diff --git a/.gitignore b/.gitignore index d16b8e12..d0476d94 100644 --- a/.gitignore +++ b/.gitignore @@ -1,6 +1,364 @@ +## Ignore Visual Studio temporary files, build results, and +## files generated by popular Visual Studio add-ons. +## +## Get latest from https://github.com/github/gitignore/blob/master/VisualStudio.gitignore + +# User-specific files +*.rsuser +*.suo +*.user +*.userosscache +*.sln.docstates + +# User-specific files (MonoDevelop/Xamarin Studio) +*.userprefs + +# Mono auto generated files +mono_crash.* + +# Build results +[Dd]ebug/ +[Dd]ebugPublic/ +[Rr]elease/ +[Rr]eleases/ +x64/ +x86/ +[Ww][Ii][Nn]32/ +[Aa][Rr][Mm]/ +[Aa][Rr][Mm]64/ +bld/ +[Bb]in/ +[Oo]bj/ +[Ll]og/ +[Ll]ogs/ + +# Visual Studio 2015/2017 cache/options directory .vs/ -bin/ -obj/ +# Uncomment if you have tasks that create the project's static files in wwwroot +#wwwroot/ + +# Visual Studio 2017 auto generated files +Generated\ Files/ + +# MSTest test Results +[Tt]est[Rr]esult*/ +[Bb]uild[Ll]og.* + +# NUnit +*.VisualState.xml +TestResult.xml +nunit-*.xml + +# Build Results of an ATL Project +[Dd]ebugPS/ +[Rr]eleasePS/ +dlldata.c + +# Benchmark Results +BenchmarkDotNet.Artifacts/ + +# .NET Core +project.lock.json +project.fragment.lock.json +artifacts/ + +# ASP.NET Scaffolding +ScaffoldingReadMe.txt + +# StyleCop +StyleCopReport.xml + +# Files built by Visual Studio +*_i.c +*_p.c +*_h.h +*.ilk +*.meta +*.obj +*.iobj +*.pch +*.pdb +*.ipdb +*.pgc +*.pgd +*.rsp +*.sbr +*.tlb +*.tli +*.tlh +*.tmp +*.tmp_proj +*_wpftmp.csproj +*.log +*.vspscc +*.vssscc +.builds +*.pidb +*.svclog +*.scc + +# Chutzpah Test files +_Chutzpah* + +# Visual C++ cache files +ipch/ +*.aps +*.ncb +*.opendb +*.opensdf +*.sdf +*.cachefile +*.VC.db +*.VC.VC.opendb + +# Visual Studio profiler +*.psess +*.vsp +*.vspx +*.sap + +# Visual Studio Trace Files +*.e2e + +# TFS 2012 Local Workspace +$tf/ + +# Guidance Automation Toolkit +*.gpState + +# ReSharper is a .NET coding add-in +_ReSharper*/ +*.[Rr]e[Ss]harper +*.DotSettings.user + +# TeamCity is a build add-in +_TeamCity* + +# DotCover is a Code Coverage Tool +*.dotCover + +# AxoCover is a Code Coverage Tool +.axoCover/* +!.axoCover/settings.json + +# Coverlet is a free, cross platform Code Coverage Tool +coverage*[.json, .xml, .info] + +# Visual Studio code coverage results +*.coverage +*.coveragexml + +# NCrunch +_NCrunch_* +.*crunch*.local.xml +nCrunchTemp_* + +# MightyMoose +*.mm.* +AutoTest.Net/ + +# Web workbench (sass) +.sass-cache/ + +# Installshield output folder +[Ee]xpress/ + +# DocProject is a documentation generator add-in +DocProject/buildhelp/ +DocProject/Help/*.HxT +DocProject/Help/*.HxC +DocProject/Help/*.hhc +DocProject/Help/*.hhk +DocProject/Help/*.hhp +DocProject/Help/Html2 +DocProject/Help/html + +# Click-Once directory +publish/ + +# Publish Web Output +*.[Pp]ublish.xml +*.azurePubxml +# Note: Comment the next line if you want to checkin your web deploy settings, +# but database connection strings (with potential passwords) will be unencrypted +*.pubxml +*.publishproj + +# Microsoft Azure Web App publish settings. Comment the next line if you want to +# checkin your Azure Web App publish settings, but sensitive information contained +# in these scripts will be unencrypted +PublishScripts/ + +# NuGet Packages +*.nupkg +# NuGet Symbol Packages +*.snupkg +# The packages folder can be ignored because of Package Restore +**/[Pp]ackages/* +# except build/, which is used as an MSBuild target. +!**/[Pp]ackages/build/ +# Uncomment if necessary however generally it will be regenerated when needed +#!**/[Pp]ackages/repositories.config +# NuGet v3's project.json files produces more ignorable files +*.nuget.props +*.nuget.targets + +# Microsoft Azure Build Output +csx/ +*.build.csdef + +# Microsoft Azure Emulator +ecf/ +rcf/ + +# Windows Store app package directories and files +AppPackages/ +BundleArtifacts/ +Package.StoreAssociation.xml +_pkginfo.txt +*.appx +*.appxbundle +*.appxupload + +# Visual Studio cache files +# files ending in .cache can be ignored +*.[Cc]ache +# but keep track of directories ending in .cache +!?*.[Cc]ache/ + +# Others +ClientBin/ +~$* +*~ +*.dbmdl +*.dbproj.schemaview +*.jfm +*.pfx +*.publishsettings +orleans.codegen.cs + +# Including strong name files can present a security risk +# (https://github.com/github/gitignore/pull/2483#issue-259490424) +#*.snk + +# Since there are multiple workflows, uncomment next line to ignore bower_components +# (https://github.com/github/gitignore/pull/1529#issuecomment-104372622) +#bower_components/ + +# RIA/Silverlight projects +Generated_Code/ + +# Backup & report files from converting an old project file +# to a newer Visual Studio version. Backup files are not needed, +# because we have git ;-) +_UpgradeReport_Files/ +Backup*/ +UpgradeLog*.XML +UpgradeLog*.htm +ServiceFabricBackup/ +*.rptproj.bak + +# SQL Server files +*.mdf +*.ldf +*.ndf + +# Business Intelligence projects +*.rdl.data +*.bim.layout +*.bim_*.settings +*.rptproj.rsuser +*- [Bb]ackup.rdl +*- [Bb]ackup ([0-9]).rdl +*- [Bb]ackup ([0-9][0-9]).rdl + +# Microsoft Fakes +FakesAssemblies/ + +# GhostDoc plugin setting file +*.GhostDoc.xml + +# Node.js Tools for Visual Studio +.ntvs_analysis.dat +node_modules/ + +# Visual Studio 6 build log +*.plg + +# Visual Studio 6 workspace options file +*.opt + +# Visual Studio 6 auto-generated workspace file (contains which files were open etc.) +*.vbw + +# Visual Studio LightSwitch build output +**/*.HTMLClient/GeneratedArtifacts +**/*.DesktopClient/GeneratedArtifacts +**/*.DesktopClient/ModelManifest.xml +**/*.Server/GeneratedArtifacts +**/*.Server/ModelManifest.xml +_Pvt_Extensions + +# Paket dependency manager +.paket/paket.exe +paket-files/ + +# FAKE - F# Make +.fake/ + +# CodeRush personal settings +.cr/personal + +# Python Tools for Visual Studio (PTVS) +__pycache__/ +*.pyc + +# Cake - Uncomment if you are using it +# tools/** +# !tools/packages.config + +# Tabs Studio +*.tss + +# Telerik's JustMock configuration file +*.jmconfig + +# BizTalk build output +*.btp.cs +*.btm.cs +*.odx.cs +*.xsd.cs + +# OpenCover UI analysis results +OpenCover/ + +# Azure Stream Analytics local run output +ASALocalRun/ + +# MSBuild Binary and Structured Log +*.binlog + +# NVidia Nsight GPU debugger configuration file +*.nvuser + +# MFractors (Xamarin productivity tool) working folder +.mfractor/ + +# Local History for Visual Studio +.localhistory/ + +# BeatPulse healthcheck temp database +healthchecksdb + +# Backup folder for Package Reference Convert tool in Visual Studio 2017 +MigrationBackup/ + +# Ionide (cross platform F# VS Code tools) working folder +.ionide/ + +# Fody - auto-generated XML schema +FodyWeavers.xsd + *Google.FlatBuffers *NodeEditorWinforms-master *GL_EditorFramework-master diff --git a/BrawlboxHelper/BrawlboxHelper.pdb b/BrawlboxHelper/BrawlboxHelper.pdb deleted file mode 100644 index 3b473a8e..00000000 Binary files a/BrawlboxHelper/BrawlboxHelper.pdb and /dev/null differ diff --git a/BrawlboxHelper/Syroot.NintenTools.Bfres.pdb b/BrawlboxHelper/Syroot.NintenTools.Bfres.pdb deleted file mode 100644 index 9a712073..00000000 Binary files a/BrawlboxHelper/Syroot.NintenTools.Bfres.pdb and /dev/null differ diff --git a/BrawlboxHelper/Syroot.NintenTools.NSW.Bfres.pdb b/BrawlboxHelper/Syroot.NintenTools.NSW.Bfres.pdb deleted file mode 100644 index 2b4c1673..00000000 Binary files a/BrawlboxHelper/Syroot.NintenTools.NSW.Bfres.pdb and /dev/null differ diff --git a/File_Format_Library/FileFormats/Bin/KartParts.cs b/File_Format_Library/FileFormats/Bin/KartParts.cs deleted file mode 100644 index 6e793319..00000000 --- a/File_Format_Library/FileFormats/Bin/KartParts.cs +++ /dev/null @@ -1,128 +0,0 @@ -using System; -using System.Collections.Generic; -using System.Linq; -using System.Text; -using System.Threading.Tasks; -using Toolbox; -using System.Windows.Forms; -using Toolbox.Library; -using Syroot.NintenTools.MarioKart8.BinData; -using Syroot.NintenTools.MarioKart8; -using System.IO; - - -namespace FirstPlugin.Turbo -{ - public class PartsBIN : TreeNodeFile, IFileFormat - { - public FileType FileType { get; set; } = FileType.Parameter; - - public bool CanSave { get; set; } - public string[] Description { get; set; } = new string[] { "Mario Kart 8 Kart Parts" }; - public string[] Extension { get; set; } = new string[] { "*.bin" }; - public string FileName { get; set; } - public string FilePath { get; set; } - public IFileInfo IFileInfo { get; set; } - - public bool Identify(System.IO.Stream stream) - { - using (var reader = new Toolbox.Library.IO.FileReader(stream, true)) - { - return reader.CheckSignature(4, "PRTS"); - } - } - - public Type[] Types - { - get - { - List types = new List(); - return types.ToArray(); - } - } - - public class TIRE - { - - } - - public class KART - { - - } - - public class GLIDER - { - - } - - BinFile binFile; - public void Load(System.IO.Stream stream) - { - binFile = new BinFile(stream); - - for (int sectionIndex = 0; sectionIndex < binFile.Sections.Count; sectionIndex++) - { - - } - - - // Dump the BIN file to CSV. - using (FileStream streamF = new FileStream("test.csv", FileMode.Create, FileAccess.Write, FileShare.None)) - using (StreamWriter writer = new StreamWriter(streamF, Encoding.UTF8, 1024, true)) - { - // Write file header information. - Write(writer, 0, $"BIN File Report for", FileName); - Write(writer, 0, "Identifier", binFile.Format); - Write(writer, 0, "Section count", binFile.Sections.Count); - Write(writer, 0, "Unknown", binFile.ID); - writer.WriteLine(); - - int sectionIndex = 1; - foreach (var section in GetDwordSectionData(binFile)) - { - Write(writer, 0, $"Section {sectionIndex++}"); - Write(writer, 1, "Identifier", section.Name); - Write(writer, 1, "Group count", section.ParamCount); - Write(writer, 1, "Type", section.ID.ToString("X")); - writer.WriteLine(); - - DwordSectionData sectionData = (DwordSectionData)section.Data; - - for (int d = 0; d < sectionData.Data.Length; d++) - { - foreach (Dword[] element in sectionData.Data[d]) - { - Write(writer, 1, String.Join('\t'.ToString(), element)); - } - } - } - } - } - - private IEnumerable
GetDwordSectionData(BinFile binFile) - { - foreach (Section section in binFile.Sections) - { - if (section.Data is DwordSectionData) - yield return section; - } - } - - - private static void Write(StreamWriter writer, int indent, params object[] values) - { - writer.WriteLine(new string('\t', indent) + String.Join('\t'.ToString(), values)); - } - - - public void Unload() - { - - } - - public void Save(System.IO.Stream stream) - { - } - } -} diff --git a/File_Format_Library/File_Format_Library.csproj.user b/File_Format_Library/File_Format_Library.csproj.user deleted file mode 100644 index dee06e3e..00000000 --- a/File_Format_Library/File_Format_Library.csproj.user +++ /dev/null @@ -1,9 +0,0 @@ - - - - true - - - ProjectFiles - - \ No newline at end of file diff --git a/GL_EditorFramework.pdb b/GL_EditorFramework.pdb deleted file mode 100644 index 36b8bf98..00000000 Binary files a/GL_EditorFramework.pdb and /dev/null differ diff --git a/README.md b/README.md index b901c42b..1df68727 100644 --- a/README.md +++ b/README.md @@ -1,168 +1,168 @@ -# Switch-Toolbox -A tool to edit many formats of Nintendo Switch, 3DS and Wii U. - -# Download -https://github.com/KillzXGaming/Switch-Toolbox/releases/tag/EXPERIMENTAL_LATEST - -## Discord -https://discord.gg/eyvGXWP - -## Features - -This tool currently features: -- BFRES - - Fully supports Wii U and Switch - - Model importing (DAE, FBX, OBJ, and CSV) - - Material editing (Render info, texture mapping, parameters, etc.) - - Material copying - - Animation and model sub section can be exported / imported - - Can delete, add, replace individual objects from an FMDL - - Can create new sub sections and data - - Can preview skeletal, SRT, param, texture pattern, and bone visual animations. (param animations vary) - - Can export and import fully rigged models with bone support - - Can convert gif files to texture pattern animations, very WIP atm - -Can edit formats: -- BFRES -- BNTX -- BFLYT -- BFLAN -- NUTEXB -- XTX -- GTX -- SARC -- BARS -- KCL -- BFLIM -- GFPAK -- BEA -- AAMP (Switch, 3DS and Wii U) -- BYAML/BYML (Switch, 3DS and Wii U) -- PTCL (Switch, 3DS and Wii U) -- TMPK -- PAK / IGA (Crash Bandicoot / Crash Team Racing) -- IGZ Textures (Crash Bandicoot / Crash Team Racing) -- BFFNT (Textures only) - -Can preview: -- BCRES - * Models, materials, and textures. -- BFSHA - * Can view options, samplers, attributes, and uniform blocks. -- BNSH - * Can extract shader vertex and fragment shaders from variations/programs. -- SHARCFB and SHARC - * Basic preview of some shader program data. - * Can edit both v1 and v2 AAMP (Wii U and Switch) -- EFC - * Can preview effect tables and link PTCL. -- NUT - * Can preview NTWU, NTP3, and NTWD variants. Editing will be implemented soon. -- MSBT - * Very basic previewing. -- MP3, OGG, IDSP, HPS, WAV, BFWAV, BFSTM, BCWAV, BCWAV - * Can listen to audio and convert between certain formats. Thanks to VGAudio and CSCore -- NARC -- SP2 (Team Sonic Racing) -- GFMDL -- TEX (3DS) -- NUSHDB (Switch Namco Shaders) -- SDF (Snow Drop Engine) -- NCA -- NSP -- IStorage -- NXARC -- LZARC -- IGA .pak -- RARC -- GMX (TPHD Models) -- MKAGPDX Model .bin files -- MKAGPDX Archive .pac files -- ME01 and SA01 archives -- Luigi's Mansion 2: Dark Moon (archives, models, and textures) -- TPL -- TXE -- BTI -- G1T -- CMB (OoT3D, MM3D, LM3DS) -- CTXB (OoT3D, MM3D, LM3DS) -- GAR (OoT3D, MM3D, LM3DS) -- ZSI (OoT3D, MM3D) -- BinGZ (Hyrule Warriors) -- PAC (Sonic Forces) -- GameCube ISOs (file system) - - -## Tutorials -https://github.com/KillzXGaming/Switch-Toolbox/wiki - -## Issues or Requests -https://github.com/KillzXGaming/Switch-Toolbox/issues - -## Building -To build make sure you have Visual Studio installed (I use 2017, older versions may not work) and open the solution (.sln), then build the solution as release. It should compile properly on the latest. - -In the event that the tool cannot compile, check references. All the libraries used are stored in Switch-Toolbox/Lib folder. - -## Credits - -- Smash Forge Devs (SMG, Ploaj, jam1garner, smb123w64gb, etc.) for some code ported over, specifically animation stuff, ETC1 encoder and some rendering. -- Ploaj for a base on the DAE writer. -- Assimp devs for their massive asset library! -- Wexos (helped figure out a few things, i.e. format list to assign each attribute) -- JuPaHe64 for the base 3D renderer. -- Every File Explorer devs (Gericom) for Yaz0 and bitmap font stuff. -- exelix for BYAML, SARC and KCL library. -- Syroot for helpful IO extensions and libraries. -- GDKChan for SPICA library (used for BCH), PICA shaders stuff used with BCRES, structs for BCRES, and some DDS decode methods. -- AboodXD for some foundation stuff with exelix's SARC library, Wii U (GPU7) and Switch (Tegra X1) textures swizzling, reading/converting uncompressed types for DDS, and documentation for GTX, XTX, and BNTX. Library for Yaz0 made by AboodXD and helped port it to the tool. -- MelonSpeedruns for Switch Toolbox logo. -- BrawlBox team for brawl libraries used for BRRES parsing. -- Sage of Mirrors for SuperBMDLib. -- Ambrosia for BTI and TXE support. -- Kuriimu for some IO and file parsing help. -- Skyth and Radfordhound for PAC documentation. -- Ac_K for ASTC decoder c# port from Ryujinx. -- pkNX and kwsch for Fnv hashing and useful pkmn code/structure references. -- Dragonation for useful code on the structure for some flatbuffers in pokemon switch -- mvit and Rei for help with gfpak hash strings and also research for formats. -- QuickBMS for some compression code ported (LZ77 WII) - -## Resources -- [TreeView Icons by icons8](https://icons8.com/) -- Smash Forge (Currently placeholders) - -## Documentation (File Formats) -- http://mk8.tockdom.com/wiki/ -- https://wiki.oatmealdome.me/Category:File_formats -- https://github.com/Kinnay/Nintendo-File-Formats/wiki -- http://Avsys.xyz/wiki/Category:File_Formats - -## Libraries -- [SuperBMDLib](https://github.com/Sage-of-Mirrors/SuperBMD) -- [BrawlLib (for BRRES section conversion)](https://github.com/libertyernie/brawltools) -- [exelix (SARC, KCL, and BYML libraries)](https://github.com/exelix11/EditorCore/tree/master/FileFormatPlugins) -- [ZstdNet (compression)](https://github.com/skbkontur/ZstdNet) -- [Be.HexEditor by Bernhard Elbl](https://sourceforge.net/projects/hexbox/) -- [GL Editor Framework by jupahe64](https://github.com/jupahe64/GL_EditorFramework) -- [WeifenLuo for docking suite](http://dockpanelsuite.com/) -- [SF Graphics by SMG (experimental)](https://github.com/ScanMountGoat/SFGraphics) (currently just a placeholder for shader workflow and some useful things) -- [NAudio (Audio & MIDI Library)](https://github.com/naudio/NAudio) -- [VGAudio](https://github.com/Thealexbarney/VGAudio) -- [CSCore](https://github.com/filoe/cscore) -- [Assimp](https://bitbucket.org/Starnick/assimpnet/src/master/) -- [OpenTK](https://github.com/opentk/opentk) -- [BezelEngineArchive Library](https://github.com/KillzXGaming/BEA-Library-Editor) -- [Syroot BinaryData](https://gitlab.com/Syroot/BinaryData) -- [Syroot Maths](https://gitlab.com/Syroot/Maths) -- [Syroot BFRES Library (Wii U)](https://gitlab.com/Syroot/NintenTools.Bfres) -- [LibHac](https://github.com/Thealexbarney/LibHac) -- [ASTC Decoder](https://github.com/Ryujinx/Ryujinx/blob/b2b736abc2569ab5d8199da666aef8d8394844a0/Ryujinx.Graphics/Graphics3d/Texture/AstcDecoder.cs) - -## Helpful Tools -- [Kuriimu](https://github.com/IcySon55/Kuriimu) - -License - in Switch_Toolbox\Lib\Licenses - - Please note if you do not want your library used or if i'm missing credits! +# Switch-Toolbox +A tool to edit many formats of Nintendo Switch, 3DS and Wii U. + +# Download +https://github.com/KillzXGaming/Switch-Toolbox/releases/tag/EXPERIMENTAL_LATEST + +## Discord +https://discord.gg/eyvGXWP + +## Features + +This tool currently features: +- BFRES + - Fully supports Wii U and Switch + - Model importing (DAE, FBX, OBJ, and CSV) + - Material editing (Render info, texture mapping, parameters, etc.) + - Material copying + - Animation and model sub section can be exported / imported + - Can delete, add, replace individual objects from an FMDL + - Can create new sub sections and data + - Can preview skeletal, SRT, param, texture pattern, and bone visual animations. (param animations vary) + - Can export and import fully rigged models with bone support + - Can convert gif files to texture pattern animations, very WIP atm + +Can edit formats: +- BFRES +- BNTX +- BFLYT +- BFLAN +- NUTEXB +- XTX +- GTX +- SARC +- BARS +- KCL +- BFLIM +- GFPAK +- BEA +- AAMP (Switch, 3DS and Wii U) +- BYAML/BYML (Switch, 3DS and Wii U) +- PTCL (Switch, 3DS and Wii U) +- TMPK +- PAK / IGA (Crash Bandicoot / Crash Team Racing) +- IGZ Textures (Crash Bandicoot / Crash Team Racing) +- BFFNT (Textures only) + +Can preview: +- BCRES + * Models, materials, and textures. +- BFSHA + * Can view options, samplers, attributes, and uniform blocks. +- BNSH + * Can extract shader vertex and fragment shaders from variations/programs. +- SHARCFB and SHARC + * Basic preview of some shader program data. + * Can edit both v1 and v2 AAMP (Wii U and Switch) +- EFC + * Can preview effect tables and link PTCL. +- NUT + * Can preview NTWU, NTP3, and NTWD variants. Editing will be implemented soon. +- MSBT + * Very basic previewing. +- MP3, OGG, IDSP, HPS, WAV, BFWAV, BFSTM, BCWAV, BCWAV + * Can listen to audio and convert between certain formats. Thanks to VGAudio and CSCore +- NARC +- SP2 (Team Sonic Racing) +- GFMDL +- TEX (3DS) +- NUSHDB (Switch Namco Shaders) +- SDF (Snow Drop Engine) +- NCA +- NSP +- IStorage +- NXARC +- LZARC +- IGA .pak +- RARC +- GMX (TPHD Models) +- MKAGPDX Model .bin files +- MKAGPDX Archive .pac files +- ME01 and SA01 archives +- Luigi's Mansion 2: Dark Moon (archives, models, and textures) +- TPL +- TXE +- BTI +- G1T +- CMB (OoT3D, MM3D, LM3DS) +- CTXB (OoT3D, MM3D, LM3DS) +- GAR (OoT3D, MM3D, LM3DS) +- ZSI (OoT3D, MM3D) +- BinGZ (Hyrule Warriors) +- PAC (Sonic Forces) +- GameCube ISOs (file system) + + +## Tutorials +https://github.com/KillzXGaming/Switch-Toolbox/wiki + +## Issues or Requests +https://github.com/KillzXGaming/Switch-Toolbox/issues + +## Building +To build make sure you have Visual Studio installed (I use 2017, older versions may not work) and open the solution (.sln), then build the solution as release. It should compile properly on the latest. + +In the event that the tool cannot compile, check references. All the libraries used are stored in Switch-Toolbox/Lib folder. + +## Credits + +- Smash Forge Devs (SMG, Ploaj, jam1garner, smb123w64gb, etc.) for some code ported over, specifically animation stuff, ETC1 encoder and some rendering. +- Ploaj for a base on the DAE writer. +- Assimp devs for their massive asset library! +- Wexos (helped figure out a few things, i.e. format list to assign each attribute) +- JuPaHe64 for the base 3D renderer. +- Every File Explorer devs (Gericom) for Yaz0 and bitmap font stuff. +- exelix for BYAML, SARC and KCL library. +- Syroot for helpful IO extensions and libraries. +- GDKChan for SPICA library (used for BCH), PICA shaders stuff used with BCRES, structs for BCRES, and some DDS decode methods. +- AboodXD for some foundation stuff with exelix's SARC library, Wii U (GPU7) and Switch (Tegra X1) textures swizzling, reading/converting uncompressed types for DDS, and documentation for GTX, XTX, and BNTX. Library for Yaz0 made by AboodXD and helped port it to the tool. +- MelonSpeedruns for Switch Toolbox logo. +- BrawlBox team for brawl libraries used for BRRES parsing. +- Sage of Mirrors for SuperBMDLib. +- Ambrosia for BTI and TXE support. +- Kuriimu for some IO and file parsing help. +- Skyth and Radfordhound for PAC documentation. +- Ac_K for ASTC decoder c# port from Ryujinx. +- pkNX and kwsch for Fnv hashing and useful pkmn code/structure references. +- Dragonation for useful code on the structure for some flatbuffers in pokemon switch +- mvit and Rei for help with gfpak hash strings and also research for formats. +- QuickBMS for some compression code ported (LZ77 WII) + +## Resources +- [TreeView Icons by icons8](https://icons8.com/) +- Smash Forge (Currently placeholders) + +## Documentation (File Formats) +- http://mk8.tockdom.com/wiki/ +- https://wiki.oatmealdome.me/Category:File_formats +- https://github.com/Kinnay/Nintendo-File-Formats/wiki +- http://Avsys.xyz/wiki/Category:File_Formats + +## Libraries +- [SuperBMDLib](https://github.com/Sage-of-Mirrors/SuperBMD) +- [BrawlLib (for BRRES section conversion)](https://github.com/libertyernie/brawltools) +- [exelix (SARC, KCL, and BYML libraries)](https://github.com/exelix11/EditorCore/tree/master/FileFormatPlugins) +- [ZstdNet (compression)](https://github.com/skbkontur/ZstdNet) +- [Be.HexEditor by Bernhard Elbl](https://sourceforge.net/projects/hexbox/) +- [GL Editor Framework by jupahe64](https://github.com/jupahe64/GL_EditorFramework) +- [WeifenLuo for docking suite](http://dockpanelsuite.com/) +- [SF Graphics by SMG (experimental)](https://github.com/ScanMountGoat/SFGraphics) (currently just a placeholder for shader workflow and some useful things) +- [NAudio (Audio & MIDI Library)](https://github.com/naudio/NAudio) +- [VGAudio](https://github.com/Thealexbarney/VGAudio) +- [CSCore](https://github.com/filoe/cscore) +- [Assimp](https://bitbucket.org/Starnick/assimpnet/src/master/) +- [OpenTK](https://github.com/opentk/opentk) +- [BezelEngineArchive Library](https://github.com/KillzXGaming/BEA-Library-Editor) +- [Syroot BinaryData](https://gitlab.com/Syroot/BinaryData) +- [Syroot Maths](https://gitlab.com/Syroot/Maths) +- [Syroot BFRES Library (Wii U)](https://gitlab.com/Syroot/NintenTools.Bfres) +- [LibHac](https://github.com/Thealexbarney/LibHac) +- [ASTC Decoder](https://github.com/Ryujinx/Ryujinx/blob/b2b736abc2569ab5d8199da666aef8d8394844a0/Ryujinx.Graphics/Graphics3d/Texture/AstcDecoder.cs) + +## Helpful Tools +- [Kuriimu](https://github.com/IcySon55/Kuriimu) + +License + in Switch_Toolbox\Lib\Licenses + + Please note if you do not want your library used or if i'm missing credits! diff --git a/Switch_Toolbox_Library/Forms/Editors/BackupAnimPanel/AnimationPanel.Designer.cs b/Switch_Toolbox_Library/Forms/Editors/BackupAnimPanel/AnimationPanel.Designer.cs deleted file mode 100644 index 629c699e..00000000 --- a/Switch_Toolbox_Library/Forms/Editors/BackupAnimPanel/AnimationPanel.Designer.cs +++ /dev/null @@ -1,185 +0,0 @@ -namespace Switch_Toolbox.Library -{ - partial class AnimationPanel - { - /// - /// Required designer variable. - /// - private System.ComponentModel.IContainer components = null; - - /// - /// Clean up any resources being used. - /// - /// true if managed resources should be disposed; otherwise, false. - protected override void Dispose(bool disposing) - { - if (disposing && (components != null)) - { - components.Dispose(); - } - base.Dispose(disposing); - } - - #region Windows Form Designer generated code - - /// - /// Required method for Designer support - do not modify - /// the contents of this method with the code editor. - /// - private void InitializeComponent() - { - this.button2 = new System.Windows.Forms.Button(); - this.panel1 = new System.Windows.Forms.Panel(); - this.totalFrame = new System.Windows.Forms.NumericUpDown(); - this.currentFrameUpDown = new System.Windows.Forms.NumericUpDown(); - this.animationPlayBtn = new System.Windows.Forms.Button(); - this.animationTrackBar = new ColorSlider.ColorSlider(); - this.stPanel1 = new Switch_Toolbox.Library.Forms.STPanel(); - this.panel1.SuspendLayout(); - ((System.ComponentModel.ISupportInitialize)(this.totalFrame)).BeginInit(); - ((System.ComponentModel.ISupportInitialize)(this.currentFrameUpDown)).BeginInit(); - this.SuspendLayout(); - // - // button2 - // - this.button2.BackColor = System.Drawing.Color.FromArgb(((int)(((byte)(64)))), ((int)(((byte)(64)))), ((int)(((byte)(64))))); - this.button2.BackgroundImage = global::Switch_Toolbox.Library.Properties.Resources.arrowL; - this.button2.BackgroundImageLayout = System.Windows.Forms.ImageLayout.Zoom; - this.button2.FlatStyle = System.Windows.Forms.FlatStyle.Flat; - this.button2.ForeColor = System.Drawing.Color.FromArgb(((int)(((byte)(64)))), ((int)(((byte)(64)))), ((int)(((byte)(64))))); - this.button2.Location = new System.Drawing.Point(17, 7); - this.button2.Name = "button2"; - this.button2.Size = new System.Drawing.Size(50, 21); - this.button2.TabIndex = 2; - this.button2.UseVisualStyleBackColor = false; - // - // panel1 - // - this.panel1.BackColor = System.Drawing.Color.FromArgb(((int)(((byte)(45)))), ((int)(((byte)(45)))), ((int)(((byte)(45))))); - this.panel1.Controls.Add(this.totalFrame); - this.panel1.Controls.Add(this.currentFrameUpDown); - this.panel1.Controls.Add(this.button2); - this.panel1.Controls.Add(this.animationPlayBtn); - this.panel1.Dock = System.Windows.Forms.DockStyle.Bottom; - this.panel1.Location = new System.Drawing.Point(0, 162); - this.panel1.Name = "panel1"; - this.panel1.Size = new System.Drawing.Size(631, 32); - this.panel1.TabIndex = 4; - this.panel1.Paint += new System.Windows.Forms.PaintEventHandler(this.panel1_Paint); - // - // totalFrame - // - this.totalFrame.Anchor = ((System.Windows.Forms.AnchorStyles)((System.Windows.Forms.AnchorStyles.Top | System.Windows.Forms.AnchorStyles.Right))); - this.totalFrame.BackColor = System.Drawing.Color.FromArgb(((int)(((byte)(64)))), ((int)(((byte)(64)))), ((int)(((byte)(64))))); - this.totalFrame.BorderStyle = System.Windows.Forms.BorderStyle.None; - this.totalFrame.ForeColor = System.Drawing.Color.White; - this.totalFrame.Location = new System.Drawing.Point(508, 12); - this.totalFrame.Name = "totalFrame"; - this.totalFrame.Size = new System.Drawing.Size(98, 16); - this.totalFrame.TabIndex = 4; - // - // currentFrameUpDown - // - this.currentFrameUpDown.Anchor = ((System.Windows.Forms.AnchorStyles)((System.Windows.Forms.AnchorStyles.Top | System.Windows.Forms.AnchorStyles.Right))); - this.currentFrameUpDown.BackColor = System.Drawing.Color.FromArgb(((int)(((byte)(64)))), ((int)(((byte)(64)))), ((int)(((byte)(64))))); - this.currentFrameUpDown.BorderStyle = System.Windows.Forms.BorderStyle.None; - this.currentFrameUpDown.ForeColor = System.Drawing.Color.White; - this.currentFrameUpDown.Location = new System.Drawing.Point(390, 12); - this.currentFrameUpDown.Name = "currentFrameUpDown"; - this.currentFrameUpDown.Size = new System.Drawing.Size(98, 16); - this.currentFrameUpDown.TabIndex = 3; - this.currentFrameUpDown.ValueChanged += new System.EventHandler(this.currentFrameUpDown_ValueChanged); - // - // animationPlayBtn - // - this.animationPlayBtn.BackColor = System.Drawing.Color.FromArgb(((int)(((byte)(64)))), ((int)(((byte)(64)))), ((int)(((byte)(64))))); - this.animationPlayBtn.BackgroundImage = global::Switch_Toolbox.Library.Properties.Resources.arrowR; - this.animationPlayBtn.BackgroundImageLayout = System.Windows.Forms.ImageLayout.Zoom; - this.animationPlayBtn.FlatStyle = System.Windows.Forms.FlatStyle.Flat; - this.animationPlayBtn.ForeColor = System.Drawing.Color.FromArgb(((int)(((byte)(64)))), ((int)(((byte)(64)))), ((int)(((byte)(64))))); - this.animationPlayBtn.Location = new System.Drawing.Point(73, 7); - this.animationPlayBtn.Name = "animationPlayBtn"; - this.animationPlayBtn.Size = new System.Drawing.Size(50, 21); - this.animationPlayBtn.TabIndex = 1; - this.animationPlayBtn.UseVisualStyleBackColor = false; - this.animationPlayBtn.Click += new System.EventHandler(this.animationPlayBtn_Click); - // - // animationTrackBar - // - this.animationTrackBar.Anchor = ((System.Windows.Forms.AnchorStyles)((((System.Windows.Forms.AnchorStyles.Top | System.Windows.Forms.AnchorStyles.Bottom) - | System.Windows.Forms.AnchorStyles.Left) - | System.Windows.Forms.AnchorStyles.Right))); - this.animationTrackBar.BackColor = System.Drawing.Color.FromArgb(((int)(((byte)(40)))), ((int)(((byte)(40)))), ((int)(((byte)(40))))); - this.animationTrackBar.BarInnerColor = System.Drawing.Color.FromArgb(((int)(((byte)(40)))), ((int)(((byte)(40)))), ((int)(((byte)(40))))); - this.animationTrackBar.BarPenColorBottom = System.Drawing.Color.FromArgb(((int)(((byte)(40)))), ((int)(((byte)(40)))), ((int)(((byte)(40))))); - this.animationTrackBar.BarPenColorTop = System.Drawing.Color.FromArgb(((int)(((byte)(40)))), ((int)(((byte)(40)))), ((int)(((byte)(40))))); - this.animationTrackBar.BorderRoundRectSize = new System.Drawing.Size(8, 8); - this.animationTrackBar.ElapsedInnerColor = System.Drawing.Color.FromArgb(((int)(((byte)(40)))), ((int)(((byte)(40)))), ((int)(((byte)(40))))); - this.animationTrackBar.ElapsedPenColorBottom = System.Drawing.Color.FromArgb(((int)(((byte)(40)))), ((int)(((byte)(40)))), ((int)(((byte)(40))))); - this.animationTrackBar.ElapsedPenColorTop = System.Drawing.Color.FromArgb(((int)(((byte)(40)))), ((int)(((byte)(40)))), ((int)(((byte)(40))))); - this.animationTrackBar.Font = new System.Drawing.Font("Microsoft Sans Serif", 6F); - this.animationTrackBar.ForeColor = System.Drawing.Color.Silver; - this.animationTrackBar.LargeChange = ((uint)(5u)); - this.animationTrackBar.Location = new System.Drawing.Point(0, 16); - this.animationTrackBar.MouseEffects = false; - this.animationTrackBar.Name = "animationTrackBar"; - this.animationTrackBar.ScaleDivisions = 10; - this.animationTrackBar.ScaleSubDivisions = 5; - this.animationTrackBar.ShowDivisionsText = true; - this.animationTrackBar.ShowSmallScale = true; - this.animationTrackBar.Size = new System.Drawing.Size(631, 147); - this.animationTrackBar.SmallChange = ((uint)(0u)); - this.animationTrackBar.TabIndex = 3; - this.animationTrackBar.Text = "colorSlider1"; - this.animationTrackBar.ThumbInnerColor = System.Drawing.Color.Olive; - this.animationTrackBar.ThumbOuterColor = System.Drawing.Color.Olive; - this.animationTrackBar.ThumbPenColor = System.Drawing.Color.FromArgb(((int)(((byte)(64)))), ((int)(((byte)(64)))), ((int)(((byte)(64))))); - this.animationTrackBar.ThumbRoundRectSize = new System.Drawing.Size(1, 1); - this.animationTrackBar.ThumbSize = new System.Drawing.Size(5, 128); - this.animationTrackBar.TickAdd = 0F; - this.animationTrackBar.TickColor = System.Drawing.Color.Gray; - this.animationTrackBar.TickDivide = 1F; - this.animationTrackBar.Value = 0; - this.animationTrackBar.ValueChanged += new System.EventHandler(this.animationTrackBar_ValueChanged); - this.animationTrackBar.Scroll += new System.Windows.Forms.ScrollEventHandler(this.colorSlider1_Scroll); - // - // stPanel1 - // - this.stPanel1.Anchor = ((System.Windows.Forms.AnchorStyles)(((System.Windows.Forms.AnchorStyles.Top | System.Windows.Forms.AnchorStyles.Left) - | System.Windows.Forms.AnchorStyles.Right))); - this.stPanel1.Location = new System.Drawing.Point(0, 0); - this.stPanel1.Name = "stPanel1"; - this.stPanel1.Size = new System.Drawing.Size(631, 16); - this.stPanel1.TabIndex = 5; - // - // AnimationPanel - // - this.AutoScaleDimensions = new System.Drawing.SizeF(6F, 13F); - this.AutoScaleMode = System.Windows.Forms.AutoScaleMode.Font; - this.Controls.Add(this.stPanel1); - this.Controls.Add(this.animationTrackBar); - this.Controls.Add(this.panel1); - this.Name = "AnimationPanel"; - this.Size = new System.Drawing.Size(631, 194); - this.Load += new System.EventHandler(this.AnimationPanel_Load); - this.Click += new System.EventHandler(this.AnimationPanel_Click); - this.Enter += new System.EventHandler(this.AnimationPanel_Enter); - this.Leave += new System.EventHandler(this.AnimationPanel_Leave); - this.panel1.ResumeLayout(false); - ((System.ComponentModel.ISupportInitialize)(this.totalFrame)).EndInit(); - ((System.ComponentModel.ISupportInitialize)(this.currentFrameUpDown)).EndInit(); - this.ResumeLayout(false); - - } - - #endregion - - private ColorSlider.ColorSlider animationTrackBar; - private System.Windows.Forms.Button button2; - private System.Windows.Forms.Button animationPlayBtn; - private System.Windows.Forms.Panel panel1; - private System.Windows.Forms.NumericUpDown totalFrame; - private System.Windows.Forms.NumericUpDown currentFrameUpDown; - private Forms.STPanel stPanel1; - } -} \ No newline at end of file diff --git a/Switch_Toolbox_Library/Forms/Editors/BackupAnimPanel/AnimationPanel.cs b/Switch_Toolbox_Library/Forms/Editors/BackupAnimPanel/AnimationPanel.cs deleted file mode 100644 index 1fb79b80..00000000 --- a/Switch_Toolbox_Library/Forms/Editors/BackupAnimPanel/AnimationPanel.cs +++ /dev/null @@ -1,407 +0,0 @@ -using System; -using System.Collections.Generic; -using System.ComponentModel; -using System.Data; -using System.Drawing; -using System.Linq; -using System.Text; -using System.Threading; -using System.Windows.Forms; -using System.IO; -using System.Diagnostics; -using Switch_Toolbox.Library.Forms; -using Switch_Toolbox.Library.Animations; - -namespace Switch_Toolbox.Library -{ - //Thanks to forge! Based on - // https://github.com/jam1garner/Smash-Forge/blob/52844da94c7bed830d841e0d7e5d49c3f2c69471/Smash%20Forge/GUI/ModelViewport.cs - - public partial class AnimationPanel : STUserControl - { - private static AnimationPanel _instance; - public static AnimationPanel Instance { get { return _instance == null ? _instance = new AnimationPanel() : _instance; } } - - //Animation Functions - public int AnimationSpeed = 60; - public float Frame = 0; - public bool isPlaying; - public bool isOpen = true; - private Thread renderThread; - public bool renderThreadIsUpdating = false; - - private Animation currentAnimation; - public Animation CurrentAnimation - { - get - { - return currentAnimation; - } - set - { - if (value == null) - return; - - int frameCount = 1; - - if (value.FrameCount != 0) - frameCount = value.FrameCount; - - ResetModels(); - currentAnimation = value; - totalFrame.Maximum = frameCount; - totalFrame.Value = frameCount; - currentFrameUpDown.Maximum = frameCount; - animationTrackBar.TickDivide = 1; - animationTrackBar.Maximum = frameCount; - animationTrackBar.Minimum = 0; - currentFrameUpDown.Value = 1; - currentFrameUpDown.Value = 0; - } - } - - public void ResetModels() - { - var viewport = LibraryGUI.Instance.GetActiveViewport(); - if (viewport == null) - return; - if (viewport.scene == null) - return; - - foreach (var drawable in viewport.scene.objects) - { - if (drawable is STSkeleton) - { - ((STSkeleton)drawable).reset(); - } - } - } - - public AnimationPanel() - { - InitializeComponent(); - BackColor = FormThemes.BaseTheme.FormBackColor; - ForeColor = FormThemes.BaseTheme.FormForeColor; - - animationTrackBar.BackColor = FormThemes.BaseTheme.FormBackColor; - animationTrackBar.ForeColor = FormThemes.BaseTheme.FormForeColor; - - animationTrackBar.ThumbInnerColor = FormThemes.BaseTheme.TimelineThumbColor; - animationTrackBar.ThumbOuterColor = FormThemes.BaseTheme.TimelineThumbColor; - - this.animationTrackBar.BarInnerColor = FormThemes.BaseTheme.FormBackColor; - this.animationTrackBar.BarPenColorBottom = FormThemes.BaseTheme.FormBackColor; - this.animationTrackBar.BarPenColorTop = FormThemes.BaseTheme.FormBackColor; - this.animationTrackBar.ElapsedInnerColor = FormThemes.BaseTheme.FormBackColor; - this.animationTrackBar.ElapsedPenColorBottom = FormThemes.BaseTheme.FormBackColor; - this.animationTrackBar.ElapsedPenColorTop = FormThemes.BaseTheme.FormBackColor; - - panel1.BackColor = FormThemes.BaseTheme.FormBackColor; - animationPlayBtn.BackColor = FormThemes.BaseTheme.FormBackColor; - button2.BackColor = FormThemes.BaseTheme.FormBackColor; - animationPlayBtn.ForeColor = FormThemes.BaseTheme.FormForeColor; - button2.ForeColor = FormThemes.BaseTheme.FormForeColor; - - totalFrame.ForeColor = FormThemes.BaseTheme.FormForeColor; - totalFrame.BackColor = FormThemes.BaseTheme.FormBackColor; - currentFrameUpDown.ForeColor = FormThemes.BaseTheme.FormForeColor; - currentFrameUpDown.BackColor = FormThemes.BaseTheme.FormBackColor; - } - - private void animationPlayBtn_Click(object sender, EventArgs e) - { - isPlaying = !isPlaying; - animationPlayBtn.BackgroundImage = isPlaying ? Properties.Resources.stop : Properties.Resources.arrowR; - } - - private void totalFrame_ValueChanged(object sender, EventArgs e) - { - if (currentAnimation == null) return; - if (totalFrame.Value < 1) - { - totalFrame.Value = 1; - } - else - { - if (currentAnimation.Tag is Animation) - ((Animation)currentAnimation.Tag).FrameCount = (int)totalFrame.Value; - currentAnimation.FrameCount = (int)totalFrame.Value; - animationTrackBar.Value = 0; - animationTrackBar.Maximum = currentAnimation.FrameCount; - animationTrackBar.Minimum = 0; - } - } - private void UpdateViewport() - { - if (IsDisposed) - return; - - Viewport viewport = LibraryGUI.Instance.GetActiveViewport(); - - - if (viewport == null) - return; - - if (viewport.GL_ControlLegacy != null && - !viewport.GL_ControlLegacy.IsDisposed) - { - if (viewport.GL_ControlLegacy.InvokeRequired) - { - viewport.GL_ControlLegacy.Invoke((MethodInvoker)delegate { - // Running on the UI thread - viewport.GL_ControlLegacy.Invalidate(); - }); - } - else - { - viewport.GL_ControlLegacy.Invalidate(); - } - } - else - { - if (viewport.GL_ControlModern == null || viewport.GL_ControlModern.IsDisposed || viewport.GL_ControlModern.Disposing) - return; - - if (viewport.GL_ControlModern.InvokeRequired) - { - viewport.GL_ControlModern.Invoke((MethodInvoker)delegate { - // Running on the UI thread - viewport.GL_ControlModern.Invalidate(); - }); - } - else - { - viewport.GL_ControlModern.Invalidate(); - } - } - } - private void RenderAndAnimationLoop() - { - if (IsDisposed) - return; - - // TODO: We don't really need two timers. - Stopwatch renderStopwatch = Stopwatch.StartNew(); - Stopwatch animationStopwatch = Stopwatch.StartNew(); - - // Wait for UI to load before triggering paint events. - int waitTimeMs = 500; - Thread.Sleep(waitTimeMs); - - UpdateViewport(); - - int frameUpdateInterval = 5; - int animationUpdateInterval = 16; - - while (isOpen) - { - // Always refresh the viewport when animations are playing. - if (renderThreadIsUpdating || isPlaying) - { - if (renderStopwatch.ElapsedMilliseconds > frameUpdateInterval) - { - UpdateViewport(); - renderStopwatch.Restart(); - } - - if (animationStopwatch.ElapsedMilliseconds > animationUpdateInterval) - { - UpdateAnimationFrame(); - animationStopwatch.Restart(); - } - } - else - { - // Avoid wasting the CPU if we don't need to render anything. - Thread.Sleep(1); - } - } - } - private void UpdateAnimationFrame() - { - if (isPlaying) - { - if (currentFrameUpDown.InvokeRequired) - { - this.currentFrameUpDown.Invoke((MethodInvoker)delegate { - // Running on the UI thread - if (currentFrameUpDown.Value == totalFrame.Value) - currentFrameUpDown.Value = 0; - else - currentFrameUpDown.Value++; - }); - } - else - { - if (currentFrameUpDown.Value == totalFrame.Value) - currentFrameUpDown.Value = 0; - else - currentFrameUpDown.Value++; - } - } - } - private void nextButton_Click(object sender, EventArgs e) - { - // Loop the animation. - if (currentFrameUpDown.Value == totalFrame.Value) - currentFrameUpDown.Value = 0; - else - currentFrameUpDown.Value++; - } - private void prevButton_Click(object sender, EventArgs e) - { - if (currentFrameUpDown.Value != 0) - currentFrameUpDown.Value--; - } - - private void animationTrackBar_Scroll(object sender, EventArgs e) - { - - } - - private void animationTrackBar_ValueChanged(object sender, EventArgs e) - { - if (animationTrackBar.Value > (int)totalFrame.Value) - animationTrackBar.Value = 0; - if (animationTrackBar.Value < 0) - animationTrackBar.Value = (int)totalFrame.Value; - currentFrameUpDown.Value = animationTrackBar.Value; - - int currentFrame = animationTrackBar.Value; - - SetAnimationsToFrame(currentFrame); - - if (!renderThreadIsUpdating || !isPlaying) - UpdateViewport(); - } - private void SetAnimationsToFrame(int frameNum) - { - if (currentAnimation == null) - return; - - var viewport = LibraryGUI.Instance.GetActiveViewport(); - if (viewport == null || viewport.scene == null) - return; - - var anim = currentAnimation.Tag; - - float animFrameNum = frameNum; - - - if (anim is MaterialAnimation) - { - ((MaterialAnimation)anim).SetFrame(animFrameNum); - ((MaterialAnimation)anim).NextFrame(viewport); - } - else if (anim is VisibilityAnimation) - { - ((VisibilityAnimation)anim).SetFrame(animFrameNum); - ((VisibilityAnimation)anim).NextFrame(viewport); - } - else if (anim is CameraAnimation) - { - ((CameraAnimation)anim).SetFrame(animFrameNum); - ((CameraAnimation)anim).NextFrame(viewport); - } - else if (anim is LightAnimation) - { - ((LightAnimation)anim).SetFrame(animFrameNum); - ((LightAnimation)anim).NextFrame(viewport); - } - else if (anim is FogAnimation) - { - ((FogAnimation)anim).SetFrame(animFrameNum); - ((FogAnimation)anim).NextFrame(viewport); - } - else //Play a skeletal animation if it's not the other types - { - foreach (var drawable in viewport.scene.objects) - { - if (drawable is STSkeleton) - { - currentAnimation.SetFrame(animFrameNum); - currentAnimation.NextFrame((STSkeleton)drawable); - } - } - } - - - //Add frames to the playing animation - currentAnimation.Frame += 1f; - - //Reset it when it reaches the total frame count - if (currentAnimation.Frame >= currentAnimation.FrameCount) - { - currentAnimation.Frame = 0; - } - } - - private void currentFrameUpDown_ValueChanged(object sender, EventArgs e) - { - if (currentFrameUpDown.Value > totalFrame.Value) - currentFrameUpDown.Value = totalFrame.Value; - - animationTrackBar.Value = (int)currentFrameUpDown.Value; - - animationTrackBar.Refresh(); - } - - public void AnimationPanel_FormClosed() - { - isOpen = false; - Dispose(); - } - - private void AnimationPanel_Load(object sender, EventArgs e) - { - Viewport viewport = LibraryGUI.Instance.GetActiveViewport(); - if (viewport != null) - { - if (viewport.GL_ControlLegacy != null) - viewport.GL_ControlLegacy.VSync = Runtime.enableVSync; - else - viewport.GL_ControlModern.VSync = Runtime.enableVSync; - } - - renderThread = new Thread(new ThreadStart(RenderAndAnimationLoop)); - renderThread.Start(); - } - - private void AnimationPanel_Enter(object sender, EventArgs e) - { - - } - - private void AnimationPanel_Click(object sender, EventArgs e) - { - renderThreadIsUpdating = true; - } - - private void AnimationPanel_Leave(object sender, EventArgs e) - { - renderThreadIsUpdating = false; - } - public void ClosePanel() - { - ResetModels(); - - currentAnimation = null; - renderThreadIsUpdating = false; - isOpen = false; - - if (renderThread != null) - renderThread.Abort(); - Dispose(); - } - - private void panel1_Paint(object sender, PaintEventArgs e) - { - - } - - private void colorSlider1_Scroll(object sender, ScrollEventArgs e) - { - - } - } -} diff --git a/Switch_Toolbox_Library/Forms/Editors/BackupAnimPanel/AnimationPanel.resx b/Switch_Toolbox_Library/Forms/Editors/BackupAnimPanel/AnimationPanel.resx deleted file mode 100644 index 1af7de15..00000000 --- a/Switch_Toolbox_Library/Forms/Editors/BackupAnimPanel/AnimationPanel.resx +++ /dev/null @@ -1,120 +0,0 @@ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - text/microsoft-resx - - - 2.0 - - - System.Resources.ResXResourceReader, System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089 - - - System.Resources.ResXResourceWriter, System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089 - - \ No newline at end of file diff --git a/Switch_Toolbox_Library/Resources/ps81B1.tmp b/Switch_Toolbox_Library/Resources/ps81B1.tmp deleted file mode 100644 index e69de29b..00000000 diff --git a/Switch_Toolbox_Library/Toolbox_Library.csproj.user b/Switch_Toolbox_Library/Toolbox_Library.csproj.user deleted file mode 100644 index 81d003f4..00000000 --- a/Switch_Toolbox_Library/Toolbox_Library.csproj.user +++ /dev/null @@ -1,9 +0,0 @@ - - - - true - - - ShowAllFiles - - \ No newline at end of file diff --git a/Toolbox - Shortcut.lnk b/Toolbox - Shortcut.lnk deleted file mode 100644 index 60532d25..00000000 Binary files a/Toolbox - Shortcut.lnk and /dev/null differ diff --git a/Toolbox/GUI/Credits.resx b/Toolbox/GUI/Credits.resx index f2055186..224c82d9 100644 --- a/Toolbox/GUI/Credits.resx +++ b/Toolbox/GUI/Credits.resx @@ -1,123 +1,123 @@ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - text/microsoft-resx - - - 2.0 - - - System.Resources.ResXResourceReader, System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089 - - - System.Resources.ResXResourceWriter, System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089 - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + text/microsoft-resx + + + 2.0 + + + System.Resources.ResXResourceReader, System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089 + + + System.Resources.ResXResourceWriter, System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089 + + - Smash Forge Devs (SMG, Ploaj, jam1garner, smb123w64gb, etc) for some code ported over. Specifically animation stuff and some rendering. - Assimp devs for their massive asset library! - Wexos (helped figure out a few things, ie format list to assign each attribute) @@ -129,6 +129,6 @@ - AboodXD for BNTX texture swizzling - MelonSpeedruns for logo. - Skyth and Radfordhound for PAC documentation -- Ploaj and CrossMod devs for base on DAE writer/exporter - +- Ploaj and CrossMod devs for base on DAE writer/exporter + \ No newline at end of file diff --git a/Toolbox/Gl_EditorFramework.pdb b/Toolbox/Gl_EditorFramework.pdb deleted file mode 100644 index 36b8bf98..00000000 Binary files a/Toolbox/Gl_EditorFramework.pdb and /dev/null differ diff --git a/Toolbox/Lib/AampLibraryCSharp.pdb b/Toolbox/Lib/AampLibraryCSharp.pdb deleted file mode 100644 index d8d8ba21..00000000 Binary files a/Toolbox/Lib/AampLibraryCSharp.pdb and /dev/null differ diff --git a/Toolbox/Lib/BarsLibrary.pdb b/Toolbox/Lib/BarsLibrary.pdb deleted file mode 100644 index 400d0e79..00000000 Binary files a/Toolbox/Lib/BarsLibrary.pdb and /dev/null differ diff --git a/Toolbox/Lib/BcresLibrary.pdb b/Toolbox/Lib/BcresLibrary.pdb deleted file mode 100644 index d2c642f8..00000000 Binary files a/Toolbox/Lib/BcresLibrary.pdb and /dev/null differ diff --git a/Toolbox/Lib/BfshaLibrary.pdb b/Toolbox/Lib/BfshaLibrary.pdb deleted file mode 100644 index 3d52ea0f..00000000 Binary files a/Toolbox/Lib/BfshaLibrary.pdb and /dev/null differ diff --git a/Toolbox/Lib/BrawlLib.pdb b/Toolbox/Lib/BrawlLib.pdb deleted file mode 100644 index 783388ba..00000000 Binary files a/Toolbox/Lib/BrawlLib.pdb and /dev/null differ diff --git a/Toolbox/Lib/BrawlboxHelper.pdb b/Toolbox/Lib/BrawlboxHelper.pdb deleted file mode 100644 index 03303d1c..00000000 Binary files a/Toolbox/Lib/BrawlboxHelper.pdb and /dev/null differ diff --git a/Toolbox/Lib/ByamlExt.pdb b/Toolbox/Lib/ByamlExt.pdb deleted file mode 100644 index fb14db8a..00000000 Binary files a/Toolbox/Lib/ByamlExt.pdb and /dev/null differ diff --git a/Toolbox/Lib/CSCore.pdb b/Toolbox/Lib/CSCore.pdb deleted file mode 100644 index 4b8824b1..00000000 Binary files a/Toolbox/Lib/CSCore.pdb and /dev/null differ diff --git a/Toolbox/Lib/DarkUI.pdb b/Toolbox/Lib/DarkUI.pdb deleted file mode 100644 index d1fcf2cb..00000000 Binary files a/Toolbox/Lib/DarkUI.pdb and /dev/null differ diff --git a/Toolbox/Lib/DirectXTex.Build.CppClean.log b/Toolbox/Lib/DirectXTex.Build.CppClean.log deleted file mode 100644 index f0aeb0c0..00000000 --- a/Toolbox/Lib/DirectXTex.Build.CppClean.log +++ /dev/null @@ -1,25 +0,0 @@ -c:\users\nathan\documents\github\switch_toolbox\switch-toolbox - copy\switch_toolbox\lib\directxtex\release\vc141.pdb -c:\users\nathan\documents\github\switch_toolbox\switch-toolbox - copy\switch_toolbox\lib\directxtex\release\directxtexutil.obj -c:\users\nathan\documents\github\switch_toolbox\switch-toolbox - copy\switch_toolbox\lib\directxtex\release\directxtexmipmaps.obj -c:\users\nathan\documents\github\switch_toolbox\switch-toolbox - copy\switch_toolbox\lib\directxtex\release\directxteximage.obj -c:\users\nathan\documents\github\switch_toolbox\switch-toolbox - copy\switch_toolbox\lib\directxtex\release\directxtexdds.obj -c:\users\nathan\documents\github\switch_toolbox\switch-toolbox - copy\switch_toolbox\lib\directxtex\release\directxtexconvert.obj -c:\users\nathan\documents\github\switch_toolbox\switch-toolbox - copy\switch_toolbox\lib\directxtex\release\directxtexcompress.obj -c:\users\nathan\documents\github\switch_toolbox\switch-toolbox - copy\switch_toolbox\lib\directxtex\release\bc6hbc7.obj -c:\users\nathan\documents\github\switch_toolbox\switch-toolbox - copy\switch_toolbox\lib\directxtex\release\bc4bc5.obj -c:\users\nathan\documents\github\switch_toolbox\switch-toolbox - copy\switch_toolbox\lib\directxtex\release\bc.obj -c:\users\nathan\documents\github\switch_toolbox\switch-toolbox - copy\switch_toolbox\lib\directxtex\release\wrapper.obj -c:\users\nathan\documents\github\switch_toolbox\switch-toolbox - copy\switch_toolbox\lib\directxtex\release\.netframework,version=v4.6.assemblyattributes.obj -c:\users\nathan\documents\github\switch_toolbox\switch-toolbox - copy\switch_toolbox\lib\directxtex\release\.netframework,version=v4.6.assemblyattributes.asm -c:\users\nathan\documents\github\switch_toolbox\switch-toolbox - copy\release\directxtex.ipdb -c:\users\nathan\documents\github\switch_toolbox\switch-toolbox - copy\release\directxtex.iobj -c:\users\nathan\documents\github\switch_toolbox\switch-toolbox - copy\release\directxtex.dll -c:\users\nathan\documents\github\switch_toolbox\switch-toolbox - copy\switch_toolbox\lib\directxtex\release\directxtex.tlog\cl.command.1.tlog -c:\users\nathan\documents\github\switch_toolbox\switch-toolbox - copy\switch_toolbox\lib\directxtex\release\directxtex.tlog\cl.read.1.tlog -c:\users\nathan\documents\github\switch_toolbox\switch-toolbox - copy\switch_toolbox\lib\directxtex\release\directxtex.tlog\cl.write.1.tlog -c:\users\nathan\documents\github\switch_toolbox\switch-toolbox - copy\switch_toolbox\lib\directxtex\release\directxtex.tlog\directxtex.write.1u.tlog -c:\users\nathan\documents\github\switch_toolbox\switch-toolbox - copy\switch_toolbox\lib\directxtex\release\directxtex.tlog\link.command.1.tlog -c:\users\nathan\documents\github\switch_toolbox\switch-toolbox - copy\switch_toolbox\lib\directxtex\release\directxtex.tlog\link.read.1.tlog -c:\users\nathan\documents\github\switch_toolbox\switch-toolbox - copy\switch_toolbox\lib\directxtex\release\directxtex.tlog\link.write.1.tlog -c:\users\nathan\documents\github\switch_toolbox\switch-toolbox - copy\switch_toolbox\lib\directxtex\release\directxtex.tlog\metagen.read.1.tlog -c:\users\nathan\documents\github\switch_toolbox\switch-toolbox - copy\switch_toolbox\lib\directxtex\release\directxtex.tlog\metagen.write.1.tlog diff --git a/Toolbox/Lib/DirectXTex.iobj b/Toolbox/Lib/DirectXTex.iobj deleted file mode 100644 index 794e3c7d..00000000 Binary files a/Toolbox/Lib/DirectXTex.iobj and /dev/null differ diff --git a/Toolbox/Lib/DirectXTex.ipdb b/Toolbox/Lib/DirectXTex.ipdb deleted file mode 100644 index 24ac227e..00000000 Binary files a/Toolbox/Lib/DirectXTex.ipdb and /dev/null differ diff --git a/Toolbox/Lib/DirectXTex.log b/Toolbox/Lib/DirectXTex.log deleted file mode 100644 index b56d741f..00000000 --- a/Toolbox/Lib/DirectXTex.log +++ /dev/null @@ -1,15 +0,0 @@ - BC.cpp - BC4BC5.cpp - BC6HBC7.cpp - DirectXTexCompress.cpp - DirectXTexConvert.cpp - DirectXTexDDS.cpp - DirectXTexImage.cpp - DirectXTexMipmaps.cpp - DirectXTexUtil.cpp - wrapper.cpp - .NETFramework,Version=v4.6.AssemblyAttributes.cpp - Generating code - All 442 functions were compiled because no usable IPDB/IOBJ from previous compilation was found. - Finished generating code - DirectXTex.vcxproj -> C:\Users\Nathan\Documents\GitHub\Switch_Toolbox\Switch-Toolbox - Copy\Release\DirectXTex.dll diff --git a/Toolbox/Lib/DirectXTex.vcxprojAssemblyReference.cache b/Toolbox/Lib/DirectXTex.vcxprojAssemblyReference.cache deleted file mode 100644 index 02221e3b..00000000 Binary files a/Toolbox/Lib/DirectXTex.vcxprojAssemblyReference.cache and /dev/null differ diff --git a/Toolbox/Lib/EditorCore.pdb b/Toolbox/Lib/EditorCore.pdb deleted file mode 100644 index a9598a62..00000000 Binary files a/Toolbox/Lib/EditorCore.pdb and /dev/null differ diff --git a/Toolbox/Lib/EditorCoreCommon.pdb b/Toolbox/Lib/EditorCoreCommon.pdb deleted file mode 100644 index 50d007c2..00000000 Binary files a/Toolbox/Lib/EditorCoreCommon.pdb and /dev/null differ diff --git a/Toolbox/Lib/FlatBufferTest.pdb b/Toolbox/Lib/FlatBufferTest.pdb deleted file mode 100644 index 4e0521c9..00000000 Binary files a/Toolbox/Lib/FlatBufferTest.pdb and /dev/null differ diff --git a/Toolbox/Lib/FlatBuffers.pdb b/Toolbox/Lib/FlatBuffers.pdb deleted file mode 100644 index 4fa3b4cb..00000000 Binary files a/Toolbox/Lib/FlatBuffers.pdb and /dev/null differ diff --git a/Toolbox/Lib/KCLExt.pdb b/Toolbox/Lib/KCLExt.pdb deleted file mode 100644 index 4938fc5d..00000000 Binary files a/Toolbox/Lib/KCLExt.pdb and /dev/null differ diff --git a/Toolbox/Lib/Newtonsoft.Json.pdb b/Toolbox/Lib/Newtonsoft.Json.pdb deleted file mode 100644 index 0cfd8934..00000000 Binary files a/Toolbox/Lib/Newtonsoft.Json.pdb and /dev/null differ diff --git a/Toolbox/Lib/Plugins/EditorCoreCommon.pdb b/Toolbox/Lib/Plugins/EditorCoreCommon.pdb deleted file mode 100644 index 9d1203af..00000000 Binary files a/Toolbox/Lib/Plugins/EditorCoreCommon.pdb and /dev/null differ diff --git a/Toolbox/Lib/Plugins/FirstPlugin.Plg.pdb b/Toolbox/Lib/Plugins/FirstPlugin.Plg.pdb deleted file mode 100644 index 74749330..00000000 Binary files a/Toolbox/Lib/Plugins/FirstPlugin.Plg.pdb and /dev/null differ diff --git a/Toolbox/Lib/Plugins/KCLExt.pdb b/Toolbox/Lib/Plugins/KCLExt.pdb deleted file mode 100644 index 6ec81fb7..00000000 Binary files a/Toolbox/Lib/Plugins/KCLExt.pdb and /dev/null differ diff --git a/Toolbox/Lib/Plugins/SARCExt.pdb b/Toolbox/Lib/Plugins/SARCExt.pdb deleted file mode 100644 index 5b013a9d..00000000 Binary files a/Toolbox/Lib/Plugins/SARCExt.pdb and /dev/null differ diff --git a/Toolbox/Lib/Plugins/Switch_Toolbox.Library.pdb b/Toolbox/Lib/Plugins/Switch_Toolbox.Library.pdb deleted file mode 100644 index f527f16e..00000000 Binary files a/Toolbox/Lib/Plugins/Switch_Toolbox.Library.pdb and /dev/null differ diff --git a/Toolbox/Lib/Plugins/Syroot.NintenTools.Bfres.pdb b/Toolbox/Lib/Plugins/Syroot.NintenTools.Bfres.pdb deleted file mode 100644 index cc5fe952..00000000 Binary files a/Toolbox/Lib/Plugins/Syroot.NintenTools.Bfres.pdb and /dev/null differ diff --git a/Toolbox/Lib/SARCExt.pdb b/Toolbox/Lib/SARCExt.pdb deleted file mode 100644 index 71947320..00000000 Binary files a/Toolbox/Lib/SARCExt.pdb and /dev/null differ diff --git a/Toolbox/Lib/SELib.pdb b/Toolbox/Lib/SELib.pdb deleted file mode 100644 index 803e4c60..00000000 Binary files a/Toolbox/Lib/SELib.pdb and /dev/null differ diff --git a/Toolbox/Lib/SPICA.Rendering.pdb b/Toolbox/Lib/SPICA.Rendering.pdb deleted file mode 100644 index cb67fe85..00000000 Binary files a/Toolbox/Lib/SPICA.Rendering.pdb and /dev/null differ diff --git a/Toolbox/Lib/SPICA.pdb b/Toolbox/Lib/SPICA.pdb deleted file mode 100644 index 0b33f2c3..00000000 Binary files a/Toolbox/Lib/SPICA.pdb and /dev/null differ diff --git a/Toolbox/Lib/ScintillaNET.pdb b/Toolbox/Lib/ScintillaNET.pdb deleted file mode 100644 index eff62fa2..00000000 Binary files a/Toolbox/Lib/ScintillaNET.pdb and /dev/null differ diff --git a/Toolbox/Lib/SuperBMDLib.pdb b/Toolbox/Lib/SuperBMDLib.pdb deleted file mode 100644 index 6c508546..00000000 Binary files a/Toolbox/Lib/SuperBMDLib.pdb and /dev/null differ diff --git a/Toolbox/Lib/Syroot.Maths.pdb b/Toolbox/Lib/Syroot.Maths.pdb deleted file mode 100644 index f130ad8d..00000000 Binary files a/Toolbox/Lib/Syroot.Maths.pdb and /dev/null differ diff --git a/Toolbox/Lib/Syroot.NintenTools.Bfres.pdb b/Toolbox/Lib/Syroot.NintenTools.Bfres.pdb deleted file mode 100644 index 04aff3e7..00000000 Binary files a/Toolbox/Lib/Syroot.NintenTools.Bfres.pdb and /dev/null differ diff --git a/Toolbox/Lib/Syroot.NintenTools.MarioKart8.pdb b/Toolbox/Lib/Syroot.NintenTools.MarioKart8.pdb deleted file mode 100644 index dbd3ef31..00000000 Binary files a/Toolbox/Lib/Syroot.NintenTools.MarioKart8.pdb and /dev/null differ diff --git a/Toolbox/Lib/Syroot.NintenTools.NSW.Bfres.pdb b/Toolbox/Lib/Syroot.NintenTools.NSW.Bfres.pdb deleted file mode 100644 index 2b4c1673..00000000 Binary files a/Toolbox/Lib/Syroot.NintenTools.NSW.Bfres.pdb and /dev/null differ diff --git a/Toolbox/Lib/Syroot.NintenTools.NSW.Bfsha.pdb b/Toolbox/Lib/Syroot.NintenTools.NSW.Bfsha.pdb deleted file mode 100644 index 9f1594b3..00000000 Binary files a/Toolbox/Lib/Syroot.NintenTools.NSW.Bfsha.pdb and /dev/null differ diff --git a/Toolbox/Lib/Syroot.NintenTools.NSW.Bntx.pdb b/Toolbox/Lib/Syroot.NintenTools.NSW.Bntx.pdb deleted file mode 100644 index 02df74db..00000000 Binary files a/Toolbox/Lib/Syroot.NintenTools.NSW.Bntx.pdb and /dev/null differ diff --git a/Toolbox/Toolbox.csproj.user b/Toolbox/Toolbox.csproj.user deleted file mode 100644 index f14b2a39..00000000 --- a/Toolbox/Toolbox.csproj.user +++ /dev/null @@ -1,6 +0,0 @@ - - - - true - - \ No newline at end of file diff --git a/Toolbox/x64/libzstd.dll b/Toolbox/x64/libzstd.dll deleted file mode 100644 index a836692f..00000000 Binary files a/Toolbox/x64/libzstd.dll and /dev/null differ diff --git a/Toolbox/x86/libzstd.dll b/Toolbox/x86/libzstd.dll deleted file mode 100644 index 3ec45c69..00000000 Binary files a/Toolbox/x86/libzstd.dll and /dev/null differ diff --git a/UpgradeLog.htm b/UpgradeLog.htm deleted file mode 100644 index a3ef1fbb..00000000 Binary files a/UpgradeLog.htm and /dev/null differ diff --git a/packages/AssimpNet.4.1.0/.signature.p7s b/packages/AssimpNet.4.1.0/.signature.p7s deleted file mode 100644 index 4c7d1ae2..00000000 Binary files a/packages/AssimpNet.4.1.0/.signature.p7s and /dev/null differ diff --git a/packages/AssimpNet.4.1.0/AssimpNet Documentation (October 2018).chm b/packages/AssimpNet.4.1.0/AssimpNet Documentation (October 2018).chm deleted file mode 100644 index 4d721792..00000000 Binary files a/packages/AssimpNet.4.1.0/AssimpNet Documentation (October 2018).chm and /dev/null differ diff --git a/packages/AssimpNet.4.1.0/AssimpNet.4.1.0.nupkg b/packages/AssimpNet.4.1.0/AssimpNet.4.1.0.nupkg deleted file mode 100644 index 40584e69..00000000 Binary files a/packages/AssimpNet.4.1.0/AssimpNet.4.1.0.nupkg and /dev/null differ diff --git a/packages/AssimpNet.4.1.0/ChangeLog.txt b/packages/AssimpNet.4.1.0/ChangeLog.txt deleted file mode 100644 index 66a52ac1..00000000 --- a/packages/AssimpNet.4.1.0/ChangeLog.txt +++ /dev/null @@ -1,209 +0,0 @@ ----------------------------------------------------------------------- -CHANGELOG ----------------------------------------------------------------------- - -4.1.0 (10-28-2018) - - - Updated to target .Net Standard 1.3 (additional .Net 3.5 and .Net 4 targets) - - Removed old IL patcher to use new MemoryInterop.ILPatcher build time dependency (allows us to build cross-platform) - - Rewrote Sample application to be a .Net Core app that uses the Veldrid low-level graphics library for rendering - - Added x64 linux native binary, x64 macOS native binary - - Tested on Ubuntu 18.04 and MacOS 10.13 (High Sierra) - - Several fixes and updates to target latest Assimp release - - Ported over "UnmanagedLibrary" abstract code and refactored AssimpLibrary - - Added "ThrowOnLoadFailure" to configure getting back a "false" if native library fails to load or throw an exception (the default). Mono should no longer - throw a "NotImplemented" exception because of trying to get the error code from windows. - - !!Breaking Change!! Native DLLs are deployed differently and resolved at runtime differently - - Removed "DefaultLibraryPathXXBit" properties from AssimpLibrary, they are meaningless now (and probably not used) - - Introduced "UnmanagedLibraryResolver" that lets you set the following to completely configure native DLL loading: - 1. Multiple probing paths - 2. Multiple fallback library names (e.g. versioned binaries) - 3. Override name if the default native library name is not good enough for your tastes. - - Search order of the native DLL is as follows: - 1. Search user-specified probing paths - 2. Search {AppBaseDirectory}/runtimes/{RID}/native/ - 3. Search {AppBaseDirectory}/ - 4. Search nuget cache based on assembly name/informational version ({UserProfile}/.nuget/packages/AssimpNet/{PackageVersion}/runtimes/{RID}/native/) - 5. If all above failed, return the given name of the DLL (or override name) and let the OS try and find it (different OS' may have different strategies). - - The resolver is only used in AssimpLibrary.LoadLibrary(). The other two overloads still take in a user-supplied path/to/your/DLL. - - Native DLLs are now deployed in the "runtimes" folder of the nuget package. This means they are now picked up as dependencies by netcore (*.deps.json) - and automatically get copied during the "dotnet publish" command. During development, the system will try and locate the native DLLs in the nuget cache - (.net framework 3.5/4.0 targets still use the MSBuild targets file to copy the runtime folder to the output folder). The folder structure looks like this: - - runtimes/win-x64/native/assimp.dll - - runtimes/win-x86/native/assimp.dll - - runtimes/osx-x64/native/libassimp.dylib - - runtimes/linux-x64/native/libassimp.so - - All native binaries are named "assimp" or "libassimp" depending on platform, since we're putting them in "well known" architecture folders, no need to have unique names - - [Source Only] Added a Unity script that will make it easier for users to load the native DLLs when running in Editor/Standalone Unity 3D - - Build outputs a folder called "UnityPlugin" which you can drag and drop into the Unity Editor. A package will be available in the Asset Store as well. - - -Targets Assimp 4.1.0 - - - -====================================================================== - - - - -3.3.2 (12-26-2016) - - - Fixed up nuget package build targets. - - Added donated mac library implementation (haven't personally tested) - - Removed null/empty string checks for import format hint for reading streams - if you don't supply - a hint, Assimp will automatically try to detect what format it is - - Added logging when an invalid export format ID is encountered -- be sure to use "collada" and not "dae". - - Added additional null/empty checks if adding a material property with an invalid fully qualified name. - -Targets Assimp 3.1.1 - - - -====================================================================== - - - - -3.3 (07-3-2014) - - - Upgraded to Assimp 3.1.1 - now with FBX support! - - Added matrix property configuration type - - Added root node transformation property configuration for use with "PreTransformVertices" post process step - - Added collada "ignore up direction" property configuration - - Added various FBX importer property configurations - - Added global property configuration to disable bone visualization when a model only has animations and no geometry - - Added support for Metadata objects on nodes - - Fixed issue with marshaling mesh names, AiMesh and AiAnimMesh are now blittable. All unmanaged structs are blittable - and .NET runtime marshaling is avoided due to issues with marshaling fixed buffers in non-blittable structures. - -Happy Fourth Of July! - -Targets Assimp 3.1.1 - - - -====================================================================== - - - - -3.2 (03-14-2013) - - - Added IOSystem/IOStream support, allowing for custom IO handling. An IOSystem can be registered to an AssimpImporter, - which is used during ImportFile and ConvertFile APIs. It currently is not supported for ImportFileFromStream APIs. - - Fixed marshalling of String material property values - - Fixed aiGetTexture function signature to take in an array of 2 UV wrapmodes - -Targets Assimp 3.0.1270 - - - -====================================================================== - - - - -3.1 (01-01-2013) - - - Added AnyCPU support, replaced AssimpMethods with AssimpLibrary that dynamically loads/unloads the unmanaged Assimp DLL - optionally, a custom file path can be specified to load the Assimp DLL. By default, the 32 or 64 bit Assimp DLL is loaded from the - same directory that the AssimpNet DLL is located in, depending on the bitness of the process. - - - Added missing properties for PreState/PostState in NodeAnimationChannel - - -Targets Assimp 3.0.1270 - - - -====================================================================== - - - - -3.0 (11-11-2012) - - - Upgraded to Assimp3.0 - - - Added Convert API to AssimpImporter to utilize new Export functionality - - - Several fixes to Matrix-Quaternion structures - - -Targets Assimp 3.0.1270 - - - -====================================================================== - - - - -2.1.2.1 Refresh (7-27-2012) - - - Added root transformations to the importer - can specify Scale, XRotation, YRotation, and ZRotation. Can use these properties to bake the - transformation by specifying the "PreTransformVertices" post process flag. - - - Added missing OffsetMatrix property to Bone - - -Targets Assimp 2.0.854 - - - -====================================================================== - - - - -2.1.2 (4-4-2012) - - - Added RemoveConfigs() method to AssimpImporter - - - Fixed an occassional crash when mashalling string material properties - - -Targets Assimp 2.0.854 - - - -====================================================================== - - - - -2.1 (1-28-2012) - - - Added Matrix3x3, Matrix4x4 methods. - - - Fixed several bugs in Quaternion. - - - Added unit tests for Matrix3x3, Matrix4x4, Quaternion. - - - Added "ImportFileFromStream" AssimpMethod and equivalent methods to the AssimpImporter: - - This is the implementation for "aiImportFileFromMemory". - - - - Added a "ReadStreamFully" method to MemoryHelper. - - - Added "Importer Settings" config classes. - - - Added a sample a port of Assimp's simple textured OpenGL sample using OpenTK. - - -Targets Assimp 2.0.854 - - - -====================================================================== - - - -2.0 (1-22-2012) - - - Initial release, core API is finished. - - -Targets Assimp 2.0.854 \ No newline at end of file diff --git a/packages/AssimpNet.4.1.0/License.txt b/packages/AssimpNet.4.1.0/License.txt deleted file mode 100644 index d2bf7bcc..00000000 --- a/packages/AssimpNet.4.1.0/License.txt +++ /dev/null @@ -1,70 +0,0 @@ - -Copyright (c) 2012-2018 AssimpNet - Nicholas Woodfield - -Permission is hereby granted, free of charge, to any person obtaining a copy -of this software and associated documentation files (the "Software"), to deal -in the Software without restriction, including without limitation the rights -to use, copy, modify, merge, publish, distribute, sublicense, and/or sell -copies of the Software, and to permit persons to whom the Software is -furnished to do so, subject to the following conditions: - -The above copyright notice and this permission notice shall be included in -all copies or substantial portions of the Software. - -THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR -IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, -FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE -AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER -LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, -OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN -THE SOFTWARE. - -==================================================================================== - -Open Asset Import Library (Assimp) - - -Copyright (c) 2006-2018, Assimp Development Team -All rights reserved. - -Redistribution and use of this software in source and binary forms, -with or without modification, are permitted provided that the -following conditions are met: - -* Redistributions of source code must retain the above - copyright notice, this list of conditions and the - following disclaimer. - -* Redistributions in binary form must reproduce the above - copyright notice, this list of conditions and the - following disclaimer in the documentation and/or other - materials provided with the distribution. - -* Neither the name of the ASSIMP team, nor the names of its - contributors may be used to endorse or promote products - derived from this software without specific prior - written permission of the ASSIMP Development Team. - -THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS -"AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT -LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR -A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT -OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, -SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT -LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, -DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY -THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT -(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE -OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. - - - -AN EXCEPTION applies to all files in the ./test/models-nonbsd subfolder. -These are 3d models for testing purposes, from various free sources -on the internet. They are - unless otherwise stated - copyright of -their respective creators, which may impose additional requirements -on the use of their work. For any of these models, see -.source.txt for more legal information. Contact us if you -are a copyright holder and believe that we credited you inproperly or -if you don't want your files to appear in the repository. - diff --git a/packages/AssimpNet.4.1.0/build/AssimpNet.targets b/packages/AssimpNet.4.1.0/build/AssimpNet.targets deleted file mode 100644 index c5b871c8..00000000 --- a/packages/AssimpNet.4.1.0/build/AssimpNet.targets +++ /dev/null @@ -1,24 +0,0 @@ - - - - - - - - - - - - - - - - - - - - - - diff --git a/packages/AssimpNet.4.1.0/lib/net35/AssimpNet.dll b/packages/AssimpNet.4.1.0/lib/net35/AssimpNet.dll deleted file mode 100644 index 36449678..00000000 Binary files a/packages/AssimpNet.4.1.0/lib/net35/AssimpNet.dll and /dev/null differ diff --git a/packages/AssimpNet.4.1.0/lib/net35/AssimpNet.xml b/packages/AssimpNet.4.1.0/lib/net35/AssimpNet.xml deleted file mode 100644 index 04097be1..00000000 --- a/packages/AssimpNet.4.1.0/lib/net35/AssimpNet.xml +++ /dev/null @@ -1,11454 +0,0 @@ - - - - AssimpNet - - - - - An animation consists of keyframe data for a number of nodes. For - each node affected by the animation, a separate series of data is given. - - - - - Gets or sets the name of the animation. If the modeling package the - data was exported from only supports a single animation channel, this - name is usually empty. - - - - - Gets or sets the duration of the animation in number of ticks. - - - - - Gets or sets the number of ticks per second. It may be zero - if it is not specified in the imported file. - - - - - Gets if the animation has node animation channels. - - - - - Gets the number of node animation channels where each channel - affects a single node. - - - - - Gets the node animation channels. - - - - - Gets if the animation has mesh animations. - - - - - Gets the number of mesh animation channels. - - - - - Gets the number of mesh morph animation channels. - - - - - Gets the mesh animation channels. - - - - - Gets the mesh morph animation channels. - - - - - Constructs a new instance of the class. - - - - - Gets if the native value type is blittable (that is, does not require marshaling by the runtime, e.g. has MarshalAs attributes). - - - - - Writes the managed data to the native value. - - Optional pointer to the memory that will hold the native value. - Output native value - - - - Reads the unmanaged data from the native value. - - Input native value - - - - Frees unmanaged memory created by . - - Native value to free - True if the unmanaged memory should be freed, false otherwise. - - - - Represents an Assimp Import/Export context that load or save models using the unmanaged library. Additionally, conversion - functionality is offered to bypass loading model data into managed memory. - - - - - Gets if the context has been disposed. - - - - - Gets or sets the uniform scale for the model. This is multiplied - with the existing root node's transform. This is only used during import. - - - - - Gets or sets the model's rotation about the X-Axis, in degrees. This is multiplied - with the existing root node's transform. This is only used during import. - - - - - Gets or sets the model's rotation abut the Y-Axis, in degrees. This is multiplied - with the existing root node's transform. This is only used during import. - - - - - Gets or sets the model's rotation about the Z-Axis, in degrees. This is multiplied - with the existing root node's transform. This is only used during import. - - - - - Gets whether this context is using a user-defined IO system for file handling. - - - - - Gets the property configurations set to this context. This is only used during import. - - - - - Constructs a new instance of the class. - - - - - Imports a model from the stream without running any post-process steps. The importer sets configurations - and loads the model into managed memory, releasing the unmanaged memory used by Assimp. It is up to the caller to dispose of the stream. - If the format is distributed across multiple files/streams, set a custom - and use the "ImportFile" family of functions. - - Stream to read from - Optional format extension to serve as a hint to Assimp to choose which importer to use. If null or empty, the system will - try to detect what importer to use from the data which may or may not be successful. - The imported scene - Thrown if the stream is not valid (null or write-only). - Thrown if the context has already been disposed of. - - - - Imports a model from the stream. The importer sets configurations and loads the model into managed memory, releasing the unmanaged memory - used by Assimp. It is up to the caller to dispose of the stream. If the format is distributed across multiple files/streams, set a custom - and use the "ImportFile" family of functions. - - Stream to read from - Post processing flags, if any - Optional format extension to serve as a hint to Assimp to choose which importer to use. If null or empty, the system will - try to detect what importer to use from the data which may or may not be successful. - The imported scene - Thrown if the stream is not valid (null or write-only). - Thrown if the context has already been disposed of. - - - - Imports a model from the specified file without running any post-process steps. The importer sets configurations - and loads the model into managed memory, releasing the unmanaged memory used by Assimp. - - Full path to the file - The imported scene - Thrown if there was a general error in importing the model. - Thrown if the file could not be located. - Thrown if the context has already been disposed of. - - - - Imports a model from the specified file. The importer sets configurations - and loads the model into managed memory, releasing the unmanaged memory used by Assimp. - - Full path to the file - Post processing flags, if any - The imported scene - Thrown if there was a general error in importing the model. - Thrown if the file could not be located. - Thrown if the context has already been disposed of. - - - - Exports a scene to the specified format and writes it to a file. - - Scene containing the model to export. - Path to the file. - FormatID representing the format to export to. - True if the scene was exported successfully, false otherwise. - Thrown if the scene is null. - Thrown if the context has already been disposed of. - - - - Exports a scene to the specified format and writes it to a file. - - Scene containing the model to export. - Path to the file. - FormatID representing the format to export to. - Preprocessing flags to apply to the model before it is exported. - True if the scene was exported successfully, false otherwise. - Thrown if the scene is null. - Thrown if the context has already been disposed of. - - - - Exports a scene to the specified format and writes it to a data blob. - - Scene containing the model to export. - FormatID representing the format to export to. - The resulting data blob, or null if the export failed. - Thrown if the scene is null. - Thrown if the context has already been disposed of. - - - - Exports a scene to the specified format and writes it to a data blob. - - Scene containing the model to export. - FormatID representing the format to export to. - Preprocessing flags to apply to the model before it is exported. - The resulting data blob, or null if the export failed. - Thrown if the scene is null. - Thrown if the context has already been disposed of. - - - - Converts the model contained in the file to the specified format and save it to a file. - - Input file name to import - Output file name to export to - Format id that specifies what format to export to - True if the conversion was successful or not, false otherwise. - Thrown if there was a general error in importing the model. - Thrown if the file could not be located. - Thrown if the context has already been disposed of. - - - - Converts the model contained in the file to the specified format and save it to a file. - - Input file name to import - Output file name to export to - Format id that specifies what format to export to - Pre processing steps used for the export - True if the conversion was successful or not, false otherwise. - Thrown if there was a general error in importing the model. - Thrown if the file could not be located. - Thrown if the context has already been disposed of. - - - - Converts the model contained in the file to the specified format and save it to a file. - - Input file name to import - Post processing steps used for the import - Output file name to export to - Format id that specifies what format to export to - Pre processing steps used for the export - True if the conversion was successful or not, false otherwise. - Thrown if there was a general error in importing the model. - Thrown if the file could not be located. - Thrown if the context has already been disposed of. - - - - Converts the model contained in the file to the specified format and save it to a data blob. - - Input file name to import - Format id that specifies what format to export to - Data blob containing the exported scene in a binary form - Thrown if there was a general error in importing the model. - Thrown if the file could not be located. - Thrown if the context has already been disposed of. - - - - Converts the model contained in the file to the specified format and save it to a data blob. - - Input file name to import - Format id that specifies what format to export to - Pre processing steps used for the export - Data blob containing the exported scene in a binary form - Thrown if there was a general error in importing the model. - Thrown if the file could not be located. - Thrown if the context has already been disposed of. - - - - Converts the model contained in the file to the specified format and save it to a data blob. - - Input file name to import - Post processing steps used for the import - Format id that specifies what format to export to - Pre processing steps used for the export - Data blob containing the exported scene in a binary form - Thrown if there was a general error in importing the model. - Thrown if the file could not be located. - Thrown if the context has already been disposed of. - - - - Converts the model contained in the stream to the specified format and save it to a file. It is up to the caller to dispose of the stream. - If the format is distributed across multiple files/streams, set a custom - and use the "ConvertFromFileToFile" family of functions. - - Stream to read from - Optional format extension to serve as a hint to Assimp to choose which importer to use. If null or empty, the system will - try to detect what importer to use from the data which may or may not be successful - Output file name to export to - Format id that specifies what format to export to - True if the conversion was successful or not, false otherwise. - Thrown if the stream is not valid (null or write-only). - Thrown if the context has already been disposed of. - - - - Converts the model contained in the stream to the specified format and save it to a file. It is up to the caller to dispose of the stream. - If the format is distributed across multiple files/streams, set a custom - and use the "ConvertFromFileToFile" family of functions. - - Stream to read from - Optional format extension to serve as a hint to Assimp to choose which importer to use. If null or empty, the system will - try to detect what importer to use from the data which may or may not be successful - Output file name to export to - Format id that specifies what format to export to - Pre processing steps used for the export - True if the conversion was successful or not, false otherwise. - Thrown if the stream is not valid (null or write-only). - Thrown if the context has already been disposed of. - - - - Converts the model contained in the stream to the specified format and save it to a file. It is up to the caller to dispose of the stream. - If the format is distributed across multiple files/streams, set a custom - and use the "ConvertFromFileToFile" family of functions. - - Stream to read from - Optional format extension to serve as a hint to Assimp to choose which importer to use. If null or empty, the system will - try to detect what importer to use from the data which may or may not be successful - Post processing steps used for import - Output file name to export to - Format id that specifies what format to export to - Pre processing steps used for the export - True if the conversion was successful or not, false otherwise. - Thrown if the stream is not valid (null or write-only). - Thrown if the context has already been disposed of. - - - - Converts the model contained in the stream to the specified format and save it to a data blob. It is up to the caller to dispose of the stream. - If the format is distributed across multiple files/streams, set a custom - and use the "ConvertFromFileToBlob" family of functions. - - Stream to read from - Optional format extension to serve as a hint to Assimp to choose which importer to use. If null or empty, the system will - try to detect what importer to use from the data which may or may not be successful - Format id that specifies what format to export to - Data blob containing the exported scene in a binary form - Thrown if the stream is not valid (null or write-only). - Thrown if the context has already been disposed of. - - - - Converts the model contained in the stream to the specified format and save it to a data blob. It is up to the caller to dispose of the stream. - If the format is distributed across multiple files/streams, set a custom - and use the "ConvertFromFileToBlob" family of functions. - - Stream to read from - Optional format extension to serve as a hint to Assimp to choose which importer to use. If null or empty, the system will - try to detect what importer to use from the data which may or may not be successful - Format id that specifies what format to export to - Pre processing steps used for the export - Data blob containing the exported scene in a binary form - Thrown if the stream is not valid (null or write-only). - Thrown if the context has already been disposed of. - - - - Converts the model contained in the stream to the specified format and save it to a data blob. It is up to the caller to dispose of the stream. - If the format is distributed across multiple files/streams, set a custom - and use the "ConvertFromFileToBlob" family of functions. - - Stream to read from - Optional format extension to serve as a hint to Assimp to choose which importer to use. If null or empty, the system will - try to detect what importer to use from the data which may or may not be successful - Post processing steps used for import - Format id that specifies what format to export to - Pre processing steps used for the export - Data blob containing the exported scene in a binary form - Thrown if the stream is not valid (null or write-only). - Thrown if the context has already been disposed of. - - - - Sets a custom file system implementation that is used by this importer. If it is null, then the default assimp file system - is used instead. - - Custom file system implementation - - - - Removes the currently set custom file system implementation from the importer. - - - - - Gets the model formats that are supported for export by Assimp. - - Export formats supported - - - - Gets the model formats that are supported for import by Assimp. - - Import formats supported - - - - Gets descriptions for each importer that assimp has registered. - - Descriptions of supported importers. - - - - Gets an importer description for the specified file extension. If no importers support it, null is returned. Multiple importers may support the file extension, - they are called in the order that they were registered. - - File extension to query importer support for. - Importer description or null if it does not exist. - - - - Checks if the format extension (e.g. ".dae" or ".obj") is supported for import. - - Model format - True if the format is supported, false otherwise - - - - Checks if the format extension (e.g. ".dae" or ".obj") is supported for export. - - Model format - True if the format is supported, false otherwise - - - - Sets a configuration property to the context. This is only used during import. - - Config to set - - - - Removes a set configuration property by name. - - Name of the config property - - - - Removes all configuration properties from the context. - - - - - Checks if the context has a config set by the specified name. - - Name of the config property - True if the config is present, false otherwise - - - - Disposes of resources held by the context. These include IO systems still attached. - - - - - Releases unmanaged and - optionally - managed resources - - True to release both managed and unmanaged resources; False to release only unmanaged resources. - - - - AssimpNet general exception. - - - - - Initializes a new instance of the class. - - - - - Initializes a new instance of the class. - - The error message. - - - - Initializes a new instance of the class. - - Name of the param. - The error message. - - - - Initializes a new instance of the class. - - The error message - The inner exception. - - - - Represents a single bone of a mesh. A bone has a name which allows it to be found in the frame - hierarchy and by which it can be addressed by animations. In addition it has a number of - influences on vertices. - - - - - Gets or sets the name of the bone. - - - - - Gets the number of vertex influences the bone contains. - - - - - Gets if the bone has vertex weights - this should always be true. - - - - - Gets the vertex weights owned by the bone. - - - - - Gets or sets the matrix that transforms from mesh space to bone space in bind pose. - - - - - Constructs a new instance of the class. - - - - - Constructs a new instance of the class. - - Name of the bone - Bone's offset matrix - Vertex weights - - - - Gets if the native value type is blittable (that is, does not require marshaling by the runtime, e.g. has MarshalAs attributes). - - - - - Writes the managed data to the native value. - - Optional pointer to the memory that will hold the native value. - Output native value - - - - Reads the unmanaged data from the native value. - - Input native value - - - - Frees unmanaged memory created by . - - Native value to free - True if the unmanaged memory should be freed, false otherwise. - - - - Describes a right-handed camera in the scene. An important aspect is that - the camera itself is also part of the scenegraph, meaning any values such - as the direction vector are not *absolute*, they can be relative to the coordinate - system defined by the node which corresponds to the camera. This allows for camera - animations. - - - - - Gets or sets the name of the camera. This corresponds to a node in the - scenegraph with the same name. This node specifies the position of the - camera in the scene hierarchy and can be animated. - - - - - Gets or sets the position of the camera relative to the coordinate space defined by - the corresponding node. THe default value is 0|0|0. - - - - - Gets or sets the 'up' vector of the camera, relative to the coordinate space defined by the - corresponding node. The 'right' vector of the camera is the cross product of the up - and direction vectors. The default value is 0|1|0. - - - - - Gets or sets the viewing direction of the camera, relative to the coordinate space defined by the corresponding node. - The default value is 0|0|1. - - - - - Gets or sets the half horizontal field of view angle, in radians. The FoV angle is - the angle between the center line of the screen and the left or right border. The default - value is 1/4PI. - - - - - Gets or sets the distance of the near clipping plane from the camera. The value may not - be 0.0f for arithmetic reasons to prevent a division through zero. The default value is 0.1f; - - - - - Gets or sets the distance of the far clipping plane from the camera. The far clippling plane must - be further than the near clippling plane. The default value is 1000.0f. The ratio between - the near and far plane should not be too large (between 1000 - 10000 should be ok) to avoid - floating-point inaccuracies which can lead to z-fighting. - - - - - Gets or sets the screen aspect ratio. This is the ratio between the width and height of the screen. Typical - values are 4/3, 1/2, or 1/1. This value is 0 if the aspect ratio is not defined in the source file. - The default value is zero. - - - - - Gets a right-handed view matrix. - - - - - Constructs a new instance of the class. - - - - - Gets if the native value type is blittable (that is, does not require marshaling by the runtime, e.g. has MarshalAs attributes). - - - - - Writes the managed data to the native value. - - Optional pointer to the memory that will hold the native value. - Output native value - - - - Reads the unmanaged data from the native value. - - Input native value - - - - Frees unmanaged memory created by . - - Native value to free - True if the unmanaged memory should be freed, false otherwise. - - - - Represents a RGB color. - - - - - Red component. - - - - - Green component. - - - - - Blue component. - - - - - Gets or sets the component value at the specified zero-based index - in the order of RGBA (index 0 access R, 1 access G, etc). If - the index is not in range, a value of zero is returned. - - Zero-based index. - The component value - - - - Constructs a Color3D. - - Red component - Green component - Blue component - - - - Constructs a Color3D where each component is - set to the same value. - - Value to set R, G, B components - - - - Determines if the color is black, or close to being black. - - True if the color is black/nearly block, false otherwise. - - - - Adds the two colors together. - - First color - Second color - Added color - - - - Adds the value to each of the components of the color. - - Source color - Value to add to each component - Added color - - - - Adds the value to each of the components of the color. - - Value to add to each component - Source color - Added color - - - - Subtracts the second color from the first color. - - First color - Second color - Resulting color - - - - Subtracts the value from each of the color's components. - - Source color - Value to subtract from each component - Resulting color - - - - Subtracts the color's components from the value, returning - the result as a new color. Same as new Color4D(value) - color - - Value for each component of the first color - Second color - Resulting color - - - - Multiplies the two colors. - - First color - Second color - Multiplied color. - - - - Multiplies the color by a scalar value, component wise. - - Source color - Scalar value - Resulting color - - - - Multiplies the color by a scalar value, component wise. - - Scalar value - Source color - Resulting color - - - - Divides the first color by the second color, component wise. - - First color - Second color - Resulting color - - - - Divides the color by a divisor value. - - Source color - Divisor - Resulting color - - - - Tets equality between two colors. - - First color - Second color - True if the colors are equal, false otherwise - - - - Tets inequality between two colors. - - First color - Second color - True if the colors are not equal, false otherwise - - - - Tests equality between this color and another color - - Color to test against - True if components are equal - - - - Tests equality between this color and another object. - - Object to test against - True if the object is a color and the components are equal - - - - Returns a hash code for this instance. - - - A hash code for this instance, suitable for use in hashing algorithms and data structures like a hash table. - - - - - Returns a that represents this instance. - - - A that represents this instance. - - - - - Represents a Red-Green-Blue-Alpha (RGBA) color. - Color values range from 0 to 1. - - - - - Red component. - - - - - Green component. - - - - - Blue component. - - - - - Alpha component. - - - - - Gets or sets the component value at the specified zero-based index - in the order of RGBA (index 0 access R, 1 access G, etc). If - the index is not in range, a value of zero is returned. - - Zero-based index. - The component value - - - - Constructs a Color4D. - - Red component - Green component - Blue component - Alpha component - - - - Constructs a Color4D. Alpha is set to 1.0. - - Red component - Green component - Blue component - - - - Constructs a Color4D where each component is - set to the same value. - - Value to set R, G, B, A components - - - - Constructs a Color4D from a Color3D. Alpha is set to 1.0. - - RGB values - - - - Constructs a Color4D from a Color3D and alpha value. - - RGB values - Alpha value - - - - Determines if the color is black, or close to being black. - - True if the color is black/nearly block, false otherwise. - - - - Adds the two colors together. - - First color - Second color - Added color - - - - Adds the value to each of the components of the color. - - Source color - Value to add to each component - Added color - - - - Adds the value to each of the components of the color. - - Value to add to each component - Source color - Added color - - - - Subtracts the second color from the first color. - - First color - Second color - Resulting color - - - - Subtracts the value from each of the color's components. - - Source color - Value to subtract from each component - Resulting color - - - - Subtracts the color's components from the value, returning - the result as a new color. Same as new Color4D(value) - color - - Value for each component of the first color - Second color - Resulting color - - - - Multiplies the two colors. - - First color - Second color - Multiplied color. - - - - Multiplies the color by a scalar value, component wise. - - Source color - Scalar value - Resulting color - - - - Multiplies the color by a scalar value, component wise. - - Scalar value - Source color - Resulting color - - - - Divides the first color by the second color, component wise. - - First color - Second color - Resulting color - - - - Divides the color by a divisor value. - - Source color - Divisor - Resulting color - - - - Tets equality between two colors. - - First color - Second color - True if the colors are equal, false otherwise - - - - Tets inequality between two colors. - - First color - Second color - True if the colors are not equal, false otherwise - - - - Tests equality between this color and another color - - Color to test against - True if components are equal - - - - Tests equality between this color and another object. - - Object to test against - True if the object is a color and the components are equal - - - - Returns a hash code for this instance. - - - A hash code for this instance, suitable for use in hashing algorithms and data structures like a hash table. - - - - - Returns a that represents this instance. - - - A that represents this instance. - - - - - Base property config. - - - - - Gets the property name. - - - - - Creates a new property config that has no active Assimp property store. - - Name of the property. - - - - Sets the current value to the default value. - - - - - Applies the property value to the given Assimp property store. - - Assimp property store - - - - Applies the property value to the given Assimp property store. - - Assimp property store - - - - Describes an integer configuration property. - - - - - Gets the property value. - - - - - Gets the default property value. - - - - - Constructs a new IntengerPropertyConfig. - - Name of the property - Property value - - - - constructs a new IntegerPropertyConfig with a default value. - - Name of the property - Property value - The default property value - - - - Sets the current value to the default value. - - - - - Applies the property value to the given Assimp property store. - - Assimp property store - - - - Describes a float configuration property. - - - - - Gets the property value. - - - - - Gets the default property value. - - - - - Constructs a new FloatPropertyConfig. - - Name of the property - Property value - - - - Constructs a new FloatPropertyConfig with a default value. - - Name of the property - Property value - The default property value - - - - Sets the current value to the default value. - - - - - Applies the property value to the given Assimp property store. - - Assimp property store - - - - Describes a configuration property. - - - - - Gets the property value. - - - - - Gets the default property value. - - - - - Constructs a new MatrixPropertyConfig. - - Name of the property - Property value - - - - Constructs a new MatrixPropertyConfig. - - Name of the property - Property value - The default property value - - - - Sets the current value to the default value. - - - - - Applies the property value to the given Assimp property store. - - Assimp property store - - - - Describes a boolean configuration property. - - - - - Gets the property value. - - - - - Gets the default property value. - - - - - Constructs a new BooleanPropertyConfig. - - Name of the property - Property value - - - - Constructs a new BooleanPropertyConfig with a default value. - - Name of the property - Property value - The default property value - - - - Sets the current value to the default value. - - - - - Applies the property value to the given Assimp property store. - - Assimp property store - - - - Describes a string configuration property. - - - - - Gets the property value. - - - - - Gets the default property value. - - - - - Constructs a new StringPropertyConfig. - - Name of the property - Property value - - - - Constructs a new StringPropertyConfig with a default value. - - Name of the property - Property value - The default property value - - - - Sets the current value to the default value. - - - - - Applies the property value to the given Assimp property store. - - Assimp property store - - - - Convience method for constructing a whitespace delimited name list. - - Array of names - White-space delimited list as a string - - - - Configuration to enable time measurements. If enabled, each - part of the loading process is timed and logged. Default value is false. - - - - - Gets the string name used by MeasureTimeConfig. - - - - - Constructs a new MeasureTimeConfig. - - True if the loading process should be timed or not. - - - - Configuration to set Assimp's multithreading policy. Possible - values are -1 to let Assimp decide, 0 to disable multithreading, or - any number larger than zero to force a specific number of threads. This - is only a hint and may be ignored by Assimp. Default value is -1. - - - - - Gets the string name used by MultithreadingConfig. - - - - - Constructs a new MultithreadingConfig. - - A value of -1 will let Assimp decide, - a value of zero to disable multithreading, and a value greater than zero - to force a specific number of threads. - - - - Global setting to disable generation of skeleton dummy meshes. These are generated as a visualization aid - in cases which the input data contains no geometry, but only animation data. So the geometry are visualizing - the bones. Default value is false. - - - - - Gets the string name used by NoSkeletonMeshConfig. - - - - - Constructs a new NoSkeletonMeshConfig. - - True if dummy skeleton mesh generation should be disabled, false otherwise. - - - - Configuration to set the maximum angle that may be between two vertex tangents/bitangents - when they are smoothed during the step to calculate the tangent basis. The default - value is 45 degrees. - - - - - Gets the string name used by TangentSmoothingAngleConfig. - - - - - Constructs a new TangentSmoothingAngleConfig. - - Smoothing angle, in degrees. - - - - Configuration to set the maximum angle between two face normals at a vertex when - they are smoothed during the step to calculate smooth normals. This is frequently - called the "crease angle". The maximum and default value is 175 degrees. - - - - - Gets the string name used by NormalSmoothingAngleConfig. - - - - - Constructs a new NormalSmoothingAngleConfig. - - Smoothing angle, in degrees. - - - - Configuration to set the colormap (palette) to be used to decode embedded textures in MDL (Quake or 3DG5) - files. This must be a valid path to a file. The file is 768 (256 * 3) bytes alrge and contains - RGB triplets for each of the 256 palette entries. If the file is not found, a - default palette (from Quake 1) is used. The default value is "colormap.lmp". - - - - - Gets the string name used by MDLColorMapConfig. - - - - - Constructs a new MDLColorMapConfig. - - Colormap filename - - - - Configuration for the the step - to determine what materials to keep. If a material matches one of these names it will not - be modified or removed by the post processing step. Default is an empty string. - - - - - Gets the string name used by MaterialExcludeListConfig. - - - - - Constructs a new MaterialExcludeListConfig. Material names containing whitespace - must be enclosed in single quotation marks. - - List of material names that will not be modified or replaced by the remove redundant materials post process step. - - - - Configuration for the step - to keep the scene hierarchy. Meshes are moved to worldspace, but no optimization is performed - where meshes with the same materials are not joined. This option can be useful - if you have a scene hierarchy that contains important additional information - which you intend to parse. The default value is false. - - - - - Gets the string name used by KeepSceneHierarchyConfig. - - - - - Constructs a new KeepHierarchyConfig. - - True to keep the hierarchy, false otherwise. - - - - Configuration for the step - to normalize all vertex components into the -1...1 range. The default value is - false. - - - - - Gets the string name used by NormalizeVertexComponentsConfig. - - - - - Constructs a new NormalizeVertexComponentsConfig. - - True if the post process step should normalize vertex components, false otherwise. - - - - Configuration for the step to - remove degenerted primitives from the import immediately. The default value is false, - where degenerated triangles are converted to lines, and degenerated lines to points. - - - - - Gets the string name used by RemoveDegeneratePrimitivesConfig. - - - - - Constructs a new RemoveDegeneratePrimitivesConfig. - - True if the post process step should remove degenerate primitives, false otherwise. - - - - Configuration for the step. If true, the area of the triangles are checked - to see if they are greater than 1e-6. If so, the triangle is removed if is set to true. - - - - - Gets the string name used by RemoveDegeneratePrimitivesCheckAreaConfig. - - - - - Constructs a new RemoveDegeneratePrimitivesCheckAreaConfig. - - True if the post process step should check the area of triangles when finding degenerate primitives, false otherwise. - - - - Configuration for the step - to preserve nodes matching a name in the given list. Nodes that match the names in the list - will not be modified or removed. Identifiers containing whitespaces - must be enclosed in single quotation marks. The default value is an - empty string. - - - - - Gets the string name used by NodeExcludeListConfig. - - - - - Constructs a new NodeExcludeListConfig. - - List of node names - - - - Configuration for the step - that specifies the maximum number of triangles a mesh can contain. The - default value is MeshTriangleLimitConfigDefaultValue. - - - - - Gets the string name used by MeshTriangleLimitConfig. - - - - - Gets the defined default limit value, this corresponds to the - constant. - - - - - Constructs a new MeshTriangleLimitConfig. - - Max number of triangles a mesh can contain. - - - - Configuration for the step - that specifies the maximum number of vertices a mesh can contain. The - default value is MeshVertexLimitConfigDefaultValue. - - - - - Gets the string name used by MeshVertexLimitConfig. - - - - - Gets the defined default limit value, this corresponds to the - constant. - - - - - Constructs a new MeshVertexLimitConfig. - - Max number of vertices a mesh can contain. - - - - Configuration for the step - that specifies the maximum number of bone weights per vertex. The default - value is VertexBoneWeightLimitConfigDefaultValue. - - - - - gets the string name used by VertexBoneWeightLimitConfig. - - - - - Gets the defined default limit value, this corresponds to the - constant. - - - - - Constructs a new VertexBoneWeightLimitConfig. - - Max number of bone weights per vertex. - - - - Configuration for the step - that specifies the size of the post-transform vertex cache. The size is - given in number of vertices and the default value is VertexCacheSizeConfigDefaultValue. - - - - - Gets the string name used by VertexCacheConfig. - - - - - Gets the defined default vertex cache size, this corresponds to - the . - - - - - Constructs a new VertexCacheSizeConfig. - - Size of the post-transform vertex cache, in number of vertices. - - - - Configuration for the step that - specifies which parts of the data structure is to be removed. If no valid mesh - remains after the step, the import fails. The default value i . - - - - - Gets the string name used by RemoveComponentConfig. - - - - - Constructs a new RemoveComponentConfig. - - Bit-wise combination of components to exclude. - - - - Configuration for the step that - specifies which primitive types are to be removed by the step. Specifying all - primitive types is illegal. The default value is zero specifying none. - - - - - Gets the string name used by SortByPrimitiveTypeConfig. - - - - - Constructs a new SortByPrimitiveTypeConfig. - - Bit-wise combination of primitive types to remove - - - - Configuration for the step that - specifies the floating point accuracy for animation values, specifically - the episilon during comparisons. The default value is 0.0f. - - - - - Gets the string name used by AnimationAccuracyConfig. - - - - - Constructs a new AnimationAccuracyConfig. - - Episilon for animation value comparisons. - - - - Configuration for the step that - specifies which UV transformations are to be evaluated. The default value - is for all combinations (scaling, rotation, translation). - - - - - Gets the string name used by TransformUVConfig. - - - - - Constructs a new TransformUVConfig. - - Bit-wise combination specifying which UV transforms that should be evaluated. - - - - Configuration that is a hint to Assimp to favor speed against import quality. Enabling this - option may result in faster loading, or it may not. It is just a hint to loaders - and post-process steps to use faster code paths if possible. The default value is false. - - - - - Gets the string name used by FavorSpeedConfig. - - - - - Constructs a new FavorSpeedConfig. - - True if Assimp should favor speed at the expense of quality, false otherwise. - - - - Configures the maximum bone count per mesh for the step. Meshes are - split until the maximum number of bones is reached. - - - - - Gets the string name used by MaxBoneCountConfig. - - - - - Constructs a new MaxBoneCountConfig. - - The maximum bone count. - - - - Configures which texture channel is used for tangent space computations. The channel must exist or an error will be raised. - - - - - Gets the string name used by TangentTextureChannelIndexConfig. - - - - - Constructs a new TangentTextureChannelIndexConfig. - - The zero-based texture channel index. - - - - Configures the threshold that is used to determine what bones are removed. - - - - - Gets the string name used by DeboneThresholdConfig. - - - - - Constructs a new DeboneThresholdConfig. - - The debone threshold. - - - - Configuration that requires all bones to qualify for deboning before any are removed. - - - - - Gets the string name used by DeboneAllOrNoneConfig. - - - - - Constructs a new DeboneAllOrNoneConfig. - - True if all are required, false if none need to qualify. - - - - Configuration for that sets a user defined matrix as the scene root node transformation before - transforming vertices. Default value is the identity matrix. - - - - - Gets the string name used by RootTransformationConfig. - - - - - Constructs a new RootTransformationConfig. - - Root transformation matrix to be set to the root scene node during the pretransform post process step. - - - - Applies the property value to the given Assimp property store. - - Assimp property store - - - - Configures the step to scale the entire scene by a certain amount. Some importers provide a mechanism to define a scaling unit for the model, - which this processing step can utilize. - - - - - - Gets the string name used by GlobalScaleConfig. - - - - - Constructs a new GlobalScaleConfig. - - Value to scale the entire scene by. - - - - Sets the vertex animation keyframe to be imported. Assimp does not support vertex keyframes (only - bone animation is supported). the library reads only one keyframe with vertex animations. By default this is the - first frame. This config sets the "global" keyframe that will be imported. There are other configs - for specific importers that will override the global setting. - - - - - Gets the string name used by GlobalKeyFrameImportConfig. - - - - - Constructs a new GlobalKeyFrameImportConfig. - - Keyframe index - - - - Sets the vertex animation keyframe to be imported. Assimp does not support vertex keyframes (only - bone animation is supported). the library reads only one keyframe with vertex animations. By default this is the - first frame. This config sets the global override for the MD3 format. - - - - - Gets the string name used by MD3KeyFrameImportConfig. - - - - - Constructs a new MD3KeyFrameImportConfig. - - Keyframe index - - - - Sets the vertex animation keyframe to be imported. Assimp does not support vertex keyframes (only - bone animation is supported). the library reads only one keyframe with vertex animations. By default this is the - first frame. This config sets the global override for the MD2 format. - - - - - Gets the string name used by MD2KeyFrameImportConfig. - - - - - Constructs a new MD2KeyFrameImportConfig. - - Keyframe index - - - - Sets the vertex animation keyframe to be imported. Assimp does not support vertex keyframes (only - bone animation is supported). the library reads only one keyframe with vertex animations. By default this is the - first frame. This config sets the global override for the MDL format. - - - - - Gets the string name used by MDLKeyFrameImportConfig. - - - - - Constructs a new MDLKeyFrameImportConfig. - - Keyframe index - - - - Sets the vertex animation keyframe to be imported. Assimp does not support vertex keyframes (only - bone animation is supported). the library reads only one keyframe with vertex animations. By default this is the - first frame. This config sets the global override for the SMD format. - - - - - Gets the string name used by SMDKeyFrameImportConfig. - - - - - Constructs a new SMDKeyFrameImportConfig. - - Keyframe index - - - - Sets the vertex animation keyframe to be imported. Assimp does not support vertex keyframes (only - bone animation is supported). the library reads only one keyframe with vertex animations. By default this is the - first frame. This config sets the global override for the Unreal format. - - - - - Gets the string name used by UnrealKeyFrameImportConfig. - - - - - Constructs a new UnrealKeyFrameImportConfig. - - Keyframe index - - - - Configures the AC loader to collect all surfaces which have the "Backface cull" flag set in separate - meshes. The default value is true. - - - - - Gets the string name used by ACSeparateBackfaceCullConfig. - - - - - Constructs a new ACSeparateBackfaceCullConfig. - - True if all surfaces that have the "backface cull" flag set should be collected in separate meshes, false otherwise. - - - - Configures whether the AC loader evaluates subdivision surfaces (indicated by the presence - of the 'subdiv' attribute in the file). By default, Assimp performs - the subdivision using the standard Catmull-Clark algorithm. The default value is true. - - - - - Gets the string name used by ACEvaluateSubdivisionConfig. - - - - - Constructs a new ACEvaluateSubdivisionConfig. - - True if the AC loader should evaluate subdivisions, false otherwise. - - - - Configures the UNREAL 3D loader to separate faces with different surface flags (e.g. two-sided vs single-sided). - The default value is true. - - - - - Gets the string name used by UnrealHandleFlagsConfig. - - - - - Constructs a new UnrealHandleFlagsConfig. - - True if the unreal loader should separate faces with different surface flags, false otherwise. - - - - Configures the terragen import plugin to compute UV's for terrains, if - they are not given. Furthermore, a default texture is assigned. The default value is false. - UV coordinates for terrains are so simple to compute that you'll usually - want to compute them on your own, if you need them. This option is intended for model viewers which - want to offer an easy way to apply textures to terrains. - - - - - Gets the string name used by TerragenComputeTexCoordsConfig. - - - - - Constructs a new TerragenComputeTexCoordsConfig. - - True if terran UV coordinates should be computed, false otherwise. - - - - Configures the ASE loader to always reconstruct normal vectors basing on the smoothing groups - loaded from the file. Some ASE files carry invalid normals, others don't. The default value is true. - - - - - Gets the string name used by ASEReconstructNormalsConfig. - - - - - Constructs a new ASEReconstructNormalsConfig. - - True if normals should be re-computed, false otherwise. - - - - Configures the M3D loader to detect and process multi-part Quake player models. These models - usually consit of three files, lower.md3, upper.md3 and head.md3. If this propery is - set to true, Assimp will try to load and combine all three files if one of them is loaded. The - default value is true. - - - - - Gets the string name used by MD3HandleMultiPartConfig. - - - - - Constructs a new MD3HandleMultiPartConfig. - - True if the split files should be loaded and combined, false otherwise. - - - - Tells the MD3 loader which skin files to load. When loading MD3 files, Assimp checks - whether a file named "md3_file_name"_"skin_name".skin exists. These files are used by - Quake III to be able to assign different skins (e.g. red and blue team) to models. 'default', 'red', 'blue' - are typical skin names. The default string value is "default". - - - - - Gets the string name used by MD3SkinNameConfig. - - - - - Constructs a new MD3SkinNameConfig. - - The skin name. - - - - Specifies the Quake 3 shader file to be used for a particular MD3 file. This can be a full path or - relative to where all MD3 shaders reside. the default string value is an empty string. - - - - - Gets the string name used by MD3ShaderSourceConfig. - - - - - Constructs a new MD3ShaderSourceConfig. - - The shader file. - - - - Configures the LWO loader to load just one layer from the model. - LWO files consist of layers and in some cases it could be useful to load only one of them. - This property can be either a string - which specifies the name of the layer - or an integer - the index - of the layer. If the property is not set then the whole LWO model is loaded. Loading fails - if the requested layer is not vailable. The layer index is zero-based and the layer name may not be empty - The default value is false (all layers are loaded). - - - - - Gets the string name used by LWOImportOneLayerConfig. - - - - - Constructs a new LWOImportOneLayerConfig. - - True if only one layer should be imported, false if all layers should be imported. - - - - Configures the MD5 loader to not load the MD5ANIM file for a MD5MESH file automatically. - The default value is false. - The default strategy is to look for a file with the same name but with the MD5ANIm extension - in the same directory. If it is found it is loaded and combined with the MD5MESH file. This configuration - option can be used to disable this behavior. - - - - - Gets the string name used by MD5NoAnimationAutoLoadConfig. - - - - - Constructs a new MD5NoAnimationAutoLoadConfig. - - True if animations should not be automatically loaded, false if they should be. - - - - Defines the beginning of the time range for which the LWS loader evaluates animations and computes - AiNodeAnim's. The default value is the one taken from the file. - Assimp provides full conversion of Lightwave's envelope system, including pre and post - conditions. The loader computes linearly subsampled animation channels with the frame rate - given in the LWS file. This property defines the start time. - Animation channels are only generated if a node has at least one envelope with more than one key - assigned. This property is given in frames where '0' is the first. By default, - if this property is not set, the importer takes the animation start from the input LWS - file ('FirstFrame' line) - - - - - Gets the string name used by LWSAnimationStartConfig. - - - - - Constructs a new LWSAnimationStartConfig. - - Beginning of the time range - - - - Defines the ending of the time range for which the LWS loader evaluates animations and computes - AiNodeAnim's. The default value is the one taken from the file - Assimp provides full conversion of Lightwave's envelope system, including pre and post - conditions. The loader computes linearly subsampled animation channels with the frame rate - given in the LWS file. This property defines the end time. - Animation channels are only generated if a node has at least one envelope with more than one key - assigned. This property is given in frames where '0' is the first. By default, - if this property is not set, the importer takes the animation end from the input LWS - file. - - - - - Gets the string name used by LWSAnimationEndConfig. - - - - - Constructs a new LWSAnimationEndConfig. - - Ending of the time range - - - - Defines the output frame rate of the IRR loader. - IRR animations are difficult to convert for Assimp and there will always be - a loss of quality. This setting defines how many keys per second are returned by the converter. - The default value is 100 frames per second. - - - - - Gets the string name used by IRRAnimationFrameRateConfig. - - - - - Constructs a new IRRAnimationFramerateConfig. - - Number of frames per second to output. - - - - The Ogre importer will try to load this MaterialFile. Ogre meshes reference with material names, this does not tell Assimp - where the file is located. Assimp will try to find the source file in the following order: [material-name].material, [mesh-filename-base].material, - and lastly the material name defined by this config property. The default value is "Scene.Material". - - - - - Gets the string name used by OgreMaterialFileConfig. - - - - - Constructs a new OgreMaterialFileConfig. - - Material file name to load. - - - - The Ogre importer will detect the texture usage from the filename. Normally a texture is loaded as a color map, if no target is specified - in the material file. If this is enabled, then Assimp will try to detect the type from the texture filename postfix: - - Normal Maps: _n, _nrm, _nrml, _normal, _normals, _normalmap - Specular Maps: _s, _spec, _specular, _specularmap - Light Maps: _l, _light, _lightmap, _occ, _occlusion - Displacement Maps: _dis, _displacement - - The matching is case insensitive. Postfix is taken between the last "_" and last ".". The default behavior is to detect type from lower cased - texture unit name by matching against: normalmap, specularmap, lightmap, and displacementmap. For both cases if no match is found then, - is used. The default value is false. - - - - - Gets the string name used by OgreTextureTypeFromFilenameConfig. - - - - - Constructs a new OgreTextureTypeFromFilenameConfig. - - True if the filename defines texture usage, false otherwise. - - - - Specifies whether the IFC loader skips over IfcSpace elements. IfcSpace elements (and their geometric representations) are used to represent free space in a building story. - - - - - Gets the string name used by IFCSkipSpaceRepresentationsConfig. - - - - - Constructs a new IFCSkipSpaceRepresentationsConfig. - - True if the IfcSpace elements are skipped, false if otherwise. - - - - Specifies whether the IFC loader will use its own, custom triangulation algorithm to triangulate wall and floor meshes. If this is set to false, - walls will be either triangulated by the post process triangulation or will be passed through as huge polygons with faked holes (e.g. holes that are connected - with the outer boundary using a dummy edge). It is highly recommended to leave this property set to true as the default post process has some known - issues with these kind of polygons. - - - - - Gets the string name used by IFCUseCustomTriangulationConfig. - - - - - Constructs a new IFCUseCustomTriangulationConfig. - - True if the loader should use its own triangulation routine for walls/floors, false otherwise. - - - - Specifies the tessellation conic angle for IFC smoothing curves. Accepted range of values is between [5, 120] - - - - - Gets the string name used by IFCSmoothingAngleConfig. - - - - - Constructs a new IFCSmoothingAngleConfig. - - Smoothing angle when tessellating curves. Needs to be in the range of [5, 120]. - - - - Specifies the tessellation for IFC cylindrical shapes. E.g. the number of segments used to approximate a circle. Accepted range of values is between [3, 180]. - - - - - Gets the string name used by IFCCylindricalTessellationConfig. - - - - - Constructs a new IFCCylindricalTessellationConfig. - - Tessellation of cylindrical shapes (e.g. the number of segments used to approximate a circle). Needs to be in the range of [3, 180]. - - - - Specifies whether the collada loader will ignore the up direction. Default is false. - - - - - Gets the string name used by ColladaIgnoreUpDirectionConfig. - - - - - Constructs a new ColladaIgnoreUpDirectionConfig. - - True if the loader should ignore the up direction, false otherwise. - - - - Specifies whether the FBX importer will merge all geometry layers present in the source file or import only the first. Default is true. - - - - - Gets the string name used by FBXImportAllGeometryLayersConfig. - - - - - Constructs a new FBXImportAllGeometryLayersConfig. - - True if all geometry layers should be merged, false otherwise to take only the first layer. - - - - Specifies whether the FBX importer will import all materials present in the source file or take only the referenced materials, - if the importer is configured to import materials at all. Otherwise this will have no effect. Default is false. - - - - - Gets the string name used by FBXImportAllMaterialsConfig. - - - - - Constructs a new FBXImportAllMaterialsConfig. - - True if the FBX importer should import ALL materials even if not referenced, false otherwise (take only the referenced materials). - - - - Specifies whether the FBX importer will import materials. Default is true. - - - - - Gets the string name used by FBXImportMaterialsConfig. - - - - - Constructs a new FBXImportMaterialsConfig. - - True if the FBX importer should import materials, false otherwise. - - - - Specifies whether the FBX importer will import embedded textures. Default is true. - - - - - - Gets the string name used by FBXImportEmbeddedTexturesConfig. - - - - - Constructs a new FBXImportEmbeddedTexturesConfig. - - True if the FBX importer should import embedded textures, false otherwise. - - - - Specifies if the FBX importer should search for embedded loaded textures, where no embedded texture data is provided. Default is false. - - - - - Gets the string name used by FBXImportSearchEmbeddedTexturesConfig. - - - - - Constructs a new FBXImportSearchEmbeddedTexturesConfig. - - True if the FBX importer should search for embedded loaded textures, where no embedded texture data is provided. - - - - Specifies whether the FBX importer will import cameras. Default is true. - - - - - Gets the string name used by FBXImportCamerasConfig. - - - - - Constructs a new FBXImportCamerasConfig. - - True if the FBX importer should import cameras, false otherwise. - - - - Specifies whether the FBX importer will import lights. Default is true. - - - - - Gets the string name used by FBXImportLightsConfig. - - - - - Constructs a new FBXImportLightsConfig. - - True if the FBX importer should import lights, false otherwise. - - - - Specifies whether the FBX importer will import animations. Default is true. - - - - - Gets the string name used by FBXImportAnimationsConfig. - - - - - Constructs a new FBXImportAnimationsConfig. - - True if the FBX importer should import animations, false otherwise. - - - - Specifies whether the FBX importer will act in strict mode in which only the FBX 2013 - format is supported and any other sub formats are rejected. FBX 2013 is the primary target for the importer, so this - format is best supported and well-tested. Default is false. - - - - - Gets the string name used by FBXStrictModeConfig. - - - - - Constructs a new FBXStrictModeConfig. - - True if FBX strict mode should be used, false otherwise. - - - - Specifies whether the FBX importer will preserve pivot points for transformations (as extra nodes). If set to false, pivots - and offsets will be evaluated whenever possible. Default value is true. - - - - - Gets the string name used by FBXPreservePivotsConfig. - - - - - Constructs a new FBXPreservePivotsConfig. - - True if pivots should be preserved, false otherwise. - - - - Specifies whether the importer will drop empty animation curves or animation curves which match the bind pose - transformation over their entire defined range. Default value is true. - - - - - Gets the string name used by FBXOptimizeEmptyAnimationCurvesConfig. - - - - - Constructs a new FBXOptimizeEmptyAnimationCurvesConfig. - - True if empty animation curves should be dropped, false otherwise. - - - - Specifies if the X-file exporter should use 64-bit doubles rather than 32-bit floats. - - - - - Gets the string name used by XFileUseDoublesConfig. - - - - - Constructs a new XFileUseDoublesConfig. - - True if the x file uses 64-bit double values rather than 32-bit float values. - - - - Represents an embedded texture. Some file formats directly embed texture assets. - Embedded textures may be uncompressed, where the data is given in an uncompressed format. - Or it may be compressed in a format like png or jpg. In the latter case, the raw - file bytes are given so the application must utilize an image decoder (e.g. DevIL) to - get access to the actual color data. This object represents both types, so some properties may or may not be valid depending - if it is compressed or not. - - - - - Gets if the texture is compressed or not. - - - - - Gets the width of the texture in pixels. Only valid for non-compressed textures. - - - - - Gets the height of the texture in pixels. Only valid for non-compressed textures. - - - - - Gets if the texture has non-compressed texel data. Only valid for non-compressed textures. - - - - - Gets the size of the non-compressed texel data. Only valid for non-compressed textures. - - - - - Gets the non-compressed texel data, the array is of size Width * Height. Only valid for non-compressed textures. - - - - - Gets if the embedded texture has compressed data. Only valid for compressed textures. - - - - - Gets the size of the compressed data. Only valid for compressed textures. - - - - - Gets the raw byte data representing the compressed texture. Only valid for compressed textures. - - - - - Gets the format hint to determine the type of compressed data. This hint - is a three-character lower-case hint like "dds", "jpg", "png". - - - - - Constructs a new instance of the class. Should use only if - reading from a native value. - - - - - Constructs a new instance of the class. This creates a compressed - embedded texture. - - The 3 character format hint. - The compressed data. - - - - Constructs a new instance of the class. This creates an uncompressed - embedded texture. - - Width of the texture - Height of the texture - Color data - Thrown if the data size does not match width * height. - - - - Gets if the native value type is blittable (that is, does not require marshaling by the runtime, e.g. has MarshalAs attributes). - - - - - Writes the managed data to the native value. - - Optional pointer to the memory that will hold the native value. - Output native value - - - - Reads the unmanaged data from the native value. - - Input native value - - - - Frees unmanaged memory created by . - - Native value to free - True if the unmanaged memory should be freed, false otherwise. - - - - Enumerates metadata data types. - - - - - Metadata is a boolean. - - - - - Metadata is an integer. - - - - - Metadata is an unsigned 64-bit integer. - - - - - Metadata is a float. - - - - - Metadata is a double. - - - - - Metadata is a string. - - - - - Metadata is a . - - - - - Post processing flag options, specifying a number of steps - that can be run on the data to either generate additional vertex - data or optimize the imported data. - - - - - No flags enabled. - - - - - Calculates the tangents and binormals (bitangents) - for the imported meshes. - - This does nothing if a mesh does not have normals. You might - want this post processing step to be executed if you plan - to use tangent space calculations such as normal mapping. There is a - config setting AI_CONFIG_PP_CT_MAX_SMOOTHING_ANGLE which - allows you to specify a maximimum smoothing angle for the algorithm. - However, usually you'll want to leave it at the default value. - - - - - - Identifies and joins identical vertex data sets within all - imported meshes. - - After this step is run each mesh does contain only unique vertices - anymore, so a vertex is possibly used by multiple faces. You usually - want to use this post processing step. If your application deals with - indexed geometry, this step is compulsory or you'll just waste rendering - time. - If this flag is not specified, no vertices are referenced by more than one - face and no index buffer is required for rendering. - - - - - Converts all imported data to a left handed coordinate space. - - By default the data is returned in a right-handed coordinate space, - where +X points to the right, +Z towards the viewer, and +Y upwards. - - - - - Triangulates all faces of all meshes. - - By default the imported mesh data might contain faces with more than - three indices. For rendering you'll usually want all faces to - be triangles. This post processing step splits up all - higher faces to triangles. Line and point primitives are *not* - modified. If you want 'triangles only' with no other kinds of primitives, - try the following: - - - - Specify both and . - - - Ignore all point and line meshes when you process Assimp's output - - - - - - - Removes some parts of the data structure (animations, materials, - light sources, cameras, textures, vertex components). - - The components to be removed are specified in a separate configuration - option, AI_CONFIG_PP_RVC_FLAGS. This is quite useful if you don't - need all parts of the output structure. Especially vertex colors are rarely used today...calling this step to remove - unrequired stuff from the pipeline as early as possible results in an increased - performance and a better optimized output data structure. - - - This step is also useful if you want to force Assimp to recompute normals - or tangents. the corresponding steps don't recompute them if they're already - there (loaded from the source asset). By using this step you can make sure - they are NOT there. - - - - - Generates normals for all faces of all meshes. It may not be - specified together with . - - This is ignored if normals are already there at the time where this - flag is evaluated. Model importers try to load them from the source file, - so they're usually already there. Face normals are shared between all - points of a single face, so a single point can have multiple normals, - which in other words, forces the library to duplicate vertices in - some cases. This makes senseless then. - - - - - - Generates smooth normals for all vertices of all meshes. It - may not be specified together with . - - This is ignored if normals are already there at the time where - this flag is evaluated. Model importers try to load them from the - source file, so they're usually already there. - - The configuration option AI_CONFIG_PP_GSN_MAX_SMOOTHING_ANGLE - allows you to specify an angle maximum for the normal smoothing algorithm. - Normals exceeding this limit are not smoothed, resulting in a 'hard' seam - between two faces. using a decent angle here (e.g. 80 degrees) results in a very good visual - appearance. - - - - - Splits large meshes into smaller submeshes. - - This is useful for realtime rendering where the number - of triangles which can be maximally processed in a single draw call is - usually limited by the video driver/hardware. The maximum vertex buffer - is usually limited, too. Both requirements can be met with this step: - you may specify both a triangle and a vertex limit for a single mesh. - - The split limits can be set through the AI_CONFIG_PP_SLM_VERTEX_LIMIT - and AI_CONFIG_PP_SLM_TRIANGLE_LIMIT config settings. The default - values are 1,000,000. - - Warning: This can be a time consuming task. - - - - - Removes the node graph and "bakes" (pre-transforms) all - vertices with the local transformation matrices of their nodes. - The output scene does still contain nodes, however, there is only - a root node with children, each one referencing only one mesh. - Each mesh referencing one material. For rendering, you can simply render - all meshes in order, you don't need to pay attention to local transformations - and the node hierarchy. - - Warning: Animations are removed during this step. - - - - - Limits the number of bones simultaneously affecting a single - vertex to a maximum value. - - If any vertex is affected by more than that number of bones, - the least important vertex weights are removed and the remaining vertex - weights are re-normalized so that the weights still sum up to 1. - - The default bone weight limit is 4 and uses the - AI_LMW_MAX_WEIGHTS config. If you intend to perform the skinning in hardware, this post processing - step might be of interest for you. - - - - - Validates the imported scene data structure. - - This makes sure that all indices are valid, all animations - and bones are linked correctly, all material references are - correct, etc. - - It is recommended to capture Assimp's log output if you use this flag, - so you can easily find out what's actually wrong if a file fails the - validation. The validator is quite rude and will find *all* inconsistencies - in the data structure. There are two types of failures: - - - Error: There's something wrong with the imported data. Further - postprocessing is not possible and the data is not usable at all. The import - fails. - - - Warning: There are some minor issues (e.g. 1000000 animation keyframes - with the same time), but further postprocessing and use of the data structure is still - safe. Warning details are written to the log file. - - - - - - - Re-orders triangles for better vertex cache locality. - - This step tries to improve the ACMR (average post-transform vertex cache - miss ratio) for all meshes. The implementation runs in O(n) time - and is roughly based on the 'tipsify' algorithm. - - If you intend to render huge models in hardware, this step might be of interest for you. - The AI_CONFIG_PP_ICL_PTCACHE_SIZE config setting can be used to fine tune - the cache optimization. - - - - - Searches for redundant/unreferenced materials and removes them. - - This is especially useful in combination with the PreTransformVertices - and OptimizeMeshes flags. Both join small meshes with equal characteristics, but - they can't do their work if two meshes have different materials. Because several - material settings are always lost during Assimp's import filders and because many - exporters don't check for redundant materials, huge models often have materials which - are defined several times with exactly the same settings. - - Several material settings not contributing to the final appearance of a surface - are ignored in all comparisons ... the material name is one of them. So, if you're passing - additional information through the content pipeline (probably using *magic* material names), - don't specify this flag. Alternatively, take a look at the AI_CONFIG_PP_RRM_EXCLUDE_LIST - setting. - - - - - This step tries to determine which meshes have normal vectors - that are facing inwards. - - The algorithm is simple but effective: - - The bounding box of all vertices and their normals are compared - against the volume of the bounding box of all vertices without their normals. - This works well for most objects, problems might occur with planar surfaces. However, - the step tries to filter such cases. The step inverts all in-facing normals. - Generally, it is recommended to enable this step, although the result is not - always correct. - - - - - This step splits meshes with more than one primitive type in homogeneous submeshes. - - This step is executed after triangulation and after it returns, just one - bit is set in aiMesh:mPrimitiveTypes. This is especially useful for real-time - rendering where point and line primitives are often ignored or rendered separately. - - - You can use AI_CONFIG_PP_SBP_REMOVE option to specify which primitive types you need. - This can be used to easily exclude lines and points, which are rarely used, - from the import. - - - - - - This step searches all meshes for degenerated primitives and - converts them to proper lines or points. A face is 'degenerated' if one or more of its points are identical. - - To have degenerated primitives removed, specify the flag - try one of the following procedures: - - - - To support lines and points: Set the - AI_CONFIG_PP_FD_REMOVE option to one. This will cause the step to remove degenerated triangles as - soon as they are detected. They won't pass any further pipeline steps. - - - If you don't support lines and points: Specify flag, which - will move line and point primitives to separate meshes. Then set the AI_CONFIG_PP_SBP_REMOVE - option to and to cause step - to reject point and line meshes from the scene. - - - - Degenerated polygons are not necessarily evil and that's why they are not removed by default. There are several - file formats which do not support lines or points where exporters bypass the format specification and write - them as degenerated triangles instead. - - - - - - This step searches all meshes for invalid data, such as zeroed - normal vectors or invalid UV coordinates and removes or fixes them. - This is intended to get rid of some common exporter rrors. - - This is especially useful for normals. If they are invalid, - and the step recognizes this, they will be removed and can later - be recomputed, e.g. by the GenerateSmoothNormals flag. The step - will also remove meshes that are infinitely small and reduce animation - tracks consisting of hundreds of redundant keys to a single key. The - AI_CONFIG_PP_FID_ANIM_ACCURACY config property decides the accuracy of the check - for duplicate animation tracks. - - - - - This step converts non-UV mappings (such as spherical or - cylindrical mapping) to proper texture coordinate channels. - - Most applications will support UV mapping only, so you will - probably want to specify this step in every case. Note that Assimp - is not always able to match the original mapping implementation of the 3D - app which produced a model perfectly. It's always better - to let the father app compute the UV channels, at least 3DS max, maya, blender, - lightwave, modo, .... are able to achieve this. - - If this step is not requested, you'll need to process the MATKEY_MAPPING - material property in order to display all assets properly. - - - - - Applies per-texture UV transformations and bakes them to stand-alone vtexture - coordinate channels. - - UV Transformations are specified per-texture - see the MATKEY_UVTRANSFORM material - key for more information. This step processes all textures with transformed input UV coordinates - and generates new (pretransformed) UV channel transformations, so you will probably - want to specify this step. - - UV transformations are usually implemented in realtime apps by - transforming texture coordinates in a vertex shader stage with a 3x3 (homogenous) - transformation matrix. - - - - - Searches for duplicated meshes and replaces them with a reference - to the first mesh. - - This is time consuming, so don't use it if you have no time. Its - main purpose is to work around the limitation with some - file formats that don't support instanced meshes, so exporters - duplicate meshes. - - - - - - Attempts to reduce the number of meshes (and draw calls). - - This is recommended to be used together with - and is fully compatible with both and . - - - - - - Optimizes scene hierarchy. Nodes with no animations, bones, - lights, or cameras assigned are collapsed and joined. - - Node names can be lost during this step, you can specify - names of nodes that should'nt be touched or modified - with AI_CONFIG_PP_OG_EXCLUDE_LIST. - - Use this flag with caution. Most simple files will be collapsed to a - single node, complex hierarchies are usually completely lost. That's not - the right choice for editor environments, but probably a very effective - optimization if you just want to get the model data, convert it to your - own format and render it as fast as possible. - - This flag is designed to be used with for best - results. - - Scenes with thousands of extremely small meshes packed - in deeply nested nodes exist for almost all file formats. - Usage of this and usually fixes them all and - makes them renderable. - - - - - Flips all UV coordinates along the y-axis - and adjusts material settings/bitangents accordingly. - - - - - Flips face winding order from CCW (default) to CW. - - - - - Splits meshes with many bones into submeshes so that each submesh has fewer or as many bones as a given limit. - - - - - Removes bones losslessly or according to some threshold. In some cases (e.g. formats that require it) exporters - are faced to assign dummy bone weights to otherwise static meshes assigned to animated meshes. Full, weight-based skinning is expensive while - animating nodes is extremely cheap, so this step is offered to clean up the data in that regard. - - Usage of the configuration AI_CONFIG_PP_DB_THRESHOLD to control the threshold and AI_CONFIG_PP_DB_ALL_OR_NONE if you want bones - removed if and only if all bones within the scene qualify for removal. - - - - - This step will perform a global scale of the model. Some importers provide a mechanism to define a scaling unit for the model, which this processing step can utilize. - Use AI_CONFIG_GLOBAL_SCALE_FACTOR_KEY to control this. - - - - - Enumerates components of the scene or mesh data that - can be excluded from the import using the post process step - RemoveComponent. - - - - - No components to be excluded. - - - - - Removes normal vectors - - - - - Removes tangents/binormals - - - - - Removes all color sets. - - - - - Removes all texture UV sets. - - - - - Remove all boneweights from all meshes. Scenegraph - nodes corresponding to the bones are NOT removed. - Use OptimizeGraph step to remove them. - - - - - Removes all node animations. Coressponding scenegraph - nodes are NOT removed. Use OptimizeGraph step to - remove them. - - - - - Removes all embedded textures. - - - - - Removes all light sources. The corresponding scenegraph nodes are - NOT removed. Use the OptimizeGraph step to do this. - - - - - Removes all cameras. The corresponding scenegraph - nodes are NOT removed. Use the OptimizeGraph step - to do this. - - - - - Removes all meshes. - - - - - Removes all materials. One default material will be generated. - - - - - Enumerates geometric primitive types. - - - - - Point primitive. This is just a single vertex - in the virtual world. A face has one index for such a primitive. - - - - - Line primitive. This is a line defined through a start and an - end position. A face contains exactly two indices for such a primitive. - - - - - Triangle primitive, consisting of three indices. - - - - - A n-Gon that has more than three edges (thus is not a triangle). - - - - - Defines an animation channel behaves outside the defined - time range. This corresponds to the prestate and poststates - of the animation node. - - - - - The value from the default node transformation is taken. - - - - - The nearest key value is used without interpolation. - - - - - The value of the nearest two keys is linearly extrapolated for the current - time value. - - - - - The animation is repeated. If the animation key goes from n to m - and the current time is t, use the value at (t - n ) % (|m-n|). - - - - - Defines the methods of mesh morphing supported. - - - - - No morphing. - - - - - Interpolation between morph targets. - - - - - Normalized morphing between morph targets. - - - - - Relative morphing between morph targets. - - - - - Enumerates all supported light sources. - - - - - Unknown light. - - - - - Directional light source that has a well-defined - direction but is infinitely far away, e.g. the sun. - - - - - Point light source that has a well-defined position in - space but is omni-directional, e.g. a light bulb. - - - - - Spot light source emits light from a position in space, - in a certain direction that is limited by an angle, like - a cone. - - - - - Generic light level of the world, including the bounces of all other light sources. Typically, there's at most one ambient light in a scene and - is usually just a constant color. This light does not have a valid position, direction, or other properties - just the color. - - - - - An area light is a rectangle with a predefined size that uniformly emits light from one of its sides. The position is center of the rectangle and the direction is its normal vector. - - - - - Defines alpha blending flags, how the final - color value of a pixel is computed, based on the following equation: - - sourceColor * sourceBlend + destColor * destBlend - - - Where the destColor is the previous color in the frame buffer - and sourceColor is the material color before the - transparency calculation. This corresponds to the AI_MATKEY_BLEND_FUNC property. - - - - - Default blending: sourceColor * sourceAlpha + destColor * (1 - sourceAlpha) - - - - - Additive blending: sourcecolor * 1 + destColor * 1. - - - - - Defines all shading models supported by the library. - - The list of shading modes has been taken from Blender. See Blender - documentation for more information. - - - - - - No shading mode defined. - - - - - Flat shading. Shading is done on a per-face basis and is diffuse only. Also known - as 'faceted shading'. - - - - - Simple Gouraud shading. - - - - - Phong Shading. - - - - - Phong-Blinn Shading. - - - - - Toon-shading, also known as a 'comic' shader. - - - - - OrenNayer shading model. Extension to standard Lambertian shading, taking the roughness - of the material into account. - - - - - Minnaert shading model. Extension to standard Lambertian shading, taking the "darkness" of - the material into account. - - - - - CookTorrance shading model. Special shader for metallic surfaces. - - - - - No shading at all. Constant light influence of 1.0. - - - - - Fresnel shading. - - - - - Defines some mixed flags for a particular texture. This corresponds - to the AI_MAT_KEY_TEXFLAGS property. - - - - - The texture's color values have to be inverted (componentwise 1-n). - - - - - Explicit request to the application to process the alpha channel of the texture. This is mutually - exclusive with . These flags are - set if the library can say for sure that the alpha channel is used/is not used. - If the model format does not define this, iti s left to the application to decide - whether the texture alpha channel - if any - is evaluated or not. - - - - - Explicit request to the application to ignore the alpha channel of the texture. This is mutually - exclusive with . - - - - - Defines how UV coordinates outside the [0..1] range are handled. Commonly - referred to as the 'wrapping mode' - - - - - A texture coordinate u|v is translated to u % 1| v % 1. - - - - - Texture coordinates outside [0...1] are clamped to the nearest valid value. - - - - - A texture coordinate u|v becomes u1|v1 if (u - (u % 1)) % 2 is zero - and 1 - (u % 1) | 1 - (v % 1) otherwise. - - - - - If the texture coordinates for a pixel are outside [0...1] the texture is not - applied to that pixel. - - - - - Defines how texture coordinates are generated - - Real-time applications typically require full UV coordinates. So the use - of step is highly recommended. - It generates proper UV channels for non-UV mapped objects, as long as an accurate - description of how the mapping should look like is given. - - - - - - Coordinates are taken from the an existing UV channel. - - The AI_MATKEY_UVWSRC key specifies from the UV channel the texture coordinates - are to be taken from since meshes can have more than one UV channel. - - - - - - Spherical mapping - - - - - Cylinder mapping - - - - - Cubic mapping - - - - - Planar mapping - - - - - Unknown mapping that is not recognied. - - - - - Defines how the Nth texture of a specific type is combined - with the result of all previous layers. - - Example (left: key, right: value): - - DiffColor0 - gray - DiffTextureOp0 - TextureOperation.Multiply - DiffTexture0 - tex1.png - DiffTextureOp0 - TextureOperation.Add - DiffTexture1 - tex2.png - - - Written as an equation, the final diffuse term for a specific - pixel would be: - - - diffFinal = DiffColor0 * sampleTex(DiffTexture0, UV0) + sampleTex(DiffTexture1, UV0) * diffContrib; - - - - - - - T = T1 * T2 - - - - - T = T1 + T2 - - - - - T = T1 - T2 - - - - - T = T1 / T2 - - - - - T = (T1 + T2) - (T1 * T2) - - - - - T = T1 + (T2 - 0.5) - - - - - Defines the purpose of a texture. - - - - - No texture, but the value can be used as a 'texture semantic'. - - - - - A diffuse texture that is combined with the result of the diffuse lighting equation. - - - - - A specular texture that is combined with the result of the specular lighting equation. - - - - - An ambient texture that is combined with the ambient lighting equation. - - - - - An emissive texture that is added to the result of the lighting calculation. It is not influenced - by incoming light, instead it represents the light that the object is naturally emitting. - - - - - A height map texture. by convention, higher gray-scale values stand for - higher elevations from some base height. - - - - - A tangent-space normal map. There are several conventions for normal maps - and Assimp does (intentionally) not distinguish here. - - - - - A texture that defines the glossiness of the material. This is the exponent of the specular (phong) - lighting equation. Usually there is a conversion function defined to map the linear color values - in the texture to a suitable exponent. - - - - - The texture defines per-pixel opacity. usually 'white' means opaque and 'black' means 'transparency. Or quite - the opposite. - - - - - A displacement texture. The exact purpose and format is application-dependent. Higher color values stand for higher vertex displacements. - - - - - A lightmap texture (aka Ambient occlusion). Both 'lightmaps' and dedicated 'ambient occlusion maps' are covered by this material property. The - texture contains a scaling value for the final color value of a pixel. Its intensity is not affected by incoming light. - - - - - A reflection texture. Contains the color of a perfect mirror reflection. This is rarely used, almost never for real-time applications. - - - - - An unknown texture that does not mention any of the defined texture type definitions. It is still imported, but is excluded from any - further postprocessing. - - - - - Defines the state of the imported scene data structure. - - - - - Default state of the scene, it imported successfully. - - - - - Specifies that the scene data structure that was imported is not complete. - This flag bypasses some internal validations and allows the import - of animation skeletons, material libaries, or camera animation paths - using Assimp. Most applications won't support such data. - - - - - This flag is set by the - post process step if validation is successful. In a validated scene you can be sure that any - cross references in the data structure (e.g. vertex indices) are valid. - - - - - This flag is set by the - post process step if validation is successful, but some issues have been found. This can for example - mean that a texture that does not exist is referenced by a material or that the bone weights for a vertex - do not sum to 1.0. In most cases you should still be able to use the import. This flag can be useful - for applications which do not capture Assimp's log output. - - - - - This flag is set by the post process step. - It indicates that the vertices of the output mesh are not in the internal verbose format anymore. In the - verbose format, all vertices are unique where no vertex is ever referenced by more than one face. - - - - - Denotes the scene is pure height-map terrain data. Pure terrains usually consist of quads, sometimes triangles, - in a regular grid. The x,y coordinates of all vertex positions refer to the x,y coordinates on the terrain height map, the - z-axis stores the elevation at a specific point. - - TER (Terragen) and HMP (3D Game Studio) are height map formats. - - - - - - Specifies that the scene data can be shared between structures. For example: one vertex in a few faces. This differs from as - that has internal meanings about postprocessing steps. - - - - - Enumerates Assimp function result codes. - - - - - Function returned successfully. - - - - - There was an error. - - - - - Assimp ran out of memory. - - - - - Seek origins for Assimp's virtual file system API. - - - - - Beginning of the file - - - - - Current position of the file pointer. - - - - - End of the file, offsets must be negative. - - - - - Enumerates predefined log streaming destinations. - - - - - Stream log to a file - - - - - Stream log to the standard output - - - - - Stream log to the standard error output. - - - - - MSVC only: Stream the log to the debugger (this relies - on OutputDebugString from the Win32 SDK). - - - - - Defines material property types. - - - - - Array of single-precision (32 bit) floats. - - - - - Array of double-precision (64 bit) floats. - - - - - Property is a string. - - - - - Array of 32 bit integers. - - - - - Byte buffer where the content is undefined. - - - - - Enumerates how the native Assimp DLL was compiled - - - - - Assimp compiled as a shared object (Windows: DLL); - - - - - Assimp was compiled against STLport - - - - - Assimp was compiled as a debug build - - - - - Assimp was compiled with the boost work around. - - - - - Assimp was compiled built to run single threaded. - - - - - Defines how UV coordinates should be transformed. - - - - - Scaling is evaluated. - - - - - Rotation is evaluated. - - - - - Translation is evaluated. - - - - - Defines the desired file I/O mode is when opening a new file. - - - - - Open the file for writing. - - - - - Open the file for writing binary data to it. - - - - - Open the file for writing text data to it. - - - - - Open the file for reading. - - - - - Open the file for reading binary data from it. - - - - - Open the file for reading text data from it. - - - - - Defines flags that indicate level of support for common features for a given importer. - - - - - Indicates there is a textual encoding of the file format and it is supported. - - - - - Indicates there is a binary encoding of the file format and it is supported. - - - - - Indicates there is a compressed encoding of the file format and it is supported. - - - - - Indicates that the importer reads only a very particular subset of the file format. This is common - for formats that cannot easily be mapped to the Scene data structure. - - - - - Indicates that the importer is experimental and used with caution - this is only reserved for importers still in - development, and not typically yet in released production code. - - - - - Describes a blob of exported scene data. Blobs can be nested - each blob may reference another blob, which in - turn can reference another and so on. This is used to allow exporters to write more than one output for a given - scene, such as material files. Existence of such files depends on the format. - - - The stream representation of an ExportDataBlob is as follows: - - String: Name of the Blob - int: Length of Binary Data - byte[]: Binary Data - bool: If has next data blob - String: Name of nested blob - int: Length of nested blob binary data - byte[]: Nested blob binary data - bool: If nested blob has next data blob - .... - - - - - - Gets the name of the blob. The first and primary blob always has an empty string for a name. Auxillary files - that are nested will have names. - - - - - Get the blob data. - - - - - Gets the next data blob. - - - - - Gets if the blob data is valid. - - - - - Creates a new ExportDataBlob. - - Unmanaged structure. - - - - Creates a new ExportDataBlob. - - Name - Data - - - - Writes the data blob to the specified stream. - - Output stream - - - - Reads a data blob from the specified stream. - - Input stream - Data blob - - - - Describes a file format which Assimp can export to. - - - - - Gets a short string ID to uniquely identify the export format. E.g. "collada" or "obj". - - - - - Gets a short description of the file format to present to users. - - - - - Gets the recommended file extension for the exported file in lower case. - - - - - Constructs a new ExportFormatDescription. - - Unmanaged structure - - - - A single face in a mesh, referring to multiple vertices. This can be a triangle - if the index count is equal to three, or a polygon if the count is greater than three. - - Since multiple primitive types can be contained in a single mesh, this approach - allows you to better examine how the mesh is constructed. If you use the - post process step flag during import, then each mesh will be homogenous where primitive type is concerned. - - - - - Gets the number of indices defined in the face. - - - - - Gets if the face has faces (should always be true). - - - - - Gets or sets the indices that refer to positions of vertex data in the mesh's vertex - arrays. - - - - - Constructs a new instance of the class. - - - - - Constructs a new instance of the class. - - Face indices - - - - Gets if the native value type is blittable (that is, does not require marshaling by the runtime, e.g. has MarshalAs attributes). - - - - - Writes the managed data to the native value. - - Optional pointer to the memory that will hold the native value. - Output native value - - - - Reads the unmanaged data from the native value. - - Input native value - - - - Frees unmanaged memory created by . - - Native value to free - True if the unmanaged memory should be freed, false otherwise. - - - - Simple implementation of an IOSystem that searches for files on the disk. This implementation - can be given a number of search directories that it will attempt to locate the file in first, before - using the file path given by Assimp. That way, you can load models that have files distributed in a number of other - directories besides the root model's. - - - - - Constructs a new FileIOSystem that does not have any search directories. - - - - - Constructs a new FileIOSystem that uses the specified search directories. - - Search directories to search for files in - - - - Sets the search directories the FileIOSystem will use when searching for files. - - Directory paths - - - - Gets the search directories the FileIOSystem is using. - - Directory paths - - - - Opens a stream to a file. - - Path to the file - Desired file access mode - The IO stream - - - - Finds the first file that matches the file name (name + extension) in the search paths. - - File name (+ extension) to search for - Found file path - True if the file was found, false otherwise - - - - Wraps a FileStream. - - - - - Metadata and feature support information for a given importer. - - - - - Gets the name of the importer (e.g. Blender3D Importer) - - - - - Gets the original author (blank if unknown or assimp team). - - - - - Gets the name of the current maintainer, if empty then the author maintains. - - - - - Gets any implementation comments. - - - - - Gets the features supported by the importer. - - - - - Gets the minimum version of the file format supported. If no version scheme, forwards compatible, or importer doesn't care, major/min will be zero. - - - - - Gets the maximum version of the file format supported. If no version scheme, forwards compatible, or importer doesn't care, major/min will be zero. - - - - - Gets the list of file extensions the importer can handle. All entries are lower case and do NOT have a leading dot. - - - - - Represents an object that can be marshaled to and from a native representation. - - Managed object type - Native value type - - - - Gets if the native value type is blittable (that is, does not require marshaling by the runtime, e.g. has MarshalAs attributes). - - - - - Writes the managed data to the native value. - - Optional pointer to the memory that will hold the native value. - Output native value - - - - Reads the unmanaged data from the native value. - - Input native value - - - - Custom marshaler for usage with the for performing marshaling - to-and-from unmanaged memory for non-blittable types. A type must be attributed with - to automatically have an instance of its marshaler be utilized. - - - - - Gets the native data size in bytes. - - - - - Marshals the managed object to the unmanaged chunk of memory. - - Managed object to marshal. - Unmanaged chunk of memory to write to. - - - - Marshals the managed object from the unmanaged chunk of memory. - - Unmanaged chunk of memory to read from. - Managed object marshaled. - - - - Defines a stream to some file input or output source. This object is responsible for reading/writing data - that is used by Assimp. - - - - - Gets whether or not this IOStream has been disposed. - - - - - Gets the original path to file given by Assimp. - - - - - Gets the original desired file access mode. - - - - - Gets whether the stream is in fact valid - that is, the input/output has been - properly located and can be read/written. - - - - - Constructs a new IOStream. - - Path to file given by Assimp - Desired file access mode - - - - Finalizes an instance of the class. - - - - - Disposes of resources held by the IOStream. - - - - - Releases unmanaged and - optionally - managed resources. - - True to release both managed and unmanaged resources; False to release only unmanaged resources. - - - - Writes data to the stream. - - Data to write - Number of bytes to write - Number of bytes actually written. Should be equal to the specified count, unless if EoF was hit or an error occured. - - - - Reads data from the stream. - - Byte buffer to store the read data in - Number of bytes to read - Number of bytes actually read. Should be equal to the specified count, unless if EoF was hit or an error occured. - - - - Sets the current file position pointer. - - Offset in bytes from the origin - Origin reference - ReturnCode indicating success or failure. - - - - Gets the current file position pointer (in bytes). - - Current file position pointer (in bytes) - - - - Gets the total file size (in bytes). - - File size in bytes - - - - Flushes all data currently in the stream buffers. - - - - - Closes the stream - flushing any data not yet read/written and disposes of resources. - - - - - Defines a custom IO handler that can be registered to an importer that will handle I/O for assimp. This includes searching/opening - files to read during import, and creating/writing to files during export. - - - - - Gets whether or not this IOSystem has been disposed. - - - - - Gets the number of currently opened streams. - - - - - Constructs a new IOSystem. - - - - - Finalizes an instance of the class. - - - - - Opens a stream to a file. - - Path to the file - Desired file access mode - The IO stream - - - - Closes a stream that is owned by this IOSystem. - - Stream to close - - - - Closes all outstanding streams owned by this IOSystem. - - - - - Disposes of all resources held by this object. - - - - - Releases unmanaged and - optionally - managed resources. - - True to release both managed and unmanaged resources; False to release only unmanaged resources. - - - - Describes a light source in the scene. Assimp supports multiple light sources - including spot, point, and directional lights. All are defined by a single structure - and distinguished by their parameters. Lights have corresponding nodes in the scenegraph. - Some file formats such as 3DS and ASE export a "target point", e.g. the point - a spot light is looking at (it can even be animated). Assimp writes the target point as a subnode - of a spotlight's main node called "spotName.Target". However, this is just additional information - then, the transform tracks of the main node make the spot light already point in the right direction. - - - - - Gets or sets the name of the light source. This corresponds to a node present in the scenegraph. - - - - - Gets or sets the type of light source. This should never be undefined. - - - - - Gets or sets the inner angle of a spot light's light cone. The spot light has - maximum influence on objects inside this angle. The angle is given in radians, it - is 2PI for point lights and defined for directional lights. - - - - - Gets or sets the outer angle of a spot light's light cone. The spot light does not affect objects outside - this angle. The angle is given in radians. It is 2PI for point lights and undefined for - directional lights. The outer angle must be greater than or equal to the inner angle. - - - - - Gets or sets the constant light attenuation factor. The intensity of the light source - at a given distance 'd' from the light position is Atten = 1 / (att0 + att1 * d + att2 * d*d). - This member corresponds to the att0 variable in the equation and is undefined for directional lights. - - - - - Gets or sets the linear light attenuation factor. The intensity of the light source - at a given distance 'd' from the light position is Atten = 1 / (att0 + att1 * d + att2 * d*d) - This member corresponds to the att1 variable in the equation and is undefined for directional lights. - - - - - Gets or sets the quadratic light attenuation factor. The intensity of the light source - at a given distance 'd' from the light position is Atten = 1 / (att0 + att1 * d + att2 * d*d). - This member corresponds to the att2 variable in the equation and is undefined for directional lights. - - - - - Gets or sets the position of the light source in space, relative to the - transformation of the node corresponding to the light. This is undefined for - directional lights. - - - - - Gets or sets the direction of the light source in space, relative to the transformation - of the node corresponding to the light. This is undefined for point lights. - - - - - Gets or sets the up vector of the light source in space, relative to the transformation of the node corresponding to the light. - This is undefined for point lights. - - - - - Gets or sets the diffuse color of the light source. The diffuse light color is multiplied with - the diffuse material color to obtain the final color that contributes to the diffuse shading term. - - - - - Gets or sets the specular color of the light source. The specular light color is multiplied with the - specular material color to obtain the final color that contributes to the specular shading term. - - - - - Gets or sets the ambient color of the light source. The ambient light color is multiplied with the ambient - material color to obtain the final color that contributes to the ambient shading term. - - - - - Gets or sets the Width (X) and Height (Y) of the area that represents an light. - - - - - Constructs a new instance of the class. - - - - - Gets if the native value type is blittable (that is, does not require marshaling by the runtime, e.g. has MarshalAs attributes). - - - - - Writes the managed data to the native value. - - Optional pointer to the memory that will hold the native value. - Output native value - - - - Reads the unmanaged data from the native value. - - Input native value - - - - Frees unmanaged memory created by . - - Native value to free - True if the unmanaged memory should be freed, false otherwise. - - - - Callback delegate for Assimp's LogStream. - - Log message - Supplied user data - - - - Represents a log stream, which receives all log messages and streams them somewhere. - - - - - Gets or sets, if verbose logging is enabled globally. - - - - - Gets or sets the user data to be passed to the callback. - - - - - Gets whether the logstream has been disposed or not. - - - - - Gets whether or not the logstream is currently attached to the library. - - - - - Static constructor. - - - - - Constructs a new LogStream. - - - - - Constructs a new LogStream. - - User-supplied data - - - - Constructs a new LogStream. - - Logging callback that is called when messages are received by the log stream. - - - - Constructs a new LogStream. - - Logging callback that is called when messages are received by the log stream. - User-supplied data - - - - Finalizes an instance of the class. - - - - - Detaches all active logstreams from the library. - - - - - Gets all active logstreams that are currently attached to the library. - - Collection of active logstreams attached to the library. - - - - Attaches the logstream to the library. - - - - - Detaches the logstream from the library. - - - - - Logs a message. - - Message contents - - - - Releases unmanaged resources held by the LogStream. This should not be called by the user if the logstream is currently attached to an assimp importer. - - - - - Releases unmanaged and - optionally - managed resources. - - True to release both managed and unmanaged resources; False to release only unmanaged resources. - - - - Override this method to log a message for a subclass of Logstream, if no callback - was set. - - Message - User data - - - - Called when the log stream has been attached to the assimp importer. At this point it may start receiving messages. - - - - - Called when the log stream has been detatched from the assimp importer. After this point it will stop receiving - messages until it is re-attached. - - - - - Log stream that writes messages to the Console. - - - - - Constructs a new console logstream. - - - - - Constructs a new console logstream. - - User supplied data - - - - Log a message to the console. - - Message - Userdata - - - - A material contains all the information that describes how to render a mesh. E.g. textures, colors, and render states. Internally - all this information is stored as key-value pair properties. The class contains many convienence methods and properties for - accessing non-texture/texture properties without having to know the Assimp material key names. Not all properties may be present, - and if they aren't a default value will be returned. - - - - - Gets the number of properties contained in the material. - - - - - Checks if the material has a name property. - - - - - Gets the material name value, if any. Default value is an empty string. - - - - - Checks if the material has a two-sided property. - - - - - Gets if the material should be rendered as two-sided. Default value is false. - - - - - Checks if the material has a shading-mode property. - - - - - Gets the shading mode. Default value is , meaning it is not defined. - - - - - Checks if the material has a wireframe property. - - - - - Gets if wireframe should be enabled. Default value is false. - - - - - Checks if the material has a blend mode property. - - - - - Gets the blending mode. Default value is . - - - - - Checks if the material has an opacity property. - - - - - Gets the opacity. Default value is 1.0f. - - - - - Checks if the material has a bump scaling property. - - - - - Gets the bump scaling. Default value is 0.0f; - - - - - Checks if the material has a shininess property. - - - - - Gets the shininess. Default value is 0.0f; - - - - - Checks if the material has a shininess strength property. - - - - - Gets the shininess strength. Default vaulue is 1.0f. - - - - - Checks if the material has a reflectivty property. - - - - - Gets the reflectivity. Default value is 0.0f; - - - - - Checks if the material has a color diffuse property. - - - - - Gets the color diffuse. Default value is white. - - - - - Checks if the material has a color ambient property. - - - - - Gets the color ambient. Default value is (.2f, .2f, .2f, 1.0f). - - - - - Checks if the material has a color specular property. - - - - - Gets the color specular. Default value is black. - - - - - Checks if the material has a color emissive property. - - - - - Gets the color emissive. Default value is black. - - - - - Checks if the material has a color transparent property. - - - - - Gets the color transparent. Default value is black. - - - - - Checks if the material has a color reflective property. - - - - - Gets the color reflective. Default value is black. - - - - - Gets if the material has a diffuse texture in the first texture index. - - - - - Gets or sets diffuse texture properties in the first texture index. - - - - - Gets if the material has a specular texture in the first texture index. - - - - - Gets or sets specular texture properties in the first texture index. - - - - - Gets if the material has a ambient texture in the first texture index. - - - - - Gets or sets ambient texture properties in the first texture index. - - - - - Gets if the material has a emissive texture in the first texture index. - - - - - Gets or sets emissive texture properties in the first texture index. - - - - - Gets if the material has a height texture in the first texture index. - - - - - Gets or sets height texture properties in the first texture index. - - - - - Gets if the material has a normal texture in the first texture index. - - - - - Gets or sets normal texture properties in the first texture index. - - - - - Gets if the material has an opacity texture in the first texture index. - - - - - Gets or sets opacity texture properties in the first texture index. - - - - - Gets if the material has a displacement texture in the first texture index. - - - - - Gets or sets displacement texture properties in the first texture index. - - - - - Gets if the material has a light map texture in the first texture index. - - - - - Gets or sets light map texture properties in the first texture index. - - - - - Gets if the material has a reflection texture in the first texture index. - - - - - Gets or sets reflection texture properties in the first texture index. - - - - - Constructs a new instance of the class. - - - - - Helper method to construct a fully qualified name from the input parameters. All the input parameters are combined into the fully qualified name: {baseName},{texType},{texIndex}. E.g. - "$clr.diffuse,0,0" or "$tex.file,1,0". This is the name that is used as the material dictionary key. - - Key basename, this must not be null or empty - Texture type; non-texture properties should leave this - Texture index; non-texture properties should leave this zero. - The fully qualified name - - - - Gets the non-texture properties contained in this Material. The name should be - the "base name", as in it should not contain texture type/texture index information. E.g. "$clr.diffuse" rather than "$clr.diffuse,0,0". The extra - data will be filled in automatically. - - Key basename - The material property, if it exists - - - - Gets the material property. All the input parameters are combined into the fully qualified name: {baseName},{texType},{texIndex}. E.g. - "$clr.diffuse,0,0" or "$tex.file,1,0". - - Key basename - Texture type; non-texture properties should leave this - Texture index; non-texture properties should leave this zero. - The material property, if it exists - - - - Gets the material property by its fully qualified name. The format is: {baseName},{texType},{texIndex}. E.g. - "$clr.diffuse,0,0" or "$tex.file,1,0". - - Fully qualified name of the property - The material property, if it exists - - - - Checks if the material has the specified non-texture property. The name should be - the "base name", as in it should not contain texture type/texture index information. E.g. "$clr.diffuse" rather than "$clr.diffuse,0,0". The extra - data will be filled in automatically. - - Key basename - True if the property exists, false otherwise. - - - - Checks if the material has the specified property. All the input parameters are combined into the fully qualified name: {baseName},{texType},{texIndex}. E.g. - "$clr.diffuse,0,0" or "$tex.file,1,0". - - Key basename - Texture type; non-texture properties should leave this - Texture index; non-texture properties should leave this zero. - True if the property exists, false otherwise. - - - - Checks if the material has the specified property by looking up its fully qualified name. The format is: {baseName},{texType},{texIndex}. E.g. - "$clr.diffuse,0,0" or "$tex.file,1,0". - - Fully qualified name of the property - True if the property exists, false otherwise. - - - - Adds a property to this material. - - Material property - True if the property was successfully added, false otherwise (e.g. null or key already present). - - - - Removes a non-texture property from the material. - - Property name - True if the property was removed, false otherwise - - - - Removes a property from the material. - - Name of the property - Property texture type - Property texture index - True if the property was removed, false otherwise - - - - Removes a property from the material. - - Fully qualified name of the property ({basename},{texType},{texIndex}) - True if the property was removed, false otherwise - - - - Removes all properties from the material; - - - - - Gets -all- properties contained in the Material. - - All properties in the material property map. - - - - Gets all the number of textures that are of the specified texture type. - - Texture type - Texture count - - - - Adds a texture to the material - this bulk creates a property for each field. This will - either create properties or overwrite existing properties. If the texture has no - file path, nothing is added. - - Texture to add - True if the texture properties were added or modified - - - - Adds a texture to the material - this bulk creates a property for each field. This will - either create properties or overwrite existing properties. If the texture has no - file path, nothing is added. - - Texture to add - True to only set the texture's file path, false otherwise - True if the texture properties were added or modified - - - - Removes a texture from the material - this bulk removes a property for each field. - If the texture has no file path, nothing is removed - - Texture to remove - True if the texture was removed, false otherwise. - - - - Gets a texture that corresponds to the type/index. - - Texture type - Texture index - Texture description - True if the texture was found in the material - - - - Gets all textures that correspond to the type. - - Texture type - The array of textures - - - - Gets all textures in the material. - - The array of textures - - - - Gets if the native value type is blittable (that is, does not require marshaling by the runtime, e.g. has MarshalAs attributes). - - - - - Writes the managed data to the native value. - - Optional pointer to the memory that will hold the native value. - Output native value - - - - Reads the unmanaged data from the native value. - - Input native value - - - - Frees unmanaged memory created by . - - Native value to free - True if the unmanaged memory should be freed, false otherwise. - - - - A key-value pairing that represents some material property. - - - - - Gets or sets the property key name. E.g. $tex.file. This corresponds to the - "AiMatKeys" base name constants. - - - - - Gets or sets the type of property. - - - - - Gets the raw byte data count. - - - - - Checks if the property has data. - - - - - Gets the raw byte data. To modify/read this data, see the Get/SetXXXValue methods. - - - - - Gets or sets the texture type semantic, for non-texture properties this is always . - - - - - Gets or sets the texture index, for non-texture properties this is always zero. - - - - - Gets the property's fully qualified name. Format: "{base name},{texture type semantic},{texture index}". E.g. "$clr.diffuse,0,0". This - is the key that is used to index the property in the material property map. - - - - - Constructs a new instance of the class. - - - - - Constructs a new instance of the class. Constructs a buffer property. - - Base name of the property - Property value - - - - Constructs a new instance of the class. Constructs a float property. - - Base name of the property - Property value - - - - Constructs a new instance of the class. Constructs an integer property. - - Base name of the property - Property value - - - - Constructs a new instance of the class. Constructs a boolean property. - - Name of the property - Property value - - - - Constructs a new instance of the class. Creates a string property. - - Base name of the property - Property value - - - - Constructs a new instance of the class. Creates a texture property. - - Base name of the property - Property value - Texture type - Texture index - - - - Constructs a new instance of the class. Creates a float array property. - - Base name of the property - Property values - - - - Constructs a new instance of the class. Creates a int array property. - - Base name of the property - Property values - - - - Constructs a new instance of the class. Creates a Color3D property. - - Base name of the property - Property value - - - - Constructs a new instance of the class. Creates a Color4D property. - - Base name of the property - Property value - - - - Gets the property raw data as a float. - - Float - - - - Sets the property raw data with a float. - - Float. - True if successful, false otherwise - - - - Gets the property raw data as a double. - - Double - - - - Sets the property raw data with a double. - - Double. - True if successful, false otherwise. - - - - Gets the property raw data as an integer. - - Integer - - - - Sets the property raw data as an integer. - - Integer - True if successful, false otherwise - - - - Gets the property raw data as a string. - - String - - - - Sets the property raw data as string. - - String - True if successful, false otherwise - - - - Gets the property raw data as a float array. - - Number of elements to get - Float array - - - - Gets the property raw data as a float array. - - Float array - - - - Sets the property raw data as a float array. - - Values to set - True if successful, otherwise false - - - - Gets the property raw data as a double array. - - Double array - - - - Sets the property raw data as a double array. - - Values to set - True if successful, otherwise false - - - - Gets the property raw data as an integer array. - - Number of elements to get - Integer array - - - - Gets the property raw data as an integer array. - - Integer array - - - - Sets the property raw data as an integer array. - - Values to set - True if successful, otherwise false - - - - Gets the property raw data as a boolean. - - Boolean - - - - Sets the property raw data as a boolean. - - Boolean value - True if successful, false otherwise - - - - Gets the property raw data as a Color3D. - - Color3D - - - - Sets the property raw data as a Color3D. - - Color3D - True if successful, false otherwise - - - - Gets the property raw data as a Color4D. - - Color4D - - - - Sets the property raw data as a Color4D. - - Color4D - True if successful, false otherwise - - - - Gets if the native value type is blittable (that is, does not require marshaling by the runtime, e.g. has MarshalAs attributes). - - - - - Writes the managed data to the native value. - - Optional pointer to the memory that will hold the native value. - Output native value - - - - Reads the unmanaged data from the native value. - - Input native value - - - - Frees unmanaged memory created by . - - Native value to free - True if the unmanaged memory should be freed, false otherwise. - - - - Represents a 3x3 matrix. Assimp docs say their matrices are always row-major, - and it looks like they're only describing the memory layout. Matrices are treated - as column vectors however (X base in the first column, Y base the second, and Z base the third) - - - - - Value at row 1, column 1 of the matrix - - - - - Value at row 1, column 2 of the matrix - - - - - Value at row 1, column 3 of the matrix - - - - - Value at row 2, column 1 of the matrix - - - - - Value at row 2, column 2 of the matrix - - - - - Value at row 2, column 3 of the matrix - - - - - Value at row 3, column 1 of the matrix - - - - - Value at row 3, column 2 of the matrix - - - - - Value at row 3, column 3 of the matrix - - - - - Gets the identity matrix. - - - - - Gets if this matrix is an identity matrix. - - - - - Gets or sets the value at the specific one-based row, column - index. E.g. i = 1, j = 2 gets the value in row 1, column 2 (MA2). Indices - out of range return a value of zero. - - - One-based Row index - One-based Column index - Matrix value - - - - Constructs a new Matrix3x3. - - Element at row 1, column 1 - Element at row 1, column 2 - Element at row 1, column 3 - Element at row 2, column 1 - Element at row 2, column 2 - Element at row 2, column 3 - Element at row 3, column 1 - Element at row 3, column 2 - Element at row 3, column 3 - - - - Constructs a new Matrix3x3. - - A 4x4 matrix to construct from, only taking the rotation/scaling part. - - - - Transposes this matrix (rows become columns, vice versa). - - - - - Inverts the matrix. If the matrix is *not* invertible all elements are set to . - - - - - Compute the determinant of this matrix. - - The determinant - - - - Creates a rotation matrix from a set of euler angles. - - Rotation angle about the x-axis, in radians. - Rotation angle about the y-axis, in radians. - Rotation angle about the z-axis, in radians. - The rotation matrix - - - - Creates a rotation matrix from a set of euler angles. - - Vector containing the rotation angles about the x, y, z axes, in radians. - The rotation matrix - - - - Creates a rotation matrix for a rotation about the x-axis. - - Rotation angle in radians. - The rotation matrix - - - - Creates a rotation matrix for a rotation about the y-axis. - - Rotation angle in radians. - The rotation matrix - - - - Creates a rotation matrix for a rotation about the z-axis. - - Rotation angle in radians. - The rotation matrix - - - - Creates a rotation matrix for a rotation about an arbitrary axis. - - Rotation angle, in radians - Rotation axis, which should be a normalized vector. - The rotation matrix - - - - Creates a scaling matrix. - - Scaling vector - The scaling vector - - - - Creates a rotation matrix that rotates a vector called "from" into another - vector called "to". Based on an algorithm by Tomas Moller and John Hudges: - - "Efficiently Building a Matrix to Rotate One Vector to Another" - Journal of Graphics Tools, 4(4):1-4, 1999 - - - Starting vector - Ending vector - Rotation matrix to rotate from the start to end. - - - - Tests equality between two matrices. - - First matrix - Second matrix - True if the matrices are equal, false otherwise - - - - Tests inequality between two matrices. - - First matrix - Second matrix - True if the matrices are not equal, false otherwise - - - - Performs matrix multiplication.Multiplication order is B x A. That way, SRT concatenations - are left to right. - - First matrix - Second matrix - Multiplied matrix - - - - Implicit conversion from a 4x4 matrix to a 3x3 matrix. - - 4x4 matrix - 3x3 matrix - - - - Tests equality between this matrix and another. - - Other matrix to test - True if the matrices are equal, false otherwise - - - - Determines whether the specified is equal to this instance. - - The to compare with this instance. - - true if the specified is equal to this instance; otherwise, false. - - - - - Returns a hash code for this instance. - - - A hash code for this instance, suitable for use in hashing algorithms and data structures like a hash table. - - - - - Returns a that represents this instance. - - - A that represents this instance. - - - - - Represents a 4x4 column-vector matrix (X base is the first column, Y base is the second, Z base the third, and translation the fourth). - Memory layout is row major. Right handed conventions are used by default. - - - - - Value at row 1, column 1 of the matrix - - - - - Value at row 1, column 2 of the matrix - - - - - Value at row 1, column 3 of the matrix - - - - - Value at row 1, column 4 of the matrix - - - - - Value at row 2, column 1 of the matrix - - - - - Value at row 2, column 2 of the matrix - - - - - Value at row 2, column 3 of the matrix - - - - - Value at row 2, column 4 of the matrix - - - - - Value at row 3, column 1 of the matrix - - - - - Value at row 3, column 2 of the matrix - - - - - Value at row 3, column 3 of the matrix - - - - - Value at row 3, column 4 of the matrix - - - - - Value at row 4, column 1 of the matrix - - - - - Value at row 4, column 2 of the matrix - - - - - Value at row 4, column 3 of the matrix - - - - - Value at row 4, column 4 of the matrix - - - - - Gets the identity matrix. - - - - - Gets if this matrix is an identity matrix. - - - - - Gets or sets the value at the specific one-based row, column - index. E.g. i = 1, j = 2 gets the value in row 1, column 2 (MA2). Indices - out of range return a value of zero. - - - One-based Row index - One-based Column index - Matrix value - - - - Constructs a new Matrix4x4. - - Element at row 1, column 1 - Element at row 1, column 2 - Element at row 1, column 3 - Element at row 1, column 4 - Element at row 2, column 1 - Element at row 2, column 2 - Element at row 2, column 3 - Element at row 2, column 4 - Element at row 3, column 1 - Element at row 3, column 2 - Element at row 3, column 3 - Element at row 3, column 4 - Element at row 4, column 1 - Element at row 4, column 2 - Element at row 4, column 3 - Element at row 4, column 4 - - - - Constructs a new Matrix4x4. - - Rotation matrix to copy values from. - - - - Transposes this matrix (rows become columns, vice versa). - - - - - Inverts the matrix. If the matrix is *not* invertible all elements are set to . - - - - - Compute the determinant of this matrix. - - The determinant - - - - Decomposes a transformation matrix into its original scale, rotation, and translation components. The - scaling vector receives the scaling for the x, y, z axes. The rotation is returned as a hamilton quaternion. And - the translation is the output position for the x, y, z axes. - - Vector to hold the scaling component - Quaternion to hold the rotation component - Vector to hold the translation component - - - - Decomposes a transformation matrix with no scaling. The rotation is returned as a hamilton - quaternion. The translation receives the output position for the x, y, z axes. - - Quaternion to hold the rotation component - Vector to hold the translation component - - - - Creates a rotation matrix from a set of euler angles. - - Rotation angle about the x-axis, in radians. - Rotation angle about the y-axis, in radians. - Rotation angle about the z-axis, in radians. - The rotation matrix - - - - Creates a rotation matrix from a set of euler angles. - - Vector containing the rotation angles about the x, y, z axes, in radians. - The rotation matrix - - - - Creates a rotation matrix for a rotation about the x-axis. - - Rotation angle in radians. - The rotation matrix - - - - Creates a rotation matrix for a rotation about the y-axis. - - Rotation angle in radians. - The rotation matrix - - - - Creates a rotation matrix for a rotation about the z-axis. - - Rotation angle in radians. - The rotation matrix - - - - Creates a rotation matrix for a rotation about an arbitrary axis. - - Rotation angle, in radians - Rotation axis, which should be a normalized vector. - The rotation matrix - - - - Creates a translation matrix. - - Translation vector - The translation matrix - - - - Creates a scaling matrix. - - Scaling vector - The scaling vector - - - - Creates a rotation matrix that rotates a vector called "from" into another - vector called "to". Based on an algorithm by Tomas Moller and John Hudges: - - "Efficiently Building a Matrix to Rotate One Vector to Another" - Journal of Graphics Tools, 4(4):1-4, 1999 - - - Starting vector - Ending vector - Rotation matrix to rotate from the start to end. - - - - Tests equality between two matrices. - - First matrix - Second matrix - True if the matrices are equal, false otherwise - - - - Tests inequality between two matrices. - - First matrix - Second matrix - True if the matrices are not equal, false otherwise - - - - Performs matrix multiplication. Multiplication order is B x A. That way, SRT concatenations - are left to right. - - First matrix - Second matrix - Multiplied matrix - - - - Implicit conversion from a 3x3 matrix to a 4x4 matrix. - - 3x3 matrix - 4x4 matrix - - - - Tests equality between this matrix and another. - - Other matrix to test - True if the matrices are equal, false otherwise - - - - Determines whether the specified is equal to this instance. - - The to compare with this instance. - - true if the specified is equal to this instance; otherwise, false. - - - - - Returns a hash code for this instance. - - - A hash code for this instance, suitable for use in hashing algorithms and data structures like a hash table. - - - - - Returns a that represents this instance. - - - A that represents this instance. - - - - - Delegate for performing unmanaged memory cleanup. - - Location in unmanaged memory of the value to cleanup - True if the unmanaged memory should be freed, false otherwise - - - - Helper static class containing functions that aid dealing with unmanaged memory to managed memory conversions. - - - - - Marshals an array of managed values to a c-style unmanaged array (void*). - - Managed type - Native type - Array of managed values - Pointer to unmanaged memory - - - - Marshals an array of managed values to a c-style unmanaged array (void*). This also can optionally marshal to - an unmanaged array of pointers (void**). - - Managed type - Native type - Array of managed values - True if the pointer is an array of pointers, false otherwise. - Pointer to unmanaged memory - - - - Marshals an array of managed values from a c-style unmanaged array (void*). - - Managed type - Native type - Pointer to unmanaged memory - Number of elements to marshal - Marshaled managed values - - - - Marshals an array of managed values from a c-style unmanaged array (void*). This also can optionally marshal from - an unmanaged array of pointers (void**). - - Managed type - Native type - Pointer to unmanaged memory - Number of elements to marshal - True if the pointer is an array of pointers, false otherwise. - Marshaled managed values - - - - Marshals an array of blittable structs to a c-style unmanaged array (void*). This should not be used on non-blittable types - that require marshaling by the runtime (e.g. has MarshalAs attributes). - - Struct type - Managed array of structs - Pointer to unmanaged memory - - - - Marshals an array of blittable structs from a c-style unmanaged array (void*). This should not be used on non-blittable types - that require marshaling by the runtime (e.g. has MarshalAs attributes). - - Struct type - Pointer to unmanaged memory - Number of elements to read - Managed array - - - - Frees an unmanaged array and performs cleanup for each value. This can be used on any type that can be - marshaled into unmanaged memory. - - Struct type - Pointer to unmanaged memory - Number of elements to free - Delegate that performs the necessary cleanup - - - - Frees an unmanaged array and performs cleanup for each value. Optionally can free an array of pointers. This can be used on any type that can be - marshaled into unmanaged memory. - - Struct type - Pointer to unmanaged memory - Number of elements to free - Delegate that performs the necessary cleanup - True if the pointer is an array of pointers, false otherwise. - - - - Marshals a managed value to unmanaged memory. - - Managed type - Unmanaged type - Managed value to marshal - Pointer to unmanaged memory - - - - Marshals a managed value from unmanaged memory. - - Managed type - Unmanaged type - Pointer to unmanaged memory - The marshaled managed value - - - - Convienence method for marshaling a pointer to a structure. Only use if the type is not blittable, otherwise - use the read methods for blittable types. - - Struct type - Pointer to marshal - The marshaled structure - - - - Convienence method for marshaling a pointer to a structure. Only use if the type is not blittable, otherwise - use the read methods for blittable types. - - Struct type - Pointer to marshal - The marshaled structure - - - - Convienence method for marshaling a structure to a pointer. Only use if the type is not blittable, otherwise - use the write methods for blittable types. - - Struct type - Struct to marshal - Pointer to unmanaged chunk of memory which must be allocated prior to this call - - - - Computes the size of the struct type using Marshal SizeOf. Only use if the type is not blittable, thus requiring marshaling by the runtime, - (e.g. has MarshalAs attributes), otherwise use the SizeOf methods for blittable types. - - Struct type - Size of the struct in bytes. - - - - Computes the size of the struct array using Marshal SizeOf. Only use if the type is not blittable, thus requiring marshaling by the runtime, - (e.g. has MarshalAs attributes), otherwise use the SizeOf methods for blittable types. - - Struct type - Array of structs - Total size, in bytes, of the array's contents. - - - - Pins an object in memory, which allows a pointer to it to be returned. While the object remains pinned the runtime - cannot move the object around in memory, which may degrade performance. - - Object to pin. - Pointer to pinned object's memory location. - - - - Unpins an object in memory, allowing it to once again freely be moved around by the runtime. - - Object to unpin. - - - - Convienence method to dispose all items in the collection - - IDisposable type - Collection of disposables - - - - Casts an underlying value type to an enum type, WITHOUT first casting the value to an Object. So this avoid boxing the value. - - Underlying value type. - Enum type. - Value to cast. - Enum value. - - - - Allocates unmanaged memory. This memory should only be freed by this helper. - - Size to allocate - Alignment of the memory, by default aligned along 16-byte boundary. - Pointer to the allocated unmanaged memory. - - - - Allocates unmanaged memory that is cleared to a certain value. This memory should only be freed by this helper. - - Size to allocate - Value the memory will be cleared to, by default zero. - Alignment of the memory, by default aligned along 16-byte boundary. - Pointer to the allocated unmanaged memory. - - - - Frees unmanaged memory that was allocated by this helper. - - Pointer to unmanaged memory to free. - - - - Checks if the memory is aligned to the specified alignment. - - Pointer to the memory - Alignment value, by defauly 16-byte - True if is aligned, false otherwise. - - - - Swaps the value between two references. - - Type of data to swap. - First reference - Second reference - - - - Computes a hash code using the FNV modified algorithmm. - - Byte data to hash. - Hash code for the data. - - - - Reads a stream until the end is reached into a byte array. Based on - Jon Skeet's implementation. - It is up to the caller to dispose of the stream. - - Stream to read all bytes from - Initial buffer length, default is 32K - The byte array containing all the bytes from the stream - - - - Compares two arrays of bytes for equivalence. - - First array of data. - Second array of data. - True if both arrays contain the same data, false otherwise. - - - - Clears the memory to the specified value. - - Pointer to the memory. - Value the memory will be cleared to. - Number of bytes, starting from the memory pointer, to clear. - - - - Computes the size of the struct type. - - Struct type - Size of the struct in bytes. - - - - Casts the by-ref value into a pointer. - - Struct type. - By-ref value. - Pointer to the value. - - - - Casts the readonly by-ref value into a pointer. - - Struct type. - By-ref value. - Pointer to the value. - - - - Casts the pointer into a by-ref value of the specified type. - - Struct type. - Memory location. - By-ref value. - - - - Casts one by-ref type to another, unsafely. - - From struct type - To struct type - Source by-ref value. - Reference as the from type. - - - - Casts one readonly by-ref type to another, unsafely. - - From struct type - To struct type - Source by-ref value. - Reference as the from type. - - - - Computes the size of the struct array. - - Struct type - Array of structs - Total size, in bytes, of the array's contents. - - - - Adds an offset to the pointer. - - Pointer - Offset - Pointer plus the offset - - - - Performs a memcopy that copies data from the memory pointed to by the source pointer to the memory pointer by the destination pointer. - - Destination memory location - Source memory location - Number of bytes to copy - - - - Returns the number of elements in the enumerable. - - Type of element in collection. - Enumerable collection - The number of elements in the enumerable collection. - - - - Converts typed element array to a byte array. - - Struct type - Element array - Byte array copy or null if the source array was not valid. - - - - Converts a byte array to a typed element array. - - Struct type - Byte array - Typed element array or null if the source array was not valid. - - - - Copies bytes from a byte array to an element array. - - Struct type - Source byte array - Starting index in destination array - Destination element array - Starting index in destination array - Number of elements to copy - - - - Copies bytes from an element array to a byte array. - - Struct type - Source element array - Starting index in source array - Destination byte array - Starting index in destination array - Number of elements to copy - - - - Reads data from the memory location into the array. - - Struct type - Pointer to memory location - Array to store the copied data - Zero-based element index to start writing data to in the element array. - Number of elements to copy - - - - Reads a single element from the memory location. - - Struct type - Pointer to memory location - The read value - - - - Reads a single element from the memory location. - - Struct type - Pointer to memory location - The read value. - - - - Writes data from the array to the memory location. - - Struct type - Pointer to memory location - Array containing data to write - Zero-based element index to start reading data from in the element array. - Number of elements to copy - - - - Writes a single element to the memory location. - - Struct type - Pointer to memory location - The value to write - - - - A mesh represents geometry with a single material. - - - - - Gets or sets the mesh name. This tends to be used - when formats name nodes and meshes independently, - vertex animations refer to meshes by their names, - or importers split meshes up, each mesh will reference - the same (dummy) name. - - - - - Gets or sets the primitive type. This may contain more than one - type unless if - option is not set. - - - - - Gets or sets the index of the material associated with this mesh. - - - - - Gets the number of vertices in this mesh. This is the count that all - per-vertex lists should be the size of. - - - - - Gets if the mesh has a vertex array. This should always return - true provided no special scene flags are set. - - - - - Gets the vertex position list. - - - - - Gets if the mesh as normals. If it does exist, the count should be the same as the vertex count. - - - - - Gets the vertex normal list. - - - - - Gets if the mesh has tangents and bitangents. It is not - possible for one to be without the other. If it does exist, the count should be the same as the vertex count. - - - - - Gets the vertex tangent list. - - - - - Gets the vertex bitangent list. - - - - - Gets the number of faces contained in the mesh. - - - - - Gets if the mesh contains faces. If no special - scene flags are set, this should always return true. - - - - - Gets the mesh's faces. Each face will contain indices - to the vertices. - - - - - Gets the number of valid vertex color channels contained in the - mesh (list is not empty/not null). This can be a value between zero and the maximum vertex color count. Each individual channel - should be the size of . - - - - - Gets the number of valid texture coordinate channels contained - in the mesh (list is not empty/not null). This can be a value between zero and the maximum texture coordinate count. - Each individual channel should be the size of . - - - - - Gets the array that contains each vertex color channels, by default all are lists of zero (but can be set to null). Each index - in the array corresponds to the texture coordinate channel. The length of the array corresponds to Assimp's maximum vertex color channel limit. - - - - - Gets the array that contains each texture coordinate channel, by default all are lists of zero (but can be set to null). Each index - in the array corresponds to the texture coordinate channel. The length of the array corresponds to Assimp's maximum UV channel limit. - - - - - Gets the array that contains the count of UV(W) components for each texture coordinate channel, usually 2 (UV) or 3 (UVW). A component - value of zero means the texture coordinate channel does not exist. The channel index (index in the array) corresponds - to the texture coordinate channel index. - - - - - Gets the number of bones that influence this mesh. - - - - - Gets if this mesh has bones. - - - - - Gets the bones that influence this mesh. - - - - - Gets the number of mesh animation attachments that influence this mesh. - - - - - Gets if this mesh has mesh animation attachments. - - - - - Gets the mesh animation attachments that influence this mesh. - - - - - Gets or sets the morph method used when animation attachments are used. - - - - - Constructs a new instance of the class. - - - - - Constructs a new instance of the class. - - Name of the mesh. - - - - Constructs a new instance of the class. - - Primitive types contained in the mesh. - - - - Constructs a new instance of the class. - - Name of the mesh - Primitive types contained in the mesh. - - - - Checks if the mesh has vertex colors for the specified channel. This returns false if the list - is null or empty. The channel, if it exists, should contain the same number of entries as . - - Channel index - True if vertex colors are present in the channel. - - - - Checks if the mesh has texture coordinates for the specified channel. This returns false if the list - is null or empty. The channel, if it exists, should contain the same number of entries as . - - Channel index - True if texture coordinates are present in the channel. - - - - Convienence method for setting this meshe's face list from an index buffer. - - Index buffer - Indices per face - True if the operation succeeded, false otherwise (e.g. not enough data) - - - - Convienence method for accumulating all face indices into a single - index array. - - int index array - - - - Convienence method for accumulating all face indices into a single index - array as unsigned integers (the default from Assimp, if you need them). - - uint index array - - - - Convienence method for accumulating all face indices into a single - index array. - - short index array - - - - Gets if the native value type is blittable (that is, does not require marshaling by the runtime, e.g. has MarshalAs attributes). - - - - - Writes the managed data to the native value. - - Optional pointer to the memory that will hold the native value. - Output native value - - - - Reads the unmanaged data from the native value. - - Input native value - - - - Frees unmanaged memory created by . - - Native value to free - True if the unmanaged memory should be freed, false otherwise. - - - - A mesh attachment store per-vertex animations for a particular frame. You may - think of this as a 'patch' for the host mesh, since the mesh attachment replaces only certain - vertex data streams at a particular time. Each mesh stores 'n' attached meshes. The actual - relationship between the time line and mesh attachments is established by the mesh animation channel, - which references singular mesh attachments by their ID and binds them to a time offset. - - - - - Gets the number of vertices in this mesh. This is a replacement - for the host mesh's vertex count. Likewise, a mesh attachment - cannot add or remove per-vertex attributes, therefore the existance - of vertex data will match the existance of data in the mesh. - - - - - Checks whether the attachment mesh overrides the vertex positions - of its host mesh. - - - - - Gets the vertex position list. - - - - - Checks whether the attachment mesh overrides the vertex normals of - its host mesh. - - - - - Gets the vertex normal list. - - - - - Checks whether the attachment mesh overrides the vertex - tangents and bitangents of its host mesh. - - - - - Gets the vertex tangent list. - - - - - Gets the vertex bitangent list. - - - - - Gets the number of valid vertex color channels contained in the - mesh (list is not empty/not null). This can be a value between zero and the maximum vertex color count. Each individual channel - should be the size of . - - - - - Gets the number of valid texture coordinate channels contained - in the mesh (list is not empty/not null). This can be a value between zero and the maximum texture coordinate count. - Each individual channel should be the size of . - - - - - Gets the array that contains each vertex color channels that override a specific channel in the host mesh, by default all are lists of zero (but can be set to null). - Each index in the array corresponds to the texture coordinate channel. The length of the array corresponds to Assimp's maximum vertex color channel limit. - - - - - Gets the array that contains each texture coordinate channel that override a specific channel in the host mesh, by default all are lists of zero (but can be set to null). - Each index in the array corresponds to the texture coordinate channel. The length of the array corresponds to Assimp's maximum UV channel limit. - - - - - Gets or sets the weight of the mesh animation. - - - - - Constructs a new instance of the class. - - - - - Checks if the mesh attachment overrides a particular set of vertex colors on - the host mesh. This returns false if the list is null or empty. The index is between - zero and the maximumb number of vertex color channels. - - Channel index - True if vertex colors are present in the channel. - - - - Checks if the mesh attachment overrides a particular set of texture coordinates on - the host mesh. This returns false if the list is null or empty. The index is - between zero and the maximum number of texture coordinate channels. - - Channel index - True if texture coordinates are present in the channel. - - - - Gets if the native value type is blittable (that is, does not require marshaling by the runtime, e.g. has MarshalAs attributes). - - - - - Writes the managed data to the native value. - - Optional pointer to the memory that will hold the native value. - Output native value - - - - Reads the unmanaged data from the native value. - - Input native value - - - - Frees unmanaged memory created by . - - Native value to free - True if the unmanaged memory should be freed, false otherwise. - - - - Describes vertex-based animations for a single mesh or a group of meshes. Meshes - carry the animation data for each frame. The purpose of this object is to define - keyframes, linking each mesh attachment to a particular point in a time. - - - - - Gets or sets the name of the mesh to be animated. Empty strings are not allowed, - animation meshes need to be named (not necessarily uniquely, the name can basically - serve as a wildcard to select a group of meshes with similar animation setup). - - - - - Gets the number of meshkeys in this animation channel. There will always - be at least one key. - - - - - Gets if this animation channel has mesh keys - this should always be true. - - - - - Gets the mesh keyframes of the animation. This should not be null. - - - - - Constructs a new instance of the class. - - - - - Gets if the native value type is blittable (that is, does not require marshaling by the runtime, e.g. has MarshalAs attributes). - - - - - Writes the managed data to the native value. - - Optional pointer to the memory that will hold the native value. - Output native value - - - - Reads the unmanaged data from the native value. - - Input native value - - - - Frees unmanaged memory created by . - - Native value to free - True if the unmanaged memory should be freed, false otherwise. - - - - Binds an anim mesh (referenced by an index) to a specific point in time. - - - - - The time of this key. - - - - - Index of the anim mesh that corresponds to this keyframe. - - - - - Constructs a new MeshKey. - - The time of this key. - Index of the anim mesh that corresponds to this keyframe. - - - - Tests equality between two keys. - - The first key - The second key - True if the key's indices are the same, false otherwise - - - - Tests inequality between two keys. - - The first key - The second key - True if the key's indices are not equal, false otherwise. - - - - Tests inequality between two keys. - - The first key - The second key - True if the first key's time is less than the second key's. - - - - Tests inequality between two keys. - - The first key - The second key - True if the first key's time is greater than the second key's. - - - - Determines whether the specified is equal to this instance. - - The to compare with this instance. - - true if the specified is equal to this instance; otherwise, false. - - - - - Tests equality between this key and another. - - Other key to test - True if their indices are equal - - - - Returns a hash code for this instance. - - - A hash code for this instance, suitable for use in hashing algorithms and data structures like a hash table. - - - - - Returns a that represents this instance. - - - A that represents this instance. - - - - - Describes morph-based keyframe animations for a single mesh or a group of meshes. - - - - - Gets or sets the name of the mesh to be animated. Empty strings are not allowed, - animation meshes need to be named (not necessarily uniquely, the name can basically - serve as a wildcard to select a group of meshes with similar animation setup). - - - - - Gets the number of mesh morph keys in this animation channel. There will always be at least one key. - - - - - Gets if this animation channel has mesh keys - this should always be true. - - - - - Gets the mesh morph keyframes of the animation. This should not be null. - - - - - Constructs a new instance of the class. - - - - - Gets if the native value type is blittable (that is, does not require marshaling by the runtime, e.g. has MarshalAs attributes). - - - - - Reads the unmanaged data from the native value. - - Input native value - - - - Writes the managed data to the native value. - - Optional pointer to the memory that will hold the native value. - Output native value - - - - Frees unmanaged memory created by . - - Native value to free - True if the unmanaged memory should be freed, false otherwise. - - - - Binds a morph animation mesh to a specific point in time. - - - - - Gets or sets the time of this keyframe. - - - - - Gets the values at the time of this keyframe. Number of values must equal number of weights. - - - - - Gets the weights at the time of this keyframe. Number of weights must equal number of values. - - - - - Constructs a new instance of the class. - - - - - Gets if the native value type is blittable (that is, does not require marshaling by the runtime, e.g. has MarshalAs attributes). - - - - - Writes the managed data to the native value. - - Optional pointer to the memory that will hold the native value. - Output native value - - - - Reads the unmanaged data from the native value. - - Input native value - - - - Frees unmanaged memory created by . - - Native value to free - True if the unmanaged memory should be freed, false otherwise. - - - - Represents a container for holding metadata, representing as key-value pairs. - - - - - Constructs a new instance of the class. - - - - - Gets if the native value type is blittable (that is, does not require marshaling by the runtime, e.g. has MarshalAs attributes). - - - - - Writes the managed data to the native value. - - Optional pointer to the memory that will hold the native value. - Output native value - - - - Reads the unmanaged data from the native value. - - Input native value - - - - Frees unmanaged memory created by . - - Native value to free - True if the unmanaged memory should be freed, false otherwise. - - - - Represents an entry in a metadata container. - - - - - Gets the type of metadata. - - - - - Gets the metadata data stored in this entry. - - - - - Constructs a new instance of the struct. - - Type of the data. - The data. - - - - Tests equality between two entries. - - First entry - Second entry - True if the entries are equal, false otherwise - - - - Tests inequality between two entries. - - First entry - Second entry - True if the entries are not equal, false otherwise - - - - Gets the data as the specified type. If it cannot be casted to the type, then null is returned. - - Type to cast the data to. - Casted data or null. - - - - Determines whether the specified is equal to this instance. - - The to compare with this instance. - True if the specified is equal to this instance; otherwise, false. - - - - Indicates whether the current object is equal to another object of the same type. - - An object to compare with this object. - True if the current object is equal to the parameter; otherwise, false. - - - - Returns a hash code for this instance. - - A hash code for this instance, suitable for use in hashing algorithms and data structures like a hash table. - - - - Returns the fully qualified type name of this instance. - - A containing a fully qualified type name. - - - - Attribute for assocating a type with an instance. - - - - - Gets the associated marshaler. - - - - - Constructs a new instance of the class. - - Type that implements - Thrown if the type is null. - Thrown if the type does not implement . - - - - A node in the imported model hierarchy. - - - - - Gets or sets the name of the node. - - - - - Gets or sets the transformation of the node relative to its parent. - - - - - Gets the node's parent, if it exists. - - - - - Gets the number of children that is owned by this node. - - - - - Gets if the node contains children. - - - - - Gets the node's children. - - - - - Gets the number of meshes referenced by this node. - - - - - Gets if the node contains mesh references. - - - - - Gets the indices of the meshes referenced by this node. Meshes can be - shared between nodes, so there is a mesh collection owned by the scene - that each node can reference. - - - - - Gets the node's metadata container. - - - - - Constructs a new instance of the class. - - - - - Constructs a new instance of the class. - - Name of the node - - - - Constructs a new instance of the class. - - Name of the node - Parent of the node - - - - Finds a node with the specific name, which may be this node - or any children or children's children, and so on, if it exists. - - Node name - The node or null if it does not exist - - - - Gets a value indicating whether this instance is native blittable. - - - - - Writes the managed data to the native value. - - Optional pointer to the memory that will hold the native value. - Output native value - - - - Reads the unmanaged data from the native value. - - Input native value - - - - Frees unmanaged memory created by . - - Native value to free - True if the unmanaged memory should be freed, false otherwise. - - - - Describes the animation of a single node. The name specifies the bone/node which is affected by - this animation chanenl. The keyframes are given in three separate seties of values, - one for each position, rotation, and scaling. The transformation matrix is computed from - these values and replaces the node's original transformation matrix at a specific time. - This means all keys are absolute and not relative to the bone default pose. - The order which the transformations are to be applied is scaling, rotation, and translation (SRT). - Keys are in chronological order and duplicate keys do not pass the validation step. There most likely will be no - negative time values, but they are not forbidden. - - - - - Gets or sets the name of the node affected by this animation. It must exist and it must - be unique. - - - - - Gets the number of position keys in the animation channel. - - - - - Gets if this animation channel contains position keys. - - - - - Gets the position keys of this animation channel. Positions are - specified as a 3D vector. If there are position keys, there should - also be -at least- one scaling and one rotation key. - - - - - Gets the number of rotation keys in the animation channel. - - - - - Gets if the animation channel contains rotation keys. - - - - - Gets the rotation keys of this animation channel. Rotations are - given as quaternions. If this exists, there should be -at least- one - scaling and one position key. - - - - - Gets the number of scaling keys in the animation channel. - - - - - Gets if the animation channel contains scaling keys. - - - - - Gets the scaling keys of this animation channel. Scalings are - specified in a 3D vector. If there are scaling keys, there should - also be -at least- one position and one rotation key. - - - - - Gets or sets how the animation behaves before the first key is encountered. By default the original - transformation matrix of the affected node is used. - - - - - Gets or sets how the animation behaves after the last key was processed. By default the original - transformation matrix of the affected node is taken. - - - - - Constructs a new instance of the class. - - - - - Gets if the native value type is blittable (that is, does not require marshaling by the runtime, e.g. has MarshalAs attributes). - - - - - Writes the managed data to the native value. - - Optional pointer to the memory that will hold the native value. - Output native value - - - - Reads the unmanaged data from the native value. - - Input native value - - - - Frees unmanaged memory created by . - - Native value to free - True if the unmanaged memory should be freed, false otherwise. - - - - A collection of child nodes owned by a parent node. Manages access to the collection while maintaing parent-child linkage. - - - - - Gets the number of elements contained in the . - - - - - Gets or sets the element at the specified index. - - The child index - - - - Gets a value indicating whether the is read-only. - - true if the is read-only; otherwise, false. - - - - Constructs a new instance of the class. - - Parent node - - - - Adds an item to the . - - The object to add to the . - - - - Adds a range of items to the list. - - Item array - - - - Removes all items from the . - - - - - Determines whether the contains a specific value. - - The object to locate in the . - - true if is found in the ; otherwise, false. - - - - - Copies collection contents to the array - - The array to copy to. - Index of the array to start copying. - - - - Determines the index of a specific item in the . - - The object to locate in the . - - The index of if found in the list; otherwise, -1. - - - - - Inserts an item to the at the specified index. - - The zero-based index at which should be inserted. - The object to insert into the . - - - - Removes the item at the specified index. - - The zero-based index of the item to remove. - - - - Removes the first occurrence of a specific object from the . - - The object to remove from the . - - true if was successfully removed from the ; otherwise, false. This method also returns false if is not found in the original . - - - - - Copies elements in the collection to a new array. - - Array of copied elements - - - - Returns an enumerator that iterates through the collection. - - A that can be used to iterate through the collection. - - - - Returns an enumerator that iterates through a collection. - - An object that can be used to iterate through the collection. - - - - Represents a plane in three-dimensional euclidean space where - A, B, C are components of the plane normal and D is the distance along the - normal from the origin to the plane. - - - - - X component of the normal vector. - - - - - Y component of the normal vector. - - - - - Z component of the normal vector. - - - - - Distance from the origin to the plane along the normal vector. - - - - - Constructs a new Plane. - - X component of the normal vector. - Y component of the normal vector. - Z component of the normal vector. - Distance from the origin to the plane along the normal vector. - - - - Static class containing preset properties for post processing options. - - - - - PostProcess configuration for (some) Direct3D conventions, - left handed geometry, upper left origin for UV coordinates, - and clockwise face order, suitable for CCW culling. - - - - - PostProcess configuration for optimizing data for real-time. - Does the following steps: - - , , - , , - , and - - - - - PostProcess configuration for optimizing - data for real-time rendering. Does the following steps: - - , , - , , - , - , , - , , and - - - - - - PostProcess configuration for heavily optimizing the data - for real-time rendering. Includes all flags in - as well as - , , and - - - - - - A 4D vector that represents a rotation. - - - - - Rotation component of the quaternion/ - - - - - X component of the vector part of the quaternion. - - - - - Y component of the vector part of the quaternion. - - - - - Z component of the vector part of the quaternion. - - - - - Constructs a new Quaternion. - - W component - X component - Y component - Z component - - - - Constructs a new Quaternion from a rotation matrix. - - Rotation matrix to create the Quaternion from. - - - - Constructs a new Quaternion from three euler angles. - - Pitch - Yaw - Roll - - - - Constructs a new Quaternion from an axis-angle. - - Axis - Angle about the axis - - - - Normalizes the quaternion. - - - - - Transforms this quaternion into its conjugate. - - - - - Returns a matrix representation of the quaternion. - - Rotation matrix representing the quaternion. - - - - Spherical interpolation between two quaternions. - - Start rotation when factor == 0 - End rotation when factor == 1 - Interpolation factor between 0 and 1, values beyond this range yield undefined values - Interpolated quaternion. - - - - Rotates a point by this quaternion. - - Point to rotate - Quaternion representing the rotation - Rotated point. - - - - Multiplies two quaternions. - - First quaternion - Second quaternion - Resulting quaternion - - - - Tests equality between two quaternions. - - First quaternion - Second quaternion - True if the quaternions are equal, false otherwise. - - - - Tests inequality between two quaternions. - - First quaternion - Second quaternion - True if the quaternions are not equal, false otherwise. - - - - Tests equality between two quaternions. - - Quaternion to compare - True if the quaternions are equal. - - - - Tests equality between this color and another object. - - Object to test against - True if the object is a color and the components are equal - - - - Returns a hash code for this instance. - - - A hash code for this instance, suitable for use in hashing algorithms and data structures like a hash table. - - - - - Returns a that represents this instance. - - - A that represents this instance. - - - - - Time-value pair specifying a rotation for a given time. - - - - - The time of this key. - - - - - The rotation of this key. - - - - - Constructs a new QuaternionKey. - - Time of the key. - Quaternion rotation at the time frame. - - - - Tests equality between two keys. - - The first key - The second key - True if the key's rotations are the same, false otherwise. - - - - Tests inequality between two keys. - - The first key - The second key - True if the key's rotations are not the same, false otherwise. - - - - Tests inequality between two keys. - - The first key - The second key - True if the first key's time is less than the second key's. - - - - Tests inequality between two keys. - - The first key - The second key - True if the first key's time is greater than the second key's. - - - - Determines whether the specified is equal to this instance. - - The to compare with this instance. - - true if the specified is equal to this instance; otherwise, false. - - - - - Tests equality between this key and another. - - Other key to test - True if their rotations are equal. - - - - Returns a hash code for this instance. - - - A hash code for this instance, suitable for use in hashing algorithms and data structures like a hash table. - - - - - Returns a that represents this instance. - - - A that represents this instance. - - - - - Defines a 3D ray with a point of origin and a direction. - - - - - Origin of the ray in space. - - - - - Direction of the ray. - - - - - Constructs a new Ray. - - Origin of the ray. - Direction of the ray. - - - - Represents a completely imported model or scene. Everything that was imported from the given file can be - accessed from here. Once the scene is loaded from unmanaged memory, it resides solely in managed memory - and Assimp's read only copy is released. - - - - - Gets or sets the state of the imported scene. By default no flags are set, but - issues can arise if the flag is set to incomplete. - - - - - Gets or sets the root node of the scene graph. There will always be at least the root node - if the import was successful and no special flags have been set. Presence of further nodes - depends on the format and content of the imported file. - - - - - Gets if the scene contains meshes. Unless if no special scene flags are set - this should always be true. - - - - - Gets the number of meshes in the scene. - - - - - Gets the meshes contained in the scene, if any. - - - - - Gets if the scene contains any lights. - - - - - Gets the number of lights in the scene. - - - - - Gets the lights in the scene, if any. - - - - - Gets if the scene contains any cameras. - - - - - Gets the number of cameras in the scene. - - - - - Gets the cameras in the scene, if any. - - - - - Gets if the scene contains embedded textures. - - - - - Gets the number of embedded textures in the scene. - - - - - Gets the embedded textures in the scene, if any. - - - - - Gets if the scene contains any animations. - - - - - Gets the number of animations in the scene. - - - - - Gets the animations in the scene, if any. - - - - - Gets if the scene contains any materials. There should always be at least the - default Assimp material if no materials were loaded. - - - - - Gets the number of materials in the scene. There should always be at least the - default Assimp material if no materials were loaded. - - - - - Gets the materials in the scene. - - - - - Constructs a new instance of the class. - - - - - Clears the scene of all components. - - - - - Marshals a managed scene to unmanaged memory. The unmanaged memory must be freed with a call to - , the memory is owned by AssimpNet and cannot be freed by the native library. - - Scene data - Unmanaged scene or NULL if the scene is null. - - - - Marshals an unmanaged scene to managed memory. This does not free the unmanaged memory. - - The unmanaged scene data - The managed scene, or null if the pointer is NULL - - - - Frees unmanaged memory allocated -ONLY- in . To free an unmanaged scene allocated by the unmanaged Assimp library, - call the appropiate function. - - Pointer to unmanaged scene data. - - - - Gets if the native value type is blittable (that is, does not require marshaling by the runtime, e.g. has MarshalAs attributes). - - - - - Writes the managed data to the native value. - - Optional pointer to the memory that will hold the native value. - Output native value - - - - Reads the unmanaged data from the native value. - - Input native value - - - - Frees unmanaged memory created by . - - Native value to free - True if the unmanaged memory should be freed, false otherwise. - - - - Represents a texel in ARGB8888 format. - - - - - Blue component. - - - - - Green component. - - - - - Red component. - - - - - Alpha component. - - - - - Constructs a new Texel. - - Blue component. - Green component. - Red component. - Alpha component. - - - - Tests equality between two texels. - - First texel - Second texel - True if the texels are equal, false otherwise. - - - - Tests inequality between two texels. - - First texel - Second texel - True if the texels are not equal, false otherwise. - - - - Implicitly converts a texel to a Color4D. - - Texel to convert - Converted Color4D - - - - Determines whether the specified is equal to this instance. - - The to compare with this instance. - - true if the specified is equal to this instance; otherwise, false. - - - - - Tests equality between this key and another. - - Other key to test - True if their indices are equal - - - - Returns a hash code for this instance. - - - A hash code for this instance, suitable for use in hashing algorithms and data structures like a hash table. - - - - - Returns a that represents this instance. - - - A that represents this instance. - - - - - Describes all the values pertaining to a particular texture slot in a material. - - - - - Gets the texture file path. - - - - - Gets the texture type semantic. - - - - - Gets the texture index in the material. - - - - - Gets the texture mapping. - - - - - Gets the UV channel index that corresponds to this texture from the mesh. - - - - - Gets the blend factor. - - - - - Gets the texture operation. - - - - - Gets the texture wrap mode for the U coordinate. - - - - - Gets the texture wrap mode for the V coordinate. - - - - - Gets misc flags. - - - - - Constructs a new TextureSlot. - - Texture filepath - Texture type semantic - Texture index in the material - Texture mapping - UV channel in mesh that corresponds to this texture - Blend factor - Texture operation - Texture wrap mode for U coordinate - Texture wrap mode for V coordinate - Misc flags - - - - Defines configurable properties for importing models. All properties - have default values. Setting config properties are done via the SetProperty* - methods in AssimpMethods. - - - - - Enables time measurements. If enabled the time needed for each - part of the loading process is timed and logged. - Type: bool. Default: false - - - - - Sets Assimp's multithreading policy. This is ignored if Assimp is - built without boost.thread support. Possible values are: -1 to - let Assimp decide, 0 to disable multithreading, and nay number larger than 0 - to force a specific number of threads. This is only a hint and may be - ignored by Assimp. - Type: integer. Default: -1 - - - - - Global setting to disable generation of skeleton dummy meshes. These are generated as a visualization aid - in cases which the input data contains no geometry, but only animation data. So the geometry are visualizing - the bones. - Type: Bool. Default: false. - - - - - Specifies the maximum angle that may be between two vertex tangents that their tangents - and bitangents are smoothed during the step to calculate the tangent basis. The angle specified - is in degrees. The maximum value is 175 degrees. - Type: float. Default: 45 degrees - - - - - Specifies the maximum angle that may be between two face normals at the same vertex position that - their normals will be smoothed together during the calculate smooth normals step. This is commonly - called the "crease angle". The angle is specified in degrees. Maximum value is 175 degrees (all vertices - smoothed). - Type: float. Default: 175 degrees - - - - - Sets the colormap(= palette) to be used to decode embedded textures in MDL (Quake or 3DG5) files. - This must be a valid path to a file. The file is 768 (256 * 3) bytes large and contains - RGB triplets for each of the 256 palette entries. If the file is not found, a default - palette (from Quake 1) is used. - Type: string. Default: "colormap.lmp" - - - - - Configures the step to - keep materials matching a name in a given list. This is a list of - 1 to n strings where whitespace ' ' serves as a delimiter character. Identifiers - containing whitespaces must be enclosed in *single* quotation marks. Tabs or - carriage returns are treated as whitespace. - If a material matches one of these names, it will not be modified - or removed by the post processing step nor will other materials be replaced - by a reference to it. - Default: string. Default: "" - - - - - Configures the step - to keep the scene hierarchy. Meshes are moved to worldspace, but no optimization - is performed where meshes with the same materials are not joined. - This option could be of used if you have a scene hierarchy that contains - important additional information which you intend to parse. - Type: bool. Default: false - - - - - Configures the step - to normalize all vertex components into the -1...1 range. That is, a bounding - box for the whole scene is computed where the maximum component is taken - and all meshes are scaled uniformly. This is useful if you don't know the spatial dimension - of the input data. - Type: bool. Default: false - - - - - Configures the step - to remove degenerated primitives from the import immediately. - The default behavior converts degenerated triangles to lines and - degenerated lines to points. - Type: bool. Default: false - - - - - Configures the step - to check the area of a triangle to be greater than 1e-6. If this is not the case, the triangle will be removed if is set to true. - Type: bool. Default: false - - - - - Configures the step - to preserve nodes matching a name in a given list. This is a list of 1 to n strings, whitespace ' ' serves as a delimter character. - Identifiers containing whitespaces must be enclosed in *single* quotation marks. Carriage returns - and tabs are treated as white space. - If a node matches one of these names, it will not be modified or removed by the - postprocessing step. - Type: string. Default: "" - - - - - Sets the maximum number of triangles a mesh can contain. This is used by the - step to determine - whether a mesh must be split or not. - Type: int. Default: AiDefines.AI_SLM_DEFAULT_MAX_TRIANGLES - - - - - Sets the maximum number of vertices in a mesh. This is used by the - step to determine - whether a mesh must be split or not. - Type: integer. Default: AiDefines.AI_SLM_DEFAULT_MAX_VERTICES - - - - - Sets the maximum number of bones that can affect a single vertex. This is used - by the step. - Type: integer. Default: AiDefines.AI_LBW_MAX_WEIGHTS - - - - - Sets the size of the post-transform vertex cache to optimize vertices for. This is - for the step. The size - is given in vertices. Of course you can't know how the vertex format will exactly look - like after the import returns, but you can still guess what your meshes will - probably have. The default value *has* resulted in slight performance improvements - for most Nvidia/AMD cards since 2002. - Type: integer. Default: AiDefines.PP_ICL_PTCACHE_SIZE - - - - - Input parameter to the step. - It specifies the parts of the data structure to be removed. - This is a bitwise combination of the flag. If no valid mesh is remaining after - the step is executed, the import FAILS. - Type: integer. Default: 0 - - - - - Input parameter to the step. - It specifies which primitive types are to be removed by the step. - This is a bitwise combination of the flag. - Specifying ALL types is illegal. - Type: integer. Default: 0 - - - - - Input parameter to the step. - It specifies the floating point accuracy for animation values, specifically the epislon - during the comparison. The step checks for animation tracks where all frame values are absolutely equal - and removes them. Two floats are considered equal if the invariant abs(n0-n1) > epislon holds - true for all vector/quaternion components. - Type: float. Default: 0.0f (comparisons are exact) - - - - - Input parameter to the step. - It specifies which UV transformations are to be evaluated. - This is bitwise combination of the flag. - Type: integer. Default: AiDefines.AI_UV_TRAFO_ALL (All combinations) - - - - - A hint to Assimp to favour speed against import quality. Enabling this option - may result in faster loading, or it may not. It is just a hint to loaders and post-processing - steps to use faster code paths if possible. A value not equal to zero stands - for true. - Type: integer. Default: 0 - - - - - Maximum bone cone per mesh for the step. Meshes - are split until the max number of bones is reached. - Type: integer. Default: 60 - - - - - Source UV channel for tangent space computation. The specified channel must exist or an error will be raised. - Type: integer. Default: 0 - - - - - Threshold used to determine if a bone is kept or removed during the step. - Type: float. Default: 1.0f - - - - - Require all bones to qualify for deboning before any are removed. - Type: bool. Default: false - - - - - Configures the step to use a user defined matrix as the scene root node - transformation before transforming vertices. - Type: bool. Default: false - - - - - Configures the step to use a user defined matrix as the scene root node transformation - before transforming vertices. - Type: Matrix4x4. Default: Identity Matrix - - - - - Configures the step to scale the entire scene by a certain amount. Some importers provide a mechanism to define a scaling unit for the model, - which this processing step can utilize. - Type: Float. Default: 1.0f. - - - - - Sets the vertex animation keyframe to be imported. Assimp does not support - vertex keyframes (only bone animation is supported). The libary reads only one frame of models - with vertex animations. By default this is the first frame. - The default value is 0. This option applies to all importers. However, it is - also possible to override the global setting for a specific loader. You can use the - AI_CONFIG_IMPORT_XXX_KEYFRAME options where XXX is a placeholder for the file format which - you want to override the global setting. - Type: integer. Default: 0 - - - - - See the documentation for . - - - - - See the documentation for . - - - - - See the documentation for . - - - - - See the documentation for . - - - - - See the documentation for . - - - - - See the documentation for . - - - - - Configures the AC loader to collect all surfaces which have the "Backface cull" flag set in separate - meshes. - Type: bool. Default: true - - - - - Configures whether the AC loader evaluates subdivision surfaces (indicated by the presence - of the 'subdiv' attribute in the file). By default, Assimp performs - the subdivision using the standard Catmull-Clark algorithm. - Type: bool. Default: true - - - - - Configures the UNREAL 3D loader to separate faces with different surface flags (e.g. two-sided vs single-sided). - Type: bool. Default: true - - - - - Configures the terragen import plugin to compute UV's for terrains, if - they are not given. Furthermore, a default texture is assigned. - UV coordinates for terrains are so simple to compute that you'll usually - want to compute them on your own, if you need them. This option is intended for model viewers which - want to offer an easy way to apply textures to terrains. - Type: bool. Default: false - - - - - Configures the ASE loader to always reconstruct normal vectors basing on the smoothing groups - loaded from the file. Some ASE files carry invalid normals, others don't. - Type: bool. Default: true - - - - - Configures the M3D loader to detect and process multi-part Quake player models. These models - usually consit of three files, lower.md3, upper.md3 and head.md3. If this propery is - set to true, Assimp will try to load and combine all three files if one of them is loaded. - Type: bool. Default: true - - - - - Tells the MD3 loader which skin files to load. When loading MD3 files, Assimp checks - whether a file named "md3_file_name"_"skin_name".skin exists. These files are used by - Quake III to be able to assign different skins (e.g. red and blue team) to models. 'default', 'red', 'blue' - are typical skin names. - Type: string. Default: "default" - - - - - Specifies the Quake 3 shader file to be used for a particular MD3 file. This can be a full path or - relative to where all MD3 shaders reside. - Type: string. Default: "" - - - - - Configures the LWO loader to load just one layer from the model. - LWO files consist of layers and in some cases it could be useful to load only one of them. - This property can be either a string - which specifies the name of the layer - or an integer - the index - of the layer. If the property is not set then the whole LWO model is loaded. Loading fails - if the requested layer is not vailable. The layer index is zero-based and the layer name may not be empty - Type: bool. Default: false (All layers are loaded) - - - - - Configures the MD5 loader to not load the MD5ANIM file for a MD5MESH file automatically. - The default strategy is to look for a file with the same name but with the MD5ANIm extension - in the same directory. If it is found it is loaded and combined with the MD5MESH file. This configuration - option can be used to disable this behavior. - Type: bool. Default: false - - - - - Defines the beginning of the time range for which the LWS loader evaluates animations and computes - AiNodeAnim's. - Assimp provides full conversion of Lightwave's envelope system, including pre and post - conditions. The loader computes linearly subsampled animation channels with the frame rate - given in the LWS file. This property defines the start time. - Animation channels are only generated if a node has at least one envelope with more than one key - assigned. This property is given in frames where '0' is the first. By default, - if this property is not set, the importer takes the animation start from the input LWS - file ('FirstFrame' line) - Type: integer. Default: taken from file - - - - - Defines the ending of the time range for which the LWS loader evaluates animations and computes - AiNodeAnim's. - Assimp provides full conversion of Lightwave's envelope system, including pre and post - conditions. The loader computes linearly subsampled animation channels with the frame rate - given in the LWS file. This property defines the end time. - Animation channels are only generated if a node has at least one envelope with more than one key - assigned. This property is given in frames where '0' is the first. By default, - if this property is not set, the importer takes the animation end from the input LWS - file. - Type: integer. Default: taken from file - - - - - Defines the output frame rate of the IRR loader. - IRR animations are difficult to convert for Assimp and there will always be - a loss of quality. This setting defines how many keys per second are returned by the converter. - Type: integer. Default: 100 - - - - - The Ogre importer will try to load this MaterialFile. Ogre meshes reference with material names, this does not tell Assimp - where the file is located. Assimp will try to find the source file in the following order: [material-name].material, [mesh-filename-base].material, - and lastly the material name defined by this config property. - Type: string. Default: "Scene.Material" - - - - - The Ogre importer will detect the texture usage from the filename. Normally a texture is loaded as a color map, if no target is specified - in the material file. If this is enabled, then Assimp will try to detect the type from the texture filename postfix: - - Normal Maps: _n, _nrm, _nrml, _normal, _normals, _normalmap - Specular Maps: _s, _spec, _specular, _specularmap - Light Maps: _l, _light, _lightmap, _occ, _occlusion - Displacement Maps: _dis, _displacement - - The matching is case insensitive. Postfix is taken between the last "_" and last ".". The default behavior is to detect type from lower cased - texture unit name by matching against: normalmap, specularmap, lightmap, and displacementmap. For both cases if no match is found then, - is used. - Type: Bool. Default: false. - - - - - Specifies whether the IFC loader skips over IfcSpace elements. IfcSpace elements (and their geometric representations) are used to represent free space in a building story. - Type: Bool. Default: true. - - - - - Specifies whether the IFC loader will use its own, custom triangulation algorithm to triangulate wall and floor meshes. If this is set to false, - walls will be either triangulated by the post process triangulation or will be passed through as huge polygons with faked holes (e.g. holes that are connected - with the outer boundary using a dummy edge). It is highly recommended to leave this property set to true as the default post process has some known - issues with these kind of polygons. - Type: Bool. Default: true. - - - - - Specifies the tessellation conic angle for IFC smoothing curves. Accepted range of values is between [5, 120] - Type: Float. Default: 10.0f - - - - - Specifies the tessellation for IFC cylindrical shapes. E.g. the number of segments used to approximate a circle. Accepted range of values is between [3, 180]. - Type: Integer. Default: 32 - - - - - Specifies whether the collada loader will ignore the up direction. - Type: Bool. Default: false - - - - - Specifies whether the FBX importer will merge all geometry layers present in the source file or take only the first. - Type: bool. Default: true. - - - - - Specifies whether the FBX importer will read all materials present in the source file or take only the referenced materials, if the importer - will read materials, otherwise this has no effect. - Type: Bool. Default: false. - - - - - Specifies whether the FBX importer will read materials. - Type: Bool. Default: true. - - - - - Specifies whether the FBX importer will read embedded textures. - Type: Bool. Default: true. - - - - - Specifies whether the FBX importer will search for embedded loaded textures, where no embedded texture data is provided. - Type: Bool. Default: false. - - - - - Specifies whether the FBX importer will read cameras. - Type: Bool. Default: true. - - - - - Specifies whether the FBX importer will read light sources. - Type: Bool. Default: true. - - - - - Specifies whether the FBX importer will read animations. - Type: Bool. default: true. - - - - - Specifies whether the FBX importer will act in strict mode in which only the FBX 2013 - format is supported and any other sub formats are rejected. FBX 2013 is the primary target for the importer, so this - format is best supported and well-tested. - Type: Bool. Default: false. - - - - - Specifies whether the FBX importer will preserve pivot points for transformations (as extra nodes). If set to false, pivots - and offsets will be evaluated whenever possible. - Type: Bool. Default: true. - - - - - Specifies whether the importer will drop empty animation curves or animation curves which match the bind pose - transformation over their entire defined range. - Type: Bool. Default: true. - - - - - Specifies if the X-file exporter should use 64-bit doubles rather than 32-bit floats. - Type: Bool. Default: false. - - - - - Static class that has a number of constants that are found in Assimp. These can be limits to configuration property default values. The constants - are grouped according to their usage or where they're found in the Assimp include files. - - - - - Default value for . - - - - - Default value for . - - - - - Default value for . - - - - - Default value for . - - - - - Default value for - - - - - Defines the maximum number of indices per face (polygon). - - - - - Defines the maximum number of bone weights. - - - - - Defines the maximum number of vertices per mesh. - - - - - Defines the maximum number of faces per mesh. - - - - - Defines the maximum number of vertex color sets per mesh. - - - - - Defines the maximum number of texture coordinate sets (UV(W) channels) per mesh. - - - - - Defines the default bone count limit. - - - - - Defines the deboning threshold. - - - - - Defines the maximum length of a string used in AiString. - - - - - Defines the default color material. - - - - - Defines the default textured material (if the meshes have UV coords). - - - - - Static class containing material key constants. A fully qualified mat key - name here means that it's a string that combines the mat key (base) name, its - texture type semantic, and its texture index into a single string delimited by - commas. For non-texture material properties, the texture type semantic and texture - index are always zero. - - - - - Material name (String) - - - - - Material name (String) - - - - - Two sided property (boolean) - - - - - Two sided property (boolean) - - - - - Shading mode property (ShadingMode) - - - - - Shading mode property (ShadingMode) - - - - - Enable wireframe property (boolean) - - - - - Enable wireframe property (boolean) - - - - - Blending function (BlendMode) - - - - - Blending function (BlendMode) - - - - - Opacity (float) - - - - - Opacity (float) - - - - - Bumpscaling (float) - - - - - Bumpscaling (float) - - - - - Shininess (float) - - - - - Shininess (float) - - - - - Reflectivity (float) - - - - - Reflectivity (float) - - - - - Shininess strength (float) - - - - - Shininess strength (float) - - - - - Refracti (float) - - - - - Refracti (float) - - - - - Diffuse color (Color4D) - - - - - Diffuse color (Color4D) - - - - - Ambient color (Color4D) - - - - - Ambient color (Color4D) - - - - - Specular color (Color4D) - - - - - Specular color (Color4D) - - - - - Emissive color (Color4D) - - - - - Emissive color (Color4D) - - - - - Transparent color (Color4D) - - - - - Transparent color (Color4D) - - - - - Reflective color (Color4D) - - - - - Reflective color (Color4D) - - - - - Background image (String) - - - - - Background image (String) - - - - - Texture base name - - - - - UVWSRC base name - - - - - Texture op base name - - - - - Mapping base name - - - - - Texture blend base name. - - - - - Mapping mode U base name - - - - - Mapping mode V base name - - - - - Texture map axis base name - - - - - UV transform base name - - - - - Texture flags base name - - - - - Helper function to get the fully qualified name of a texture property type name. Takes - in a base name constant, a texture type, and a texture index and outputs the name in the format: - "baseName,TextureType,texIndex" - - Base name - Texture type - Texture index - Fully qualified texture name - - - - Helper function to get the base name from a fully qualified name of a material property type name. The format - of such a string is: - "baseName,TextureType,texIndex" - - Fully qualified material property name. - Base name of the property type. - - - - Singleton that governs access to the unmanaged Assimp library functions. - - - - - Default name of the unmanaged library. Based on runtime implementation the prefix ("lib" on non-windows) and extension (.dll, .so, .dylib) will be appended automatically. - - - - - Gets the AssimpLibrary instance. - - - - - Gets if the Assimp unmanaged library supports multithreading. If it was compiled for single threading only, - then it will not utilize multiple threads during import. - - - - - Imports a file. - - Valid filename - Post process flags specifying what steps are to be run after the import. - Property store containing config name-values, may be null. - Pointer to the unmanaged data structure. - - - - Imports a file. - - Valid filename - Post process flags specifying what steps are to be run after the import. - Pointer to an instance of AiFileIO, a custom file IO system used to open the model and - any associated file the loader needs to open, passing NULL uses the default implementation. - Property store containing config name-values, may be null. - Pointer to the unmanaged data structure. - - - - Imports a scene from a stream. This uses the "aiImportFileFromMemory" function. The stream can be from anyplace, - not just a memory stream. It is up to the caller to dispose of the stream. - - Stream containing the scene data - Post processing flags - A hint to Assimp to decide which importer to use to process the data - Property store containing the config name-values, may be null. - Pointer to the unmanaged data structure. - - - - Releases the unmanaged scene data structure. This should NOT be used for unmanaged scenes that were marshaled - from the managed scene structure - only for scenes whose memory was allocated by the native library! - - Pointer to the unmanaged scene data structure. - - - - Applies a post-processing step on an already imported scene. - - Pointer to the unmanaged scene data structure. - Post processing steps to run. - Pointer to the unmanaged scene data structure. - - - - Gets all supported export formats. - - Array of supported export formats. - - - - Exports the given scene to a chosen file format. Returns the exported data as a binary blob which you can embed into another data structure or file. - - Scene to export, it is the responsibility of the caller to free this when finished. - Format id describing which format to export to. - Pre processing flags to operate on the scene during the export. - Exported binary blob, or null if there was an error. - - - - Exports the given scene to a chosen file format and writes the result file(s) to disk. - - The scene to export, which needs to be freed by the caller. The scene is expected to conform to Assimp's Importer output format. In short, - this means the model data should use a right handed coordinate system, face winding should be counter clockwise, and the UV coordinate origin assumed to be upper left. If the input is different, specify the pre processing flags appropiately. - Format id describing which format to export to. - Output filename to write to - Pre processing flags - accepts any post processing step flag. In reality only a small subset are actually supported, e.g. to ensure the input - conforms to the standard Assimp output format. Some may be redundant, such as triangulation, which some exporters may have to enforce due to the export format. - Return code specifying if the operation was a success. - - - - Exports the given scene to a chosen file format and writes the result file(s) to disk. - - The scene to export, which needs to be freed by the caller. The scene is expected to conform to Assimp's Importer output format. In short, - this means the model data should use a right handed coordinate system, face winding should be counter clockwise, and the UV coordinate origin assumed to be upper left. If the input is different, specify the pre processing flags appropiately. - Format id describing which format to export to. - Output filename to write to - Pointer to an instance of AiFileIO, a custom file IO system used to open the model and - any associated file the loader needs to open, passing NULL uses the default implementation. - Pre processing flags - accepts any post processing step flag. In reality only a small subset are actually supported, e.g. to ensure the input - conforms to the standard Assimp output format. Some may be redundant, such as triangulation, which some exporters may have to enforce due to the export format. - Return code specifying if the operation was a success. - - - - Creates a modifyable copy of a scene, useful for copying the scene that was imported so its topology can be modified - and the scene be exported. - - Valid scene to be copied - Modifyable copy of the scene - - - - Attaches a log stream callback to catch Assimp messages. - - Pointer to an instance of AiLogStream. - - - - Enables verbose logging. - - True if verbose logging is to be enabled or not. - - - - Gets if verbose logging is enabled. - - True if verbose logging is enabled, false otherwise. - - - - Detaches a logstream callback. - - Pointer to an instance of AiLogStream. - A return code signifying if the function was successful or not. - - - - Detaches all logstream callbacks currently attached to Assimp. - - - - - Create an empty property store. Property stores are used to collect import settings. - - Pointer to property store - - - - Deletes a property store. - - Pointer to property store - - - - Sets an integer property value. - - Pointer to property store - Property name - Property value - - - - Sets a float property value. - - Pointer to property store - Property name - Property value - - - - Sets a string property value. - - Pointer to property store - Property name - Property value - - - - Sets a matrix property value. - - Pointer to property store - Property name - Property value - - - - Retrieves a color value from the material property table. - - Material to retrieve the data from - Ai mat key (base) name to search for - Texture Type semantic, always zero for non-texture properties - Texture index, always zero for non-texture properties - The color if it exists. If not, the default Color4D value is returned. - - - - Retrieves an array of float values with the specific key from the material. - - Material to retrieve the data from - Ai mat key (base) name to search for - Texture Type semantic, always zero for non-texture properties - Texture index, always zero for non-texture properties - The maximum number of floats to read. This may not accurately describe the data returned, as it may not exist or be smaller. If this value is less than - the available floats, then only the requested number is returned (e.g. 1 or 2 out of a 4 float array). - The float array, if it exists - - - - Retrieves an array of integer values with the specific key from the material. - - Material to retrieve the data from - Ai mat key (base) name to search for - Texture Type semantic, always zero for non-texture properties - Texture index, always zero for non-texture properties - The maximum number of integers to read. This may not accurately describe the data returned, as it may not exist or be smaller. If this value is less than - the available integers, then only the requested number is returned (e.g. 1 or 2 out of a 4 float array). - The integer array, if it exists - - - - Retrieves a material property with the specific key from the material. - - Material to retrieve the property from - Ai mat key (base) name to search for - Texture Type semantic, always zero for non-texture properties - Texture index, always zero for non-texture properties - The material property, if found. - - - - Retrieves a string from the material property table. - - Material to retrieve the data from - Ai mat key (base) name to search for - Texture Type semantic, always zero for non-texture properties - Texture index, always zero for non-texture properties - The string, if it exists. If not, an empty string is returned. - - - - Gets the number of textures contained in the material for a particular texture type. - - Material to retrieve the data from - Texture Type semantic - The number of textures for the type. - - - - Gets the texture filepath contained in the material. - - Material to retrieve the data from - Texture type semantic - Texture index - The texture filepath, if it exists. If not an empty string is returned. - - - - Gets all values pertaining to a particular texture from a material. - - Material to retrieve the data from - Texture type semantic - Texture index - Returns the texture slot struct containing all the information. - - - - Gets the last error logged in Assimp. - - The last error message logged. - - - - Checks whether the model format extension is supported by Assimp. - - Model format extension, e.g. ".3ds" - True if the format is supported, false otherwise. - - - - Gets all the model format extensions that are currently supported by Assimp. - - Array of supported format extensions - - - - Gets a collection of importer descriptions that detail metadata and feature support for each importer. - - Collection of importer descriptions - - - - Gets the memory requirements of the scene. - - Pointer to the unmanaged scene data structure. - The memory information about the scene. - - - - Creates a quaternion from the 3x3 rotation matrix. - - Quaternion struct to fill - Rotation matrix - - - - Decomposes a 4x4 matrix into its scaling, rotation, and translation parts. - - 4x4 Matrix to decompose - Scaling vector - Quaternion containing the rotation - Translation vector - - - - Transposes the 4x4 matrix. - - Matrix to transpose - - - - Transposes the 3x3 matrix. - - Matrix to transpose - - - - Transforms the vector by the 3x3 rotation matrix. - - Vector to transform - Rotation matrix - - - - Transforms the vector by the 4x4 matrix. - - Vector to transform - Matrix transformation - - - - Multiplies two 4x4 matrices. The destination matrix receives the result. - - First input matrix and is also the Matrix to receive the result - Second input matrix, to be multiplied with "dst". - - - - Multiplies two 3x3 matrices. The destination matrix receives the result. - - First input matrix and is also the Matrix to receive the result - Second input matrix, to be multiplied with "dst". - - - - Creates a 3x3 identity matrix. - - Matrix to hold the identity - - - - Creates a 4x4 identity matrix. - - Matrix to hold the identity - - - - Gets the Assimp legal info. - - String containing Assimp legal info. - - - - Gets the native Assimp DLL's minor version number. - - Assimp minor version number - - - - Gets the native Assimp DLL's major version number. - - Assimp major version number - - - - Gets the native Assimp DLL's revision version number. - - Assimp revision version number - - - - Gets the native Assimp DLL's current version number as "major.minor.revision" string. This is the - version of Assimp that this wrapper is currently using. - - Unmanaged DLL version - - - - Gets the native Assimp DLL's current version number as a .NET version object. - - Unmanaged DLL version - - - - Get the compilation flags that describe how the native Assimp DLL was compiled. - - Compilation flags - - - - Defines all the unmanaged assimp C-function names. - - - - - Defines all of the delegates that represent the unmanaged assimp functions. - - - - - Enumerates supported platforms. - - - - - Windows platform. - - - - - Linux platform. - - - - - Mac platform. - - - - - An attribute that represents the name of an unmanaged function to import. - - - - - Name of the unmanaged function. - - - - - Constructs a new . - - Name of the function. - - - - Represents management and access to an unmanaged library. An unmanaged library can be loaded and unloaded dynamically. The library then searches for a list - of exported functions to create managed delegates for, allowing callers to access the library. Each OS platform has its own implementation to determine how to load - unmanaged libraries. - - - - - Occurs when the unmanaged library is loaded. - - - - - Occurs when the unmanaged library is freed. - - - - - Queries if the unmanaged library has been loaded or not. - - - - - Gets the default name of the unmanaged library DLL. This is dependent based on the platform extension and name prefix. Additional - names can be set in the (e.g. to load versioned DLLs) - - - - - Gets the path to the unmanaged library DLL that is currently loaded. - - - - - Gets the resolver used to find the unmanaged library DLL when loading. - - - - - Gets or sets whether an is thrown if the unmanaged DLL fails to load for whatever reason. By - default this is true. - - - - - Queries if the OS is 64-bit, if false then it is 32-bit. - - - - - Constructs a new . - - Default name (NOT path) of the unmanaged library. - Delegate types to instantiate and load. - - - - Gets an enum representing the current OS that is application is executing on. - - Platform enumeration. - - - - Loads the unmanaged library using the . - - True if the library was found and successfully loaded. - - - - Loads the unmanaged library using the supplied 32 and 64 bit paths, the one chosen is based on the OS bitness. - - Path to the 32-bit DLL - Path to the 64-bit DLL - True if the library was found and successfully loaded. - - - - Loads the unmanaged library using the supplied path. - - Path to the unmanaged DLL. - True if the library was found and successfully loaded. - - - - Frees the unmanaged library that is currently loaded. - - True if the library was sucessfully freed. - - - - Gets a delegate based on the unmanaged function name. - - Type of delegate. - Name of unmanaged function that is exported by the library. - The delegate, or null if not found. - - - - If library is not explicitly loaded by user, call this when trying to call an unmanaged function to load the unmanaged library - from the default path. This function is thread safe. - - - - - Called when the library is loaded. - - - - - Called when the library is freed. - - - - - Resolves unmanaged DLLs for . The process is completely configurable, where the user can supply alternative library names (e.g. versioned libs), - an override library name, and probing paths. These can be set for both 32/64 bit, or seperately for 32 or 64 bit. See - for the search strategy. - - - - - Gets the platform that the application is running on. - - - - - Constructs a new instance of the class. - - Platform we're resolving binaries for. - - - - Sets the collection of fallback library names (e.g. versioned libs) for 32-bit probing. - - Null to clear, or set of fallback library names. - - - - Sets the collection of fallback library names (e.g. versioned libs) for 64-bit probing. - - Null to clear, or set of fallback library names. - - - - Sets the collection of fallback library names (e.g. versioned libs) for both 32-bit and 64-bit probing. - - Null to clear, or set of fallback library names. - - - - Sets the collection of file paths to probe for 32-bit libraries. These paths always are first to be searched, in the order - that they are given. - - Null to clear, or set of paths to probe. - - - - Sets the collection of file paths to probe for 64-bit libraries. These paths always are first to be searched, in the order - that they are given. - - Null to clear, or set of paths to probe. - - - - Sets the collection of file paths to probe for both 32-bit and 64-bit libraries. These paths always are first to be searched, in the order - that they are given. - - Null to clear, or set of paths to probe. - - - - Sets an override 32-bit library name. By default, the implementations creates a default name for the library, which - is passed into for resolving. If the override is non-null, it will be used instead. This is useful if the library - to be loaded is not conforming to the platform's default prefix/extension scheme (e.g. libXYZ.so on linux where "lib" is the prefix and ".so" the extension). - - Null to clear, or override library name. - - - - Sets an override 64-bit library name. By default, the implementations creates a default name for the library, which - is passed into for resolving. If the override is non-null, it will be used instead. This is useful if the library - to be loaded is not conforming to the platform's default prefix/extension scheme (e.g. libXYZ.so on linux where "lib" is the prefix and ".so" the extension). - - Null to clear, or override library name. - - - - Sets an override 32-bit and 64-bit library name. By default, the implementations creates a default name for the library, which - is passed into for resolving. If the override is non-null, it will be used instead. This is useful if the library - to be loaded is not conforming to the platform's default prefix/extension scheme (e.g. libXYZ.so on linux where "lib" is the prefix and ".so" the extension). - - Null to clear, or override library name. - - - - Given a library name, this function attempts to resolve the file path from which it can be loaded. Each step of the search strategy uses the fallback - library names if the given name was not found in the current step. If the search is unsuccessfully, the library name is returned which means the OS will try - and do its own search strategy when attempting to load the library (this is dependent on the OS). The search strategy is the following, in order of execution: - - - Search user-specified probing paths. - Search {AppBaseDirectory}/runtimes/{RID}/native/. - Search {AppBaseDirectory}/. - Search nuget package path, e.g. {UserProfile}/.nuget/packages/{PackageId}/{PackageVersion}/runtimes/{RID}/native/. - - - - The search strategy gives priority to user-specified probing paths, then local paths to the application, then finally examining the global nuget cache. The RID - is the Runtime Identifier based on the platform/architecture, see also Microsoft's RID Catalog. - - - Name of the library to attempt to resolve. - Full file path to the library, or the file name if not found (e.g. "libXYZ.so"). - - - - Represents an aiScene struct. - - - - - unsigned int, flags about the state of the scene - - - - - aiNode*, root node of the scenegraph. - - - - - Number of meshes contained. - - - - - aiMesh**, meshes in the scene. - - - - - Number of materials contained. - - - - - aiMaterial**, materials in the scene. - - - - - Number of animations contained. - - - - - aiAnimation**, animations in the scene. - - - - - Number of embedded textures contained. - - - - - aiTexture**, textures in the scene. - - - - - Number of lights contained. - - - - - aiLight**, lights in the scene. - - - - - Number of cameras contained. - - - - - aiCamera**, cameras in the scene. - - - - - void*, Private data do not touch! - - - - - Represents an aiNode struct. - - - - - Name of the node. - - - - - Node's transform relative to its parent. - - - - - aiNode*, node's parent. - - - - - Number of children the node owns. - - - - - aiNode**, array of nodes this node owns. - - - - - Number of meshes referenced by this node. - - - - - unsigned int*, array of mesh indices. - - - - - aiMetadata*, pointer to a metadata container. May be NULL, if an importer doesn't document metadata then it doesn't write any. - - - - - Represents an aiMetadataEntry struct. - - - - - Type of metadata. - - - - - Pointer to data. - - - - - Represents an aiMetadata struct. - - - - - Length of the Keys and Values arrays. - - - - - aiString*, array of keys. May not be NULL. Each entry must exist. - - - - - aiMetadataEntry*, array of values. May not be NULL. Entries may be NULL if the corresponding property key has no assigned value. - - - - - Represents an aiMesh struct. Note: This structure requires marshaling, due to the arrays of IntPtrs. - - - - - unsigned int, bitwise flag detailing types of primitives contained. - - - - - Number of vertices in the mesh, denotes length of - -all- per-vertex arrays. - - - - - Number of faces in the mesh. - - - - - aiVector3D*, array of positions. - - - - - aiVector3D*, array of normals. - - - - - aiVector3D*, array of tangents. - - - - - aiVector3D*, array of bitangents. - - - - - aiColor4D*[Max_Value], array of arrays of vertex colors. Max_Value is defined as . - - - - - aiVector3D*[Max_Value], array of arrays of texture coordinates. Max_Value is defined as . - - - - - unsigned int[Max_Value], array of ints denoting the number of components for each set of texture coordinates - UV (2), UVW (3) for example. - Max_Value is defined as . - - - - - aiFace*, array of faces. - - - - - Number of bones in the mesh. - - - - - aiBone**, array of bones. - - - - - Material index referencing the material in the scene. - - - - - Optional name of the mesh. - - - - - Number of attachment meshes. NOT CURRENTLY IN USE. - - - - - aiAnimMesh**, array of attachment meshes for vertex-based animation. NOT CURRENTLY IN USE. - - - - - unsigned int, method of morphing when anim meshes are specified. - - - - - Represents an aiTexture struct. - - - - - Width of the texture. - - - - - Height of the texture. - - - - - sbyte[9], format extension hint. Fixed size char is two bytes regardless of encoding. Unmanaged assimp uses a char that - maps to one byte. 8 for string + 1 for terminator. - - - - - aiTexel*, array of texel data. - - - - - Sets the format hint. - - Format hint - must be 3 characters or less - - - - Gets the format hint. - - The format hint - - - - Gets the format hint. Use this to avoid struct copy if the string was passed by read-only ref. - - AiTexture - The format hint - - - - Represents an aiFace struct. - - - - - Number of indices in the face. - - - - - unsigned int*, array of indices. - - - - - Represents an aiBone struct. - - - - - Name of the bone. - - - - - Number of weights. - - - - - VertexWeight*, array of vertex weights. - - - - - Matrix that transforms the vertex from mesh to bone space in bind pose - - - - - Represents an aiMaterialProperty struct. - - - - - Name of the property (key). - - - - - Textures: Specifies texture usage. None texture properties - have this zero (or None). - - - - - Textures: Specifies the index of the texture. For non-texture properties - this is always zero. - - - - - Size of the buffer data in bytes. This value may not be zero. - - - - - Type of value contained in the buffer. - - - - - char*, byte buffer to hold the property's value. - - - - - Represents an aiMaterial struct. - - - - - aiMaterialProperty**, array of material properties. - - - - - Number of key-value properties. - - - - - Storage allocated for key-value properties. - - - - - Represents an aiNodeAnim struct. - - - - - Name of the node affected by the animation. The node must exist - and be unique. - - - - - Number of position keys. - - - - - VectorKey*, position keys of this animation channel. Positions - are 3D vectors and are accompanied by at least one scaling and one rotation key. - - - - - The number of rotation keys. - - - - - QuaternionKey*, rotation keys of this animation channel. Rotations are 4D vectors (quaternions). - If there are rotation keys there will be at least one scaling and one position key. - - - - - Number of scaling keys. - - - - - VectorKey*, scaling keys of this animation channel. Scalings are specified as a - 3D vector, and if there are scaling keys, there will at least be one position - and one rotation key. - - - - - Defines how the animation behaves before the first key is encountered. - - - - - Defines how the animation behaves after the last key was processed. - - - - - Represents an aiMeshAnim struct. - - - - - Name of the mesh to be animated. Empty string not allowed. - - - - - Number of keys, there is at least one. - - - - - aiMeshkey*, the key frames of the animation. There must exist at least one. - - - - - Represents an aiMeshMorphKey struct. - - - - - The time of this key. - - - - - unsigned int*, values at the time of this key. - - - - - double*, weights at the time of this key. - - - - - unsigned int, the number of values/weights. - - - - - Represents an aiMeshMorphAnim struct. - - - - - aiString, the name of the mesh to be animated. Empty strings are not allowed, animated meshes need to be named (not necessarily uniquely, - the name can basically serve as a wildcard to select a group of meshes with similar animation setup). - - - - - unsigned int, number of key frames. Must be at least one. - - - - - aiMeshMorphKey*, key frames of the animation. - - - - - Represents an aiAnimation struct. - - - - - Name of the animation. - - - - - Duration of the animation in ticks. - - - - - Ticks per second, 0 if not specified in imported file. - - - - - Number of bone animation channels, each channel affects a single node. - - - - - aiNodeAnim**, node animation channels. Each channel affects a single node. - - - - - Number of mesh animation channels. Each channel affects a single mesh and defines - vertex-based animation. - - - - - aiMeshAnim**, mesh animation channels. Each channel affects a single mesh. - - - - - Number of mesh morph animation channels. Each channel affects a single mesh and defines - morphing animation. - - - - - aiMeshMorphAnim**, mesh morph animation channels. Each channel affects a single mesh. - - - - - Represents an aiLight struct. - - - - - Name of the light. - - - - - Type of light. - - - - - Position of the light. - - - - - Direction of the spot/directional light. - - - - - Up direction of the light source in space. Undefined for point lights. - - - - - Attenuation constant value. - - - - - Attenuation linear value. - - - - - Attenuation quadratic value. - - - - - Diffuse color. - - - - - Specular color. - - - - - Ambient color. - - - - - Spot light inner angle. - - - - - Spot light outer angle. - - - - - Width (X) and Height (Y) of the area that represents an light. - - - - - Represents an aiCamera struct. - - - - - Name of the camera. - - - - - Position of the camera. - - - - - Up vector of the camera. - - - - - Viewing direction of the camera. - - - - - Field Of View of the camera. - - - - - Near clip plane distance. - - - - - Far clip plane distance. - - - - - The Aspect ratio. - - - - - Represents an aiString struct. - - - - - Byte length of the UTF-8 string. - - - - - Actual string data. - - - - - Constructs a new instance of the struct. - - The string data - - - - Convienence method for getting the AiString string - if the length is not greater than zero, it returns - an empty string rather than garbage. Use this to avoid struct copy if the string was passed by read-only ref. - - AiString - AiString string data - - - - Convienence method for getting the AiString string - if the length is not greater than zero, it returns - an empty string rather than garbage. - - AiString string data - - - - Convienence method for setting the AiString string (and length). - - String data to set - True if the operation was successful, false otherwise. - - - - Returns the fully qualified type name of this instance. - - A containing a fully qualified type name. - - - - Represents a log stream, which receives all log messages and streams them somewhere. - - - - - Function pointer that gets called when a message is to be logged. - - - - - char*, user defined opaque data. - - - - - Represents the memory requirements for the different components of an imported - scene. All sizes in in bytes. - - - - - Size of the storage allocated for texture data, in bytes. - - - - - Size of the storage allocated for material data, in bytes. - - - - - Size of the storage allocated for mesh data, in bytes. - - - - - Size of the storage allocated for node data, in bytes. - - - - - Size of the storage allocated for animation data, in bytes. - - - - - Size of the storage allocated for camera data, in bytes. - - - - - Size of the storage allocated for light data, in bytes. - - - - - Total storage allocated for the imported scene, in bytes. - - - - - Represents an aiAnimMesh struct. Note: This structure requires marshaling, due to the array of IntPtrs. - - - - - aiVector3D*, replacement position array. - - - - - aiVector3D*, replacement normal array. - - - - - aiVector3D*, replacement tangent array. - - - - - aiVector3D*, replacement bitangent array. - - - - - aiColor4D*[Max_Value], array of arrays of vertex colors. Max_Value is defined as . - - - - - aiVector3D*[Max_Value], array of arrays of texture coordinates. Max_Value is defined as . - - - - - unsigned int, number of vertices. - - - - - float, weight of the AnimMesh. - - - - - Describes a variety of information about an importer. - - - - - char*, full name of the importer (e.g. Blender3D Importer) - - - - - char*, original author (blank if unknown or assimp team) - - - - - char*, current maintainer, left blank if the author maintains. - - - - - char*, implementation comments. E.g. unimplemented features. - - - - - unsigned int, features supported by the importer. - - - - - unsigned int, max major version of format supported. If no version scheme or importer doesn't care, will be zero. - - - - - unsigned int, min major version of format supported. If no version scheme or importer doesn't care, will be zero. - - - - - unsigned int, max major version of format supported. If no version scheme, forwards compatible, or importer doesn't care, will be zero. - - - - - unsigned int, min major version of format supported. If no version scheme, forwards compatible, or importer doesn't care, will be zero. - - - - - char*, list of file extensions the importer can handle. Entries are separated by space characters, and all entries are lower case WITHOUT a leading dot. (e.g. "xml dae"). - Multiple importers may respond to the same file extension, assim - - - - - Describes a file format which Assimp can export to. - - - - - char*, a short string ID to uniquely identify the export format. e.g. "collada" or "obj" - - - - - char*, a short description of the file format to present to users. - - - - - char*, a recommended file extension of the exported file in lower case. - - - - - Describes a blob of exported scene data. Blobs can be nested, the first blob always has an empty name. Nested - blobs represent auxillary files produced by the exporter (e.g. material files) and are named accordingly. - - - - - size_t, size of the data in bytes. - - - - - void*, the data. - - - - - AiString, name of the blob. - - - - - aiExportDataBlob*, pointer to the next blob in the chain. - - - - - Contains callbacks to implement a custom file system to open and close files. - - - - - Function pointer to open a new file. - - - - - Function pointer used to close an existing file. - - - - - Char*, user defined opaque data. - - - - - Contains callbacks to read and write to a file opened by a custom file system. - - - - - Function pointer to read from a file. - - - - - Function pointer to write to a file. - - - - - Function pointer to retrieve the current position of the file cursor. - - - - - Function pointer to retrieve the size of the file. - - - - - Function pointer to set the current position of the file cursor. - - - - - Function pointer to flush the file contents. - - - - - Char*, user defined opaque data. - - - - - Callback delegate for Assimp's LogStream. - - Log message - char* pointer to user data that is passed to the callback - - - - Callback delegate for a custom file system, to write to a file. - - Pointer to an AiFile instance - Char* pointer to data to write (casted from a void*) - Size of a single element in bytes to write - Number of elements to write - Number of elements successfully written. Should be zero if either size or numElements is zero. May be less than numElements if an error occured. - - - - Callback delegate for a custom file system, to read from a file. - - Pointer to an AiFile instance. - Char* pointer that will store the data read (casted from a void*) - Size of a single element in bytes to read - Number of elements to read - Number of elements succesfully read. Should be zero if either size or numElements is zero. May be less than numElements if end of file is encountered, or if an error occured. - - - - Callback delegate for a custom file system, to tell offset/size information about the file. - - Pointer to an AiFile instance. - Returns the current file cursor or the file size in bytes. May be -1 if an error has occured. - - - - Callback delegate for a custom file system, to flush the contents of the file to the disk. - - Pointer to an AiFile instance. - - - - Callback delegate for a custom file system, to set the current position of the file cursor. - - Pointer to An AiFile instance. - Offset from the origin. - Position used as a reference - Returns success, if successful - - - - Callback delegate for a custom file system, to open a given file and create a new AiFile instance. - - Pointer to an AiFileIO instance. - Path to the target file - Read-write permissions to request - Pointer to an AiFile instance. - - - - Callback delegate for a custom file system, to close a given file and free its memory. - - Pointer to an AiFileIO instance. - Pointer to an AiFile instance that will be closed. - - - - Fixed length array for representing the color channels of a mesh. Length is equal - to . - - - - - Gets the length of the array. - - - - - Gets or sets an array value at the specified index. - - Zero-based index. - - - - Fixed length array for representing the texture coordinate channels of a mesh. Length is equal - to . - - - - - Gets the length of the array. - - - - - Gets or sets an array value at the specified index. - - Zero-based index. - - - - Fixed length array for representing the number of UV components for each texture coordinate channel of a mesh. Length is equal - to . - - - - - Gets the length of the array. - - - - - Gets or sets an array value at the specified index. - - Zero-based index. - - - - Defines how an UV channel is transformed. - - - - - Translation on the U and V axes. Default is 0|0 - - - - - Scaling on the U and V axes. Default is 1|1. - - - - - Rotation in counter-clockwise direction, specfied in - radians. The rotation center is 0.5f|0.5f and the - default value is zero. - - - - - Represents a two-dimensional vector. - - - - - X component. - - - - - Y component - - - - - Gets or sets the component value at the specified zero-based index - in the order of XY (index 0 access X, 1 access Y. If - the index is not in range, a value of zero is returned. - - Zero-based index. - The component value - - - - Constructs a new Vector2D. - - X component - Y component - - - - Constructs a new Vector2D with both components - set the same value. - - Value to set both X and Y to - - - - Sets the X and Y values. - - X component - Y component - - - - Calculates the length of the vector. - - Vector's length - - - - Calculates the length of the vector squared. - - Vector's length squared - - - - Normalizes the vector where all components add to one (Unit Vector), but preserves - the direction that the vector represents. - - - - - Negates the vector. - - - - - Adds two vectors together. - - First vector - Second vector - Added vector - - - - Subtracts the second vector from the first vector. - - First vector - Second vector - Resulting vector - - - - Multiplies two vectors together. - - First vector - Second vector - Multiplied vector - - - - Multiplies a vector by a scalar. - - Source vector - Scalar value - Scaled vector - - - - Multiplies a vector by a scalar. - - Scalar value - Source vector - Scaled vector - - - - Divides the first vector by the second vector. - - First vector - Second vector - Divided vector - - - - Divides the vector by a divisor value. - - Source vector - Divisor - Divided vector - - - - Negates the vector. - - Source vector - Negated vector - - - - Tests equality between two vectors. - - First vector - Second vector - True if the vectors are equal, false otherwise - - - - Tests inequality between two vectors. - - First vector - Second vector - True if the vectors are not equal, false otherwise - - - - Tests equality between this vector and another vector. - - Vector to test against - True if components are equal - - - - Tests equality between this vector and another object. - - Object to test against - True if the object is a vector and the components are equal - - - - Returns a hash code for this instance. - - - A hash code for this instance, suitable for use in hashing algorithms and data structures like a hash table. - - - - - Returns a that represents this instance. - - - A that represents this instance. - - - - - Represents a three-dimensional vector. - - - - - X component. - - - - - Y component. - - - - - Z component. - - - - - Gets or sets the component value at the specified zero-based index - in the order of XYZ (index 0 access X, 1 access Y, etc). If - the index is not in range, a value of zero is returned. - - Zero-based index. - The component value - - - - Constructs a new Vector3D. - - X component - Y component - Z component - - - - Constructs a new Vector3D. - - Vector2D containing the X, Y values - Z component - - - - Constructs a new Vector3D where each component is set - to the same value. - - Value to set X, Y, and Z to - - - - Sets the X, Y, and Z values. - - X component - Y component - Z component - - - - Calculates the length of the vector. - - Vector's length - - - - Calculates the length of the vector squared. - - Vector's length squared - - - - Normalizes the vector where all components add to one (Unit Vector), but preserves - the direction that the vector represents. - - - - - Negates the vector. - - - - - Calculates the cross product of two vectors. - - First vector - Second vector - Resulting vector - - - - Calculates the dot product of two vectors. - - First vector - Second vector - Resulting vector - - - - Adds two vectors together. - - First vector - Second vector - Added vector - - - - Subtracts the second vector from the first vector. - - First vector - Second vector - Resulting vector - - - - Multiplies two vectors together. - - First vector - Second vector - Multiplied vector - - - - Multiplies a vector by a scalar. - - Source vector - Scalar value - Scaled vector - - - - Multiplies a vector by a scalar. - - Scalar value - Source vector - Scaled vector - - - - Transforms this vector by a 3x3 matrix. This "post-multiplies" the two. - - Source matrix - Source vector - Transformed vector - - - - Transforms this vector by a 4x4 matrix. This "post-multiplies" the two. - - Source matrix - Source vector - Transformed vector - - - - Divides the first vector by the second vector. - - First vector - Second vector - Divided vector - - - - Divides the vector by a divisor value. - - Source vector - Divisor - Divided vector - - - - Negates the vector. - - Source vector - Negated vector - - - - Tests equality between two vectors. - - First vector - Second vector - True if the vectors are equal, false otherwise - - - - Tests inequality between two vectors. - - First vector - Second vector - True if the vectors are not equal, false otherwise - - - - Tests equality between this vector and another vector. - - Vector to test against - True if components are equal - - - - Tests equality between this vector and another object. - - Object to test against - True if the object is a vector and the components are equal - - - - Returns a hash code for this instance. - - - A hash code for this instance, suitable for use in hashing algorithms and data structures like a hash table. - - - - - Returns a that represents this instance. - - - A that represents this instance. - - - - - Time-value pair specifying a 3D vector for a given time. - - - - - The time of this key. - - - - - The 3D vector value of this key. - - - - - Constructs a new VectorKey. - - The time of this key. - The 3D vector value of this key. - - - - Tests equality between two keys. - - The first key - The second key - True if the key's 3D vectors are the same, false otherwise. - - - - Tests inequality between two keys. - - The first key - The second key - True if the key's 3D vectors are not the same, false otherwise. - - - - Tests inequality between two keys. - - The first key - The second key - True if the first key's time is less than the second key's. - - - - Tests inequality between two keys. - - The first key - The second key - True if the first key's time is greater than the second key's. - - - - Determines whether the specified is equal to this instance. - - The to compare with this instance. - - true if the specified is equal to this instance; otherwise, false. - - - - - Tests equality between this key and another. - - Other key to test - True if their 3D vectors are equal. - - - - Returns a hash code for this instance. - - - A hash code for this instance, suitable for use in hashing algorithms and data structures like a hash table. - - - - - Returns a that represents this instance. - - - A that represents this instance. - - - - - Represents a single influence of a bone on a vertex. - - - - - Index of the vertex which is influenced by the bone. - - - - - Strength of the influence in range of (0...1). All influences - from all bones at one vertex amounts to 1. - - - - - Constructs a new VertexWeight. - - Index of the vertex. - Weight of the influence. - - - - Returns a that represents this instance. - - - A that represents this instance. - - - - - Internal stub type used by MemoryInterop.ILPatcher to inject fast-interop code. Depending on the type of method, the IL injection is either inline (replacing the call) or - replaces the entire method body. Recommended types to use are generally blittable structs. - - - - - Casts the by-ref value from one type to another. - - Type to cast from. - Type to cast to. - By-ref value. - Ref to the value, as the new type. - - - - Casts the readonly by-ref value from one type to another. - - Type to cast from. - Type to cast to. - By-ref value. - Ref to the value, as the new type. - - - - Casts the pointer to a by-ref value of the specified type. - - Type to cast to. - Pointer. - Ref to the value, as the new type. - - - - Write data from the managed array to the memory location. This will temporarily pin the array and do a memcpy. - - Type of data. - Pointer to memory location to receive the data. - Array containing data to write. - Zero-based index to start reading data from the array. - Number of elements to copy. - - - - Write data from the managed array to the memory location. This will temporarily pin the array and do an unaligned memcpy. - - Type of data. - Pointer to memory location to write the data. - Array containing data to write. - Zero-based index to start reading data from the array. - Number of elements to copy. - - - - Read data from the memory location to the managed array. This will temporarily pin the array and do a memcpy. - - Type of data. - Pointer to memory location to read the data. - Array to store the copied data. - Zero-based index to start writing data to in the array. - Number of elements to copy. - - - - Read data from the memory location to the managed array. This will temporarily pin the array and do an unaligned memcpy. - - Type of data. - Pointer to memory location to read the data. - Array to store the copied data. - Zero-based index to start writing data to in the array. - Number of elements to copy. - - - - Computes the size of the type (inlined). - - Type of data. - Size of the type in bytes. - - - - Casts the by-ref value to a pointer (inlined). Note: This does not do any sort of pinning. - - Type of data. - Ref to a value. - Pointer to the memory location. - - - - Casts the readonly by-ref value to a pointer (inlined). Note: This does not do any sort of pinning. - - Type of data. - Ref to a value. - Pointer to the memory location. - - - - Writes a single element to the memory location (inlined). - - Type of data. - Pointer to memory location. - Value to be written. - - - - Writes a single element to the memory location (inlined, unaligned copy). - - Type of data. - Pointer to memory location. - Value to be written. - - - - Reads a single element from the memory location (inlined). - - Type of data. - Pointer to memory location. - Value read. - - - - Reads a single element from the memory location (inlined, unaligned copy). - - Type of data. - Pointer to memory location. - Value read. - - - - Copies the number of bytes from one pointer to the other (inlined). - - Pointer to the destination memory location. - Pointer to the source memory location - Number of bytes to copy - - - - Copies the number of bytes from one pointer to the other (inlined, unaligned copy). - - Pointer to the destination memory location. - Pointer to the source memory location - Number of bytes to copy - - - - Clears the memory to a specified value (inlined). - - Pointer to the memory location. - Value the memory will be cleared to. - Number of bytes to to set. - - - - Clears the memory to a specified value (inlined, unaligned init). - - Pointer to the memory location. - Value the memory will be cleared to. - Number of bytes to to set. - - - diff --git a/packages/AssimpNet.4.1.0/lib/net40/AssimpNet.dll b/packages/AssimpNet.4.1.0/lib/net40/AssimpNet.dll deleted file mode 100644 index 3caa301e..00000000 Binary files a/packages/AssimpNet.4.1.0/lib/net40/AssimpNet.dll and /dev/null differ diff --git a/packages/AssimpNet.4.1.0/lib/net40/AssimpNet.xml b/packages/AssimpNet.4.1.0/lib/net40/AssimpNet.xml deleted file mode 100644 index 04097be1..00000000 --- a/packages/AssimpNet.4.1.0/lib/net40/AssimpNet.xml +++ /dev/null @@ -1,11454 +0,0 @@ - - - - AssimpNet - - - - - An animation consists of keyframe data for a number of nodes. For - each node affected by the animation, a separate series of data is given. - - - - - Gets or sets the name of the animation. If the modeling package the - data was exported from only supports a single animation channel, this - name is usually empty. - - - - - Gets or sets the duration of the animation in number of ticks. - - - - - Gets or sets the number of ticks per second. It may be zero - if it is not specified in the imported file. - - - - - Gets if the animation has node animation channels. - - - - - Gets the number of node animation channels where each channel - affects a single node. - - - - - Gets the node animation channels. - - - - - Gets if the animation has mesh animations. - - - - - Gets the number of mesh animation channels. - - - - - Gets the number of mesh morph animation channels. - - - - - Gets the mesh animation channels. - - - - - Gets the mesh morph animation channels. - - - - - Constructs a new instance of the class. - - - - - Gets if the native value type is blittable (that is, does not require marshaling by the runtime, e.g. has MarshalAs attributes). - - - - - Writes the managed data to the native value. - - Optional pointer to the memory that will hold the native value. - Output native value - - - - Reads the unmanaged data from the native value. - - Input native value - - - - Frees unmanaged memory created by . - - Native value to free - True if the unmanaged memory should be freed, false otherwise. - - - - Represents an Assimp Import/Export context that load or save models using the unmanaged library. Additionally, conversion - functionality is offered to bypass loading model data into managed memory. - - - - - Gets if the context has been disposed. - - - - - Gets or sets the uniform scale for the model. This is multiplied - with the existing root node's transform. This is only used during import. - - - - - Gets or sets the model's rotation about the X-Axis, in degrees. This is multiplied - with the existing root node's transform. This is only used during import. - - - - - Gets or sets the model's rotation abut the Y-Axis, in degrees. This is multiplied - with the existing root node's transform. This is only used during import. - - - - - Gets or sets the model's rotation about the Z-Axis, in degrees. This is multiplied - with the existing root node's transform. This is only used during import. - - - - - Gets whether this context is using a user-defined IO system for file handling. - - - - - Gets the property configurations set to this context. This is only used during import. - - - - - Constructs a new instance of the class. - - - - - Imports a model from the stream without running any post-process steps. The importer sets configurations - and loads the model into managed memory, releasing the unmanaged memory used by Assimp. It is up to the caller to dispose of the stream. - If the format is distributed across multiple files/streams, set a custom - and use the "ImportFile" family of functions. - - Stream to read from - Optional format extension to serve as a hint to Assimp to choose which importer to use. If null or empty, the system will - try to detect what importer to use from the data which may or may not be successful. - The imported scene - Thrown if the stream is not valid (null or write-only). - Thrown if the context has already been disposed of. - - - - Imports a model from the stream. The importer sets configurations and loads the model into managed memory, releasing the unmanaged memory - used by Assimp. It is up to the caller to dispose of the stream. If the format is distributed across multiple files/streams, set a custom - and use the "ImportFile" family of functions. - - Stream to read from - Post processing flags, if any - Optional format extension to serve as a hint to Assimp to choose which importer to use. If null or empty, the system will - try to detect what importer to use from the data which may or may not be successful. - The imported scene - Thrown if the stream is not valid (null or write-only). - Thrown if the context has already been disposed of. - - - - Imports a model from the specified file without running any post-process steps. The importer sets configurations - and loads the model into managed memory, releasing the unmanaged memory used by Assimp. - - Full path to the file - The imported scene - Thrown if there was a general error in importing the model. - Thrown if the file could not be located. - Thrown if the context has already been disposed of. - - - - Imports a model from the specified file. The importer sets configurations - and loads the model into managed memory, releasing the unmanaged memory used by Assimp. - - Full path to the file - Post processing flags, if any - The imported scene - Thrown if there was a general error in importing the model. - Thrown if the file could not be located. - Thrown if the context has already been disposed of. - - - - Exports a scene to the specified format and writes it to a file. - - Scene containing the model to export. - Path to the file. - FormatID representing the format to export to. - True if the scene was exported successfully, false otherwise. - Thrown if the scene is null. - Thrown if the context has already been disposed of. - - - - Exports a scene to the specified format and writes it to a file. - - Scene containing the model to export. - Path to the file. - FormatID representing the format to export to. - Preprocessing flags to apply to the model before it is exported. - True if the scene was exported successfully, false otherwise. - Thrown if the scene is null. - Thrown if the context has already been disposed of. - - - - Exports a scene to the specified format and writes it to a data blob. - - Scene containing the model to export. - FormatID representing the format to export to. - The resulting data blob, or null if the export failed. - Thrown if the scene is null. - Thrown if the context has already been disposed of. - - - - Exports a scene to the specified format and writes it to a data blob. - - Scene containing the model to export. - FormatID representing the format to export to. - Preprocessing flags to apply to the model before it is exported. - The resulting data blob, or null if the export failed. - Thrown if the scene is null. - Thrown if the context has already been disposed of. - - - - Converts the model contained in the file to the specified format and save it to a file. - - Input file name to import - Output file name to export to - Format id that specifies what format to export to - True if the conversion was successful or not, false otherwise. - Thrown if there was a general error in importing the model. - Thrown if the file could not be located. - Thrown if the context has already been disposed of. - - - - Converts the model contained in the file to the specified format and save it to a file. - - Input file name to import - Output file name to export to - Format id that specifies what format to export to - Pre processing steps used for the export - True if the conversion was successful or not, false otherwise. - Thrown if there was a general error in importing the model. - Thrown if the file could not be located. - Thrown if the context has already been disposed of. - - - - Converts the model contained in the file to the specified format and save it to a file. - - Input file name to import - Post processing steps used for the import - Output file name to export to - Format id that specifies what format to export to - Pre processing steps used for the export - True if the conversion was successful or not, false otherwise. - Thrown if there was a general error in importing the model. - Thrown if the file could not be located. - Thrown if the context has already been disposed of. - - - - Converts the model contained in the file to the specified format and save it to a data blob. - - Input file name to import - Format id that specifies what format to export to - Data blob containing the exported scene in a binary form - Thrown if there was a general error in importing the model. - Thrown if the file could not be located. - Thrown if the context has already been disposed of. - - - - Converts the model contained in the file to the specified format and save it to a data blob. - - Input file name to import - Format id that specifies what format to export to - Pre processing steps used for the export - Data blob containing the exported scene in a binary form - Thrown if there was a general error in importing the model. - Thrown if the file could not be located. - Thrown if the context has already been disposed of. - - - - Converts the model contained in the file to the specified format and save it to a data blob. - - Input file name to import - Post processing steps used for the import - Format id that specifies what format to export to - Pre processing steps used for the export - Data blob containing the exported scene in a binary form - Thrown if there was a general error in importing the model. - Thrown if the file could not be located. - Thrown if the context has already been disposed of. - - - - Converts the model contained in the stream to the specified format and save it to a file. It is up to the caller to dispose of the stream. - If the format is distributed across multiple files/streams, set a custom - and use the "ConvertFromFileToFile" family of functions. - - Stream to read from - Optional format extension to serve as a hint to Assimp to choose which importer to use. If null or empty, the system will - try to detect what importer to use from the data which may or may not be successful - Output file name to export to - Format id that specifies what format to export to - True if the conversion was successful or not, false otherwise. - Thrown if the stream is not valid (null or write-only). - Thrown if the context has already been disposed of. - - - - Converts the model contained in the stream to the specified format and save it to a file. It is up to the caller to dispose of the stream. - If the format is distributed across multiple files/streams, set a custom - and use the "ConvertFromFileToFile" family of functions. - - Stream to read from - Optional format extension to serve as a hint to Assimp to choose which importer to use. If null or empty, the system will - try to detect what importer to use from the data which may or may not be successful - Output file name to export to - Format id that specifies what format to export to - Pre processing steps used for the export - True if the conversion was successful or not, false otherwise. - Thrown if the stream is not valid (null or write-only). - Thrown if the context has already been disposed of. - - - - Converts the model contained in the stream to the specified format and save it to a file. It is up to the caller to dispose of the stream. - If the format is distributed across multiple files/streams, set a custom - and use the "ConvertFromFileToFile" family of functions. - - Stream to read from - Optional format extension to serve as a hint to Assimp to choose which importer to use. If null or empty, the system will - try to detect what importer to use from the data which may or may not be successful - Post processing steps used for import - Output file name to export to - Format id that specifies what format to export to - Pre processing steps used for the export - True if the conversion was successful or not, false otherwise. - Thrown if the stream is not valid (null or write-only). - Thrown if the context has already been disposed of. - - - - Converts the model contained in the stream to the specified format and save it to a data blob. It is up to the caller to dispose of the stream. - If the format is distributed across multiple files/streams, set a custom - and use the "ConvertFromFileToBlob" family of functions. - - Stream to read from - Optional format extension to serve as a hint to Assimp to choose which importer to use. If null or empty, the system will - try to detect what importer to use from the data which may or may not be successful - Format id that specifies what format to export to - Data blob containing the exported scene in a binary form - Thrown if the stream is not valid (null or write-only). - Thrown if the context has already been disposed of. - - - - Converts the model contained in the stream to the specified format and save it to a data blob. It is up to the caller to dispose of the stream. - If the format is distributed across multiple files/streams, set a custom - and use the "ConvertFromFileToBlob" family of functions. - - Stream to read from - Optional format extension to serve as a hint to Assimp to choose which importer to use. If null or empty, the system will - try to detect what importer to use from the data which may or may not be successful - Format id that specifies what format to export to - Pre processing steps used for the export - Data blob containing the exported scene in a binary form - Thrown if the stream is not valid (null or write-only). - Thrown if the context has already been disposed of. - - - - Converts the model contained in the stream to the specified format and save it to a data blob. It is up to the caller to dispose of the stream. - If the format is distributed across multiple files/streams, set a custom - and use the "ConvertFromFileToBlob" family of functions. - - Stream to read from - Optional format extension to serve as a hint to Assimp to choose which importer to use. If null or empty, the system will - try to detect what importer to use from the data which may or may not be successful - Post processing steps used for import - Format id that specifies what format to export to - Pre processing steps used for the export - Data blob containing the exported scene in a binary form - Thrown if the stream is not valid (null or write-only). - Thrown if the context has already been disposed of. - - - - Sets a custom file system implementation that is used by this importer. If it is null, then the default assimp file system - is used instead. - - Custom file system implementation - - - - Removes the currently set custom file system implementation from the importer. - - - - - Gets the model formats that are supported for export by Assimp. - - Export formats supported - - - - Gets the model formats that are supported for import by Assimp. - - Import formats supported - - - - Gets descriptions for each importer that assimp has registered. - - Descriptions of supported importers. - - - - Gets an importer description for the specified file extension. If no importers support it, null is returned. Multiple importers may support the file extension, - they are called in the order that they were registered. - - File extension to query importer support for. - Importer description or null if it does not exist. - - - - Checks if the format extension (e.g. ".dae" or ".obj") is supported for import. - - Model format - True if the format is supported, false otherwise - - - - Checks if the format extension (e.g. ".dae" or ".obj") is supported for export. - - Model format - True if the format is supported, false otherwise - - - - Sets a configuration property to the context. This is only used during import. - - Config to set - - - - Removes a set configuration property by name. - - Name of the config property - - - - Removes all configuration properties from the context. - - - - - Checks if the context has a config set by the specified name. - - Name of the config property - True if the config is present, false otherwise - - - - Disposes of resources held by the context. These include IO systems still attached. - - - - - Releases unmanaged and - optionally - managed resources - - True to release both managed and unmanaged resources; False to release only unmanaged resources. - - - - AssimpNet general exception. - - - - - Initializes a new instance of the class. - - - - - Initializes a new instance of the class. - - The error message. - - - - Initializes a new instance of the class. - - Name of the param. - The error message. - - - - Initializes a new instance of the class. - - The error message - The inner exception. - - - - Represents a single bone of a mesh. A bone has a name which allows it to be found in the frame - hierarchy and by which it can be addressed by animations. In addition it has a number of - influences on vertices. - - - - - Gets or sets the name of the bone. - - - - - Gets the number of vertex influences the bone contains. - - - - - Gets if the bone has vertex weights - this should always be true. - - - - - Gets the vertex weights owned by the bone. - - - - - Gets or sets the matrix that transforms from mesh space to bone space in bind pose. - - - - - Constructs a new instance of the class. - - - - - Constructs a new instance of the class. - - Name of the bone - Bone's offset matrix - Vertex weights - - - - Gets if the native value type is blittable (that is, does not require marshaling by the runtime, e.g. has MarshalAs attributes). - - - - - Writes the managed data to the native value. - - Optional pointer to the memory that will hold the native value. - Output native value - - - - Reads the unmanaged data from the native value. - - Input native value - - - - Frees unmanaged memory created by . - - Native value to free - True if the unmanaged memory should be freed, false otherwise. - - - - Describes a right-handed camera in the scene. An important aspect is that - the camera itself is also part of the scenegraph, meaning any values such - as the direction vector are not *absolute*, they can be relative to the coordinate - system defined by the node which corresponds to the camera. This allows for camera - animations. - - - - - Gets or sets the name of the camera. This corresponds to a node in the - scenegraph with the same name. This node specifies the position of the - camera in the scene hierarchy and can be animated. - - - - - Gets or sets the position of the camera relative to the coordinate space defined by - the corresponding node. THe default value is 0|0|0. - - - - - Gets or sets the 'up' vector of the camera, relative to the coordinate space defined by the - corresponding node. The 'right' vector of the camera is the cross product of the up - and direction vectors. The default value is 0|1|0. - - - - - Gets or sets the viewing direction of the camera, relative to the coordinate space defined by the corresponding node. - The default value is 0|0|1. - - - - - Gets or sets the half horizontal field of view angle, in radians. The FoV angle is - the angle between the center line of the screen and the left or right border. The default - value is 1/4PI. - - - - - Gets or sets the distance of the near clipping plane from the camera. The value may not - be 0.0f for arithmetic reasons to prevent a division through zero. The default value is 0.1f; - - - - - Gets or sets the distance of the far clipping plane from the camera. The far clippling plane must - be further than the near clippling plane. The default value is 1000.0f. The ratio between - the near and far plane should not be too large (between 1000 - 10000 should be ok) to avoid - floating-point inaccuracies which can lead to z-fighting. - - - - - Gets or sets the screen aspect ratio. This is the ratio between the width and height of the screen. Typical - values are 4/3, 1/2, or 1/1. This value is 0 if the aspect ratio is not defined in the source file. - The default value is zero. - - - - - Gets a right-handed view matrix. - - - - - Constructs a new instance of the class. - - - - - Gets if the native value type is blittable (that is, does not require marshaling by the runtime, e.g. has MarshalAs attributes). - - - - - Writes the managed data to the native value. - - Optional pointer to the memory that will hold the native value. - Output native value - - - - Reads the unmanaged data from the native value. - - Input native value - - - - Frees unmanaged memory created by . - - Native value to free - True if the unmanaged memory should be freed, false otherwise. - - - - Represents a RGB color. - - - - - Red component. - - - - - Green component. - - - - - Blue component. - - - - - Gets or sets the component value at the specified zero-based index - in the order of RGBA (index 0 access R, 1 access G, etc). If - the index is not in range, a value of zero is returned. - - Zero-based index. - The component value - - - - Constructs a Color3D. - - Red component - Green component - Blue component - - - - Constructs a Color3D where each component is - set to the same value. - - Value to set R, G, B components - - - - Determines if the color is black, or close to being black. - - True if the color is black/nearly block, false otherwise. - - - - Adds the two colors together. - - First color - Second color - Added color - - - - Adds the value to each of the components of the color. - - Source color - Value to add to each component - Added color - - - - Adds the value to each of the components of the color. - - Value to add to each component - Source color - Added color - - - - Subtracts the second color from the first color. - - First color - Second color - Resulting color - - - - Subtracts the value from each of the color's components. - - Source color - Value to subtract from each component - Resulting color - - - - Subtracts the color's components from the value, returning - the result as a new color. Same as new Color4D(value) - color - - Value for each component of the first color - Second color - Resulting color - - - - Multiplies the two colors. - - First color - Second color - Multiplied color. - - - - Multiplies the color by a scalar value, component wise. - - Source color - Scalar value - Resulting color - - - - Multiplies the color by a scalar value, component wise. - - Scalar value - Source color - Resulting color - - - - Divides the first color by the second color, component wise. - - First color - Second color - Resulting color - - - - Divides the color by a divisor value. - - Source color - Divisor - Resulting color - - - - Tets equality between two colors. - - First color - Second color - True if the colors are equal, false otherwise - - - - Tets inequality between two colors. - - First color - Second color - True if the colors are not equal, false otherwise - - - - Tests equality between this color and another color - - Color to test against - True if components are equal - - - - Tests equality between this color and another object. - - Object to test against - True if the object is a color and the components are equal - - - - Returns a hash code for this instance. - - - A hash code for this instance, suitable for use in hashing algorithms and data structures like a hash table. - - - - - Returns a that represents this instance. - - - A that represents this instance. - - - - - Represents a Red-Green-Blue-Alpha (RGBA) color. - Color values range from 0 to 1. - - - - - Red component. - - - - - Green component. - - - - - Blue component. - - - - - Alpha component. - - - - - Gets or sets the component value at the specified zero-based index - in the order of RGBA (index 0 access R, 1 access G, etc). If - the index is not in range, a value of zero is returned. - - Zero-based index. - The component value - - - - Constructs a Color4D. - - Red component - Green component - Blue component - Alpha component - - - - Constructs a Color4D. Alpha is set to 1.0. - - Red component - Green component - Blue component - - - - Constructs a Color4D where each component is - set to the same value. - - Value to set R, G, B, A components - - - - Constructs a Color4D from a Color3D. Alpha is set to 1.0. - - RGB values - - - - Constructs a Color4D from a Color3D and alpha value. - - RGB values - Alpha value - - - - Determines if the color is black, or close to being black. - - True if the color is black/nearly block, false otherwise. - - - - Adds the two colors together. - - First color - Second color - Added color - - - - Adds the value to each of the components of the color. - - Source color - Value to add to each component - Added color - - - - Adds the value to each of the components of the color. - - Value to add to each component - Source color - Added color - - - - Subtracts the second color from the first color. - - First color - Second color - Resulting color - - - - Subtracts the value from each of the color's components. - - Source color - Value to subtract from each component - Resulting color - - - - Subtracts the color's components from the value, returning - the result as a new color. Same as new Color4D(value) - color - - Value for each component of the first color - Second color - Resulting color - - - - Multiplies the two colors. - - First color - Second color - Multiplied color. - - - - Multiplies the color by a scalar value, component wise. - - Source color - Scalar value - Resulting color - - - - Multiplies the color by a scalar value, component wise. - - Scalar value - Source color - Resulting color - - - - Divides the first color by the second color, component wise. - - First color - Second color - Resulting color - - - - Divides the color by a divisor value. - - Source color - Divisor - Resulting color - - - - Tets equality between two colors. - - First color - Second color - True if the colors are equal, false otherwise - - - - Tets inequality between two colors. - - First color - Second color - True if the colors are not equal, false otherwise - - - - Tests equality between this color and another color - - Color to test against - True if components are equal - - - - Tests equality between this color and another object. - - Object to test against - True if the object is a color and the components are equal - - - - Returns a hash code for this instance. - - - A hash code for this instance, suitable for use in hashing algorithms and data structures like a hash table. - - - - - Returns a that represents this instance. - - - A that represents this instance. - - - - - Base property config. - - - - - Gets the property name. - - - - - Creates a new property config that has no active Assimp property store. - - Name of the property. - - - - Sets the current value to the default value. - - - - - Applies the property value to the given Assimp property store. - - Assimp property store - - - - Applies the property value to the given Assimp property store. - - Assimp property store - - - - Describes an integer configuration property. - - - - - Gets the property value. - - - - - Gets the default property value. - - - - - Constructs a new IntengerPropertyConfig. - - Name of the property - Property value - - - - constructs a new IntegerPropertyConfig with a default value. - - Name of the property - Property value - The default property value - - - - Sets the current value to the default value. - - - - - Applies the property value to the given Assimp property store. - - Assimp property store - - - - Describes a float configuration property. - - - - - Gets the property value. - - - - - Gets the default property value. - - - - - Constructs a new FloatPropertyConfig. - - Name of the property - Property value - - - - Constructs a new FloatPropertyConfig with a default value. - - Name of the property - Property value - The default property value - - - - Sets the current value to the default value. - - - - - Applies the property value to the given Assimp property store. - - Assimp property store - - - - Describes a configuration property. - - - - - Gets the property value. - - - - - Gets the default property value. - - - - - Constructs a new MatrixPropertyConfig. - - Name of the property - Property value - - - - Constructs a new MatrixPropertyConfig. - - Name of the property - Property value - The default property value - - - - Sets the current value to the default value. - - - - - Applies the property value to the given Assimp property store. - - Assimp property store - - - - Describes a boolean configuration property. - - - - - Gets the property value. - - - - - Gets the default property value. - - - - - Constructs a new BooleanPropertyConfig. - - Name of the property - Property value - - - - Constructs a new BooleanPropertyConfig with a default value. - - Name of the property - Property value - The default property value - - - - Sets the current value to the default value. - - - - - Applies the property value to the given Assimp property store. - - Assimp property store - - - - Describes a string configuration property. - - - - - Gets the property value. - - - - - Gets the default property value. - - - - - Constructs a new StringPropertyConfig. - - Name of the property - Property value - - - - Constructs a new StringPropertyConfig with a default value. - - Name of the property - Property value - The default property value - - - - Sets the current value to the default value. - - - - - Applies the property value to the given Assimp property store. - - Assimp property store - - - - Convience method for constructing a whitespace delimited name list. - - Array of names - White-space delimited list as a string - - - - Configuration to enable time measurements. If enabled, each - part of the loading process is timed and logged. Default value is false. - - - - - Gets the string name used by MeasureTimeConfig. - - - - - Constructs a new MeasureTimeConfig. - - True if the loading process should be timed or not. - - - - Configuration to set Assimp's multithreading policy. Possible - values are -1 to let Assimp decide, 0 to disable multithreading, or - any number larger than zero to force a specific number of threads. This - is only a hint and may be ignored by Assimp. Default value is -1. - - - - - Gets the string name used by MultithreadingConfig. - - - - - Constructs a new MultithreadingConfig. - - A value of -1 will let Assimp decide, - a value of zero to disable multithreading, and a value greater than zero - to force a specific number of threads. - - - - Global setting to disable generation of skeleton dummy meshes. These are generated as a visualization aid - in cases which the input data contains no geometry, but only animation data. So the geometry are visualizing - the bones. Default value is false. - - - - - Gets the string name used by NoSkeletonMeshConfig. - - - - - Constructs a new NoSkeletonMeshConfig. - - True if dummy skeleton mesh generation should be disabled, false otherwise. - - - - Configuration to set the maximum angle that may be between two vertex tangents/bitangents - when they are smoothed during the step to calculate the tangent basis. The default - value is 45 degrees. - - - - - Gets the string name used by TangentSmoothingAngleConfig. - - - - - Constructs a new TangentSmoothingAngleConfig. - - Smoothing angle, in degrees. - - - - Configuration to set the maximum angle between two face normals at a vertex when - they are smoothed during the step to calculate smooth normals. This is frequently - called the "crease angle". The maximum and default value is 175 degrees. - - - - - Gets the string name used by NormalSmoothingAngleConfig. - - - - - Constructs a new NormalSmoothingAngleConfig. - - Smoothing angle, in degrees. - - - - Configuration to set the colormap (palette) to be used to decode embedded textures in MDL (Quake or 3DG5) - files. This must be a valid path to a file. The file is 768 (256 * 3) bytes alrge and contains - RGB triplets for each of the 256 palette entries. If the file is not found, a - default palette (from Quake 1) is used. The default value is "colormap.lmp". - - - - - Gets the string name used by MDLColorMapConfig. - - - - - Constructs a new MDLColorMapConfig. - - Colormap filename - - - - Configuration for the the step - to determine what materials to keep. If a material matches one of these names it will not - be modified or removed by the post processing step. Default is an empty string. - - - - - Gets the string name used by MaterialExcludeListConfig. - - - - - Constructs a new MaterialExcludeListConfig. Material names containing whitespace - must be enclosed in single quotation marks. - - List of material names that will not be modified or replaced by the remove redundant materials post process step. - - - - Configuration for the step - to keep the scene hierarchy. Meshes are moved to worldspace, but no optimization is performed - where meshes with the same materials are not joined. This option can be useful - if you have a scene hierarchy that contains important additional information - which you intend to parse. The default value is false. - - - - - Gets the string name used by KeepSceneHierarchyConfig. - - - - - Constructs a new KeepHierarchyConfig. - - True to keep the hierarchy, false otherwise. - - - - Configuration for the step - to normalize all vertex components into the -1...1 range. The default value is - false. - - - - - Gets the string name used by NormalizeVertexComponentsConfig. - - - - - Constructs a new NormalizeVertexComponentsConfig. - - True if the post process step should normalize vertex components, false otherwise. - - - - Configuration for the step to - remove degenerted primitives from the import immediately. The default value is false, - where degenerated triangles are converted to lines, and degenerated lines to points. - - - - - Gets the string name used by RemoveDegeneratePrimitivesConfig. - - - - - Constructs a new RemoveDegeneratePrimitivesConfig. - - True if the post process step should remove degenerate primitives, false otherwise. - - - - Configuration for the step. If true, the area of the triangles are checked - to see if they are greater than 1e-6. If so, the triangle is removed if is set to true. - - - - - Gets the string name used by RemoveDegeneratePrimitivesCheckAreaConfig. - - - - - Constructs a new RemoveDegeneratePrimitivesCheckAreaConfig. - - True if the post process step should check the area of triangles when finding degenerate primitives, false otherwise. - - - - Configuration for the step - to preserve nodes matching a name in the given list. Nodes that match the names in the list - will not be modified or removed. Identifiers containing whitespaces - must be enclosed in single quotation marks. The default value is an - empty string. - - - - - Gets the string name used by NodeExcludeListConfig. - - - - - Constructs a new NodeExcludeListConfig. - - List of node names - - - - Configuration for the step - that specifies the maximum number of triangles a mesh can contain. The - default value is MeshTriangleLimitConfigDefaultValue. - - - - - Gets the string name used by MeshTriangleLimitConfig. - - - - - Gets the defined default limit value, this corresponds to the - constant. - - - - - Constructs a new MeshTriangleLimitConfig. - - Max number of triangles a mesh can contain. - - - - Configuration for the step - that specifies the maximum number of vertices a mesh can contain. The - default value is MeshVertexLimitConfigDefaultValue. - - - - - Gets the string name used by MeshVertexLimitConfig. - - - - - Gets the defined default limit value, this corresponds to the - constant. - - - - - Constructs a new MeshVertexLimitConfig. - - Max number of vertices a mesh can contain. - - - - Configuration for the step - that specifies the maximum number of bone weights per vertex. The default - value is VertexBoneWeightLimitConfigDefaultValue. - - - - - gets the string name used by VertexBoneWeightLimitConfig. - - - - - Gets the defined default limit value, this corresponds to the - constant. - - - - - Constructs a new VertexBoneWeightLimitConfig. - - Max number of bone weights per vertex. - - - - Configuration for the step - that specifies the size of the post-transform vertex cache. The size is - given in number of vertices and the default value is VertexCacheSizeConfigDefaultValue. - - - - - Gets the string name used by VertexCacheConfig. - - - - - Gets the defined default vertex cache size, this corresponds to - the . - - - - - Constructs a new VertexCacheSizeConfig. - - Size of the post-transform vertex cache, in number of vertices. - - - - Configuration for the step that - specifies which parts of the data structure is to be removed. If no valid mesh - remains after the step, the import fails. The default value i . - - - - - Gets the string name used by RemoveComponentConfig. - - - - - Constructs a new RemoveComponentConfig. - - Bit-wise combination of components to exclude. - - - - Configuration for the step that - specifies which primitive types are to be removed by the step. Specifying all - primitive types is illegal. The default value is zero specifying none. - - - - - Gets the string name used by SortByPrimitiveTypeConfig. - - - - - Constructs a new SortByPrimitiveTypeConfig. - - Bit-wise combination of primitive types to remove - - - - Configuration for the step that - specifies the floating point accuracy for animation values, specifically - the episilon during comparisons. The default value is 0.0f. - - - - - Gets the string name used by AnimationAccuracyConfig. - - - - - Constructs a new AnimationAccuracyConfig. - - Episilon for animation value comparisons. - - - - Configuration for the step that - specifies which UV transformations are to be evaluated. The default value - is for all combinations (scaling, rotation, translation). - - - - - Gets the string name used by TransformUVConfig. - - - - - Constructs a new TransformUVConfig. - - Bit-wise combination specifying which UV transforms that should be evaluated. - - - - Configuration that is a hint to Assimp to favor speed against import quality. Enabling this - option may result in faster loading, or it may not. It is just a hint to loaders - and post-process steps to use faster code paths if possible. The default value is false. - - - - - Gets the string name used by FavorSpeedConfig. - - - - - Constructs a new FavorSpeedConfig. - - True if Assimp should favor speed at the expense of quality, false otherwise. - - - - Configures the maximum bone count per mesh for the step. Meshes are - split until the maximum number of bones is reached. - - - - - Gets the string name used by MaxBoneCountConfig. - - - - - Constructs a new MaxBoneCountConfig. - - The maximum bone count. - - - - Configures which texture channel is used for tangent space computations. The channel must exist or an error will be raised. - - - - - Gets the string name used by TangentTextureChannelIndexConfig. - - - - - Constructs a new TangentTextureChannelIndexConfig. - - The zero-based texture channel index. - - - - Configures the threshold that is used to determine what bones are removed. - - - - - Gets the string name used by DeboneThresholdConfig. - - - - - Constructs a new DeboneThresholdConfig. - - The debone threshold. - - - - Configuration that requires all bones to qualify for deboning before any are removed. - - - - - Gets the string name used by DeboneAllOrNoneConfig. - - - - - Constructs a new DeboneAllOrNoneConfig. - - True if all are required, false if none need to qualify. - - - - Configuration for that sets a user defined matrix as the scene root node transformation before - transforming vertices. Default value is the identity matrix. - - - - - Gets the string name used by RootTransformationConfig. - - - - - Constructs a new RootTransformationConfig. - - Root transformation matrix to be set to the root scene node during the pretransform post process step. - - - - Applies the property value to the given Assimp property store. - - Assimp property store - - - - Configures the step to scale the entire scene by a certain amount. Some importers provide a mechanism to define a scaling unit for the model, - which this processing step can utilize. - - - - - - Gets the string name used by GlobalScaleConfig. - - - - - Constructs a new GlobalScaleConfig. - - Value to scale the entire scene by. - - - - Sets the vertex animation keyframe to be imported. Assimp does not support vertex keyframes (only - bone animation is supported). the library reads only one keyframe with vertex animations. By default this is the - first frame. This config sets the "global" keyframe that will be imported. There are other configs - for specific importers that will override the global setting. - - - - - Gets the string name used by GlobalKeyFrameImportConfig. - - - - - Constructs a new GlobalKeyFrameImportConfig. - - Keyframe index - - - - Sets the vertex animation keyframe to be imported. Assimp does not support vertex keyframes (only - bone animation is supported). the library reads only one keyframe with vertex animations. By default this is the - first frame. This config sets the global override for the MD3 format. - - - - - Gets the string name used by MD3KeyFrameImportConfig. - - - - - Constructs a new MD3KeyFrameImportConfig. - - Keyframe index - - - - Sets the vertex animation keyframe to be imported. Assimp does not support vertex keyframes (only - bone animation is supported). the library reads only one keyframe with vertex animations. By default this is the - first frame. This config sets the global override for the MD2 format. - - - - - Gets the string name used by MD2KeyFrameImportConfig. - - - - - Constructs a new MD2KeyFrameImportConfig. - - Keyframe index - - - - Sets the vertex animation keyframe to be imported. Assimp does not support vertex keyframes (only - bone animation is supported). the library reads only one keyframe with vertex animations. By default this is the - first frame. This config sets the global override for the MDL format. - - - - - Gets the string name used by MDLKeyFrameImportConfig. - - - - - Constructs a new MDLKeyFrameImportConfig. - - Keyframe index - - - - Sets the vertex animation keyframe to be imported. Assimp does not support vertex keyframes (only - bone animation is supported). the library reads only one keyframe with vertex animations. By default this is the - first frame. This config sets the global override for the SMD format. - - - - - Gets the string name used by SMDKeyFrameImportConfig. - - - - - Constructs a new SMDKeyFrameImportConfig. - - Keyframe index - - - - Sets the vertex animation keyframe to be imported. Assimp does not support vertex keyframes (only - bone animation is supported). the library reads only one keyframe with vertex animations. By default this is the - first frame. This config sets the global override for the Unreal format. - - - - - Gets the string name used by UnrealKeyFrameImportConfig. - - - - - Constructs a new UnrealKeyFrameImportConfig. - - Keyframe index - - - - Configures the AC loader to collect all surfaces which have the "Backface cull" flag set in separate - meshes. The default value is true. - - - - - Gets the string name used by ACSeparateBackfaceCullConfig. - - - - - Constructs a new ACSeparateBackfaceCullConfig. - - True if all surfaces that have the "backface cull" flag set should be collected in separate meshes, false otherwise. - - - - Configures whether the AC loader evaluates subdivision surfaces (indicated by the presence - of the 'subdiv' attribute in the file). By default, Assimp performs - the subdivision using the standard Catmull-Clark algorithm. The default value is true. - - - - - Gets the string name used by ACEvaluateSubdivisionConfig. - - - - - Constructs a new ACEvaluateSubdivisionConfig. - - True if the AC loader should evaluate subdivisions, false otherwise. - - - - Configures the UNREAL 3D loader to separate faces with different surface flags (e.g. two-sided vs single-sided). - The default value is true. - - - - - Gets the string name used by UnrealHandleFlagsConfig. - - - - - Constructs a new UnrealHandleFlagsConfig. - - True if the unreal loader should separate faces with different surface flags, false otherwise. - - - - Configures the terragen import plugin to compute UV's for terrains, if - they are not given. Furthermore, a default texture is assigned. The default value is false. - UV coordinates for terrains are so simple to compute that you'll usually - want to compute them on your own, if you need them. This option is intended for model viewers which - want to offer an easy way to apply textures to terrains. - - - - - Gets the string name used by TerragenComputeTexCoordsConfig. - - - - - Constructs a new TerragenComputeTexCoordsConfig. - - True if terran UV coordinates should be computed, false otherwise. - - - - Configures the ASE loader to always reconstruct normal vectors basing on the smoothing groups - loaded from the file. Some ASE files carry invalid normals, others don't. The default value is true. - - - - - Gets the string name used by ASEReconstructNormalsConfig. - - - - - Constructs a new ASEReconstructNormalsConfig. - - True if normals should be re-computed, false otherwise. - - - - Configures the M3D loader to detect and process multi-part Quake player models. These models - usually consit of three files, lower.md3, upper.md3 and head.md3. If this propery is - set to true, Assimp will try to load and combine all three files if one of them is loaded. The - default value is true. - - - - - Gets the string name used by MD3HandleMultiPartConfig. - - - - - Constructs a new MD3HandleMultiPartConfig. - - True if the split files should be loaded and combined, false otherwise. - - - - Tells the MD3 loader which skin files to load. When loading MD3 files, Assimp checks - whether a file named "md3_file_name"_"skin_name".skin exists. These files are used by - Quake III to be able to assign different skins (e.g. red and blue team) to models. 'default', 'red', 'blue' - are typical skin names. The default string value is "default". - - - - - Gets the string name used by MD3SkinNameConfig. - - - - - Constructs a new MD3SkinNameConfig. - - The skin name. - - - - Specifies the Quake 3 shader file to be used for a particular MD3 file. This can be a full path or - relative to where all MD3 shaders reside. the default string value is an empty string. - - - - - Gets the string name used by MD3ShaderSourceConfig. - - - - - Constructs a new MD3ShaderSourceConfig. - - The shader file. - - - - Configures the LWO loader to load just one layer from the model. - LWO files consist of layers and in some cases it could be useful to load only one of them. - This property can be either a string - which specifies the name of the layer - or an integer - the index - of the layer. If the property is not set then the whole LWO model is loaded. Loading fails - if the requested layer is not vailable. The layer index is zero-based and the layer name may not be empty - The default value is false (all layers are loaded). - - - - - Gets the string name used by LWOImportOneLayerConfig. - - - - - Constructs a new LWOImportOneLayerConfig. - - True if only one layer should be imported, false if all layers should be imported. - - - - Configures the MD5 loader to not load the MD5ANIM file for a MD5MESH file automatically. - The default value is false. - The default strategy is to look for a file with the same name but with the MD5ANIm extension - in the same directory. If it is found it is loaded and combined with the MD5MESH file. This configuration - option can be used to disable this behavior. - - - - - Gets the string name used by MD5NoAnimationAutoLoadConfig. - - - - - Constructs a new MD5NoAnimationAutoLoadConfig. - - True if animations should not be automatically loaded, false if they should be. - - - - Defines the beginning of the time range for which the LWS loader evaluates animations and computes - AiNodeAnim's. The default value is the one taken from the file. - Assimp provides full conversion of Lightwave's envelope system, including pre and post - conditions. The loader computes linearly subsampled animation channels with the frame rate - given in the LWS file. This property defines the start time. - Animation channels are only generated if a node has at least one envelope with more than one key - assigned. This property is given in frames where '0' is the first. By default, - if this property is not set, the importer takes the animation start from the input LWS - file ('FirstFrame' line) - - - - - Gets the string name used by LWSAnimationStartConfig. - - - - - Constructs a new LWSAnimationStartConfig. - - Beginning of the time range - - - - Defines the ending of the time range for which the LWS loader evaluates animations and computes - AiNodeAnim's. The default value is the one taken from the file - Assimp provides full conversion of Lightwave's envelope system, including pre and post - conditions. The loader computes linearly subsampled animation channels with the frame rate - given in the LWS file. This property defines the end time. - Animation channels are only generated if a node has at least one envelope with more than one key - assigned. This property is given in frames where '0' is the first. By default, - if this property is not set, the importer takes the animation end from the input LWS - file. - - - - - Gets the string name used by LWSAnimationEndConfig. - - - - - Constructs a new LWSAnimationEndConfig. - - Ending of the time range - - - - Defines the output frame rate of the IRR loader. - IRR animations are difficult to convert for Assimp and there will always be - a loss of quality. This setting defines how many keys per second are returned by the converter. - The default value is 100 frames per second. - - - - - Gets the string name used by IRRAnimationFrameRateConfig. - - - - - Constructs a new IRRAnimationFramerateConfig. - - Number of frames per second to output. - - - - The Ogre importer will try to load this MaterialFile. Ogre meshes reference with material names, this does not tell Assimp - where the file is located. Assimp will try to find the source file in the following order: [material-name].material, [mesh-filename-base].material, - and lastly the material name defined by this config property. The default value is "Scene.Material". - - - - - Gets the string name used by OgreMaterialFileConfig. - - - - - Constructs a new OgreMaterialFileConfig. - - Material file name to load. - - - - The Ogre importer will detect the texture usage from the filename. Normally a texture is loaded as a color map, if no target is specified - in the material file. If this is enabled, then Assimp will try to detect the type from the texture filename postfix: - - Normal Maps: _n, _nrm, _nrml, _normal, _normals, _normalmap - Specular Maps: _s, _spec, _specular, _specularmap - Light Maps: _l, _light, _lightmap, _occ, _occlusion - Displacement Maps: _dis, _displacement - - The matching is case insensitive. Postfix is taken between the last "_" and last ".". The default behavior is to detect type from lower cased - texture unit name by matching against: normalmap, specularmap, lightmap, and displacementmap. For both cases if no match is found then, - is used. The default value is false. - - - - - Gets the string name used by OgreTextureTypeFromFilenameConfig. - - - - - Constructs a new OgreTextureTypeFromFilenameConfig. - - True if the filename defines texture usage, false otherwise. - - - - Specifies whether the IFC loader skips over IfcSpace elements. IfcSpace elements (and their geometric representations) are used to represent free space in a building story. - - - - - Gets the string name used by IFCSkipSpaceRepresentationsConfig. - - - - - Constructs a new IFCSkipSpaceRepresentationsConfig. - - True if the IfcSpace elements are skipped, false if otherwise. - - - - Specifies whether the IFC loader will use its own, custom triangulation algorithm to triangulate wall and floor meshes. If this is set to false, - walls will be either triangulated by the post process triangulation or will be passed through as huge polygons with faked holes (e.g. holes that are connected - with the outer boundary using a dummy edge). It is highly recommended to leave this property set to true as the default post process has some known - issues with these kind of polygons. - - - - - Gets the string name used by IFCUseCustomTriangulationConfig. - - - - - Constructs a new IFCUseCustomTriangulationConfig. - - True if the loader should use its own triangulation routine for walls/floors, false otherwise. - - - - Specifies the tessellation conic angle for IFC smoothing curves. Accepted range of values is between [5, 120] - - - - - Gets the string name used by IFCSmoothingAngleConfig. - - - - - Constructs a new IFCSmoothingAngleConfig. - - Smoothing angle when tessellating curves. Needs to be in the range of [5, 120]. - - - - Specifies the tessellation for IFC cylindrical shapes. E.g. the number of segments used to approximate a circle. Accepted range of values is between [3, 180]. - - - - - Gets the string name used by IFCCylindricalTessellationConfig. - - - - - Constructs a new IFCCylindricalTessellationConfig. - - Tessellation of cylindrical shapes (e.g. the number of segments used to approximate a circle). Needs to be in the range of [3, 180]. - - - - Specifies whether the collada loader will ignore the up direction. Default is false. - - - - - Gets the string name used by ColladaIgnoreUpDirectionConfig. - - - - - Constructs a new ColladaIgnoreUpDirectionConfig. - - True if the loader should ignore the up direction, false otherwise. - - - - Specifies whether the FBX importer will merge all geometry layers present in the source file or import only the first. Default is true. - - - - - Gets the string name used by FBXImportAllGeometryLayersConfig. - - - - - Constructs a new FBXImportAllGeometryLayersConfig. - - True if all geometry layers should be merged, false otherwise to take only the first layer. - - - - Specifies whether the FBX importer will import all materials present in the source file or take only the referenced materials, - if the importer is configured to import materials at all. Otherwise this will have no effect. Default is false. - - - - - Gets the string name used by FBXImportAllMaterialsConfig. - - - - - Constructs a new FBXImportAllMaterialsConfig. - - True if the FBX importer should import ALL materials even if not referenced, false otherwise (take only the referenced materials). - - - - Specifies whether the FBX importer will import materials. Default is true. - - - - - Gets the string name used by FBXImportMaterialsConfig. - - - - - Constructs a new FBXImportMaterialsConfig. - - True if the FBX importer should import materials, false otherwise. - - - - Specifies whether the FBX importer will import embedded textures. Default is true. - - - - - - Gets the string name used by FBXImportEmbeddedTexturesConfig. - - - - - Constructs a new FBXImportEmbeddedTexturesConfig. - - True if the FBX importer should import embedded textures, false otherwise. - - - - Specifies if the FBX importer should search for embedded loaded textures, where no embedded texture data is provided. Default is false. - - - - - Gets the string name used by FBXImportSearchEmbeddedTexturesConfig. - - - - - Constructs a new FBXImportSearchEmbeddedTexturesConfig. - - True if the FBX importer should search for embedded loaded textures, where no embedded texture data is provided. - - - - Specifies whether the FBX importer will import cameras. Default is true. - - - - - Gets the string name used by FBXImportCamerasConfig. - - - - - Constructs a new FBXImportCamerasConfig. - - True if the FBX importer should import cameras, false otherwise. - - - - Specifies whether the FBX importer will import lights. Default is true. - - - - - Gets the string name used by FBXImportLightsConfig. - - - - - Constructs a new FBXImportLightsConfig. - - True if the FBX importer should import lights, false otherwise. - - - - Specifies whether the FBX importer will import animations. Default is true. - - - - - Gets the string name used by FBXImportAnimationsConfig. - - - - - Constructs a new FBXImportAnimationsConfig. - - True if the FBX importer should import animations, false otherwise. - - - - Specifies whether the FBX importer will act in strict mode in which only the FBX 2013 - format is supported and any other sub formats are rejected. FBX 2013 is the primary target for the importer, so this - format is best supported and well-tested. Default is false. - - - - - Gets the string name used by FBXStrictModeConfig. - - - - - Constructs a new FBXStrictModeConfig. - - True if FBX strict mode should be used, false otherwise. - - - - Specifies whether the FBX importer will preserve pivot points for transformations (as extra nodes). If set to false, pivots - and offsets will be evaluated whenever possible. Default value is true. - - - - - Gets the string name used by FBXPreservePivotsConfig. - - - - - Constructs a new FBXPreservePivotsConfig. - - True if pivots should be preserved, false otherwise. - - - - Specifies whether the importer will drop empty animation curves or animation curves which match the bind pose - transformation over their entire defined range. Default value is true. - - - - - Gets the string name used by FBXOptimizeEmptyAnimationCurvesConfig. - - - - - Constructs a new FBXOptimizeEmptyAnimationCurvesConfig. - - True if empty animation curves should be dropped, false otherwise. - - - - Specifies if the X-file exporter should use 64-bit doubles rather than 32-bit floats. - - - - - Gets the string name used by XFileUseDoublesConfig. - - - - - Constructs a new XFileUseDoublesConfig. - - True if the x file uses 64-bit double values rather than 32-bit float values. - - - - Represents an embedded texture. Some file formats directly embed texture assets. - Embedded textures may be uncompressed, where the data is given in an uncompressed format. - Or it may be compressed in a format like png or jpg. In the latter case, the raw - file bytes are given so the application must utilize an image decoder (e.g. DevIL) to - get access to the actual color data. This object represents both types, so some properties may or may not be valid depending - if it is compressed or not. - - - - - Gets if the texture is compressed or not. - - - - - Gets the width of the texture in pixels. Only valid for non-compressed textures. - - - - - Gets the height of the texture in pixels. Only valid for non-compressed textures. - - - - - Gets if the texture has non-compressed texel data. Only valid for non-compressed textures. - - - - - Gets the size of the non-compressed texel data. Only valid for non-compressed textures. - - - - - Gets the non-compressed texel data, the array is of size Width * Height. Only valid for non-compressed textures. - - - - - Gets if the embedded texture has compressed data. Only valid for compressed textures. - - - - - Gets the size of the compressed data. Only valid for compressed textures. - - - - - Gets the raw byte data representing the compressed texture. Only valid for compressed textures. - - - - - Gets the format hint to determine the type of compressed data. This hint - is a three-character lower-case hint like "dds", "jpg", "png". - - - - - Constructs a new instance of the class. Should use only if - reading from a native value. - - - - - Constructs a new instance of the class. This creates a compressed - embedded texture. - - The 3 character format hint. - The compressed data. - - - - Constructs a new instance of the class. This creates an uncompressed - embedded texture. - - Width of the texture - Height of the texture - Color data - Thrown if the data size does not match width * height. - - - - Gets if the native value type is blittable (that is, does not require marshaling by the runtime, e.g. has MarshalAs attributes). - - - - - Writes the managed data to the native value. - - Optional pointer to the memory that will hold the native value. - Output native value - - - - Reads the unmanaged data from the native value. - - Input native value - - - - Frees unmanaged memory created by . - - Native value to free - True if the unmanaged memory should be freed, false otherwise. - - - - Enumerates metadata data types. - - - - - Metadata is a boolean. - - - - - Metadata is an integer. - - - - - Metadata is an unsigned 64-bit integer. - - - - - Metadata is a float. - - - - - Metadata is a double. - - - - - Metadata is a string. - - - - - Metadata is a . - - - - - Post processing flag options, specifying a number of steps - that can be run on the data to either generate additional vertex - data or optimize the imported data. - - - - - No flags enabled. - - - - - Calculates the tangents and binormals (bitangents) - for the imported meshes. - - This does nothing if a mesh does not have normals. You might - want this post processing step to be executed if you plan - to use tangent space calculations such as normal mapping. There is a - config setting AI_CONFIG_PP_CT_MAX_SMOOTHING_ANGLE which - allows you to specify a maximimum smoothing angle for the algorithm. - However, usually you'll want to leave it at the default value. - - - - - - Identifies and joins identical vertex data sets within all - imported meshes. - - After this step is run each mesh does contain only unique vertices - anymore, so a vertex is possibly used by multiple faces. You usually - want to use this post processing step. If your application deals with - indexed geometry, this step is compulsory or you'll just waste rendering - time. - If this flag is not specified, no vertices are referenced by more than one - face and no index buffer is required for rendering. - - - - - Converts all imported data to a left handed coordinate space. - - By default the data is returned in a right-handed coordinate space, - where +X points to the right, +Z towards the viewer, and +Y upwards. - - - - - Triangulates all faces of all meshes. - - By default the imported mesh data might contain faces with more than - three indices. For rendering you'll usually want all faces to - be triangles. This post processing step splits up all - higher faces to triangles. Line and point primitives are *not* - modified. If you want 'triangles only' with no other kinds of primitives, - try the following: - - - - Specify both and . - - - Ignore all point and line meshes when you process Assimp's output - - - - - - - Removes some parts of the data structure (animations, materials, - light sources, cameras, textures, vertex components). - - The components to be removed are specified in a separate configuration - option, AI_CONFIG_PP_RVC_FLAGS. This is quite useful if you don't - need all parts of the output structure. Especially vertex colors are rarely used today...calling this step to remove - unrequired stuff from the pipeline as early as possible results in an increased - performance and a better optimized output data structure. - - - This step is also useful if you want to force Assimp to recompute normals - or tangents. the corresponding steps don't recompute them if they're already - there (loaded from the source asset). By using this step you can make sure - they are NOT there. - - - - - Generates normals for all faces of all meshes. It may not be - specified together with . - - This is ignored if normals are already there at the time where this - flag is evaluated. Model importers try to load them from the source file, - so they're usually already there. Face normals are shared between all - points of a single face, so a single point can have multiple normals, - which in other words, forces the library to duplicate vertices in - some cases. This makes senseless then. - - - - - - Generates smooth normals for all vertices of all meshes. It - may not be specified together with . - - This is ignored if normals are already there at the time where - this flag is evaluated. Model importers try to load them from the - source file, so they're usually already there. - - The configuration option AI_CONFIG_PP_GSN_MAX_SMOOTHING_ANGLE - allows you to specify an angle maximum for the normal smoothing algorithm. - Normals exceeding this limit are not smoothed, resulting in a 'hard' seam - between two faces. using a decent angle here (e.g. 80 degrees) results in a very good visual - appearance. - - - - - Splits large meshes into smaller submeshes. - - This is useful for realtime rendering where the number - of triangles which can be maximally processed in a single draw call is - usually limited by the video driver/hardware. The maximum vertex buffer - is usually limited, too. Both requirements can be met with this step: - you may specify both a triangle and a vertex limit for a single mesh. - - The split limits can be set through the AI_CONFIG_PP_SLM_VERTEX_LIMIT - and AI_CONFIG_PP_SLM_TRIANGLE_LIMIT config settings. The default - values are 1,000,000. - - Warning: This can be a time consuming task. - - - - - Removes the node graph and "bakes" (pre-transforms) all - vertices with the local transformation matrices of their nodes. - The output scene does still contain nodes, however, there is only - a root node with children, each one referencing only one mesh. - Each mesh referencing one material. For rendering, you can simply render - all meshes in order, you don't need to pay attention to local transformations - and the node hierarchy. - - Warning: Animations are removed during this step. - - - - - Limits the number of bones simultaneously affecting a single - vertex to a maximum value. - - If any vertex is affected by more than that number of bones, - the least important vertex weights are removed and the remaining vertex - weights are re-normalized so that the weights still sum up to 1. - - The default bone weight limit is 4 and uses the - AI_LMW_MAX_WEIGHTS config. If you intend to perform the skinning in hardware, this post processing - step might be of interest for you. - - - - - Validates the imported scene data structure. - - This makes sure that all indices are valid, all animations - and bones are linked correctly, all material references are - correct, etc. - - It is recommended to capture Assimp's log output if you use this flag, - so you can easily find out what's actually wrong if a file fails the - validation. The validator is quite rude and will find *all* inconsistencies - in the data structure. There are two types of failures: - - - Error: There's something wrong with the imported data. Further - postprocessing is not possible and the data is not usable at all. The import - fails. - - - Warning: There are some minor issues (e.g. 1000000 animation keyframes - with the same time), but further postprocessing and use of the data structure is still - safe. Warning details are written to the log file. - - - - - - - Re-orders triangles for better vertex cache locality. - - This step tries to improve the ACMR (average post-transform vertex cache - miss ratio) for all meshes. The implementation runs in O(n) time - and is roughly based on the 'tipsify' algorithm. - - If you intend to render huge models in hardware, this step might be of interest for you. - The AI_CONFIG_PP_ICL_PTCACHE_SIZE config setting can be used to fine tune - the cache optimization. - - - - - Searches for redundant/unreferenced materials and removes them. - - This is especially useful in combination with the PreTransformVertices - and OptimizeMeshes flags. Both join small meshes with equal characteristics, but - they can't do their work if two meshes have different materials. Because several - material settings are always lost during Assimp's import filders and because many - exporters don't check for redundant materials, huge models often have materials which - are defined several times with exactly the same settings. - - Several material settings not contributing to the final appearance of a surface - are ignored in all comparisons ... the material name is one of them. So, if you're passing - additional information through the content pipeline (probably using *magic* material names), - don't specify this flag. Alternatively, take a look at the AI_CONFIG_PP_RRM_EXCLUDE_LIST - setting. - - - - - This step tries to determine which meshes have normal vectors - that are facing inwards. - - The algorithm is simple but effective: - - The bounding box of all vertices and their normals are compared - against the volume of the bounding box of all vertices without their normals. - This works well for most objects, problems might occur with planar surfaces. However, - the step tries to filter such cases. The step inverts all in-facing normals. - Generally, it is recommended to enable this step, although the result is not - always correct. - - - - - This step splits meshes with more than one primitive type in homogeneous submeshes. - - This step is executed after triangulation and after it returns, just one - bit is set in aiMesh:mPrimitiveTypes. This is especially useful for real-time - rendering where point and line primitives are often ignored or rendered separately. - - - You can use AI_CONFIG_PP_SBP_REMOVE option to specify which primitive types you need. - This can be used to easily exclude lines and points, which are rarely used, - from the import. - - - - - - This step searches all meshes for degenerated primitives and - converts them to proper lines or points. A face is 'degenerated' if one or more of its points are identical. - - To have degenerated primitives removed, specify the flag - try one of the following procedures: - - - - To support lines and points: Set the - AI_CONFIG_PP_FD_REMOVE option to one. This will cause the step to remove degenerated triangles as - soon as they are detected. They won't pass any further pipeline steps. - - - If you don't support lines and points: Specify flag, which - will move line and point primitives to separate meshes. Then set the AI_CONFIG_PP_SBP_REMOVE - option to and to cause step - to reject point and line meshes from the scene. - - - - Degenerated polygons are not necessarily evil and that's why they are not removed by default. There are several - file formats which do not support lines or points where exporters bypass the format specification and write - them as degenerated triangles instead. - - - - - - This step searches all meshes for invalid data, such as zeroed - normal vectors or invalid UV coordinates and removes or fixes them. - This is intended to get rid of some common exporter rrors. - - This is especially useful for normals. If they are invalid, - and the step recognizes this, they will be removed and can later - be recomputed, e.g. by the GenerateSmoothNormals flag. The step - will also remove meshes that are infinitely small and reduce animation - tracks consisting of hundreds of redundant keys to a single key. The - AI_CONFIG_PP_FID_ANIM_ACCURACY config property decides the accuracy of the check - for duplicate animation tracks. - - - - - This step converts non-UV mappings (such as spherical or - cylindrical mapping) to proper texture coordinate channels. - - Most applications will support UV mapping only, so you will - probably want to specify this step in every case. Note that Assimp - is not always able to match the original mapping implementation of the 3D - app which produced a model perfectly. It's always better - to let the father app compute the UV channels, at least 3DS max, maya, blender, - lightwave, modo, .... are able to achieve this. - - If this step is not requested, you'll need to process the MATKEY_MAPPING - material property in order to display all assets properly. - - - - - Applies per-texture UV transformations and bakes them to stand-alone vtexture - coordinate channels. - - UV Transformations are specified per-texture - see the MATKEY_UVTRANSFORM material - key for more information. This step processes all textures with transformed input UV coordinates - and generates new (pretransformed) UV channel transformations, so you will probably - want to specify this step. - - UV transformations are usually implemented in realtime apps by - transforming texture coordinates in a vertex shader stage with a 3x3 (homogenous) - transformation matrix. - - - - - Searches for duplicated meshes and replaces them with a reference - to the first mesh. - - This is time consuming, so don't use it if you have no time. Its - main purpose is to work around the limitation with some - file formats that don't support instanced meshes, so exporters - duplicate meshes. - - - - - - Attempts to reduce the number of meshes (and draw calls). - - This is recommended to be used together with - and is fully compatible with both and . - - - - - - Optimizes scene hierarchy. Nodes with no animations, bones, - lights, or cameras assigned are collapsed and joined. - - Node names can be lost during this step, you can specify - names of nodes that should'nt be touched or modified - with AI_CONFIG_PP_OG_EXCLUDE_LIST. - - Use this flag with caution. Most simple files will be collapsed to a - single node, complex hierarchies are usually completely lost. That's not - the right choice for editor environments, but probably a very effective - optimization if you just want to get the model data, convert it to your - own format and render it as fast as possible. - - This flag is designed to be used with for best - results. - - Scenes with thousands of extremely small meshes packed - in deeply nested nodes exist for almost all file formats. - Usage of this and usually fixes them all and - makes them renderable. - - - - - Flips all UV coordinates along the y-axis - and adjusts material settings/bitangents accordingly. - - - - - Flips face winding order from CCW (default) to CW. - - - - - Splits meshes with many bones into submeshes so that each submesh has fewer or as many bones as a given limit. - - - - - Removes bones losslessly or according to some threshold. In some cases (e.g. formats that require it) exporters - are faced to assign dummy bone weights to otherwise static meshes assigned to animated meshes. Full, weight-based skinning is expensive while - animating nodes is extremely cheap, so this step is offered to clean up the data in that regard. - - Usage of the configuration AI_CONFIG_PP_DB_THRESHOLD to control the threshold and AI_CONFIG_PP_DB_ALL_OR_NONE if you want bones - removed if and only if all bones within the scene qualify for removal. - - - - - This step will perform a global scale of the model. Some importers provide a mechanism to define a scaling unit for the model, which this processing step can utilize. - Use AI_CONFIG_GLOBAL_SCALE_FACTOR_KEY to control this. - - - - - Enumerates components of the scene or mesh data that - can be excluded from the import using the post process step - RemoveComponent. - - - - - No components to be excluded. - - - - - Removes normal vectors - - - - - Removes tangents/binormals - - - - - Removes all color sets. - - - - - Removes all texture UV sets. - - - - - Remove all boneweights from all meshes. Scenegraph - nodes corresponding to the bones are NOT removed. - Use OptimizeGraph step to remove them. - - - - - Removes all node animations. Coressponding scenegraph - nodes are NOT removed. Use OptimizeGraph step to - remove them. - - - - - Removes all embedded textures. - - - - - Removes all light sources. The corresponding scenegraph nodes are - NOT removed. Use the OptimizeGraph step to do this. - - - - - Removes all cameras. The corresponding scenegraph - nodes are NOT removed. Use the OptimizeGraph step - to do this. - - - - - Removes all meshes. - - - - - Removes all materials. One default material will be generated. - - - - - Enumerates geometric primitive types. - - - - - Point primitive. This is just a single vertex - in the virtual world. A face has one index for such a primitive. - - - - - Line primitive. This is a line defined through a start and an - end position. A face contains exactly two indices for such a primitive. - - - - - Triangle primitive, consisting of three indices. - - - - - A n-Gon that has more than three edges (thus is not a triangle). - - - - - Defines an animation channel behaves outside the defined - time range. This corresponds to the prestate and poststates - of the animation node. - - - - - The value from the default node transformation is taken. - - - - - The nearest key value is used without interpolation. - - - - - The value of the nearest two keys is linearly extrapolated for the current - time value. - - - - - The animation is repeated. If the animation key goes from n to m - and the current time is t, use the value at (t - n ) % (|m-n|). - - - - - Defines the methods of mesh morphing supported. - - - - - No morphing. - - - - - Interpolation between morph targets. - - - - - Normalized morphing between morph targets. - - - - - Relative morphing between morph targets. - - - - - Enumerates all supported light sources. - - - - - Unknown light. - - - - - Directional light source that has a well-defined - direction but is infinitely far away, e.g. the sun. - - - - - Point light source that has a well-defined position in - space but is omni-directional, e.g. a light bulb. - - - - - Spot light source emits light from a position in space, - in a certain direction that is limited by an angle, like - a cone. - - - - - Generic light level of the world, including the bounces of all other light sources. Typically, there's at most one ambient light in a scene and - is usually just a constant color. This light does not have a valid position, direction, or other properties - just the color. - - - - - An area light is a rectangle with a predefined size that uniformly emits light from one of its sides. The position is center of the rectangle and the direction is its normal vector. - - - - - Defines alpha blending flags, how the final - color value of a pixel is computed, based on the following equation: - - sourceColor * sourceBlend + destColor * destBlend - - - Where the destColor is the previous color in the frame buffer - and sourceColor is the material color before the - transparency calculation. This corresponds to the AI_MATKEY_BLEND_FUNC property. - - - - - Default blending: sourceColor * sourceAlpha + destColor * (1 - sourceAlpha) - - - - - Additive blending: sourcecolor * 1 + destColor * 1. - - - - - Defines all shading models supported by the library. - - The list of shading modes has been taken from Blender. See Blender - documentation for more information. - - - - - - No shading mode defined. - - - - - Flat shading. Shading is done on a per-face basis and is diffuse only. Also known - as 'faceted shading'. - - - - - Simple Gouraud shading. - - - - - Phong Shading. - - - - - Phong-Blinn Shading. - - - - - Toon-shading, also known as a 'comic' shader. - - - - - OrenNayer shading model. Extension to standard Lambertian shading, taking the roughness - of the material into account. - - - - - Minnaert shading model. Extension to standard Lambertian shading, taking the "darkness" of - the material into account. - - - - - CookTorrance shading model. Special shader for metallic surfaces. - - - - - No shading at all. Constant light influence of 1.0. - - - - - Fresnel shading. - - - - - Defines some mixed flags for a particular texture. This corresponds - to the AI_MAT_KEY_TEXFLAGS property. - - - - - The texture's color values have to be inverted (componentwise 1-n). - - - - - Explicit request to the application to process the alpha channel of the texture. This is mutually - exclusive with . These flags are - set if the library can say for sure that the alpha channel is used/is not used. - If the model format does not define this, iti s left to the application to decide - whether the texture alpha channel - if any - is evaluated or not. - - - - - Explicit request to the application to ignore the alpha channel of the texture. This is mutually - exclusive with . - - - - - Defines how UV coordinates outside the [0..1] range are handled. Commonly - referred to as the 'wrapping mode' - - - - - A texture coordinate u|v is translated to u % 1| v % 1. - - - - - Texture coordinates outside [0...1] are clamped to the nearest valid value. - - - - - A texture coordinate u|v becomes u1|v1 if (u - (u % 1)) % 2 is zero - and 1 - (u % 1) | 1 - (v % 1) otherwise. - - - - - If the texture coordinates for a pixel are outside [0...1] the texture is not - applied to that pixel. - - - - - Defines how texture coordinates are generated - - Real-time applications typically require full UV coordinates. So the use - of step is highly recommended. - It generates proper UV channels for non-UV mapped objects, as long as an accurate - description of how the mapping should look like is given. - - - - - - Coordinates are taken from the an existing UV channel. - - The AI_MATKEY_UVWSRC key specifies from the UV channel the texture coordinates - are to be taken from since meshes can have more than one UV channel. - - - - - - Spherical mapping - - - - - Cylinder mapping - - - - - Cubic mapping - - - - - Planar mapping - - - - - Unknown mapping that is not recognied. - - - - - Defines how the Nth texture of a specific type is combined - with the result of all previous layers. - - Example (left: key, right: value): - - DiffColor0 - gray - DiffTextureOp0 - TextureOperation.Multiply - DiffTexture0 - tex1.png - DiffTextureOp0 - TextureOperation.Add - DiffTexture1 - tex2.png - - - Written as an equation, the final diffuse term for a specific - pixel would be: - - - diffFinal = DiffColor0 * sampleTex(DiffTexture0, UV0) + sampleTex(DiffTexture1, UV0) * diffContrib; - - - - - - - T = T1 * T2 - - - - - T = T1 + T2 - - - - - T = T1 - T2 - - - - - T = T1 / T2 - - - - - T = (T1 + T2) - (T1 * T2) - - - - - T = T1 + (T2 - 0.5) - - - - - Defines the purpose of a texture. - - - - - No texture, but the value can be used as a 'texture semantic'. - - - - - A diffuse texture that is combined with the result of the diffuse lighting equation. - - - - - A specular texture that is combined with the result of the specular lighting equation. - - - - - An ambient texture that is combined with the ambient lighting equation. - - - - - An emissive texture that is added to the result of the lighting calculation. It is not influenced - by incoming light, instead it represents the light that the object is naturally emitting. - - - - - A height map texture. by convention, higher gray-scale values stand for - higher elevations from some base height. - - - - - A tangent-space normal map. There are several conventions for normal maps - and Assimp does (intentionally) not distinguish here. - - - - - A texture that defines the glossiness of the material. This is the exponent of the specular (phong) - lighting equation. Usually there is a conversion function defined to map the linear color values - in the texture to a suitable exponent. - - - - - The texture defines per-pixel opacity. usually 'white' means opaque and 'black' means 'transparency. Or quite - the opposite. - - - - - A displacement texture. The exact purpose and format is application-dependent. Higher color values stand for higher vertex displacements. - - - - - A lightmap texture (aka Ambient occlusion). Both 'lightmaps' and dedicated 'ambient occlusion maps' are covered by this material property. The - texture contains a scaling value for the final color value of a pixel. Its intensity is not affected by incoming light. - - - - - A reflection texture. Contains the color of a perfect mirror reflection. This is rarely used, almost never for real-time applications. - - - - - An unknown texture that does not mention any of the defined texture type definitions. It is still imported, but is excluded from any - further postprocessing. - - - - - Defines the state of the imported scene data structure. - - - - - Default state of the scene, it imported successfully. - - - - - Specifies that the scene data structure that was imported is not complete. - This flag bypasses some internal validations and allows the import - of animation skeletons, material libaries, or camera animation paths - using Assimp. Most applications won't support such data. - - - - - This flag is set by the - post process step if validation is successful. In a validated scene you can be sure that any - cross references in the data structure (e.g. vertex indices) are valid. - - - - - This flag is set by the - post process step if validation is successful, but some issues have been found. This can for example - mean that a texture that does not exist is referenced by a material or that the bone weights for a vertex - do not sum to 1.0. In most cases you should still be able to use the import. This flag can be useful - for applications which do not capture Assimp's log output. - - - - - This flag is set by the post process step. - It indicates that the vertices of the output mesh are not in the internal verbose format anymore. In the - verbose format, all vertices are unique where no vertex is ever referenced by more than one face. - - - - - Denotes the scene is pure height-map terrain data. Pure terrains usually consist of quads, sometimes triangles, - in a regular grid. The x,y coordinates of all vertex positions refer to the x,y coordinates on the terrain height map, the - z-axis stores the elevation at a specific point. - - TER (Terragen) and HMP (3D Game Studio) are height map formats. - - - - - - Specifies that the scene data can be shared between structures. For example: one vertex in a few faces. This differs from as - that has internal meanings about postprocessing steps. - - - - - Enumerates Assimp function result codes. - - - - - Function returned successfully. - - - - - There was an error. - - - - - Assimp ran out of memory. - - - - - Seek origins for Assimp's virtual file system API. - - - - - Beginning of the file - - - - - Current position of the file pointer. - - - - - End of the file, offsets must be negative. - - - - - Enumerates predefined log streaming destinations. - - - - - Stream log to a file - - - - - Stream log to the standard output - - - - - Stream log to the standard error output. - - - - - MSVC only: Stream the log to the debugger (this relies - on OutputDebugString from the Win32 SDK). - - - - - Defines material property types. - - - - - Array of single-precision (32 bit) floats. - - - - - Array of double-precision (64 bit) floats. - - - - - Property is a string. - - - - - Array of 32 bit integers. - - - - - Byte buffer where the content is undefined. - - - - - Enumerates how the native Assimp DLL was compiled - - - - - Assimp compiled as a shared object (Windows: DLL); - - - - - Assimp was compiled against STLport - - - - - Assimp was compiled as a debug build - - - - - Assimp was compiled with the boost work around. - - - - - Assimp was compiled built to run single threaded. - - - - - Defines how UV coordinates should be transformed. - - - - - Scaling is evaluated. - - - - - Rotation is evaluated. - - - - - Translation is evaluated. - - - - - Defines the desired file I/O mode is when opening a new file. - - - - - Open the file for writing. - - - - - Open the file for writing binary data to it. - - - - - Open the file for writing text data to it. - - - - - Open the file for reading. - - - - - Open the file for reading binary data from it. - - - - - Open the file for reading text data from it. - - - - - Defines flags that indicate level of support for common features for a given importer. - - - - - Indicates there is a textual encoding of the file format and it is supported. - - - - - Indicates there is a binary encoding of the file format and it is supported. - - - - - Indicates there is a compressed encoding of the file format and it is supported. - - - - - Indicates that the importer reads only a very particular subset of the file format. This is common - for formats that cannot easily be mapped to the Scene data structure. - - - - - Indicates that the importer is experimental and used with caution - this is only reserved for importers still in - development, and not typically yet in released production code. - - - - - Describes a blob of exported scene data. Blobs can be nested - each blob may reference another blob, which in - turn can reference another and so on. This is used to allow exporters to write more than one output for a given - scene, such as material files. Existence of such files depends on the format. - - - The stream representation of an ExportDataBlob is as follows: - - String: Name of the Blob - int: Length of Binary Data - byte[]: Binary Data - bool: If has next data blob - String: Name of nested blob - int: Length of nested blob binary data - byte[]: Nested blob binary data - bool: If nested blob has next data blob - .... - - - - - - Gets the name of the blob. The first and primary blob always has an empty string for a name. Auxillary files - that are nested will have names. - - - - - Get the blob data. - - - - - Gets the next data blob. - - - - - Gets if the blob data is valid. - - - - - Creates a new ExportDataBlob. - - Unmanaged structure. - - - - Creates a new ExportDataBlob. - - Name - Data - - - - Writes the data blob to the specified stream. - - Output stream - - - - Reads a data blob from the specified stream. - - Input stream - Data blob - - - - Describes a file format which Assimp can export to. - - - - - Gets a short string ID to uniquely identify the export format. E.g. "collada" or "obj". - - - - - Gets a short description of the file format to present to users. - - - - - Gets the recommended file extension for the exported file in lower case. - - - - - Constructs a new ExportFormatDescription. - - Unmanaged structure - - - - A single face in a mesh, referring to multiple vertices. This can be a triangle - if the index count is equal to three, or a polygon if the count is greater than three. - - Since multiple primitive types can be contained in a single mesh, this approach - allows you to better examine how the mesh is constructed. If you use the - post process step flag during import, then each mesh will be homogenous where primitive type is concerned. - - - - - Gets the number of indices defined in the face. - - - - - Gets if the face has faces (should always be true). - - - - - Gets or sets the indices that refer to positions of vertex data in the mesh's vertex - arrays. - - - - - Constructs a new instance of the class. - - - - - Constructs a new instance of the class. - - Face indices - - - - Gets if the native value type is blittable (that is, does not require marshaling by the runtime, e.g. has MarshalAs attributes). - - - - - Writes the managed data to the native value. - - Optional pointer to the memory that will hold the native value. - Output native value - - - - Reads the unmanaged data from the native value. - - Input native value - - - - Frees unmanaged memory created by . - - Native value to free - True if the unmanaged memory should be freed, false otherwise. - - - - Simple implementation of an IOSystem that searches for files on the disk. This implementation - can be given a number of search directories that it will attempt to locate the file in first, before - using the file path given by Assimp. That way, you can load models that have files distributed in a number of other - directories besides the root model's. - - - - - Constructs a new FileIOSystem that does not have any search directories. - - - - - Constructs a new FileIOSystem that uses the specified search directories. - - Search directories to search for files in - - - - Sets the search directories the FileIOSystem will use when searching for files. - - Directory paths - - - - Gets the search directories the FileIOSystem is using. - - Directory paths - - - - Opens a stream to a file. - - Path to the file - Desired file access mode - The IO stream - - - - Finds the first file that matches the file name (name + extension) in the search paths. - - File name (+ extension) to search for - Found file path - True if the file was found, false otherwise - - - - Wraps a FileStream. - - - - - Metadata and feature support information for a given importer. - - - - - Gets the name of the importer (e.g. Blender3D Importer) - - - - - Gets the original author (blank if unknown or assimp team). - - - - - Gets the name of the current maintainer, if empty then the author maintains. - - - - - Gets any implementation comments. - - - - - Gets the features supported by the importer. - - - - - Gets the minimum version of the file format supported. If no version scheme, forwards compatible, or importer doesn't care, major/min will be zero. - - - - - Gets the maximum version of the file format supported. If no version scheme, forwards compatible, or importer doesn't care, major/min will be zero. - - - - - Gets the list of file extensions the importer can handle. All entries are lower case and do NOT have a leading dot. - - - - - Represents an object that can be marshaled to and from a native representation. - - Managed object type - Native value type - - - - Gets if the native value type is blittable (that is, does not require marshaling by the runtime, e.g. has MarshalAs attributes). - - - - - Writes the managed data to the native value. - - Optional pointer to the memory that will hold the native value. - Output native value - - - - Reads the unmanaged data from the native value. - - Input native value - - - - Custom marshaler for usage with the for performing marshaling - to-and-from unmanaged memory for non-blittable types. A type must be attributed with - to automatically have an instance of its marshaler be utilized. - - - - - Gets the native data size in bytes. - - - - - Marshals the managed object to the unmanaged chunk of memory. - - Managed object to marshal. - Unmanaged chunk of memory to write to. - - - - Marshals the managed object from the unmanaged chunk of memory. - - Unmanaged chunk of memory to read from. - Managed object marshaled. - - - - Defines a stream to some file input or output source. This object is responsible for reading/writing data - that is used by Assimp. - - - - - Gets whether or not this IOStream has been disposed. - - - - - Gets the original path to file given by Assimp. - - - - - Gets the original desired file access mode. - - - - - Gets whether the stream is in fact valid - that is, the input/output has been - properly located and can be read/written. - - - - - Constructs a new IOStream. - - Path to file given by Assimp - Desired file access mode - - - - Finalizes an instance of the class. - - - - - Disposes of resources held by the IOStream. - - - - - Releases unmanaged and - optionally - managed resources. - - True to release both managed and unmanaged resources; False to release only unmanaged resources. - - - - Writes data to the stream. - - Data to write - Number of bytes to write - Number of bytes actually written. Should be equal to the specified count, unless if EoF was hit or an error occured. - - - - Reads data from the stream. - - Byte buffer to store the read data in - Number of bytes to read - Number of bytes actually read. Should be equal to the specified count, unless if EoF was hit or an error occured. - - - - Sets the current file position pointer. - - Offset in bytes from the origin - Origin reference - ReturnCode indicating success or failure. - - - - Gets the current file position pointer (in bytes). - - Current file position pointer (in bytes) - - - - Gets the total file size (in bytes). - - File size in bytes - - - - Flushes all data currently in the stream buffers. - - - - - Closes the stream - flushing any data not yet read/written and disposes of resources. - - - - - Defines a custom IO handler that can be registered to an importer that will handle I/O for assimp. This includes searching/opening - files to read during import, and creating/writing to files during export. - - - - - Gets whether or not this IOSystem has been disposed. - - - - - Gets the number of currently opened streams. - - - - - Constructs a new IOSystem. - - - - - Finalizes an instance of the class. - - - - - Opens a stream to a file. - - Path to the file - Desired file access mode - The IO stream - - - - Closes a stream that is owned by this IOSystem. - - Stream to close - - - - Closes all outstanding streams owned by this IOSystem. - - - - - Disposes of all resources held by this object. - - - - - Releases unmanaged and - optionally - managed resources. - - True to release both managed and unmanaged resources; False to release only unmanaged resources. - - - - Describes a light source in the scene. Assimp supports multiple light sources - including spot, point, and directional lights. All are defined by a single structure - and distinguished by their parameters. Lights have corresponding nodes in the scenegraph. - Some file formats such as 3DS and ASE export a "target point", e.g. the point - a spot light is looking at (it can even be animated). Assimp writes the target point as a subnode - of a spotlight's main node called "spotName.Target". However, this is just additional information - then, the transform tracks of the main node make the spot light already point in the right direction. - - - - - Gets or sets the name of the light source. This corresponds to a node present in the scenegraph. - - - - - Gets or sets the type of light source. This should never be undefined. - - - - - Gets or sets the inner angle of a spot light's light cone. The spot light has - maximum influence on objects inside this angle. The angle is given in radians, it - is 2PI for point lights and defined for directional lights. - - - - - Gets or sets the outer angle of a spot light's light cone. The spot light does not affect objects outside - this angle. The angle is given in radians. It is 2PI for point lights and undefined for - directional lights. The outer angle must be greater than or equal to the inner angle. - - - - - Gets or sets the constant light attenuation factor. The intensity of the light source - at a given distance 'd' from the light position is Atten = 1 / (att0 + att1 * d + att2 * d*d). - This member corresponds to the att0 variable in the equation and is undefined for directional lights. - - - - - Gets or sets the linear light attenuation factor. The intensity of the light source - at a given distance 'd' from the light position is Atten = 1 / (att0 + att1 * d + att2 * d*d) - This member corresponds to the att1 variable in the equation and is undefined for directional lights. - - - - - Gets or sets the quadratic light attenuation factor. The intensity of the light source - at a given distance 'd' from the light position is Atten = 1 / (att0 + att1 * d + att2 * d*d). - This member corresponds to the att2 variable in the equation and is undefined for directional lights. - - - - - Gets or sets the position of the light source in space, relative to the - transformation of the node corresponding to the light. This is undefined for - directional lights. - - - - - Gets or sets the direction of the light source in space, relative to the transformation - of the node corresponding to the light. This is undefined for point lights. - - - - - Gets or sets the up vector of the light source in space, relative to the transformation of the node corresponding to the light. - This is undefined for point lights. - - - - - Gets or sets the diffuse color of the light source. The diffuse light color is multiplied with - the diffuse material color to obtain the final color that contributes to the diffuse shading term. - - - - - Gets or sets the specular color of the light source. The specular light color is multiplied with the - specular material color to obtain the final color that contributes to the specular shading term. - - - - - Gets or sets the ambient color of the light source. The ambient light color is multiplied with the ambient - material color to obtain the final color that contributes to the ambient shading term. - - - - - Gets or sets the Width (X) and Height (Y) of the area that represents an light. - - - - - Constructs a new instance of the class. - - - - - Gets if the native value type is blittable (that is, does not require marshaling by the runtime, e.g. has MarshalAs attributes). - - - - - Writes the managed data to the native value. - - Optional pointer to the memory that will hold the native value. - Output native value - - - - Reads the unmanaged data from the native value. - - Input native value - - - - Frees unmanaged memory created by . - - Native value to free - True if the unmanaged memory should be freed, false otherwise. - - - - Callback delegate for Assimp's LogStream. - - Log message - Supplied user data - - - - Represents a log stream, which receives all log messages and streams them somewhere. - - - - - Gets or sets, if verbose logging is enabled globally. - - - - - Gets or sets the user data to be passed to the callback. - - - - - Gets whether the logstream has been disposed or not. - - - - - Gets whether or not the logstream is currently attached to the library. - - - - - Static constructor. - - - - - Constructs a new LogStream. - - - - - Constructs a new LogStream. - - User-supplied data - - - - Constructs a new LogStream. - - Logging callback that is called when messages are received by the log stream. - - - - Constructs a new LogStream. - - Logging callback that is called when messages are received by the log stream. - User-supplied data - - - - Finalizes an instance of the class. - - - - - Detaches all active logstreams from the library. - - - - - Gets all active logstreams that are currently attached to the library. - - Collection of active logstreams attached to the library. - - - - Attaches the logstream to the library. - - - - - Detaches the logstream from the library. - - - - - Logs a message. - - Message contents - - - - Releases unmanaged resources held by the LogStream. This should not be called by the user if the logstream is currently attached to an assimp importer. - - - - - Releases unmanaged and - optionally - managed resources. - - True to release both managed and unmanaged resources; False to release only unmanaged resources. - - - - Override this method to log a message for a subclass of Logstream, if no callback - was set. - - Message - User data - - - - Called when the log stream has been attached to the assimp importer. At this point it may start receiving messages. - - - - - Called when the log stream has been detatched from the assimp importer. After this point it will stop receiving - messages until it is re-attached. - - - - - Log stream that writes messages to the Console. - - - - - Constructs a new console logstream. - - - - - Constructs a new console logstream. - - User supplied data - - - - Log a message to the console. - - Message - Userdata - - - - A material contains all the information that describes how to render a mesh. E.g. textures, colors, and render states. Internally - all this information is stored as key-value pair properties. The class contains many convienence methods and properties for - accessing non-texture/texture properties without having to know the Assimp material key names. Not all properties may be present, - and if they aren't a default value will be returned. - - - - - Gets the number of properties contained in the material. - - - - - Checks if the material has a name property. - - - - - Gets the material name value, if any. Default value is an empty string. - - - - - Checks if the material has a two-sided property. - - - - - Gets if the material should be rendered as two-sided. Default value is false. - - - - - Checks if the material has a shading-mode property. - - - - - Gets the shading mode. Default value is , meaning it is not defined. - - - - - Checks if the material has a wireframe property. - - - - - Gets if wireframe should be enabled. Default value is false. - - - - - Checks if the material has a blend mode property. - - - - - Gets the blending mode. Default value is . - - - - - Checks if the material has an opacity property. - - - - - Gets the opacity. Default value is 1.0f. - - - - - Checks if the material has a bump scaling property. - - - - - Gets the bump scaling. Default value is 0.0f; - - - - - Checks if the material has a shininess property. - - - - - Gets the shininess. Default value is 0.0f; - - - - - Checks if the material has a shininess strength property. - - - - - Gets the shininess strength. Default vaulue is 1.0f. - - - - - Checks if the material has a reflectivty property. - - - - - Gets the reflectivity. Default value is 0.0f; - - - - - Checks if the material has a color diffuse property. - - - - - Gets the color diffuse. Default value is white. - - - - - Checks if the material has a color ambient property. - - - - - Gets the color ambient. Default value is (.2f, .2f, .2f, 1.0f). - - - - - Checks if the material has a color specular property. - - - - - Gets the color specular. Default value is black. - - - - - Checks if the material has a color emissive property. - - - - - Gets the color emissive. Default value is black. - - - - - Checks if the material has a color transparent property. - - - - - Gets the color transparent. Default value is black. - - - - - Checks if the material has a color reflective property. - - - - - Gets the color reflective. Default value is black. - - - - - Gets if the material has a diffuse texture in the first texture index. - - - - - Gets or sets diffuse texture properties in the first texture index. - - - - - Gets if the material has a specular texture in the first texture index. - - - - - Gets or sets specular texture properties in the first texture index. - - - - - Gets if the material has a ambient texture in the first texture index. - - - - - Gets or sets ambient texture properties in the first texture index. - - - - - Gets if the material has a emissive texture in the first texture index. - - - - - Gets or sets emissive texture properties in the first texture index. - - - - - Gets if the material has a height texture in the first texture index. - - - - - Gets or sets height texture properties in the first texture index. - - - - - Gets if the material has a normal texture in the first texture index. - - - - - Gets or sets normal texture properties in the first texture index. - - - - - Gets if the material has an opacity texture in the first texture index. - - - - - Gets or sets opacity texture properties in the first texture index. - - - - - Gets if the material has a displacement texture in the first texture index. - - - - - Gets or sets displacement texture properties in the first texture index. - - - - - Gets if the material has a light map texture in the first texture index. - - - - - Gets or sets light map texture properties in the first texture index. - - - - - Gets if the material has a reflection texture in the first texture index. - - - - - Gets or sets reflection texture properties in the first texture index. - - - - - Constructs a new instance of the class. - - - - - Helper method to construct a fully qualified name from the input parameters. All the input parameters are combined into the fully qualified name: {baseName},{texType},{texIndex}. E.g. - "$clr.diffuse,0,0" or "$tex.file,1,0". This is the name that is used as the material dictionary key. - - Key basename, this must not be null or empty - Texture type; non-texture properties should leave this - Texture index; non-texture properties should leave this zero. - The fully qualified name - - - - Gets the non-texture properties contained in this Material. The name should be - the "base name", as in it should not contain texture type/texture index information. E.g. "$clr.diffuse" rather than "$clr.diffuse,0,0". The extra - data will be filled in automatically. - - Key basename - The material property, if it exists - - - - Gets the material property. All the input parameters are combined into the fully qualified name: {baseName},{texType},{texIndex}. E.g. - "$clr.diffuse,0,0" or "$tex.file,1,0". - - Key basename - Texture type; non-texture properties should leave this - Texture index; non-texture properties should leave this zero. - The material property, if it exists - - - - Gets the material property by its fully qualified name. The format is: {baseName},{texType},{texIndex}. E.g. - "$clr.diffuse,0,0" or "$tex.file,1,0". - - Fully qualified name of the property - The material property, if it exists - - - - Checks if the material has the specified non-texture property. The name should be - the "base name", as in it should not contain texture type/texture index information. E.g. "$clr.diffuse" rather than "$clr.diffuse,0,0". The extra - data will be filled in automatically. - - Key basename - True if the property exists, false otherwise. - - - - Checks if the material has the specified property. All the input parameters are combined into the fully qualified name: {baseName},{texType},{texIndex}. E.g. - "$clr.diffuse,0,0" or "$tex.file,1,0". - - Key basename - Texture type; non-texture properties should leave this - Texture index; non-texture properties should leave this zero. - True if the property exists, false otherwise. - - - - Checks if the material has the specified property by looking up its fully qualified name. The format is: {baseName},{texType},{texIndex}. E.g. - "$clr.diffuse,0,0" or "$tex.file,1,0". - - Fully qualified name of the property - True if the property exists, false otherwise. - - - - Adds a property to this material. - - Material property - True if the property was successfully added, false otherwise (e.g. null or key already present). - - - - Removes a non-texture property from the material. - - Property name - True if the property was removed, false otherwise - - - - Removes a property from the material. - - Name of the property - Property texture type - Property texture index - True if the property was removed, false otherwise - - - - Removes a property from the material. - - Fully qualified name of the property ({basename},{texType},{texIndex}) - True if the property was removed, false otherwise - - - - Removes all properties from the material; - - - - - Gets -all- properties contained in the Material. - - All properties in the material property map. - - - - Gets all the number of textures that are of the specified texture type. - - Texture type - Texture count - - - - Adds a texture to the material - this bulk creates a property for each field. This will - either create properties or overwrite existing properties. If the texture has no - file path, nothing is added. - - Texture to add - True if the texture properties were added or modified - - - - Adds a texture to the material - this bulk creates a property for each field. This will - either create properties or overwrite existing properties. If the texture has no - file path, nothing is added. - - Texture to add - True to only set the texture's file path, false otherwise - True if the texture properties were added or modified - - - - Removes a texture from the material - this bulk removes a property for each field. - If the texture has no file path, nothing is removed - - Texture to remove - True if the texture was removed, false otherwise. - - - - Gets a texture that corresponds to the type/index. - - Texture type - Texture index - Texture description - True if the texture was found in the material - - - - Gets all textures that correspond to the type. - - Texture type - The array of textures - - - - Gets all textures in the material. - - The array of textures - - - - Gets if the native value type is blittable (that is, does not require marshaling by the runtime, e.g. has MarshalAs attributes). - - - - - Writes the managed data to the native value. - - Optional pointer to the memory that will hold the native value. - Output native value - - - - Reads the unmanaged data from the native value. - - Input native value - - - - Frees unmanaged memory created by . - - Native value to free - True if the unmanaged memory should be freed, false otherwise. - - - - A key-value pairing that represents some material property. - - - - - Gets or sets the property key name. E.g. $tex.file. This corresponds to the - "AiMatKeys" base name constants. - - - - - Gets or sets the type of property. - - - - - Gets the raw byte data count. - - - - - Checks if the property has data. - - - - - Gets the raw byte data. To modify/read this data, see the Get/SetXXXValue methods. - - - - - Gets or sets the texture type semantic, for non-texture properties this is always . - - - - - Gets or sets the texture index, for non-texture properties this is always zero. - - - - - Gets the property's fully qualified name. Format: "{base name},{texture type semantic},{texture index}". E.g. "$clr.diffuse,0,0". This - is the key that is used to index the property in the material property map. - - - - - Constructs a new instance of the class. - - - - - Constructs a new instance of the class. Constructs a buffer property. - - Base name of the property - Property value - - - - Constructs a new instance of the class. Constructs a float property. - - Base name of the property - Property value - - - - Constructs a new instance of the class. Constructs an integer property. - - Base name of the property - Property value - - - - Constructs a new instance of the class. Constructs a boolean property. - - Name of the property - Property value - - - - Constructs a new instance of the class. Creates a string property. - - Base name of the property - Property value - - - - Constructs a new instance of the class. Creates a texture property. - - Base name of the property - Property value - Texture type - Texture index - - - - Constructs a new instance of the class. Creates a float array property. - - Base name of the property - Property values - - - - Constructs a new instance of the class. Creates a int array property. - - Base name of the property - Property values - - - - Constructs a new instance of the class. Creates a Color3D property. - - Base name of the property - Property value - - - - Constructs a new instance of the class. Creates a Color4D property. - - Base name of the property - Property value - - - - Gets the property raw data as a float. - - Float - - - - Sets the property raw data with a float. - - Float. - True if successful, false otherwise - - - - Gets the property raw data as a double. - - Double - - - - Sets the property raw data with a double. - - Double. - True if successful, false otherwise. - - - - Gets the property raw data as an integer. - - Integer - - - - Sets the property raw data as an integer. - - Integer - True if successful, false otherwise - - - - Gets the property raw data as a string. - - String - - - - Sets the property raw data as string. - - String - True if successful, false otherwise - - - - Gets the property raw data as a float array. - - Number of elements to get - Float array - - - - Gets the property raw data as a float array. - - Float array - - - - Sets the property raw data as a float array. - - Values to set - True if successful, otherwise false - - - - Gets the property raw data as a double array. - - Double array - - - - Sets the property raw data as a double array. - - Values to set - True if successful, otherwise false - - - - Gets the property raw data as an integer array. - - Number of elements to get - Integer array - - - - Gets the property raw data as an integer array. - - Integer array - - - - Sets the property raw data as an integer array. - - Values to set - True if successful, otherwise false - - - - Gets the property raw data as a boolean. - - Boolean - - - - Sets the property raw data as a boolean. - - Boolean value - True if successful, false otherwise - - - - Gets the property raw data as a Color3D. - - Color3D - - - - Sets the property raw data as a Color3D. - - Color3D - True if successful, false otherwise - - - - Gets the property raw data as a Color4D. - - Color4D - - - - Sets the property raw data as a Color4D. - - Color4D - True if successful, false otherwise - - - - Gets if the native value type is blittable (that is, does not require marshaling by the runtime, e.g. has MarshalAs attributes). - - - - - Writes the managed data to the native value. - - Optional pointer to the memory that will hold the native value. - Output native value - - - - Reads the unmanaged data from the native value. - - Input native value - - - - Frees unmanaged memory created by . - - Native value to free - True if the unmanaged memory should be freed, false otherwise. - - - - Represents a 3x3 matrix. Assimp docs say their matrices are always row-major, - and it looks like they're only describing the memory layout. Matrices are treated - as column vectors however (X base in the first column, Y base the second, and Z base the third) - - - - - Value at row 1, column 1 of the matrix - - - - - Value at row 1, column 2 of the matrix - - - - - Value at row 1, column 3 of the matrix - - - - - Value at row 2, column 1 of the matrix - - - - - Value at row 2, column 2 of the matrix - - - - - Value at row 2, column 3 of the matrix - - - - - Value at row 3, column 1 of the matrix - - - - - Value at row 3, column 2 of the matrix - - - - - Value at row 3, column 3 of the matrix - - - - - Gets the identity matrix. - - - - - Gets if this matrix is an identity matrix. - - - - - Gets or sets the value at the specific one-based row, column - index. E.g. i = 1, j = 2 gets the value in row 1, column 2 (MA2). Indices - out of range return a value of zero. - - - One-based Row index - One-based Column index - Matrix value - - - - Constructs a new Matrix3x3. - - Element at row 1, column 1 - Element at row 1, column 2 - Element at row 1, column 3 - Element at row 2, column 1 - Element at row 2, column 2 - Element at row 2, column 3 - Element at row 3, column 1 - Element at row 3, column 2 - Element at row 3, column 3 - - - - Constructs a new Matrix3x3. - - A 4x4 matrix to construct from, only taking the rotation/scaling part. - - - - Transposes this matrix (rows become columns, vice versa). - - - - - Inverts the matrix. If the matrix is *not* invertible all elements are set to . - - - - - Compute the determinant of this matrix. - - The determinant - - - - Creates a rotation matrix from a set of euler angles. - - Rotation angle about the x-axis, in radians. - Rotation angle about the y-axis, in radians. - Rotation angle about the z-axis, in radians. - The rotation matrix - - - - Creates a rotation matrix from a set of euler angles. - - Vector containing the rotation angles about the x, y, z axes, in radians. - The rotation matrix - - - - Creates a rotation matrix for a rotation about the x-axis. - - Rotation angle in radians. - The rotation matrix - - - - Creates a rotation matrix for a rotation about the y-axis. - - Rotation angle in radians. - The rotation matrix - - - - Creates a rotation matrix for a rotation about the z-axis. - - Rotation angle in radians. - The rotation matrix - - - - Creates a rotation matrix for a rotation about an arbitrary axis. - - Rotation angle, in radians - Rotation axis, which should be a normalized vector. - The rotation matrix - - - - Creates a scaling matrix. - - Scaling vector - The scaling vector - - - - Creates a rotation matrix that rotates a vector called "from" into another - vector called "to". Based on an algorithm by Tomas Moller and John Hudges: - - "Efficiently Building a Matrix to Rotate One Vector to Another" - Journal of Graphics Tools, 4(4):1-4, 1999 - - - Starting vector - Ending vector - Rotation matrix to rotate from the start to end. - - - - Tests equality between two matrices. - - First matrix - Second matrix - True if the matrices are equal, false otherwise - - - - Tests inequality between two matrices. - - First matrix - Second matrix - True if the matrices are not equal, false otherwise - - - - Performs matrix multiplication.Multiplication order is B x A. That way, SRT concatenations - are left to right. - - First matrix - Second matrix - Multiplied matrix - - - - Implicit conversion from a 4x4 matrix to a 3x3 matrix. - - 4x4 matrix - 3x3 matrix - - - - Tests equality between this matrix and another. - - Other matrix to test - True if the matrices are equal, false otherwise - - - - Determines whether the specified is equal to this instance. - - The to compare with this instance. - - true if the specified is equal to this instance; otherwise, false. - - - - - Returns a hash code for this instance. - - - A hash code for this instance, suitable for use in hashing algorithms and data structures like a hash table. - - - - - Returns a that represents this instance. - - - A that represents this instance. - - - - - Represents a 4x4 column-vector matrix (X base is the first column, Y base is the second, Z base the third, and translation the fourth). - Memory layout is row major. Right handed conventions are used by default. - - - - - Value at row 1, column 1 of the matrix - - - - - Value at row 1, column 2 of the matrix - - - - - Value at row 1, column 3 of the matrix - - - - - Value at row 1, column 4 of the matrix - - - - - Value at row 2, column 1 of the matrix - - - - - Value at row 2, column 2 of the matrix - - - - - Value at row 2, column 3 of the matrix - - - - - Value at row 2, column 4 of the matrix - - - - - Value at row 3, column 1 of the matrix - - - - - Value at row 3, column 2 of the matrix - - - - - Value at row 3, column 3 of the matrix - - - - - Value at row 3, column 4 of the matrix - - - - - Value at row 4, column 1 of the matrix - - - - - Value at row 4, column 2 of the matrix - - - - - Value at row 4, column 3 of the matrix - - - - - Value at row 4, column 4 of the matrix - - - - - Gets the identity matrix. - - - - - Gets if this matrix is an identity matrix. - - - - - Gets or sets the value at the specific one-based row, column - index. E.g. i = 1, j = 2 gets the value in row 1, column 2 (MA2). Indices - out of range return a value of zero. - - - One-based Row index - One-based Column index - Matrix value - - - - Constructs a new Matrix4x4. - - Element at row 1, column 1 - Element at row 1, column 2 - Element at row 1, column 3 - Element at row 1, column 4 - Element at row 2, column 1 - Element at row 2, column 2 - Element at row 2, column 3 - Element at row 2, column 4 - Element at row 3, column 1 - Element at row 3, column 2 - Element at row 3, column 3 - Element at row 3, column 4 - Element at row 4, column 1 - Element at row 4, column 2 - Element at row 4, column 3 - Element at row 4, column 4 - - - - Constructs a new Matrix4x4. - - Rotation matrix to copy values from. - - - - Transposes this matrix (rows become columns, vice versa). - - - - - Inverts the matrix. If the matrix is *not* invertible all elements are set to . - - - - - Compute the determinant of this matrix. - - The determinant - - - - Decomposes a transformation matrix into its original scale, rotation, and translation components. The - scaling vector receives the scaling for the x, y, z axes. The rotation is returned as a hamilton quaternion. And - the translation is the output position for the x, y, z axes. - - Vector to hold the scaling component - Quaternion to hold the rotation component - Vector to hold the translation component - - - - Decomposes a transformation matrix with no scaling. The rotation is returned as a hamilton - quaternion. The translation receives the output position for the x, y, z axes. - - Quaternion to hold the rotation component - Vector to hold the translation component - - - - Creates a rotation matrix from a set of euler angles. - - Rotation angle about the x-axis, in radians. - Rotation angle about the y-axis, in radians. - Rotation angle about the z-axis, in radians. - The rotation matrix - - - - Creates a rotation matrix from a set of euler angles. - - Vector containing the rotation angles about the x, y, z axes, in radians. - The rotation matrix - - - - Creates a rotation matrix for a rotation about the x-axis. - - Rotation angle in radians. - The rotation matrix - - - - Creates a rotation matrix for a rotation about the y-axis. - - Rotation angle in radians. - The rotation matrix - - - - Creates a rotation matrix for a rotation about the z-axis. - - Rotation angle in radians. - The rotation matrix - - - - Creates a rotation matrix for a rotation about an arbitrary axis. - - Rotation angle, in radians - Rotation axis, which should be a normalized vector. - The rotation matrix - - - - Creates a translation matrix. - - Translation vector - The translation matrix - - - - Creates a scaling matrix. - - Scaling vector - The scaling vector - - - - Creates a rotation matrix that rotates a vector called "from" into another - vector called "to". Based on an algorithm by Tomas Moller and John Hudges: - - "Efficiently Building a Matrix to Rotate One Vector to Another" - Journal of Graphics Tools, 4(4):1-4, 1999 - - - Starting vector - Ending vector - Rotation matrix to rotate from the start to end. - - - - Tests equality between two matrices. - - First matrix - Second matrix - True if the matrices are equal, false otherwise - - - - Tests inequality between two matrices. - - First matrix - Second matrix - True if the matrices are not equal, false otherwise - - - - Performs matrix multiplication. Multiplication order is B x A. That way, SRT concatenations - are left to right. - - First matrix - Second matrix - Multiplied matrix - - - - Implicit conversion from a 3x3 matrix to a 4x4 matrix. - - 3x3 matrix - 4x4 matrix - - - - Tests equality between this matrix and another. - - Other matrix to test - True if the matrices are equal, false otherwise - - - - Determines whether the specified is equal to this instance. - - The to compare with this instance. - - true if the specified is equal to this instance; otherwise, false. - - - - - Returns a hash code for this instance. - - - A hash code for this instance, suitable for use in hashing algorithms and data structures like a hash table. - - - - - Returns a that represents this instance. - - - A that represents this instance. - - - - - Delegate for performing unmanaged memory cleanup. - - Location in unmanaged memory of the value to cleanup - True if the unmanaged memory should be freed, false otherwise - - - - Helper static class containing functions that aid dealing with unmanaged memory to managed memory conversions. - - - - - Marshals an array of managed values to a c-style unmanaged array (void*). - - Managed type - Native type - Array of managed values - Pointer to unmanaged memory - - - - Marshals an array of managed values to a c-style unmanaged array (void*). This also can optionally marshal to - an unmanaged array of pointers (void**). - - Managed type - Native type - Array of managed values - True if the pointer is an array of pointers, false otherwise. - Pointer to unmanaged memory - - - - Marshals an array of managed values from a c-style unmanaged array (void*). - - Managed type - Native type - Pointer to unmanaged memory - Number of elements to marshal - Marshaled managed values - - - - Marshals an array of managed values from a c-style unmanaged array (void*). This also can optionally marshal from - an unmanaged array of pointers (void**). - - Managed type - Native type - Pointer to unmanaged memory - Number of elements to marshal - True if the pointer is an array of pointers, false otherwise. - Marshaled managed values - - - - Marshals an array of blittable structs to a c-style unmanaged array (void*). This should not be used on non-blittable types - that require marshaling by the runtime (e.g. has MarshalAs attributes). - - Struct type - Managed array of structs - Pointer to unmanaged memory - - - - Marshals an array of blittable structs from a c-style unmanaged array (void*). This should not be used on non-blittable types - that require marshaling by the runtime (e.g. has MarshalAs attributes). - - Struct type - Pointer to unmanaged memory - Number of elements to read - Managed array - - - - Frees an unmanaged array and performs cleanup for each value. This can be used on any type that can be - marshaled into unmanaged memory. - - Struct type - Pointer to unmanaged memory - Number of elements to free - Delegate that performs the necessary cleanup - - - - Frees an unmanaged array and performs cleanup for each value. Optionally can free an array of pointers. This can be used on any type that can be - marshaled into unmanaged memory. - - Struct type - Pointer to unmanaged memory - Number of elements to free - Delegate that performs the necessary cleanup - True if the pointer is an array of pointers, false otherwise. - - - - Marshals a managed value to unmanaged memory. - - Managed type - Unmanaged type - Managed value to marshal - Pointer to unmanaged memory - - - - Marshals a managed value from unmanaged memory. - - Managed type - Unmanaged type - Pointer to unmanaged memory - The marshaled managed value - - - - Convienence method for marshaling a pointer to a structure. Only use if the type is not blittable, otherwise - use the read methods for blittable types. - - Struct type - Pointer to marshal - The marshaled structure - - - - Convienence method for marshaling a pointer to a structure. Only use if the type is not blittable, otherwise - use the read methods for blittable types. - - Struct type - Pointer to marshal - The marshaled structure - - - - Convienence method for marshaling a structure to a pointer. Only use if the type is not blittable, otherwise - use the write methods for blittable types. - - Struct type - Struct to marshal - Pointer to unmanaged chunk of memory which must be allocated prior to this call - - - - Computes the size of the struct type using Marshal SizeOf. Only use if the type is not blittable, thus requiring marshaling by the runtime, - (e.g. has MarshalAs attributes), otherwise use the SizeOf methods for blittable types. - - Struct type - Size of the struct in bytes. - - - - Computes the size of the struct array using Marshal SizeOf. Only use if the type is not blittable, thus requiring marshaling by the runtime, - (e.g. has MarshalAs attributes), otherwise use the SizeOf methods for blittable types. - - Struct type - Array of structs - Total size, in bytes, of the array's contents. - - - - Pins an object in memory, which allows a pointer to it to be returned. While the object remains pinned the runtime - cannot move the object around in memory, which may degrade performance. - - Object to pin. - Pointer to pinned object's memory location. - - - - Unpins an object in memory, allowing it to once again freely be moved around by the runtime. - - Object to unpin. - - - - Convienence method to dispose all items in the collection - - IDisposable type - Collection of disposables - - - - Casts an underlying value type to an enum type, WITHOUT first casting the value to an Object. So this avoid boxing the value. - - Underlying value type. - Enum type. - Value to cast. - Enum value. - - - - Allocates unmanaged memory. This memory should only be freed by this helper. - - Size to allocate - Alignment of the memory, by default aligned along 16-byte boundary. - Pointer to the allocated unmanaged memory. - - - - Allocates unmanaged memory that is cleared to a certain value. This memory should only be freed by this helper. - - Size to allocate - Value the memory will be cleared to, by default zero. - Alignment of the memory, by default aligned along 16-byte boundary. - Pointer to the allocated unmanaged memory. - - - - Frees unmanaged memory that was allocated by this helper. - - Pointer to unmanaged memory to free. - - - - Checks if the memory is aligned to the specified alignment. - - Pointer to the memory - Alignment value, by defauly 16-byte - True if is aligned, false otherwise. - - - - Swaps the value between two references. - - Type of data to swap. - First reference - Second reference - - - - Computes a hash code using the FNV modified algorithmm. - - Byte data to hash. - Hash code for the data. - - - - Reads a stream until the end is reached into a byte array. Based on - Jon Skeet's implementation. - It is up to the caller to dispose of the stream. - - Stream to read all bytes from - Initial buffer length, default is 32K - The byte array containing all the bytes from the stream - - - - Compares two arrays of bytes for equivalence. - - First array of data. - Second array of data. - True if both arrays contain the same data, false otherwise. - - - - Clears the memory to the specified value. - - Pointer to the memory. - Value the memory will be cleared to. - Number of bytes, starting from the memory pointer, to clear. - - - - Computes the size of the struct type. - - Struct type - Size of the struct in bytes. - - - - Casts the by-ref value into a pointer. - - Struct type. - By-ref value. - Pointer to the value. - - - - Casts the readonly by-ref value into a pointer. - - Struct type. - By-ref value. - Pointer to the value. - - - - Casts the pointer into a by-ref value of the specified type. - - Struct type. - Memory location. - By-ref value. - - - - Casts one by-ref type to another, unsafely. - - From struct type - To struct type - Source by-ref value. - Reference as the from type. - - - - Casts one readonly by-ref type to another, unsafely. - - From struct type - To struct type - Source by-ref value. - Reference as the from type. - - - - Computes the size of the struct array. - - Struct type - Array of structs - Total size, in bytes, of the array's contents. - - - - Adds an offset to the pointer. - - Pointer - Offset - Pointer plus the offset - - - - Performs a memcopy that copies data from the memory pointed to by the source pointer to the memory pointer by the destination pointer. - - Destination memory location - Source memory location - Number of bytes to copy - - - - Returns the number of elements in the enumerable. - - Type of element in collection. - Enumerable collection - The number of elements in the enumerable collection. - - - - Converts typed element array to a byte array. - - Struct type - Element array - Byte array copy or null if the source array was not valid. - - - - Converts a byte array to a typed element array. - - Struct type - Byte array - Typed element array or null if the source array was not valid. - - - - Copies bytes from a byte array to an element array. - - Struct type - Source byte array - Starting index in destination array - Destination element array - Starting index in destination array - Number of elements to copy - - - - Copies bytes from an element array to a byte array. - - Struct type - Source element array - Starting index in source array - Destination byte array - Starting index in destination array - Number of elements to copy - - - - Reads data from the memory location into the array. - - Struct type - Pointer to memory location - Array to store the copied data - Zero-based element index to start writing data to in the element array. - Number of elements to copy - - - - Reads a single element from the memory location. - - Struct type - Pointer to memory location - The read value - - - - Reads a single element from the memory location. - - Struct type - Pointer to memory location - The read value. - - - - Writes data from the array to the memory location. - - Struct type - Pointer to memory location - Array containing data to write - Zero-based element index to start reading data from in the element array. - Number of elements to copy - - - - Writes a single element to the memory location. - - Struct type - Pointer to memory location - The value to write - - - - A mesh represents geometry with a single material. - - - - - Gets or sets the mesh name. This tends to be used - when formats name nodes and meshes independently, - vertex animations refer to meshes by their names, - or importers split meshes up, each mesh will reference - the same (dummy) name. - - - - - Gets or sets the primitive type. This may contain more than one - type unless if - option is not set. - - - - - Gets or sets the index of the material associated with this mesh. - - - - - Gets the number of vertices in this mesh. This is the count that all - per-vertex lists should be the size of. - - - - - Gets if the mesh has a vertex array. This should always return - true provided no special scene flags are set. - - - - - Gets the vertex position list. - - - - - Gets if the mesh as normals. If it does exist, the count should be the same as the vertex count. - - - - - Gets the vertex normal list. - - - - - Gets if the mesh has tangents and bitangents. It is not - possible for one to be without the other. If it does exist, the count should be the same as the vertex count. - - - - - Gets the vertex tangent list. - - - - - Gets the vertex bitangent list. - - - - - Gets the number of faces contained in the mesh. - - - - - Gets if the mesh contains faces. If no special - scene flags are set, this should always return true. - - - - - Gets the mesh's faces. Each face will contain indices - to the vertices. - - - - - Gets the number of valid vertex color channels contained in the - mesh (list is not empty/not null). This can be a value between zero and the maximum vertex color count. Each individual channel - should be the size of . - - - - - Gets the number of valid texture coordinate channels contained - in the mesh (list is not empty/not null). This can be a value between zero and the maximum texture coordinate count. - Each individual channel should be the size of . - - - - - Gets the array that contains each vertex color channels, by default all are lists of zero (but can be set to null). Each index - in the array corresponds to the texture coordinate channel. The length of the array corresponds to Assimp's maximum vertex color channel limit. - - - - - Gets the array that contains each texture coordinate channel, by default all are lists of zero (but can be set to null). Each index - in the array corresponds to the texture coordinate channel. The length of the array corresponds to Assimp's maximum UV channel limit. - - - - - Gets the array that contains the count of UV(W) components for each texture coordinate channel, usually 2 (UV) or 3 (UVW). A component - value of zero means the texture coordinate channel does not exist. The channel index (index in the array) corresponds - to the texture coordinate channel index. - - - - - Gets the number of bones that influence this mesh. - - - - - Gets if this mesh has bones. - - - - - Gets the bones that influence this mesh. - - - - - Gets the number of mesh animation attachments that influence this mesh. - - - - - Gets if this mesh has mesh animation attachments. - - - - - Gets the mesh animation attachments that influence this mesh. - - - - - Gets or sets the morph method used when animation attachments are used. - - - - - Constructs a new instance of the class. - - - - - Constructs a new instance of the class. - - Name of the mesh. - - - - Constructs a new instance of the class. - - Primitive types contained in the mesh. - - - - Constructs a new instance of the class. - - Name of the mesh - Primitive types contained in the mesh. - - - - Checks if the mesh has vertex colors for the specified channel. This returns false if the list - is null or empty. The channel, if it exists, should contain the same number of entries as . - - Channel index - True if vertex colors are present in the channel. - - - - Checks if the mesh has texture coordinates for the specified channel. This returns false if the list - is null or empty. The channel, if it exists, should contain the same number of entries as . - - Channel index - True if texture coordinates are present in the channel. - - - - Convienence method for setting this meshe's face list from an index buffer. - - Index buffer - Indices per face - True if the operation succeeded, false otherwise (e.g. not enough data) - - - - Convienence method for accumulating all face indices into a single - index array. - - int index array - - - - Convienence method for accumulating all face indices into a single index - array as unsigned integers (the default from Assimp, if you need them). - - uint index array - - - - Convienence method for accumulating all face indices into a single - index array. - - short index array - - - - Gets if the native value type is blittable (that is, does not require marshaling by the runtime, e.g. has MarshalAs attributes). - - - - - Writes the managed data to the native value. - - Optional pointer to the memory that will hold the native value. - Output native value - - - - Reads the unmanaged data from the native value. - - Input native value - - - - Frees unmanaged memory created by . - - Native value to free - True if the unmanaged memory should be freed, false otherwise. - - - - A mesh attachment store per-vertex animations for a particular frame. You may - think of this as a 'patch' for the host mesh, since the mesh attachment replaces only certain - vertex data streams at a particular time. Each mesh stores 'n' attached meshes. The actual - relationship between the time line and mesh attachments is established by the mesh animation channel, - which references singular mesh attachments by their ID and binds them to a time offset. - - - - - Gets the number of vertices in this mesh. This is a replacement - for the host mesh's vertex count. Likewise, a mesh attachment - cannot add or remove per-vertex attributes, therefore the existance - of vertex data will match the existance of data in the mesh. - - - - - Checks whether the attachment mesh overrides the vertex positions - of its host mesh. - - - - - Gets the vertex position list. - - - - - Checks whether the attachment mesh overrides the vertex normals of - its host mesh. - - - - - Gets the vertex normal list. - - - - - Checks whether the attachment mesh overrides the vertex - tangents and bitangents of its host mesh. - - - - - Gets the vertex tangent list. - - - - - Gets the vertex bitangent list. - - - - - Gets the number of valid vertex color channels contained in the - mesh (list is not empty/not null). This can be a value between zero and the maximum vertex color count. Each individual channel - should be the size of . - - - - - Gets the number of valid texture coordinate channels contained - in the mesh (list is not empty/not null). This can be a value between zero and the maximum texture coordinate count. - Each individual channel should be the size of . - - - - - Gets the array that contains each vertex color channels that override a specific channel in the host mesh, by default all are lists of zero (but can be set to null). - Each index in the array corresponds to the texture coordinate channel. The length of the array corresponds to Assimp's maximum vertex color channel limit. - - - - - Gets the array that contains each texture coordinate channel that override a specific channel in the host mesh, by default all are lists of zero (but can be set to null). - Each index in the array corresponds to the texture coordinate channel. The length of the array corresponds to Assimp's maximum UV channel limit. - - - - - Gets or sets the weight of the mesh animation. - - - - - Constructs a new instance of the class. - - - - - Checks if the mesh attachment overrides a particular set of vertex colors on - the host mesh. This returns false if the list is null or empty. The index is between - zero and the maximumb number of vertex color channels. - - Channel index - True if vertex colors are present in the channel. - - - - Checks if the mesh attachment overrides a particular set of texture coordinates on - the host mesh. This returns false if the list is null or empty. The index is - between zero and the maximum number of texture coordinate channels. - - Channel index - True if texture coordinates are present in the channel. - - - - Gets if the native value type is blittable (that is, does not require marshaling by the runtime, e.g. has MarshalAs attributes). - - - - - Writes the managed data to the native value. - - Optional pointer to the memory that will hold the native value. - Output native value - - - - Reads the unmanaged data from the native value. - - Input native value - - - - Frees unmanaged memory created by . - - Native value to free - True if the unmanaged memory should be freed, false otherwise. - - - - Describes vertex-based animations for a single mesh or a group of meshes. Meshes - carry the animation data for each frame. The purpose of this object is to define - keyframes, linking each mesh attachment to a particular point in a time. - - - - - Gets or sets the name of the mesh to be animated. Empty strings are not allowed, - animation meshes need to be named (not necessarily uniquely, the name can basically - serve as a wildcard to select a group of meshes with similar animation setup). - - - - - Gets the number of meshkeys in this animation channel. There will always - be at least one key. - - - - - Gets if this animation channel has mesh keys - this should always be true. - - - - - Gets the mesh keyframes of the animation. This should not be null. - - - - - Constructs a new instance of the class. - - - - - Gets if the native value type is blittable (that is, does not require marshaling by the runtime, e.g. has MarshalAs attributes). - - - - - Writes the managed data to the native value. - - Optional pointer to the memory that will hold the native value. - Output native value - - - - Reads the unmanaged data from the native value. - - Input native value - - - - Frees unmanaged memory created by . - - Native value to free - True if the unmanaged memory should be freed, false otherwise. - - - - Binds an anim mesh (referenced by an index) to a specific point in time. - - - - - The time of this key. - - - - - Index of the anim mesh that corresponds to this keyframe. - - - - - Constructs a new MeshKey. - - The time of this key. - Index of the anim mesh that corresponds to this keyframe. - - - - Tests equality between two keys. - - The first key - The second key - True if the key's indices are the same, false otherwise - - - - Tests inequality between two keys. - - The first key - The second key - True if the key's indices are not equal, false otherwise. - - - - Tests inequality between two keys. - - The first key - The second key - True if the first key's time is less than the second key's. - - - - Tests inequality between two keys. - - The first key - The second key - True if the first key's time is greater than the second key's. - - - - Determines whether the specified is equal to this instance. - - The to compare with this instance. - - true if the specified is equal to this instance; otherwise, false. - - - - - Tests equality between this key and another. - - Other key to test - True if their indices are equal - - - - Returns a hash code for this instance. - - - A hash code for this instance, suitable for use in hashing algorithms and data structures like a hash table. - - - - - Returns a that represents this instance. - - - A that represents this instance. - - - - - Describes morph-based keyframe animations for a single mesh or a group of meshes. - - - - - Gets or sets the name of the mesh to be animated. Empty strings are not allowed, - animation meshes need to be named (not necessarily uniquely, the name can basically - serve as a wildcard to select a group of meshes with similar animation setup). - - - - - Gets the number of mesh morph keys in this animation channel. There will always be at least one key. - - - - - Gets if this animation channel has mesh keys - this should always be true. - - - - - Gets the mesh morph keyframes of the animation. This should not be null. - - - - - Constructs a new instance of the class. - - - - - Gets if the native value type is blittable (that is, does not require marshaling by the runtime, e.g. has MarshalAs attributes). - - - - - Reads the unmanaged data from the native value. - - Input native value - - - - Writes the managed data to the native value. - - Optional pointer to the memory that will hold the native value. - Output native value - - - - Frees unmanaged memory created by . - - Native value to free - True if the unmanaged memory should be freed, false otherwise. - - - - Binds a morph animation mesh to a specific point in time. - - - - - Gets or sets the time of this keyframe. - - - - - Gets the values at the time of this keyframe. Number of values must equal number of weights. - - - - - Gets the weights at the time of this keyframe. Number of weights must equal number of values. - - - - - Constructs a new instance of the class. - - - - - Gets if the native value type is blittable (that is, does not require marshaling by the runtime, e.g. has MarshalAs attributes). - - - - - Writes the managed data to the native value. - - Optional pointer to the memory that will hold the native value. - Output native value - - - - Reads the unmanaged data from the native value. - - Input native value - - - - Frees unmanaged memory created by . - - Native value to free - True if the unmanaged memory should be freed, false otherwise. - - - - Represents a container for holding metadata, representing as key-value pairs. - - - - - Constructs a new instance of the class. - - - - - Gets if the native value type is blittable (that is, does not require marshaling by the runtime, e.g. has MarshalAs attributes). - - - - - Writes the managed data to the native value. - - Optional pointer to the memory that will hold the native value. - Output native value - - - - Reads the unmanaged data from the native value. - - Input native value - - - - Frees unmanaged memory created by . - - Native value to free - True if the unmanaged memory should be freed, false otherwise. - - - - Represents an entry in a metadata container. - - - - - Gets the type of metadata. - - - - - Gets the metadata data stored in this entry. - - - - - Constructs a new instance of the struct. - - Type of the data. - The data. - - - - Tests equality between two entries. - - First entry - Second entry - True if the entries are equal, false otherwise - - - - Tests inequality between two entries. - - First entry - Second entry - True if the entries are not equal, false otherwise - - - - Gets the data as the specified type. If it cannot be casted to the type, then null is returned. - - Type to cast the data to. - Casted data or null. - - - - Determines whether the specified is equal to this instance. - - The to compare with this instance. - True if the specified is equal to this instance; otherwise, false. - - - - Indicates whether the current object is equal to another object of the same type. - - An object to compare with this object. - True if the current object is equal to the parameter; otherwise, false. - - - - Returns a hash code for this instance. - - A hash code for this instance, suitable for use in hashing algorithms and data structures like a hash table. - - - - Returns the fully qualified type name of this instance. - - A containing a fully qualified type name. - - - - Attribute for assocating a type with an instance. - - - - - Gets the associated marshaler. - - - - - Constructs a new instance of the class. - - Type that implements - Thrown if the type is null. - Thrown if the type does not implement . - - - - A node in the imported model hierarchy. - - - - - Gets or sets the name of the node. - - - - - Gets or sets the transformation of the node relative to its parent. - - - - - Gets the node's parent, if it exists. - - - - - Gets the number of children that is owned by this node. - - - - - Gets if the node contains children. - - - - - Gets the node's children. - - - - - Gets the number of meshes referenced by this node. - - - - - Gets if the node contains mesh references. - - - - - Gets the indices of the meshes referenced by this node. Meshes can be - shared between nodes, so there is a mesh collection owned by the scene - that each node can reference. - - - - - Gets the node's metadata container. - - - - - Constructs a new instance of the class. - - - - - Constructs a new instance of the class. - - Name of the node - - - - Constructs a new instance of the class. - - Name of the node - Parent of the node - - - - Finds a node with the specific name, which may be this node - or any children or children's children, and so on, if it exists. - - Node name - The node or null if it does not exist - - - - Gets a value indicating whether this instance is native blittable. - - - - - Writes the managed data to the native value. - - Optional pointer to the memory that will hold the native value. - Output native value - - - - Reads the unmanaged data from the native value. - - Input native value - - - - Frees unmanaged memory created by . - - Native value to free - True if the unmanaged memory should be freed, false otherwise. - - - - Describes the animation of a single node. The name specifies the bone/node which is affected by - this animation chanenl. The keyframes are given in three separate seties of values, - one for each position, rotation, and scaling. The transformation matrix is computed from - these values and replaces the node's original transformation matrix at a specific time. - This means all keys are absolute and not relative to the bone default pose. - The order which the transformations are to be applied is scaling, rotation, and translation (SRT). - Keys are in chronological order and duplicate keys do not pass the validation step. There most likely will be no - negative time values, but they are not forbidden. - - - - - Gets or sets the name of the node affected by this animation. It must exist and it must - be unique. - - - - - Gets the number of position keys in the animation channel. - - - - - Gets if this animation channel contains position keys. - - - - - Gets the position keys of this animation channel. Positions are - specified as a 3D vector. If there are position keys, there should - also be -at least- one scaling and one rotation key. - - - - - Gets the number of rotation keys in the animation channel. - - - - - Gets if the animation channel contains rotation keys. - - - - - Gets the rotation keys of this animation channel. Rotations are - given as quaternions. If this exists, there should be -at least- one - scaling and one position key. - - - - - Gets the number of scaling keys in the animation channel. - - - - - Gets if the animation channel contains scaling keys. - - - - - Gets the scaling keys of this animation channel. Scalings are - specified in a 3D vector. If there are scaling keys, there should - also be -at least- one position and one rotation key. - - - - - Gets or sets how the animation behaves before the first key is encountered. By default the original - transformation matrix of the affected node is used. - - - - - Gets or sets how the animation behaves after the last key was processed. By default the original - transformation matrix of the affected node is taken. - - - - - Constructs a new instance of the class. - - - - - Gets if the native value type is blittable (that is, does not require marshaling by the runtime, e.g. has MarshalAs attributes). - - - - - Writes the managed data to the native value. - - Optional pointer to the memory that will hold the native value. - Output native value - - - - Reads the unmanaged data from the native value. - - Input native value - - - - Frees unmanaged memory created by . - - Native value to free - True if the unmanaged memory should be freed, false otherwise. - - - - A collection of child nodes owned by a parent node. Manages access to the collection while maintaing parent-child linkage. - - - - - Gets the number of elements contained in the . - - - - - Gets or sets the element at the specified index. - - The child index - - - - Gets a value indicating whether the is read-only. - - true if the is read-only; otherwise, false. - - - - Constructs a new instance of the class. - - Parent node - - - - Adds an item to the . - - The object to add to the . - - - - Adds a range of items to the list. - - Item array - - - - Removes all items from the . - - - - - Determines whether the contains a specific value. - - The object to locate in the . - - true if is found in the ; otherwise, false. - - - - - Copies collection contents to the array - - The array to copy to. - Index of the array to start copying. - - - - Determines the index of a specific item in the . - - The object to locate in the . - - The index of if found in the list; otherwise, -1. - - - - - Inserts an item to the at the specified index. - - The zero-based index at which should be inserted. - The object to insert into the . - - - - Removes the item at the specified index. - - The zero-based index of the item to remove. - - - - Removes the first occurrence of a specific object from the . - - The object to remove from the . - - true if was successfully removed from the ; otherwise, false. This method also returns false if is not found in the original . - - - - - Copies elements in the collection to a new array. - - Array of copied elements - - - - Returns an enumerator that iterates through the collection. - - A that can be used to iterate through the collection. - - - - Returns an enumerator that iterates through a collection. - - An object that can be used to iterate through the collection. - - - - Represents a plane in three-dimensional euclidean space where - A, B, C are components of the plane normal and D is the distance along the - normal from the origin to the plane. - - - - - X component of the normal vector. - - - - - Y component of the normal vector. - - - - - Z component of the normal vector. - - - - - Distance from the origin to the plane along the normal vector. - - - - - Constructs a new Plane. - - X component of the normal vector. - Y component of the normal vector. - Z component of the normal vector. - Distance from the origin to the plane along the normal vector. - - - - Static class containing preset properties for post processing options. - - - - - PostProcess configuration for (some) Direct3D conventions, - left handed geometry, upper left origin for UV coordinates, - and clockwise face order, suitable for CCW culling. - - - - - PostProcess configuration for optimizing data for real-time. - Does the following steps: - - , , - , , - , and - - - - - PostProcess configuration for optimizing - data for real-time rendering. Does the following steps: - - , , - , , - , - , , - , , and - - - - - - PostProcess configuration for heavily optimizing the data - for real-time rendering. Includes all flags in - as well as - , , and - - - - - - A 4D vector that represents a rotation. - - - - - Rotation component of the quaternion/ - - - - - X component of the vector part of the quaternion. - - - - - Y component of the vector part of the quaternion. - - - - - Z component of the vector part of the quaternion. - - - - - Constructs a new Quaternion. - - W component - X component - Y component - Z component - - - - Constructs a new Quaternion from a rotation matrix. - - Rotation matrix to create the Quaternion from. - - - - Constructs a new Quaternion from three euler angles. - - Pitch - Yaw - Roll - - - - Constructs a new Quaternion from an axis-angle. - - Axis - Angle about the axis - - - - Normalizes the quaternion. - - - - - Transforms this quaternion into its conjugate. - - - - - Returns a matrix representation of the quaternion. - - Rotation matrix representing the quaternion. - - - - Spherical interpolation between two quaternions. - - Start rotation when factor == 0 - End rotation when factor == 1 - Interpolation factor between 0 and 1, values beyond this range yield undefined values - Interpolated quaternion. - - - - Rotates a point by this quaternion. - - Point to rotate - Quaternion representing the rotation - Rotated point. - - - - Multiplies two quaternions. - - First quaternion - Second quaternion - Resulting quaternion - - - - Tests equality between two quaternions. - - First quaternion - Second quaternion - True if the quaternions are equal, false otherwise. - - - - Tests inequality between two quaternions. - - First quaternion - Second quaternion - True if the quaternions are not equal, false otherwise. - - - - Tests equality between two quaternions. - - Quaternion to compare - True if the quaternions are equal. - - - - Tests equality between this color and another object. - - Object to test against - True if the object is a color and the components are equal - - - - Returns a hash code for this instance. - - - A hash code for this instance, suitable for use in hashing algorithms and data structures like a hash table. - - - - - Returns a that represents this instance. - - - A that represents this instance. - - - - - Time-value pair specifying a rotation for a given time. - - - - - The time of this key. - - - - - The rotation of this key. - - - - - Constructs a new QuaternionKey. - - Time of the key. - Quaternion rotation at the time frame. - - - - Tests equality between two keys. - - The first key - The second key - True if the key's rotations are the same, false otherwise. - - - - Tests inequality between two keys. - - The first key - The second key - True if the key's rotations are not the same, false otherwise. - - - - Tests inequality between two keys. - - The first key - The second key - True if the first key's time is less than the second key's. - - - - Tests inequality between two keys. - - The first key - The second key - True if the first key's time is greater than the second key's. - - - - Determines whether the specified is equal to this instance. - - The to compare with this instance. - - true if the specified is equal to this instance; otherwise, false. - - - - - Tests equality between this key and another. - - Other key to test - True if their rotations are equal. - - - - Returns a hash code for this instance. - - - A hash code for this instance, suitable for use in hashing algorithms and data structures like a hash table. - - - - - Returns a that represents this instance. - - - A that represents this instance. - - - - - Defines a 3D ray with a point of origin and a direction. - - - - - Origin of the ray in space. - - - - - Direction of the ray. - - - - - Constructs a new Ray. - - Origin of the ray. - Direction of the ray. - - - - Represents a completely imported model or scene. Everything that was imported from the given file can be - accessed from here. Once the scene is loaded from unmanaged memory, it resides solely in managed memory - and Assimp's read only copy is released. - - - - - Gets or sets the state of the imported scene. By default no flags are set, but - issues can arise if the flag is set to incomplete. - - - - - Gets or sets the root node of the scene graph. There will always be at least the root node - if the import was successful and no special flags have been set. Presence of further nodes - depends on the format and content of the imported file. - - - - - Gets if the scene contains meshes. Unless if no special scene flags are set - this should always be true. - - - - - Gets the number of meshes in the scene. - - - - - Gets the meshes contained in the scene, if any. - - - - - Gets if the scene contains any lights. - - - - - Gets the number of lights in the scene. - - - - - Gets the lights in the scene, if any. - - - - - Gets if the scene contains any cameras. - - - - - Gets the number of cameras in the scene. - - - - - Gets the cameras in the scene, if any. - - - - - Gets if the scene contains embedded textures. - - - - - Gets the number of embedded textures in the scene. - - - - - Gets the embedded textures in the scene, if any. - - - - - Gets if the scene contains any animations. - - - - - Gets the number of animations in the scene. - - - - - Gets the animations in the scene, if any. - - - - - Gets if the scene contains any materials. There should always be at least the - default Assimp material if no materials were loaded. - - - - - Gets the number of materials in the scene. There should always be at least the - default Assimp material if no materials were loaded. - - - - - Gets the materials in the scene. - - - - - Constructs a new instance of the class. - - - - - Clears the scene of all components. - - - - - Marshals a managed scene to unmanaged memory. The unmanaged memory must be freed with a call to - , the memory is owned by AssimpNet and cannot be freed by the native library. - - Scene data - Unmanaged scene or NULL if the scene is null. - - - - Marshals an unmanaged scene to managed memory. This does not free the unmanaged memory. - - The unmanaged scene data - The managed scene, or null if the pointer is NULL - - - - Frees unmanaged memory allocated -ONLY- in . To free an unmanaged scene allocated by the unmanaged Assimp library, - call the appropiate function. - - Pointer to unmanaged scene data. - - - - Gets if the native value type is blittable (that is, does not require marshaling by the runtime, e.g. has MarshalAs attributes). - - - - - Writes the managed data to the native value. - - Optional pointer to the memory that will hold the native value. - Output native value - - - - Reads the unmanaged data from the native value. - - Input native value - - - - Frees unmanaged memory created by . - - Native value to free - True if the unmanaged memory should be freed, false otherwise. - - - - Represents a texel in ARGB8888 format. - - - - - Blue component. - - - - - Green component. - - - - - Red component. - - - - - Alpha component. - - - - - Constructs a new Texel. - - Blue component. - Green component. - Red component. - Alpha component. - - - - Tests equality between two texels. - - First texel - Second texel - True if the texels are equal, false otherwise. - - - - Tests inequality between two texels. - - First texel - Second texel - True if the texels are not equal, false otherwise. - - - - Implicitly converts a texel to a Color4D. - - Texel to convert - Converted Color4D - - - - Determines whether the specified is equal to this instance. - - The to compare with this instance. - - true if the specified is equal to this instance; otherwise, false. - - - - - Tests equality between this key and another. - - Other key to test - True if their indices are equal - - - - Returns a hash code for this instance. - - - A hash code for this instance, suitable for use in hashing algorithms and data structures like a hash table. - - - - - Returns a that represents this instance. - - - A that represents this instance. - - - - - Describes all the values pertaining to a particular texture slot in a material. - - - - - Gets the texture file path. - - - - - Gets the texture type semantic. - - - - - Gets the texture index in the material. - - - - - Gets the texture mapping. - - - - - Gets the UV channel index that corresponds to this texture from the mesh. - - - - - Gets the blend factor. - - - - - Gets the texture operation. - - - - - Gets the texture wrap mode for the U coordinate. - - - - - Gets the texture wrap mode for the V coordinate. - - - - - Gets misc flags. - - - - - Constructs a new TextureSlot. - - Texture filepath - Texture type semantic - Texture index in the material - Texture mapping - UV channel in mesh that corresponds to this texture - Blend factor - Texture operation - Texture wrap mode for U coordinate - Texture wrap mode for V coordinate - Misc flags - - - - Defines configurable properties for importing models. All properties - have default values. Setting config properties are done via the SetProperty* - methods in AssimpMethods. - - - - - Enables time measurements. If enabled the time needed for each - part of the loading process is timed and logged. - Type: bool. Default: false - - - - - Sets Assimp's multithreading policy. This is ignored if Assimp is - built without boost.thread support. Possible values are: -1 to - let Assimp decide, 0 to disable multithreading, and nay number larger than 0 - to force a specific number of threads. This is only a hint and may be - ignored by Assimp. - Type: integer. Default: -1 - - - - - Global setting to disable generation of skeleton dummy meshes. These are generated as a visualization aid - in cases which the input data contains no geometry, but only animation data. So the geometry are visualizing - the bones. - Type: Bool. Default: false. - - - - - Specifies the maximum angle that may be between two vertex tangents that their tangents - and bitangents are smoothed during the step to calculate the tangent basis. The angle specified - is in degrees. The maximum value is 175 degrees. - Type: float. Default: 45 degrees - - - - - Specifies the maximum angle that may be between two face normals at the same vertex position that - their normals will be smoothed together during the calculate smooth normals step. This is commonly - called the "crease angle". The angle is specified in degrees. Maximum value is 175 degrees (all vertices - smoothed). - Type: float. Default: 175 degrees - - - - - Sets the colormap(= palette) to be used to decode embedded textures in MDL (Quake or 3DG5) files. - This must be a valid path to a file. The file is 768 (256 * 3) bytes large and contains - RGB triplets for each of the 256 palette entries. If the file is not found, a default - palette (from Quake 1) is used. - Type: string. Default: "colormap.lmp" - - - - - Configures the step to - keep materials matching a name in a given list. This is a list of - 1 to n strings where whitespace ' ' serves as a delimiter character. Identifiers - containing whitespaces must be enclosed in *single* quotation marks. Tabs or - carriage returns are treated as whitespace. - If a material matches one of these names, it will not be modified - or removed by the post processing step nor will other materials be replaced - by a reference to it. - Default: string. Default: "" - - - - - Configures the step - to keep the scene hierarchy. Meshes are moved to worldspace, but no optimization - is performed where meshes with the same materials are not joined. - This option could be of used if you have a scene hierarchy that contains - important additional information which you intend to parse. - Type: bool. Default: false - - - - - Configures the step - to normalize all vertex components into the -1...1 range. That is, a bounding - box for the whole scene is computed where the maximum component is taken - and all meshes are scaled uniformly. This is useful if you don't know the spatial dimension - of the input data. - Type: bool. Default: false - - - - - Configures the step - to remove degenerated primitives from the import immediately. - The default behavior converts degenerated triangles to lines and - degenerated lines to points. - Type: bool. Default: false - - - - - Configures the step - to check the area of a triangle to be greater than 1e-6. If this is not the case, the triangle will be removed if is set to true. - Type: bool. Default: false - - - - - Configures the step - to preserve nodes matching a name in a given list. This is a list of 1 to n strings, whitespace ' ' serves as a delimter character. - Identifiers containing whitespaces must be enclosed in *single* quotation marks. Carriage returns - and tabs are treated as white space. - If a node matches one of these names, it will not be modified or removed by the - postprocessing step. - Type: string. Default: "" - - - - - Sets the maximum number of triangles a mesh can contain. This is used by the - step to determine - whether a mesh must be split or not. - Type: int. Default: AiDefines.AI_SLM_DEFAULT_MAX_TRIANGLES - - - - - Sets the maximum number of vertices in a mesh. This is used by the - step to determine - whether a mesh must be split or not. - Type: integer. Default: AiDefines.AI_SLM_DEFAULT_MAX_VERTICES - - - - - Sets the maximum number of bones that can affect a single vertex. This is used - by the step. - Type: integer. Default: AiDefines.AI_LBW_MAX_WEIGHTS - - - - - Sets the size of the post-transform vertex cache to optimize vertices for. This is - for the step. The size - is given in vertices. Of course you can't know how the vertex format will exactly look - like after the import returns, but you can still guess what your meshes will - probably have. The default value *has* resulted in slight performance improvements - for most Nvidia/AMD cards since 2002. - Type: integer. Default: AiDefines.PP_ICL_PTCACHE_SIZE - - - - - Input parameter to the step. - It specifies the parts of the data structure to be removed. - This is a bitwise combination of the flag. If no valid mesh is remaining after - the step is executed, the import FAILS. - Type: integer. Default: 0 - - - - - Input parameter to the step. - It specifies which primitive types are to be removed by the step. - This is a bitwise combination of the flag. - Specifying ALL types is illegal. - Type: integer. Default: 0 - - - - - Input parameter to the step. - It specifies the floating point accuracy for animation values, specifically the epislon - during the comparison. The step checks for animation tracks where all frame values are absolutely equal - and removes them. Two floats are considered equal if the invariant abs(n0-n1) > epislon holds - true for all vector/quaternion components. - Type: float. Default: 0.0f (comparisons are exact) - - - - - Input parameter to the step. - It specifies which UV transformations are to be evaluated. - This is bitwise combination of the flag. - Type: integer. Default: AiDefines.AI_UV_TRAFO_ALL (All combinations) - - - - - A hint to Assimp to favour speed against import quality. Enabling this option - may result in faster loading, or it may not. It is just a hint to loaders and post-processing - steps to use faster code paths if possible. A value not equal to zero stands - for true. - Type: integer. Default: 0 - - - - - Maximum bone cone per mesh for the step. Meshes - are split until the max number of bones is reached. - Type: integer. Default: 60 - - - - - Source UV channel for tangent space computation. The specified channel must exist or an error will be raised. - Type: integer. Default: 0 - - - - - Threshold used to determine if a bone is kept or removed during the step. - Type: float. Default: 1.0f - - - - - Require all bones to qualify for deboning before any are removed. - Type: bool. Default: false - - - - - Configures the step to use a user defined matrix as the scene root node - transformation before transforming vertices. - Type: bool. Default: false - - - - - Configures the step to use a user defined matrix as the scene root node transformation - before transforming vertices. - Type: Matrix4x4. Default: Identity Matrix - - - - - Configures the step to scale the entire scene by a certain amount. Some importers provide a mechanism to define a scaling unit for the model, - which this processing step can utilize. - Type: Float. Default: 1.0f. - - - - - Sets the vertex animation keyframe to be imported. Assimp does not support - vertex keyframes (only bone animation is supported). The libary reads only one frame of models - with vertex animations. By default this is the first frame. - The default value is 0. This option applies to all importers. However, it is - also possible to override the global setting for a specific loader. You can use the - AI_CONFIG_IMPORT_XXX_KEYFRAME options where XXX is a placeholder for the file format which - you want to override the global setting. - Type: integer. Default: 0 - - - - - See the documentation for . - - - - - See the documentation for . - - - - - See the documentation for . - - - - - See the documentation for . - - - - - See the documentation for . - - - - - See the documentation for . - - - - - Configures the AC loader to collect all surfaces which have the "Backface cull" flag set in separate - meshes. - Type: bool. Default: true - - - - - Configures whether the AC loader evaluates subdivision surfaces (indicated by the presence - of the 'subdiv' attribute in the file). By default, Assimp performs - the subdivision using the standard Catmull-Clark algorithm. - Type: bool. Default: true - - - - - Configures the UNREAL 3D loader to separate faces with different surface flags (e.g. two-sided vs single-sided). - Type: bool. Default: true - - - - - Configures the terragen import plugin to compute UV's for terrains, if - they are not given. Furthermore, a default texture is assigned. - UV coordinates for terrains are so simple to compute that you'll usually - want to compute them on your own, if you need them. This option is intended for model viewers which - want to offer an easy way to apply textures to terrains. - Type: bool. Default: false - - - - - Configures the ASE loader to always reconstruct normal vectors basing on the smoothing groups - loaded from the file. Some ASE files carry invalid normals, others don't. - Type: bool. Default: true - - - - - Configures the M3D loader to detect and process multi-part Quake player models. These models - usually consit of three files, lower.md3, upper.md3 and head.md3. If this propery is - set to true, Assimp will try to load and combine all three files if one of them is loaded. - Type: bool. Default: true - - - - - Tells the MD3 loader which skin files to load. When loading MD3 files, Assimp checks - whether a file named "md3_file_name"_"skin_name".skin exists. These files are used by - Quake III to be able to assign different skins (e.g. red and blue team) to models. 'default', 'red', 'blue' - are typical skin names. - Type: string. Default: "default" - - - - - Specifies the Quake 3 shader file to be used for a particular MD3 file. This can be a full path or - relative to where all MD3 shaders reside. - Type: string. Default: "" - - - - - Configures the LWO loader to load just one layer from the model. - LWO files consist of layers and in some cases it could be useful to load only one of them. - This property can be either a string - which specifies the name of the layer - or an integer - the index - of the layer. If the property is not set then the whole LWO model is loaded. Loading fails - if the requested layer is not vailable. The layer index is zero-based and the layer name may not be empty - Type: bool. Default: false (All layers are loaded) - - - - - Configures the MD5 loader to not load the MD5ANIM file for a MD5MESH file automatically. - The default strategy is to look for a file with the same name but with the MD5ANIm extension - in the same directory. If it is found it is loaded and combined with the MD5MESH file. This configuration - option can be used to disable this behavior. - Type: bool. Default: false - - - - - Defines the beginning of the time range for which the LWS loader evaluates animations and computes - AiNodeAnim's. - Assimp provides full conversion of Lightwave's envelope system, including pre and post - conditions. The loader computes linearly subsampled animation channels with the frame rate - given in the LWS file. This property defines the start time. - Animation channels are only generated if a node has at least one envelope with more than one key - assigned. This property is given in frames where '0' is the first. By default, - if this property is not set, the importer takes the animation start from the input LWS - file ('FirstFrame' line) - Type: integer. Default: taken from file - - - - - Defines the ending of the time range for which the LWS loader evaluates animations and computes - AiNodeAnim's. - Assimp provides full conversion of Lightwave's envelope system, including pre and post - conditions. The loader computes linearly subsampled animation channels with the frame rate - given in the LWS file. This property defines the end time. - Animation channels are only generated if a node has at least one envelope with more than one key - assigned. This property is given in frames where '0' is the first. By default, - if this property is not set, the importer takes the animation end from the input LWS - file. - Type: integer. Default: taken from file - - - - - Defines the output frame rate of the IRR loader. - IRR animations are difficult to convert for Assimp and there will always be - a loss of quality. This setting defines how many keys per second are returned by the converter. - Type: integer. Default: 100 - - - - - The Ogre importer will try to load this MaterialFile. Ogre meshes reference with material names, this does not tell Assimp - where the file is located. Assimp will try to find the source file in the following order: [material-name].material, [mesh-filename-base].material, - and lastly the material name defined by this config property. - Type: string. Default: "Scene.Material" - - - - - The Ogre importer will detect the texture usage from the filename. Normally a texture is loaded as a color map, if no target is specified - in the material file. If this is enabled, then Assimp will try to detect the type from the texture filename postfix: - - Normal Maps: _n, _nrm, _nrml, _normal, _normals, _normalmap - Specular Maps: _s, _spec, _specular, _specularmap - Light Maps: _l, _light, _lightmap, _occ, _occlusion - Displacement Maps: _dis, _displacement - - The matching is case insensitive. Postfix is taken between the last "_" and last ".". The default behavior is to detect type from lower cased - texture unit name by matching against: normalmap, specularmap, lightmap, and displacementmap. For both cases if no match is found then, - is used. - Type: Bool. Default: false. - - - - - Specifies whether the IFC loader skips over IfcSpace elements. IfcSpace elements (and their geometric representations) are used to represent free space in a building story. - Type: Bool. Default: true. - - - - - Specifies whether the IFC loader will use its own, custom triangulation algorithm to triangulate wall and floor meshes. If this is set to false, - walls will be either triangulated by the post process triangulation or will be passed through as huge polygons with faked holes (e.g. holes that are connected - with the outer boundary using a dummy edge). It is highly recommended to leave this property set to true as the default post process has some known - issues with these kind of polygons. - Type: Bool. Default: true. - - - - - Specifies the tessellation conic angle for IFC smoothing curves. Accepted range of values is between [5, 120] - Type: Float. Default: 10.0f - - - - - Specifies the tessellation for IFC cylindrical shapes. E.g. the number of segments used to approximate a circle. Accepted range of values is between [3, 180]. - Type: Integer. Default: 32 - - - - - Specifies whether the collada loader will ignore the up direction. - Type: Bool. Default: false - - - - - Specifies whether the FBX importer will merge all geometry layers present in the source file or take only the first. - Type: bool. Default: true. - - - - - Specifies whether the FBX importer will read all materials present in the source file or take only the referenced materials, if the importer - will read materials, otherwise this has no effect. - Type: Bool. Default: false. - - - - - Specifies whether the FBX importer will read materials. - Type: Bool. Default: true. - - - - - Specifies whether the FBX importer will read embedded textures. - Type: Bool. Default: true. - - - - - Specifies whether the FBX importer will search for embedded loaded textures, where no embedded texture data is provided. - Type: Bool. Default: false. - - - - - Specifies whether the FBX importer will read cameras. - Type: Bool. Default: true. - - - - - Specifies whether the FBX importer will read light sources. - Type: Bool. Default: true. - - - - - Specifies whether the FBX importer will read animations. - Type: Bool. default: true. - - - - - Specifies whether the FBX importer will act in strict mode in which only the FBX 2013 - format is supported and any other sub formats are rejected. FBX 2013 is the primary target for the importer, so this - format is best supported and well-tested. - Type: Bool. Default: false. - - - - - Specifies whether the FBX importer will preserve pivot points for transformations (as extra nodes). If set to false, pivots - and offsets will be evaluated whenever possible. - Type: Bool. Default: true. - - - - - Specifies whether the importer will drop empty animation curves or animation curves which match the bind pose - transformation over their entire defined range. - Type: Bool. Default: true. - - - - - Specifies if the X-file exporter should use 64-bit doubles rather than 32-bit floats. - Type: Bool. Default: false. - - - - - Static class that has a number of constants that are found in Assimp. These can be limits to configuration property default values. The constants - are grouped according to their usage or where they're found in the Assimp include files. - - - - - Default value for . - - - - - Default value for . - - - - - Default value for . - - - - - Default value for . - - - - - Default value for - - - - - Defines the maximum number of indices per face (polygon). - - - - - Defines the maximum number of bone weights. - - - - - Defines the maximum number of vertices per mesh. - - - - - Defines the maximum number of faces per mesh. - - - - - Defines the maximum number of vertex color sets per mesh. - - - - - Defines the maximum number of texture coordinate sets (UV(W) channels) per mesh. - - - - - Defines the default bone count limit. - - - - - Defines the deboning threshold. - - - - - Defines the maximum length of a string used in AiString. - - - - - Defines the default color material. - - - - - Defines the default textured material (if the meshes have UV coords). - - - - - Static class containing material key constants. A fully qualified mat key - name here means that it's a string that combines the mat key (base) name, its - texture type semantic, and its texture index into a single string delimited by - commas. For non-texture material properties, the texture type semantic and texture - index are always zero. - - - - - Material name (String) - - - - - Material name (String) - - - - - Two sided property (boolean) - - - - - Two sided property (boolean) - - - - - Shading mode property (ShadingMode) - - - - - Shading mode property (ShadingMode) - - - - - Enable wireframe property (boolean) - - - - - Enable wireframe property (boolean) - - - - - Blending function (BlendMode) - - - - - Blending function (BlendMode) - - - - - Opacity (float) - - - - - Opacity (float) - - - - - Bumpscaling (float) - - - - - Bumpscaling (float) - - - - - Shininess (float) - - - - - Shininess (float) - - - - - Reflectivity (float) - - - - - Reflectivity (float) - - - - - Shininess strength (float) - - - - - Shininess strength (float) - - - - - Refracti (float) - - - - - Refracti (float) - - - - - Diffuse color (Color4D) - - - - - Diffuse color (Color4D) - - - - - Ambient color (Color4D) - - - - - Ambient color (Color4D) - - - - - Specular color (Color4D) - - - - - Specular color (Color4D) - - - - - Emissive color (Color4D) - - - - - Emissive color (Color4D) - - - - - Transparent color (Color4D) - - - - - Transparent color (Color4D) - - - - - Reflective color (Color4D) - - - - - Reflective color (Color4D) - - - - - Background image (String) - - - - - Background image (String) - - - - - Texture base name - - - - - UVWSRC base name - - - - - Texture op base name - - - - - Mapping base name - - - - - Texture blend base name. - - - - - Mapping mode U base name - - - - - Mapping mode V base name - - - - - Texture map axis base name - - - - - UV transform base name - - - - - Texture flags base name - - - - - Helper function to get the fully qualified name of a texture property type name. Takes - in a base name constant, a texture type, and a texture index and outputs the name in the format: - "baseName,TextureType,texIndex" - - Base name - Texture type - Texture index - Fully qualified texture name - - - - Helper function to get the base name from a fully qualified name of a material property type name. The format - of such a string is: - "baseName,TextureType,texIndex" - - Fully qualified material property name. - Base name of the property type. - - - - Singleton that governs access to the unmanaged Assimp library functions. - - - - - Default name of the unmanaged library. Based on runtime implementation the prefix ("lib" on non-windows) and extension (.dll, .so, .dylib) will be appended automatically. - - - - - Gets the AssimpLibrary instance. - - - - - Gets if the Assimp unmanaged library supports multithreading. If it was compiled for single threading only, - then it will not utilize multiple threads during import. - - - - - Imports a file. - - Valid filename - Post process flags specifying what steps are to be run after the import. - Property store containing config name-values, may be null. - Pointer to the unmanaged data structure. - - - - Imports a file. - - Valid filename - Post process flags specifying what steps are to be run after the import. - Pointer to an instance of AiFileIO, a custom file IO system used to open the model and - any associated file the loader needs to open, passing NULL uses the default implementation. - Property store containing config name-values, may be null. - Pointer to the unmanaged data structure. - - - - Imports a scene from a stream. This uses the "aiImportFileFromMemory" function. The stream can be from anyplace, - not just a memory stream. It is up to the caller to dispose of the stream. - - Stream containing the scene data - Post processing flags - A hint to Assimp to decide which importer to use to process the data - Property store containing the config name-values, may be null. - Pointer to the unmanaged data structure. - - - - Releases the unmanaged scene data structure. This should NOT be used for unmanaged scenes that were marshaled - from the managed scene structure - only for scenes whose memory was allocated by the native library! - - Pointer to the unmanaged scene data structure. - - - - Applies a post-processing step on an already imported scene. - - Pointer to the unmanaged scene data structure. - Post processing steps to run. - Pointer to the unmanaged scene data structure. - - - - Gets all supported export formats. - - Array of supported export formats. - - - - Exports the given scene to a chosen file format. Returns the exported data as a binary blob which you can embed into another data structure or file. - - Scene to export, it is the responsibility of the caller to free this when finished. - Format id describing which format to export to. - Pre processing flags to operate on the scene during the export. - Exported binary blob, or null if there was an error. - - - - Exports the given scene to a chosen file format and writes the result file(s) to disk. - - The scene to export, which needs to be freed by the caller. The scene is expected to conform to Assimp's Importer output format. In short, - this means the model data should use a right handed coordinate system, face winding should be counter clockwise, and the UV coordinate origin assumed to be upper left. If the input is different, specify the pre processing flags appropiately. - Format id describing which format to export to. - Output filename to write to - Pre processing flags - accepts any post processing step flag. In reality only a small subset are actually supported, e.g. to ensure the input - conforms to the standard Assimp output format. Some may be redundant, such as triangulation, which some exporters may have to enforce due to the export format. - Return code specifying if the operation was a success. - - - - Exports the given scene to a chosen file format and writes the result file(s) to disk. - - The scene to export, which needs to be freed by the caller. The scene is expected to conform to Assimp's Importer output format. In short, - this means the model data should use a right handed coordinate system, face winding should be counter clockwise, and the UV coordinate origin assumed to be upper left. If the input is different, specify the pre processing flags appropiately. - Format id describing which format to export to. - Output filename to write to - Pointer to an instance of AiFileIO, a custom file IO system used to open the model and - any associated file the loader needs to open, passing NULL uses the default implementation. - Pre processing flags - accepts any post processing step flag. In reality only a small subset are actually supported, e.g. to ensure the input - conforms to the standard Assimp output format. Some may be redundant, such as triangulation, which some exporters may have to enforce due to the export format. - Return code specifying if the operation was a success. - - - - Creates a modifyable copy of a scene, useful for copying the scene that was imported so its topology can be modified - and the scene be exported. - - Valid scene to be copied - Modifyable copy of the scene - - - - Attaches a log stream callback to catch Assimp messages. - - Pointer to an instance of AiLogStream. - - - - Enables verbose logging. - - True if verbose logging is to be enabled or not. - - - - Gets if verbose logging is enabled. - - True if verbose logging is enabled, false otherwise. - - - - Detaches a logstream callback. - - Pointer to an instance of AiLogStream. - A return code signifying if the function was successful or not. - - - - Detaches all logstream callbacks currently attached to Assimp. - - - - - Create an empty property store. Property stores are used to collect import settings. - - Pointer to property store - - - - Deletes a property store. - - Pointer to property store - - - - Sets an integer property value. - - Pointer to property store - Property name - Property value - - - - Sets a float property value. - - Pointer to property store - Property name - Property value - - - - Sets a string property value. - - Pointer to property store - Property name - Property value - - - - Sets a matrix property value. - - Pointer to property store - Property name - Property value - - - - Retrieves a color value from the material property table. - - Material to retrieve the data from - Ai mat key (base) name to search for - Texture Type semantic, always zero for non-texture properties - Texture index, always zero for non-texture properties - The color if it exists. If not, the default Color4D value is returned. - - - - Retrieves an array of float values with the specific key from the material. - - Material to retrieve the data from - Ai mat key (base) name to search for - Texture Type semantic, always zero for non-texture properties - Texture index, always zero for non-texture properties - The maximum number of floats to read. This may not accurately describe the data returned, as it may not exist or be smaller. If this value is less than - the available floats, then only the requested number is returned (e.g. 1 or 2 out of a 4 float array). - The float array, if it exists - - - - Retrieves an array of integer values with the specific key from the material. - - Material to retrieve the data from - Ai mat key (base) name to search for - Texture Type semantic, always zero for non-texture properties - Texture index, always zero for non-texture properties - The maximum number of integers to read. This may not accurately describe the data returned, as it may not exist or be smaller. If this value is less than - the available integers, then only the requested number is returned (e.g. 1 or 2 out of a 4 float array). - The integer array, if it exists - - - - Retrieves a material property with the specific key from the material. - - Material to retrieve the property from - Ai mat key (base) name to search for - Texture Type semantic, always zero for non-texture properties - Texture index, always zero for non-texture properties - The material property, if found. - - - - Retrieves a string from the material property table. - - Material to retrieve the data from - Ai mat key (base) name to search for - Texture Type semantic, always zero for non-texture properties - Texture index, always zero for non-texture properties - The string, if it exists. If not, an empty string is returned. - - - - Gets the number of textures contained in the material for a particular texture type. - - Material to retrieve the data from - Texture Type semantic - The number of textures for the type. - - - - Gets the texture filepath contained in the material. - - Material to retrieve the data from - Texture type semantic - Texture index - The texture filepath, if it exists. If not an empty string is returned. - - - - Gets all values pertaining to a particular texture from a material. - - Material to retrieve the data from - Texture type semantic - Texture index - Returns the texture slot struct containing all the information. - - - - Gets the last error logged in Assimp. - - The last error message logged. - - - - Checks whether the model format extension is supported by Assimp. - - Model format extension, e.g. ".3ds" - True if the format is supported, false otherwise. - - - - Gets all the model format extensions that are currently supported by Assimp. - - Array of supported format extensions - - - - Gets a collection of importer descriptions that detail metadata and feature support for each importer. - - Collection of importer descriptions - - - - Gets the memory requirements of the scene. - - Pointer to the unmanaged scene data structure. - The memory information about the scene. - - - - Creates a quaternion from the 3x3 rotation matrix. - - Quaternion struct to fill - Rotation matrix - - - - Decomposes a 4x4 matrix into its scaling, rotation, and translation parts. - - 4x4 Matrix to decompose - Scaling vector - Quaternion containing the rotation - Translation vector - - - - Transposes the 4x4 matrix. - - Matrix to transpose - - - - Transposes the 3x3 matrix. - - Matrix to transpose - - - - Transforms the vector by the 3x3 rotation matrix. - - Vector to transform - Rotation matrix - - - - Transforms the vector by the 4x4 matrix. - - Vector to transform - Matrix transformation - - - - Multiplies two 4x4 matrices. The destination matrix receives the result. - - First input matrix and is also the Matrix to receive the result - Second input matrix, to be multiplied with "dst". - - - - Multiplies two 3x3 matrices. The destination matrix receives the result. - - First input matrix and is also the Matrix to receive the result - Second input matrix, to be multiplied with "dst". - - - - Creates a 3x3 identity matrix. - - Matrix to hold the identity - - - - Creates a 4x4 identity matrix. - - Matrix to hold the identity - - - - Gets the Assimp legal info. - - String containing Assimp legal info. - - - - Gets the native Assimp DLL's minor version number. - - Assimp minor version number - - - - Gets the native Assimp DLL's major version number. - - Assimp major version number - - - - Gets the native Assimp DLL's revision version number. - - Assimp revision version number - - - - Gets the native Assimp DLL's current version number as "major.minor.revision" string. This is the - version of Assimp that this wrapper is currently using. - - Unmanaged DLL version - - - - Gets the native Assimp DLL's current version number as a .NET version object. - - Unmanaged DLL version - - - - Get the compilation flags that describe how the native Assimp DLL was compiled. - - Compilation flags - - - - Defines all the unmanaged assimp C-function names. - - - - - Defines all of the delegates that represent the unmanaged assimp functions. - - - - - Enumerates supported platforms. - - - - - Windows platform. - - - - - Linux platform. - - - - - Mac platform. - - - - - An attribute that represents the name of an unmanaged function to import. - - - - - Name of the unmanaged function. - - - - - Constructs a new . - - Name of the function. - - - - Represents management and access to an unmanaged library. An unmanaged library can be loaded and unloaded dynamically. The library then searches for a list - of exported functions to create managed delegates for, allowing callers to access the library. Each OS platform has its own implementation to determine how to load - unmanaged libraries. - - - - - Occurs when the unmanaged library is loaded. - - - - - Occurs when the unmanaged library is freed. - - - - - Queries if the unmanaged library has been loaded or not. - - - - - Gets the default name of the unmanaged library DLL. This is dependent based on the platform extension and name prefix. Additional - names can be set in the (e.g. to load versioned DLLs) - - - - - Gets the path to the unmanaged library DLL that is currently loaded. - - - - - Gets the resolver used to find the unmanaged library DLL when loading. - - - - - Gets or sets whether an is thrown if the unmanaged DLL fails to load for whatever reason. By - default this is true. - - - - - Queries if the OS is 64-bit, if false then it is 32-bit. - - - - - Constructs a new . - - Default name (NOT path) of the unmanaged library. - Delegate types to instantiate and load. - - - - Gets an enum representing the current OS that is application is executing on. - - Platform enumeration. - - - - Loads the unmanaged library using the . - - True if the library was found and successfully loaded. - - - - Loads the unmanaged library using the supplied 32 and 64 bit paths, the one chosen is based on the OS bitness. - - Path to the 32-bit DLL - Path to the 64-bit DLL - True if the library was found and successfully loaded. - - - - Loads the unmanaged library using the supplied path. - - Path to the unmanaged DLL. - True if the library was found and successfully loaded. - - - - Frees the unmanaged library that is currently loaded. - - True if the library was sucessfully freed. - - - - Gets a delegate based on the unmanaged function name. - - Type of delegate. - Name of unmanaged function that is exported by the library. - The delegate, or null if not found. - - - - If library is not explicitly loaded by user, call this when trying to call an unmanaged function to load the unmanaged library - from the default path. This function is thread safe. - - - - - Called when the library is loaded. - - - - - Called when the library is freed. - - - - - Resolves unmanaged DLLs for . The process is completely configurable, where the user can supply alternative library names (e.g. versioned libs), - an override library name, and probing paths. These can be set for both 32/64 bit, or seperately for 32 or 64 bit. See - for the search strategy. - - - - - Gets the platform that the application is running on. - - - - - Constructs a new instance of the class. - - Platform we're resolving binaries for. - - - - Sets the collection of fallback library names (e.g. versioned libs) for 32-bit probing. - - Null to clear, or set of fallback library names. - - - - Sets the collection of fallback library names (e.g. versioned libs) for 64-bit probing. - - Null to clear, or set of fallback library names. - - - - Sets the collection of fallback library names (e.g. versioned libs) for both 32-bit and 64-bit probing. - - Null to clear, or set of fallback library names. - - - - Sets the collection of file paths to probe for 32-bit libraries. These paths always are first to be searched, in the order - that they are given. - - Null to clear, or set of paths to probe. - - - - Sets the collection of file paths to probe for 64-bit libraries. These paths always are first to be searched, in the order - that they are given. - - Null to clear, or set of paths to probe. - - - - Sets the collection of file paths to probe for both 32-bit and 64-bit libraries. These paths always are first to be searched, in the order - that they are given. - - Null to clear, or set of paths to probe. - - - - Sets an override 32-bit library name. By default, the implementations creates a default name for the library, which - is passed into for resolving. If the override is non-null, it will be used instead. This is useful if the library - to be loaded is not conforming to the platform's default prefix/extension scheme (e.g. libXYZ.so on linux where "lib" is the prefix and ".so" the extension). - - Null to clear, or override library name. - - - - Sets an override 64-bit library name. By default, the implementations creates a default name for the library, which - is passed into for resolving. If the override is non-null, it will be used instead. This is useful if the library - to be loaded is not conforming to the platform's default prefix/extension scheme (e.g. libXYZ.so on linux where "lib" is the prefix and ".so" the extension). - - Null to clear, or override library name. - - - - Sets an override 32-bit and 64-bit library name. By default, the implementations creates a default name for the library, which - is passed into for resolving. If the override is non-null, it will be used instead. This is useful if the library - to be loaded is not conforming to the platform's default prefix/extension scheme (e.g. libXYZ.so on linux where "lib" is the prefix and ".so" the extension). - - Null to clear, or override library name. - - - - Given a library name, this function attempts to resolve the file path from which it can be loaded. Each step of the search strategy uses the fallback - library names if the given name was not found in the current step. If the search is unsuccessfully, the library name is returned which means the OS will try - and do its own search strategy when attempting to load the library (this is dependent on the OS). The search strategy is the following, in order of execution: - - - Search user-specified probing paths. - Search {AppBaseDirectory}/runtimes/{RID}/native/. - Search {AppBaseDirectory}/. - Search nuget package path, e.g. {UserProfile}/.nuget/packages/{PackageId}/{PackageVersion}/runtimes/{RID}/native/. - - - - The search strategy gives priority to user-specified probing paths, then local paths to the application, then finally examining the global nuget cache. The RID - is the Runtime Identifier based on the platform/architecture, see also Microsoft's RID Catalog. - - - Name of the library to attempt to resolve. - Full file path to the library, or the file name if not found (e.g. "libXYZ.so"). - - - - Represents an aiScene struct. - - - - - unsigned int, flags about the state of the scene - - - - - aiNode*, root node of the scenegraph. - - - - - Number of meshes contained. - - - - - aiMesh**, meshes in the scene. - - - - - Number of materials contained. - - - - - aiMaterial**, materials in the scene. - - - - - Number of animations contained. - - - - - aiAnimation**, animations in the scene. - - - - - Number of embedded textures contained. - - - - - aiTexture**, textures in the scene. - - - - - Number of lights contained. - - - - - aiLight**, lights in the scene. - - - - - Number of cameras contained. - - - - - aiCamera**, cameras in the scene. - - - - - void*, Private data do not touch! - - - - - Represents an aiNode struct. - - - - - Name of the node. - - - - - Node's transform relative to its parent. - - - - - aiNode*, node's parent. - - - - - Number of children the node owns. - - - - - aiNode**, array of nodes this node owns. - - - - - Number of meshes referenced by this node. - - - - - unsigned int*, array of mesh indices. - - - - - aiMetadata*, pointer to a metadata container. May be NULL, if an importer doesn't document metadata then it doesn't write any. - - - - - Represents an aiMetadataEntry struct. - - - - - Type of metadata. - - - - - Pointer to data. - - - - - Represents an aiMetadata struct. - - - - - Length of the Keys and Values arrays. - - - - - aiString*, array of keys. May not be NULL. Each entry must exist. - - - - - aiMetadataEntry*, array of values. May not be NULL. Entries may be NULL if the corresponding property key has no assigned value. - - - - - Represents an aiMesh struct. Note: This structure requires marshaling, due to the arrays of IntPtrs. - - - - - unsigned int, bitwise flag detailing types of primitives contained. - - - - - Number of vertices in the mesh, denotes length of - -all- per-vertex arrays. - - - - - Number of faces in the mesh. - - - - - aiVector3D*, array of positions. - - - - - aiVector3D*, array of normals. - - - - - aiVector3D*, array of tangents. - - - - - aiVector3D*, array of bitangents. - - - - - aiColor4D*[Max_Value], array of arrays of vertex colors. Max_Value is defined as . - - - - - aiVector3D*[Max_Value], array of arrays of texture coordinates. Max_Value is defined as . - - - - - unsigned int[Max_Value], array of ints denoting the number of components for each set of texture coordinates - UV (2), UVW (3) for example. - Max_Value is defined as . - - - - - aiFace*, array of faces. - - - - - Number of bones in the mesh. - - - - - aiBone**, array of bones. - - - - - Material index referencing the material in the scene. - - - - - Optional name of the mesh. - - - - - Number of attachment meshes. NOT CURRENTLY IN USE. - - - - - aiAnimMesh**, array of attachment meshes for vertex-based animation. NOT CURRENTLY IN USE. - - - - - unsigned int, method of morphing when anim meshes are specified. - - - - - Represents an aiTexture struct. - - - - - Width of the texture. - - - - - Height of the texture. - - - - - sbyte[9], format extension hint. Fixed size char is two bytes regardless of encoding. Unmanaged assimp uses a char that - maps to one byte. 8 for string + 1 for terminator. - - - - - aiTexel*, array of texel data. - - - - - Sets the format hint. - - Format hint - must be 3 characters or less - - - - Gets the format hint. - - The format hint - - - - Gets the format hint. Use this to avoid struct copy if the string was passed by read-only ref. - - AiTexture - The format hint - - - - Represents an aiFace struct. - - - - - Number of indices in the face. - - - - - unsigned int*, array of indices. - - - - - Represents an aiBone struct. - - - - - Name of the bone. - - - - - Number of weights. - - - - - VertexWeight*, array of vertex weights. - - - - - Matrix that transforms the vertex from mesh to bone space in bind pose - - - - - Represents an aiMaterialProperty struct. - - - - - Name of the property (key). - - - - - Textures: Specifies texture usage. None texture properties - have this zero (or None). - - - - - Textures: Specifies the index of the texture. For non-texture properties - this is always zero. - - - - - Size of the buffer data in bytes. This value may not be zero. - - - - - Type of value contained in the buffer. - - - - - char*, byte buffer to hold the property's value. - - - - - Represents an aiMaterial struct. - - - - - aiMaterialProperty**, array of material properties. - - - - - Number of key-value properties. - - - - - Storage allocated for key-value properties. - - - - - Represents an aiNodeAnim struct. - - - - - Name of the node affected by the animation. The node must exist - and be unique. - - - - - Number of position keys. - - - - - VectorKey*, position keys of this animation channel. Positions - are 3D vectors and are accompanied by at least one scaling and one rotation key. - - - - - The number of rotation keys. - - - - - QuaternionKey*, rotation keys of this animation channel. Rotations are 4D vectors (quaternions). - If there are rotation keys there will be at least one scaling and one position key. - - - - - Number of scaling keys. - - - - - VectorKey*, scaling keys of this animation channel. Scalings are specified as a - 3D vector, and if there are scaling keys, there will at least be one position - and one rotation key. - - - - - Defines how the animation behaves before the first key is encountered. - - - - - Defines how the animation behaves after the last key was processed. - - - - - Represents an aiMeshAnim struct. - - - - - Name of the mesh to be animated. Empty string not allowed. - - - - - Number of keys, there is at least one. - - - - - aiMeshkey*, the key frames of the animation. There must exist at least one. - - - - - Represents an aiMeshMorphKey struct. - - - - - The time of this key. - - - - - unsigned int*, values at the time of this key. - - - - - double*, weights at the time of this key. - - - - - unsigned int, the number of values/weights. - - - - - Represents an aiMeshMorphAnim struct. - - - - - aiString, the name of the mesh to be animated. Empty strings are not allowed, animated meshes need to be named (not necessarily uniquely, - the name can basically serve as a wildcard to select a group of meshes with similar animation setup). - - - - - unsigned int, number of key frames. Must be at least one. - - - - - aiMeshMorphKey*, key frames of the animation. - - - - - Represents an aiAnimation struct. - - - - - Name of the animation. - - - - - Duration of the animation in ticks. - - - - - Ticks per second, 0 if not specified in imported file. - - - - - Number of bone animation channels, each channel affects a single node. - - - - - aiNodeAnim**, node animation channels. Each channel affects a single node. - - - - - Number of mesh animation channels. Each channel affects a single mesh and defines - vertex-based animation. - - - - - aiMeshAnim**, mesh animation channels. Each channel affects a single mesh. - - - - - Number of mesh morph animation channels. Each channel affects a single mesh and defines - morphing animation. - - - - - aiMeshMorphAnim**, mesh morph animation channels. Each channel affects a single mesh. - - - - - Represents an aiLight struct. - - - - - Name of the light. - - - - - Type of light. - - - - - Position of the light. - - - - - Direction of the spot/directional light. - - - - - Up direction of the light source in space. Undefined for point lights. - - - - - Attenuation constant value. - - - - - Attenuation linear value. - - - - - Attenuation quadratic value. - - - - - Diffuse color. - - - - - Specular color. - - - - - Ambient color. - - - - - Spot light inner angle. - - - - - Spot light outer angle. - - - - - Width (X) and Height (Y) of the area that represents an light. - - - - - Represents an aiCamera struct. - - - - - Name of the camera. - - - - - Position of the camera. - - - - - Up vector of the camera. - - - - - Viewing direction of the camera. - - - - - Field Of View of the camera. - - - - - Near clip plane distance. - - - - - Far clip plane distance. - - - - - The Aspect ratio. - - - - - Represents an aiString struct. - - - - - Byte length of the UTF-8 string. - - - - - Actual string data. - - - - - Constructs a new instance of the struct. - - The string data - - - - Convienence method for getting the AiString string - if the length is not greater than zero, it returns - an empty string rather than garbage. Use this to avoid struct copy if the string was passed by read-only ref. - - AiString - AiString string data - - - - Convienence method for getting the AiString string - if the length is not greater than zero, it returns - an empty string rather than garbage. - - AiString string data - - - - Convienence method for setting the AiString string (and length). - - String data to set - True if the operation was successful, false otherwise. - - - - Returns the fully qualified type name of this instance. - - A containing a fully qualified type name. - - - - Represents a log stream, which receives all log messages and streams them somewhere. - - - - - Function pointer that gets called when a message is to be logged. - - - - - char*, user defined opaque data. - - - - - Represents the memory requirements for the different components of an imported - scene. All sizes in in bytes. - - - - - Size of the storage allocated for texture data, in bytes. - - - - - Size of the storage allocated for material data, in bytes. - - - - - Size of the storage allocated for mesh data, in bytes. - - - - - Size of the storage allocated for node data, in bytes. - - - - - Size of the storage allocated for animation data, in bytes. - - - - - Size of the storage allocated for camera data, in bytes. - - - - - Size of the storage allocated for light data, in bytes. - - - - - Total storage allocated for the imported scene, in bytes. - - - - - Represents an aiAnimMesh struct. Note: This structure requires marshaling, due to the array of IntPtrs. - - - - - aiVector3D*, replacement position array. - - - - - aiVector3D*, replacement normal array. - - - - - aiVector3D*, replacement tangent array. - - - - - aiVector3D*, replacement bitangent array. - - - - - aiColor4D*[Max_Value], array of arrays of vertex colors. Max_Value is defined as . - - - - - aiVector3D*[Max_Value], array of arrays of texture coordinates. Max_Value is defined as . - - - - - unsigned int, number of vertices. - - - - - float, weight of the AnimMesh. - - - - - Describes a variety of information about an importer. - - - - - char*, full name of the importer (e.g. Blender3D Importer) - - - - - char*, original author (blank if unknown or assimp team) - - - - - char*, current maintainer, left blank if the author maintains. - - - - - char*, implementation comments. E.g. unimplemented features. - - - - - unsigned int, features supported by the importer. - - - - - unsigned int, max major version of format supported. If no version scheme or importer doesn't care, will be zero. - - - - - unsigned int, min major version of format supported. If no version scheme or importer doesn't care, will be zero. - - - - - unsigned int, max major version of format supported. If no version scheme, forwards compatible, or importer doesn't care, will be zero. - - - - - unsigned int, min major version of format supported. If no version scheme, forwards compatible, or importer doesn't care, will be zero. - - - - - char*, list of file extensions the importer can handle. Entries are separated by space characters, and all entries are lower case WITHOUT a leading dot. (e.g. "xml dae"). - Multiple importers may respond to the same file extension, assim - - - - - Describes a file format which Assimp can export to. - - - - - char*, a short string ID to uniquely identify the export format. e.g. "collada" or "obj" - - - - - char*, a short description of the file format to present to users. - - - - - char*, a recommended file extension of the exported file in lower case. - - - - - Describes a blob of exported scene data. Blobs can be nested, the first blob always has an empty name. Nested - blobs represent auxillary files produced by the exporter (e.g. material files) and are named accordingly. - - - - - size_t, size of the data in bytes. - - - - - void*, the data. - - - - - AiString, name of the blob. - - - - - aiExportDataBlob*, pointer to the next blob in the chain. - - - - - Contains callbacks to implement a custom file system to open and close files. - - - - - Function pointer to open a new file. - - - - - Function pointer used to close an existing file. - - - - - Char*, user defined opaque data. - - - - - Contains callbacks to read and write to a file opened by a custom file system. - - - - - Function pointer to read from a file. - - - - - Function pointer to write to a file. - - - - - Function pointer to retrieve the current position of the file cursor. - - - - - Function pointer to retrieve the size of the file. - - - - - Function pointer to set the current position of the file cursor. - - - - - Function pointer to flush the file contents. - - - - - Char*, user defined opaque data. - - - - - Callback delegate for Assimp's LogStream. - - Log message - char* pointer to user data that is passed to the callback - - - - Callback delegate for a custom file system, to write to a file. - - Pointer to an AiFile instance - Char* pointer to data to write (casted from a void*) - Size of a single element in bytes to write - Number of elements to write - Number of elements successfully written. Should be zero if either size or numElements is zero. May be less than numElements if an error occured. - - - - Callback delegate for a custom file system, to read from a file. - - Pointer to an AiFile instance. - Char* pointer that will store the data read (casted from a void*) - Size of a single element in bytes to read - Number of elements to read - Number of elements succesfully read. Should be zero if either size or numElements is zero. May be less than numElements if end of file is encountered, or if an error occured. - - - - Callback delegate for a custom file system, to tell offset/size information about the file. - - Pointer to an AiFile instance. - Returns the current file cursor or the file size in bytes. May be -1 if an error has occured. - - - - Callback delegate for a custom file system, to flush the contents of the file to the disk. - - Pointer to an AiFile instance. - - - - Callback delegate for a custom file system, to set the current position of the file cursor. - - Pointer to An AiFile instance. - Offset from the origin. - Position used as a reference - Returns success, if successful - - - - Callback delegate for a custom file system, to open a given file and create a new AiFile instance. - - Pointer to an AiFileIO instance. - Path to the target file - Read-write permissions to request - Pointer to an AiFile instance. - - - - Callback delegate for a custom file system, to close a given file and free its memory. - - Pointer to an AiFileIO instance. - Pointer to an AiFile instance that will be closed. - - - - Fixed length array for representing the color channels of a mesh. Length is equal - to . - - - - - Gets the length of the array. - - - - - Gets or sets an array value at the specified index. - - Zero-based index. - - - - Fixed length array for representing the texture coordinate channels of a mesh. Length is equal - to . - - - - - Gets the length of the array. - - - - - Gets or sets an array value at the specified index. - - Zero-based index. - - - - Fixed length array for representing the number of UV components for each texture coordinate channel of a mesh. Length is equal - to . - - - - - Gets the length of the array. - - - - - Gets or sets an array value at the specified index. - - Zero-based index. - - - - Defines how an UV channel is transformed. - - - - - Translation on the U and V axes. Default is 0|0 - - - - - Scaling on the U and V axes. Default is 1|1. - - - - - Rotation in counter-clockwise direction, specfied in - radians. The rotation center is 0.5f|0.5f and the - default value is zero. - - - - - Represents a two-dimensional vector. - - - - - X component. - - - - - Y component - - - - - Gets or sets the component value at the specified zero-based index - in the order of XY (index 0 access X, 1 access Y. If - the index is not in range, a value of zero is returned. - - Zero-based index. - The component value - - - - Constructs a new Vector2D. - - X component - Y component - - - - Constructs a new Vector2D with both components - set the same value. - - Value to set both X and Y to - - - - Sets the X and Y values. - - X component - Y component - - - - Calculates the length of the vector. - - Vector's length - - - - Calculates the length of the vector squared. - - Vector's length squared - - - - Normalizes the vector where all components add to one (Unit Vector), but preserves - the direction that the vector represents. - - - - - Negates the vector. - - - - - Adds two vectors together. - - First vector - Second vector - Added vector - - - - Subtracts the second vector from the first vector. - - First vector - Second vector - Resulting vector - - - - Multiplies two vectors together. - - First vector - Second vector - Multiplied vector - - - - Multiplies a vector by a scalar. - - Source vector - Scalar value - Scaled vector - - - - Multiplies a vector by a scalar. - - Scalar value - Source vector - Scaled vector - - - - Divides the first vector by the second vector. - - First vector - Second vector - Divided vector - - - - Divides the vector by a divisor value. - - Source vector - Divisor - Divided vector - - - - Negates the vector. - - Source vector - Negated vector - - - - Tests equality between two vectors. - - First vector - Second vector - True if the vectors are equal, false otherwise - - - - Tests inequality between two vectors. - - First vector - Second vector - True if the vectors are not equal, false otherwise - - - - Tests equality between this vector and another vector. - - Vector to test against - True if components are equal - - - - Tests equality between this vector and another object. - - Object to test against - True if the object is a vector and the components are equal - - - - Returns a hash code for this instance. - - - A hash code for this instance, suitable for use in hashing algorithms and data structures like a hash table. - - - - - Returns a that represents this instance. - - - A that represents this instance. - - - - - Represents a three-dimensional vector. - - - - - X component. - - - - - Y component. - - - - - Z component. - - - - - Gets or sets the component value at the specified zero-based index - in the order of XYZ (index 0 access X, 1 access Y, etc). If - the index is not in range, a value of zero is returned. - - Zero-based index. - The component value - - - - Constructs a new Vector3D. - - X component - Y component - Z component - - - - Constructs a new Vector3D. - - Vector2D containing the X, Y values - Z component - - - - Constructs a new Vector3D where each component is set - to the same value. - - Value to set X, Y, and Z to - - - - Sets the X, Y, and Z values. - - X component - Y component - Z component - - - - Calculates the length of the vector. - - Vector's length - - - - Calculates the length of the vector squared. - - Vector's length squared - - - - Normalizes the vector where all components add to one (Unit Vector), but preserves - the direction that the vector represents. - - - - - Negates the vector. - - - - - Calculates the cross product of two vectors. - - First vector - Second vector - Resulting vector - - - - Calculates the dot product of two vectors. - - First vector - Second vector - Resulting vector - - - - Adds two vectors together. - - First vector - Second vector - Added vector - - - - Subtracts the second vector from the first vector. - - First vector - Second vector - Resulting vector - - - - Multiplies two vectors together. - - First vector - Second vector - Multiplied vector - - - - Multiplies a vector by a scalar. - - Source vector - Scalar value - Scaled vector - - - - Multiplies a vector by a scalar. - - Scalar value - Source vector - Scaled vector - - - - Transforms this vector by a 3x3 matrix. This "post-multiplies" the two. - - Source matrix - Source vector - Transformed vector - - - - Transforms this vector by a 4x4 matrix. This "post-multiplies" the two. - - Source matrix - Source vector - Transformed vector - - - - Divides the first vector by the second vector. - - First vector - Second vector - Divided vector - - - - Divides the vector by a divisor value. - - Source vector - Divisor - Divided vector - - - - Negates the vector. - - Source vector - Negated vector - - - - Tests equality between two vectors. - - First vector - Second vector - True if the vectors are equal, false otherwise - - - - Tests inequality between two vectors. - - First vector - Second vector - True if the vectors are not equal, false otherwise - - - - Tests equality between this vector and another vector. - - Vector to test against - True if components are equal - - - - Tests equality between this vector and another object. - - Object to test against - True if the object is a vector and the components are equal - - - - Returns a hash code for this instance. - - - A hash code for this instance, suitable for use in hashing algorithms and data structures like a hash table. - - - - - Returns a that represents this instance. - - - A that represents this instance. - - - - - Time-value pair specifying a 3D vector for a given time. - - - - - The time of this key. - - - - - The 3D vector value of this key. - - - - - Constructs a new VectorKey. - - The time of this key. - The 3D vector value of this key. - - - - Tests equality between two keys. - - The first key - The second key - True if the key's 3D vectors are the same, false otherwise. - - - - Tests inequality between two keys. - - The first key - The second key - True if the key's 3D vectors are not the same, false otherwise. - - - - Tests inequality between two keys. - - The first key - The second key - True if the first key's time is less than the second key's. - - - - Tests inequality between two keys. - - The first key - The second key - True if the first key's time is greater than the second key's. - - - - Determines whether the specified is equal to this instance. - - The to compare with this instance. - - true if the specified is equal to this instance; otherwise, false. - - - - - Tests equality between this key and another. - - Other key to test - True if their 3D vectors are equal. - - - - Returns a hash code for this instance. - - - A hash code for this instance, suitable for use in hashing algorithms and data structures like a hash table. - - - - - Returns a that represents this instance. - - - A that represents this instance. - - - - - Represents a single influence of a bone on a vertex. - - - - - Index of the vertex which is influenced by the bone. - - - - - Strength of the influence in range of (0...1). All influences - from all bones at one vertex amounts to 1. - - - - - Constructs a new VertexWeight. - - Index of the vertex. - Weight of the influence. - - - - Returns a that represents this instance. - - - A that represents this instance. - - - - - Internal stub type used by MemoryInterop.ILPatcher to inject fast-interop code. Depending on the type of method, the IL injection is either inline (replacing the call) or - replaces the entire method body. Recommended types to use are generally blittable structs. - - - - - Casts the by-ref value from one type to another. - - Type to cast from. - Type to cast to. - By-ref value. - Ref to the value, as the new type. - - - - Casts the readonly by-ref value from one type to another. - - Type to cast from. - Type to cast to. - By-ref value. - Ref to the value, as the new type. - - - - Casts the pointer to a by-ref value of the specified type. - - Type to cast to. - Pointer. - Ref to the value, as the new type. - - - - Write data from the managed array to the memory location. This will temporarily pin the array and do a memcpy. - - Type of data. - Pointer to memory location to receive the data. - Array containing data to write. - Zero-based index to start reading data from the array. - Number of elements to copy. - - - - Write data from the managed array to the memory location. This will temporarily pin the array and do an unaligned memcpy. - - Type of data. - Pointer to memory location to write the data. - Array containing data to write. - Zero-based index to start reading data from the array. - Number of elements to copy. - - - - Read data from the memory location to the managed array. This will temporarily pin the array and do a memcpy. - - Type of data. - Pointer to memory location to read the data. - Array to store the copied data. - Zero-based index to start writing data to in the array. - Number of elements to copy. - - - - Read data from the memory location to the managed array. This will temporarily pin the array and do an unaligned memcpy. - - Type of data. - Pointer to memory location to read the data. - Array to store the copied data. - Zero-based index to start writing data to in the array. - Number of elements to copy. - - - - Computes the size of the type (inlined). - - Type of data. - Size of the type in bytes. - - - - Casts the by-ref value to a pointer (inlined). Note: This does not do any sort of pinning. - - Type of data. - Ref to a value. - Pointer to the memory location. - - - - Casts the readonly by-ref value to a pointer (inlined). Note: This does not do any sort of pinning. - - Type of data. - Ref to a value. - Pointer to the memory location. - - - - Writes a single element to the memory location (inlined). - - Type of data. - Pointer to memory location. - Value to be written. - - - - Writes a single element to the memory location (inlined, unaligned copy). - - Type of data. - Pointer to memory location. - Value to be written. - - - - Reads a single element from the memory location (inlined). - - Type of data. - Pointer to memory location. - Value read. - - - - Reads a single element from the memory location (inlined, unaligned copy). - - Type of data. - Pointer to memory location. - Value read. - - - - Copies the number of bytes from one pointer to the other (inlined). - - Pointer to the destination memory location. - Pointer to the source memory location - Number of bytes to copy - - - - Copies the number of bytes from one pointer to the other (inlined, unaligned copy). - - Pointer to the destination memory location. - Pointer to the source memory location - Number of bytes to copy - - - - Clears the memory to a specified value (inlined). - - Pointer to the memory location. - Value the memory will be cleared to. - Number of bytes to to set. - - - - Clears the memory to a specified value (inlined, unaligned init). - - Pointer to the memory location. - Value the memory will be cleared to. - Number of bytes to to set. - - - diff --git a/packages/AssimpNet.4.1.0/lib/netstandard1.3/AssimpNet.dll b/packages/AssimpNet.4.1.0/lib/netstandard1.3/AssimpNet.dll deleted file mode 100644 index 7f2e61bb..00000000 Binary files a/packages/AssimpNet.4.1.0/lib/netstandard1.3/AssimpNet.dll and /dev/null differ diff --git a/packages/AssimpNet.4.1.0/lib/netstandard1.3/AssimpNet.xml b/packages/AssimpNet.4.1.0/lib/netstandard1.3/AssimpNet.xml deleted file mode 100644 index 04097be1..00000000 --- a/packages/AssimpNet.4.1.0/lib/netstandard1.3/AssimpNet.xml +++ /dev/null @@ -1,11454 +0,0 @@ - - - - AssimpNet - - - - - An animation consists of keyframe data for a number of nodes. For - each node affected by the animation, a separate series of data is given. - - - - - Gets or sets the name of the animation. If the modeling package the - data was exported from only supports a single animation channel, this - name is usually empty. - - - - - Gets or sets the duration of the animation in number of ticks. - - - - - Gets or sets the number of ticks per second. It may be zero - if it is not specified in the imported file. - - - - - Gets if the animation has node animation channels. - - - - - Gets the number of node animation channels where each channel - affects a single node. - - - - - Gets the node animation channels. - - - - - Gets if the animation has mesh animations. - - - - - Gets the number of mesh animation channels. - - - - - Gets the number of mesh morph animation channels. - - - - - Gets the mesh animation channels. - - - - - Gets the mesh morph animation channels. - - - - - Constructs a new instance of the class. - - - - - Gets if the native value type is blittable (that is, does not require marshaling by the runtime, e.g. has MarshalAs attributes). - - - - - Writes the managed data to the native value. - - Optional pointer to the memory that will hold the native value. - Output native value - - - - Reads the unmanaged data from the native value. - - Input native value - - - - Frees unmanaged memory created by . - - Native value to free - True if the unmanaged memory should be freed, false otherwise. - - - - Represents an Assimp Import/Export context that load or save models using the unmanaged library. Additionally, conversion - functionality is offered to bypass loading model data into managed memory. - - - - - Gets if the context has been disposed. - - - - - Gets or sets the uniform scale for the model. This is multiplied - with the existing root node's transform. This is only used during import. - - - - - Gets or sets the model's rotation about the X-Axis, in degrees. This is multiplied - with the existing root node's transform. This is only used during import. - - - - - Gets or sets the model's rotation abut the Y-Axis, in degrees. This is multiplied - with the existing root node's transform. This is only used during import. - - - - - Gets or sets the model's rotation about the Z-Axis, in degrees. This is multiplied - with the existing root node's transform. This is only used during import. - - - - - Gets whether this context is using a user-defined IO system for file handling. - - - - - Gets the property configurations set to this context. This is only used during import. - - - - - Constructs a new instance of the class. - - - - - Imports a model from the stream without running any post-process steps. The importer sets configurations - and loads the model into managed memory, releasing the unmanaged memory used by Assimp. It is up to the caller to dispose of the stream. - If the format is distributed across multiple files/streams, set a custom - and use the "ImportFile" family of functions. - - Stream to read from - Optional format extension to serve as a hint to Assimp to choose which importer to use. If null or empty, the system will - try to detect what importer to use from the data which may or may not be successful. - The imported scene - Thrown if the stream is not valid (null or write-only). - Thrown if the context has already been disposed of. - - - - Imports a model from the stream. The importer sets configurations and loads the model into managed memory, releasing the unmanaged memory - used by Assimp. It is up to the caller to dispose of the stream. If the format is distributed across multiple files/streams, set a custom - and use the "ImportFile" family of functions. - - Stream to read from - Post processing flags, if any - Optional format extension to serve as a hint to Assimp to choose which importer to use. If null or empty, the system will - try to detect what importer to use from the data which may or may not be successful. - The imported scene - Thrown if the stream is not valid (null or write-only). - Thrown if the context has already been disposed of. - - - - Imports a model from the specified file without running any post-process steps. The importer sets configurations - and loads the model into managed memory, releasing the unmanaged memory used by Assimp. - - Full path to the file - The imported scene - Thrown if there was a general error in importing the model. - Thrown if the file could not be located. - Thrown if the context has already been disposed of. - - - - Imports a model from the specified file. The importer sets configurations - and loads the model into managed memory, releasing the unmanaged memory used by Assimp. - - Full path to the file - Post processing flags, if any - The imported scene - Thrown if there was a general error in importing the model. - Thrown if the file could not be located. - Thrown if the context has already been disposed of. - - - - Exports a scene to the specified format and writes it to a file. - - Scene containing the model to export. - Path to the file. - FormatID representing the format to export to. - True if the scene was exported successfully, false otherwise. - Thrown if the scene is null. - Thrown if the context has already been disposed of. - - - - Exports a scene to the specified format and writes it to a file. - - Scene containing the model to export. - Path to the file. - FormatID representing the format to export to. - Preprocessing flags to apply to the model before it is exported. - True if the scene was exported successfully, false otherwise. - Thrown if the scene is null. - Thrown if the context has already been disposed of. - - - - Exports a scene to the specified format and writes it to a data blob. - - Scene containing the model to export. - FormatID representing the format to export to. - The resulting data blob, or null if the export failed. - Thrown if the scene is null. - Thrown if the context has already been disposed of. - - - - Exports a scene to the specified format and writes it to a data blob. - - Scene containing the model to export. - FormatID representing the format to export to. - Preprocessing flags to apply to the model before it is exported. - The resulting data blob, or null if the export failed. - Thrown if the scene is null. - Thrown if the context has already been disposed of. - - - - Converts the model contained in the file to the specified format and save it to a file. - - Input file name to import - Output file name to export to - Format id that specifies what format to export to - True if the conversion was successful or not, false otherwise. - Thrown if there was a general error in importing the model. - Thrown if the file could not be located. - Thrown if the context has already been disposed of. - - - - Converts the model contained in the file to the specified format and save it to a file. - - Input file name to import - Output file name to export to - Format id that specifies what format to export to - Pre processing steps used for the export - True if the conversion was successful or not, false otherwise. - Thrown if there was a general error in importing the model. - Thrown if the file could not be located. - Thrown if the context has already been disposed of. - - - - Converts the model contained in the file to the specified format and save it to a file. - - Input file name to import - Post processing steps used for the import - Output file name to export to - Format id that specifies what format to export to - Pre processing steps used for the export - True if the conversion was successful or not, false otherwise. - Thrown if there was a general error in importing the model. - Thrown if the file could not be located. - Thrown if the context has already been disposed of. - - - - Converts the model contained in the file to the specified format and save it to a data blob. - - Input file name to import - Format id that specifies what format to export to - Data blob containing the exported scene in a binary form - Thrown if there was a general error in importing the model. - Thrown if the file could not be located. - Thrown if the context has already been disposed of. - - - - Converts the model contained in the file to the specified format and save it to a data blob. - - Input file name to import - Format id that specifies what format to export to - Pre processing steps used for the export - Data blob containing the exported scene in a binary form - Thrown if there was a general error in importing the model. - Thrown if the file could not be located. - Thrown if the context has already been disposed of. - - - - Converts the model contained in the file to the specified format and save it to a data blob. - - Input file name to import - Post processing steps used for the import - Format id that specifies what format to export to - Pre processing steps used for the export - Data blob containing the exported scene in a binary form - Thrown if there was a general error in importing the model. - Thrown if the file could not be located. - Thrown if the context has already been disposed of. - - - - Converts the model contained in the stream to the specified format and save it to a file. It is up to the caller to dispose of the stream. - If the format is distributed across multiple files/streams, set a custom - and use the "ConvertFromFileToFile" family of functions. - - Stream to read from - Optional format extension to serve as a hint to Assimp to choose which importer to use. If null or empty, the system will - try to detect what importer to use from the data which may or may not be successful - Output file name to export to - Format id that specifies what format to export to - True if the conversion was successful or not, false otherwise. - Thrown if the stream is not valid (null or write-only). - Thrown if the context has already been disposed of. - - - - Converts the model contained in the stream to the specified format and save it to a file. It is up to the caller to dispose of the stream. - If the format is distributed across multiple files/streams, set a custom - and use the "ConvertFromFileToFile" family of functions. - - Stream to read from - Optional format extension to serve as a hint to Assimp to choose which importer to use. If null or empty, the system will - try to detect what importer to use from the data which may or may not be successful - Output file name to export to - Format id that specifies what format to export to - Pre processing steps used for the export - True if the conversion was successful or not, false otherwise. - Thrown if the stream is not valid (null or write-only). - Thrown if the context has already been disposed of. - - - - Converts the model contained in the stream to the specified format and save it to a file. It is up to the caller to dispose of the stream. - If the format is distributed across multiple files/streams, set a custom - and use the "ConvertFromFileToFile" family of functions. - - Stream to read from - Optional format extension to serve as a hint to Assimp to choose which importer to use. If null or empty, the system will - try to detect what importer to use from the data which may or may not be successful - Post processing steps used for import - Output file name to export to - Format id that specifies what format to export to - Pre processing steps used for the export - True if the conversion was successful or not, false otherwise. - Thrown if the stream is not valid (null or write-only). - Thrown if the context has already been disposed of. - - - - Converts the model contained in the stream to the specified format and save it to a data blob. It is up to the caller to dispose of the stream. - If the format is distributed across multiple files/streams, set a custom - and use the "ConvertFromFileToBlob" family of functions. - - Stream to read from - Optional format extension to serve as a hint to Assimp to choose which importer to use. If null or empty, the system will - try to detect what importer to use from the data which may or may not be successful - Format id that specifies what format to export to - Data blob containing the exported scene in a binary form - Thrown if the stream is not valid (null or write-only). - Thrown if the context has already been disposed of. - - - - Converts the model contained in the stream to the specified format and save it to a data blob. It is up to the caller to dispose of the stream. - If the format is distributed across multiple files/streams, set a custom - and use the "ConvertFromFileToBlob" family of functions. - - Stream to read from - Optional format extension to serve as a hint to Assimp to choose which importer to use. If null or empty, the system will - try to detect what importer to use from the data which may or may not be successful - Format id that specifies what format to export to - Pre processing steps used for the export - Data blob containing the exported scene in a binary form - Thrown if the stream is not valid (null or write-only). - Thrown if the context has already been disposed of. - - - - Converts the model contained in the stream to the specified format and save it to a data blob. It is up to the caller to dispose of the stream. - If the format is distributed across multiple files/streams, set a custom - and use the "ConvertFromFileToBlob" family of functions. - - Stream to read from - Optional format extension to serve as a hint to Assimp to choose which importer to use. If null or empty, the system will - try to detect what importer to use from the data which may or may not be successful - Post processing steps used for import - Format id that specifies what format to export to - Pre processing steps used for the export - Data blob containing the exported scene in a binary form - Thrown if the stream is not valid (null or write-only). - Thrown if the context has already been disposed of. - - - - Sets a custom file system implementation that is used by this importer. If it is null, then the default assimp file system - is used instead. - - Custom file system implementation - - - - Removes the currently set custom file system implementation from the importer. - - - - - Gets the model formats that are supported for export by Assimp. - - Export formats supported - - - - Gets the model formats that are supported for import by Assimp. - - Import formats supported - - - - Gets descriptions for each importer that assimp has registered. - - Descriptions of supported importers. - - - - Gets an importer description for the specified file extension. If no importers support it, null is returned. Multiple importers may support the file extension, - they are called in the order that they were registered. - - File extension to query importer support for. - Importer description or null if it does not exist. - - - - Checks if the format extension (e.g. ".dae" or ".obj") is supported for import. - - Model format - True if the format is supported, false otherwise - - - - Checks if the format extension (e.g. ".dae" or ".obj") is supported for export. - - Model format - True if the format is supported, false otherwise - - - - Sets a configuration property to the context. This is only used during import. - - Config to set - - - - Removes a set configuration property by name. - - Name of the config property - - - - Removes all configuration properties from the context. - - - - - Checks if the context has a config set by the specified name. - - Name of the config property - True if the config is present, false otherwise - - - - Disposes of resources held by the context. These include IO systems still attached. - - - - - Releases unmanaged and - optionally - managed resources - - True to release both managed and unmanaged resources; False to release only unmanaged resources. - - - - AssimpNet general exception. - - - - - Initializes a new instance of the class. - - - - - Initializes a new instance of the class. - - The error message. - - - - Initializes a new instance of the class. - - Name of the param. - The error message. - - - - Initializes a new instance of the class. - - The error message - The inner exception. - - - - Represents a single bone of a mesh. A bone has a name which allows it to be found in the frame - hierarchy and by which it can be addressed by animations. In addition it has a number of - influences on vertices. - - - - - Gets or sets the name of the bone. - - - - - Gets the number of vertex influences the bone contains. - - - - - Gets if the bone has vertex weights - this should always be true. - - - - - Gets the vertex weights owned by the bone. - - - - - Gets or sets the matrix that transforms from mesh space to bone space in bind pose. - - - - - Constructs a new instance of the class. - - - - - Constructs a new instance of the class. - - Name of the bone - Bone's offset matrix - Vertex weights - - - - Gets if the native value type is blittable (that is, does not require marshaling by the runtime, e.g. has MarshalAs attributes). - - - - - Writes the managed data to the native value. - - Optional pointer to the memory that will hold the native value. - Output native value - - - - Reads the unmanaged data from the native value. - - Input native value - - - - Frees unmanaged memory created by . - - Native value to free - True if the unmanaged memory should be freed, false otherwise. - - - - Describes a right-handed camera in the scene. An important aspect is that - the camera itself is also part of the scenegraph, meaning any values such - as the direction vector are not *absolute*, they can be relative to the coordinate - system defined by the node which corresponds to the camera. This allows for camera - animations. - - - - - Gets or sets the name of the camera. This corresponds to a node in the - scenegraph with the same name. This node specifies the position of the - camera in the scene hierarchy and can be animated. - - - - - Gets or sets the position of the camera relative to the coordinate space defined by - the corresponding node. THe default value is 0|0|0. - - - - - Gets or sets the 'up' vector of the camera, relative to the coordinate space defined by the - corresponding node. The 'right' vector of the camera is the cross product of the up - and direction vectors. The default value is 0|1|0. - - - - - Gets or sets the viewing direction of the camera, relative to the coordinate space defined by the corresponding node. - The default value is 0|0|1. - - - - - Gets or sets the half horizontal field of view angle, in radians. The FoV angle is - the angle between the center line of the screen and the left or right border. The default - value is 1/4PI. - - - - - Gets or sets the distance of the near clipping plane from the camera. The value may not - be 0.0f for arithmetic reasons to prevent a division through zero. The default value is 0.1f; - - - - - Gets or sets the distance of the far clipping plane from the camera. The far clippling plane must - be further than the near clippling plane. The default value is 1000.0f. The ratio between - the near and far plane should not be too large (between 1000 - 10000 should be ok) to avoid - floating-point inaccuracies which can lead to z-fighting. - - - - - Gets or sets the screen aspect ratio. This is the ratio between the width and height of the screen. Typical - values are 4/3, 1/2, or 1/1. This value is 0 if the aspect ratio is not defined in the source file. - The default value is zero. - - - - - Gets a right-handed view matrix. - - - - - Constructs a new instance of the class. - - - - - Gets if the native value type is blittable (that is, does not require marshaling by the runtime, e.g. has MarshalAs attributes). - - - - - Writes the managed data to the native value. - - Optional pointer to the memory that will hold the native value. - Output native value - - - - Reads the unmanaged data from the native value. - - Input native value - - - - Frees unmanaged memory created by . - - Native value to free - True if the unmanaged memory should be freed, false otherwise. - - - - Represents a RGB color. - - - - - Red component. - - - - - Green component. - - - - - Blue component. - - - - - Gets or sets the component value at the specified zero-based index - in the order of RGBA (index 0 access R, 1 access G, etc). If - the index is not in range, a value of zero is returned. - - Zero-based index. - The component value - - - - Constructs a Color3D. - - Red component - Green component - Blue component - - - - Constructs a Color3D where each component is - set to the same value. - - Value to set R, G, B components - - - - Determines if the color is black, or close to being black. - - True if the color is black/nearly block, false otherwise. - - - - Adds the two colors together. - - First color - Second color - Added color - - - - Adds the value to each of the components of the color. - - Source color - Value to add to each component - Added color - - - - Adds the value to each of the components of the color. - - Value to add to each component - Source color - Added color - - - - Subtracts the second color from the first color. - - First color - Second color - Resulting color - - - - Subtracts the value from each of the color's components. - - Source color - Value to subtract from each component - Resulting color - - - - Subtracts the color's components from the value, returning - the result as a new color. Same as new Color4D(value) - color - - Value for each component of the first color - Second color - Resulting color - - - - Multiplies the two colors. - - First color - Second color - Multiplied color. - - - - Multiplies the color by a scalar value, component wise. - - Source color - Scalar value - Resulting color - - - - Multiplies the color by a scalar value, component wise. - - Scalar value - Source color - Resulting color - - - - Divides the first color by the second color, component wise. - - First color - Second color - Resulting color - - - - Divides the color by a divisor value. - - Source color - Divisor - Resulting color - - - - Tets equality between two colors. - - First color - Second color - True if the colors are equal, false otherwise - - - - Tets inequality between two colors. - - First color - Second color - True if the colors are not equal, false otherwise - - - - Tests equality between this color and another color - - Color to test against - True if components are equal - - - - Tests equality between this color and another object. - - Object to test against - True if the object is a color and the components are equal - - - - Returns a hash code for this instance. - - - A hash code for this instance, suitable for use in hashing algorithms and data structures like a hash table. - - - - - Returns a that represents this instance. - - - A that represents this instance. - - - - - Represents a Red-Green-Blue-Alpha (RGBA) color. - Color values range from 0 to 1. - - - - - Red component. - - - - - Green component. - - - - - Blue component. - - - - - Alpha component. - - - - - Gets or sets the component value at the specified zero-based index - in the order of RGBA (index 0 access R, 1 access G, etc). If - the index is not in range, a value of zero is returned. - - Zero-based index. - The component value - - - - Constructs a Color4D. - - Red component - Green component - Blue component - Alpha component - - - - Constructs a Color4D. Alpha is set to 1.0. - - Red component - Green component - Blue component - - - - Constructs a Color4D where each component is - set to the same value. - - Value to set R, G, B, A components - - - - Constructs a Color4D from a Color3D. Alpha is set to 1.0. - - RGB values - - - - Constructs a Color4D from a Color3D and alpha value. - - RGB values - Alpha value - - - - Determines if the color is black, or close to being black. - - True if the color is black/nearly block, false otherwise. - - - - Adds the two colors together. - - First color - Second color - Added color - - - - Adds the value to each of the components of the color. - - Source color - Value to add to each component - Added color - - - - Adds the value to each of the components of the color. - - Value to add to each component - Source color - Added color - - - - Subtracts the second color from the first color. - - First color - Second color - Resulting color - - - - Subtracts the value from each of the color's components. - - Source color - Value to subtract from each component - Resulting color - - - - Subtracts the color's components from the value, returning - the result as a new color. Same as new Color4D(value) - color - - Value for each component of the first color - Second color - Resulting color - - - - Multiplies the two colors. - - First color - Second color - Multiplied color. - - - - Multiplies the color by a scalar value, component wise. - - Source color - Scalar value - Resulting color - - - - Multiplies the color by a scalar value, component wise. - - Scalar value - Source color - Resulting color - - - - Divides the first color by the second color, component wise. - - First color - Second color - Resulting color - - - - Divides the color by a divisor value. - - Source color - Divisor - Resulting color - - - - Tets equality between two colors. - - First color - Second color - True if the colors are equal, false otherwise - - - - Tets inequality between two colors. - - First color - Second color - True if the colors are not equal, false otherwise - - - - Tests equality between this color and another color - - Color to test against - True if components are equal - - - - Tests equality between this color and another object. - - Object to test against - True if the object is a color and the components are equal - - - - Returns a hash code for this instance. - - - A hash code for this instance, suitable for use in hashing algorithms and data structures like a hash table. - - - - - Returns a that represents this instance. - - - A that represents this instance. - - - - - Base property config. - - - - - Gets the property name. - - - - - Creates a new property config that has no active Assimp property store. - - Name of the property. - - - - Sets the current value to the default value. - - - - - Applies the property value to the given Assimp property store. - - Assimp property store - - - - Applies the property value to the given Assimp property store. - - Assimp property store - - - - Describes an integer configuration property. - - - - - Gets the property value. - - - - - Gets the default property value. - - - - - Constructs a new IntengerPropertyConfig. - - Name of the property - Property value - - - - constructs a new IntegerPropertyConfig with a default value. - - Name of the property - Property value - The default property value - - - - Sets the current value to the default value. - - - - - Applies the property value to the given Assimp property store. - - Assimp property store - - - - Describes a float configuration property. - - - - - Gets the property value. - - - - - Gets the default property value. - - - - - Constructs a new FloatPropertyConfig. - - Name of the property - Property value - - - - Constructs a new FloatPropertyConfig with a default value. - - Name of the property - Property value - The default property value - - - - Sets the current value to the default value. - - - - - Applies the property value to the given Assimp property store. - - Assimp property store - - - - Describes a configuration property. - - - - - Gets the property value. - - - - - Gets the default property value. - - - - - Constructs a new MatrixPropertyConfig. - - Name of the property - Property value - - - - Constructs a new MatrixPropertyConfig. - - Name of the property - Property value - The default property value - - - - Sets the current value to the default value. - - - - - Applies the property value to the given Assimp property store. - - Assimp property store - - - - Describes a boolean configuration property. - - - - - Gets the property value. - - - - - Gets the default property value. - - - - - Constructs a new BooleanPropertyConfig. - - Name of the property - Property value - - - - Constructs a new BooleanPropertyConfig with a default value. - - Name of the property - Property value - The default property value - - - - Sets the current value to the default value. - - - - - Applies the property value to the given Assimp property store. - - Assimp property store - - - - Describes a string configuration property. - - - - - Gets the property value. - - - - - Gets the default property value. - - - - - Constructs a new StringPropertyConfig. - - Name of the property - Property value - - - - Constructs a new StringPropertyConfig with a default value. - - Name of the property - Property value - The default property value - - - - Sets the current value to the default value. - - - - - Applies the property value to the given Assimp property store. - - Assimp property store - - - - Convience method for constructing a whitespace delimited name list. - - Array of names - White-space delimited list as a string - - - - Configuration to enable time measurements. If enabled, each - part of the loading process is timed and logged. Default value is false. - - - - - Gets the string name used by MeasureTimeConfig. - - - - - Constructs a new MeasureTimeConfig. - - True if the loading process should be timed or not. - - - - Configuration to set Assimp's multithreading policy. Possible - values are -1 to let Assimp decide, 0 to disable multithreading, or - any number larger than zero to force a specific number of threads. This - is only a hint and may be ignored by Assimp. Default value is -1. - - - - - Gets the string name used by MultithreadingConfig. - - - - - Constructs a new MultithreadingConfig. - - A value of -1 will let Assimp decide, - a value of zero to disable multithreading, and a value greater than zero - to force a specific number of threads. - - - - Global setting to disable generation of skeleton dummy meshes. These are generated as a visualization aid - in cases which the input data contains no geometry, but only animation data. So the geometry are visualizing - the bones. Default value is false. - - - - - Gets the string name used by NoSkeletonMeshConfig. - - - - - Constructs a new NoSkeletonMeshConfig. - - True if dummy skeleton mesh generation should be disabled, false otherwise. - - - - Configuration to set the maximum angle that may be between two vertex tangents/bitangents - when they are smoothed during the step to calculate the tangent basis. The default - value is 45 degrees. - - - - - Gets the string name used by TangentSmoothingAngleConfig. - - - - - Constructs a new TangentSmoothingAngleConfig. - - Smoothing angle, in degrees. - - - - Configuration to set the maximum angle between two face normals at a vertex when - they are smoothed during the step to calculate smooth normals. This is frequently - called the "crease angle". The maximum and default value is 175 degrees. - - - - - Gets the string name used by NormalSmoothingAngleConfig. - - - - - Constructs a new NormalSmoothingAngleConfig. - - Smoothing angle, in degrees. - - - - Configuration to set the colormap (palette) to be used to decode embedded textures in MDL (Quake or 3DG5) - files. This must be a valid path to a file. The file is 768 (256 * 3) bytes alrge and contains - RGB triplets for each of the 256 palette entries. If the file is not found, a - default palette (from Quake 1) is used. The default value is "colormap.lmp". - - - - - Gets the string name used by MDLColorMapConfig. - - - - - Constructs a new MDLColorMapConfig. - - Colormap filename - - - - Configuration for the the step - to determine what materials to keep. If a material matches one of these names it will not - be modified or removed by the post processing step. Default is an empty string. - - - - - Gets the string name used by MaterialExcludeListConfig. - - - - - Constructs a new MaterialExcludeListConfig. Material names containing whitespace - must be enclosed in single quotation marks. - - List of material names that will not be modified or replaced by the remove redundant materials post process step. - - - - Configuration for the step - to keep the scene hierarchy. Meshes are moved to worldspace, but no optimization is performed - where meshes with the same materials are not joined. This option can be useful - if you have a scene hierarchy that contains important additional information - which you intend to parse. The default value is false. - - - - - Gets the string name used by KeepSceneHierarchyConfig. - - - - - Constructs a new KeepHierarchyConfig. - - True to keep the hierarchy, false otherwise. - - - - Configuration for the step - to normalize all vertex components into the -1...1 range. The default value is - false. - - - - - Gets the string name used by NormalizeVertexComponentsConfig. - - - - - Constructs a new NormalizeVertexComponentsConfig. - - True if the post process step should normalize vertex components, false otherwise. - - - - Configuration for the step to - remove degenerted primitives from the import immediately. The default value is false, - where degenerated triangles are converted to lines, and degenerated lines to points. - - - - - Gets the string name used by RemoveDegeneratePrimitivesConfig. - - - - - Constructs a new RemoveDegeneratePrimitivesConfig. - - True if the post process step should remove degenerate primitives, false otherwise. - - - - Configuration for the step. If true, the area of the triangles are checked - to see if they are greater than 1e-6. If so, the triangle is removed if is set to true. - - - - - Gets the string name used by RemoveDegeneratePrimitivesCheckAreaConfig. - - - - - Constructs a new RemoveDegeneratePrimitivesCheckAreaConfig. - - True if the post process step should check the area of triangles when finding degenerate primitives, false otherwise. - - - - Configuration for the step - to preserve nodes matching a name in the given list. Nodes that match the names in the list - will not be modified or removed. Identifiers containing whitespaces - must be enclosed in single quotation marks. The default value is an - empty string. - - - - - Gets the string name used by NodeExcludeListConfig. - - - - - Constructs a new NodeExcludeListConfig. - - List of node names - - - - Configuration for the step - that specifies the maximum number of triangles a mesh can contain. The - default value is MeshTriangleLimitConfigDefaultValue. - - - - - Gets the string name used by MeshTriangleLimitConfig. - - - - - Gets the defined default limit value, this corresponds to the - constant. - - - - - Constructs a new MeshTriangleLimitConfig. - - Max number of triangles a mesh can contain. - - - - Configuration for the step - that specifies the maximum number of vertices a mesh can contain. The - default value is MeshVertexLimitConfigDefaultValue. - - - - - Gets the string name used by MeshVertexLimitConfig. - - - - - Gets the defined default limit value, this corresponds to the - constant. - - - - - Constructs a new MeshVertexLimitConfig. - - Max number of vertices a mesh can contain. - - - - Configuration for the step - that specifies the maximum number of bone weights per vertex. The default - value is VertexBoneWeightLimitConfigDefaultValue. - - - - - gets the string name used by VertexBoneWeightLimitConfig. - - - - - Gets the defined default limit value, this corresponds to the - constant. - - - - - Constructs a new VertexBoneWeightLimitConfig. - - Max number of bone weights per vertex. - - - - Configuration for the step - that specifies the size of the post-transform vertex cache. The size is - given in number of vertices and the default value is VertexCacheSizeConfigDefaultValue. - - - - - Gets the string name used by VertexCacheConfig. - - - - - Gets the defined default vertex cache size, this corresponds to - the . - - - - - Constructs a new VertexCacheSizeConfig. - - Size of the post-transform vertex cache, in number of vertices. - - - - Configuration for the step that - specifies which parts of the data structure is to be removed. If no valid mesh - remains after the step, the import fails. The default value i . - - - - - Gets the string name used by RemoveComponentConfig. - - - - - Constructs a new RemoveComponentConfig. - - Bit-wise combination of components to exclude. - - - - Configuration for the step that - specifies which primitive types are to be removed by the step. Specifying all - primitive types is illegal. The default value is zero specifying none. - - - - - Gets the string name used by SortByPrimitiveTypeConfig. - - - - - Constructs a new SortByPrimitiveTypeConfig. - - Bit-wise combination of primitive types to remove - - - - Configuration for the step that - specifies the floating point accuracy for animation values, specifically - the episilon during comparisons. The default value is 0.0f. - - - - - Gets the string name used by AnimationAccuracyConfig. - - - - - Constructs a new AnimationAccuracyConfig. - - Episilon for animation value comparisons. - - - - Configuration for the step that - specifies which UV transformations are to be evaluated. The default value - is for all combinations (scaling, rotation, translation). - - - - - Gets the string name used by TransformUVConfig. - - - - - Constructs a new TransformUVConfig. - - Bit-wise combination specifying which UV transforms that should be evaluated. - - - - Configuration that is a hint to Assimp to favor speed against import quality. Enabling this - option may result in faster loading, or it may not. It is just a hint to loaders - and post-process steps to use faster code paths if possible. The default value is false. - - - - - Gets the string name used by FavorSpeedConfig. - - - - - Constructs a new FavorSpeedConfig. - - True if Assimp should favor speed at the expense of quality, false otherwise. - - - - Configures the maximum bone count per mesh for the step. Meshes are - split until the maximum number of bones is reached. - - - - - Gets the string name used by MaxBoneCountConfig. - - - - - Constructs a new MaxBoneCountConfig. - - The maximum bone count. - - - - Configures which texture channel is used for tangent space computations. The channel must exist or an error will be raised. - - - - - Gets the string name used by TangentTextureChannelIndexConfig. - - - - - Constructs a new TangentTextureChannelIndexConfig. - - The zero-based texture channel index. - - - - Configures the threshold that is used to determine what bones are removed. - - - - - Gets the string name used by DeboneThresholdConfig. - - - - - Constructs a new DeboneThresholdConfig. - - The debone threshold. - - - - Configuration that requires all bones to qualify for deboning before any are removed. - - - - - Gets the string name used by DeboneAllOrNoneConfig. - - - - - Constructs a new DeboneAllOrNoneConfig. - - True if all are required, false if none need to qualify. - - - - Configuration for that sets a user defined matrix as the scene root node transformation before - transforming vertices. Default value is the identity matrix. - - - - - Gets the string name used by RootTransformationConfig. - - - - - Constructs a new RootTransformationConfig. - - Root transformation matrix to be set to the root scene node during the pretransform post process step. - - - - Applies the property value to the given Assimp property store. - - Assimp property store - - - - Configures the step to scale the entire scene by a certain amount. Some importers provide a mechanism to define a scaling unit for the model, - which this processing step can utilize. - - - - - - Gets the string name used by GlobalScaleConfig. - - - - - Constructs a new GlobalScaleConfig. - - Value to scale the entire scene by. - - - - Sets the vertex animation keyframe to be imported. Assimp does not support vertex keyframes (only - bone animation is supported). the library reads only one keyframe with vertex animations. By default this is the - first frame. This config sets the "global" keyframe that will be imported. There are other configs - for specific importers that will override the global setting. - - - - - Gets the string name used by GlobalKeyFrameImportConfig. - - - - - Constructs a new GlobalKeyFrameImportConfig. - - Keyframe index - - - - Sets the vertex animation keyframe to be imported. Assimp does not support vertex keyframes (only - bone animation is supported). the library reads only one keyframe with vertex animations. By default this is the - first frame. This config sets the global override for the MD3 format. - - - - - Gets the string name used by MD3KeyFrameImportConfig. - - - - - Constructs a new MD3KeyFrameImportConfig. - - Keyframe index - - - - Sets the vertex animation keyframe to be imported. Assimp does not support vertex keyframes (only - bone animation is supported). the library reads only one keyframe with vertex animations. By default this is the - first frame. This config sets the global override for the MD2 format. - - - - - Gets the string name used by MD2KeyFrameImportConfig. - - - - - Constructs a new MD2KeyFrameImportConfig. - - Keyframe index - - - - Sets the vertex animation keyframe to be imported. Assimp does not support vertex keyframes (only - bone animation is supported). the library reads only one keyframe with vertex animations. By default this is the - first frame. This config sets the global override for the MDL format. - - - - - Gets the string name used by MDLKeyFrameImportConfig. - - - - - Constructs a new MDLKeyFrameImportConfig. - - Keyframe index - - - - Sets the vertex animation keyframe to be imported. Assimp does not support vertex keyframes (only - bone animation is supported). the library reads only one keyframe with vertex animations. By default this is the - first frame. This config sets the global override for the SMD format. - - - - - Gets the string name used by SMDKeyFrameImportConfig. - - - - - Constructs a new SMDKeyFrameImportConfig. - - Keyframe index - - - - Sets the vertex animation keyframe to be imported. Assimp does not support vertex keyframes (only - bone animation is supported). the library reads only one keyframe with vertex animations. By default this is the - first frame. This config sets the global override for the Unreal format. - - - - - Gets the string name used by UnrealKeyFrameImportConfig. - - - - - Constructs a new UnrealKeyFrameImportConfig. - - Keyframe index - - - - Configures the AC loader to collect all surfaces which have the "Backface cull" flag set in separate - meshes. The default value is true. - - - - - Gets the string name used by ACSeparateBackfaceCullConfig. - - - - - Constructs a new ACSeparateBackfaceCullConfig. - - True if all surfaces that have the "backface cull" flag set should be collected in separate meshes, false otherwise. - - - - Configures whether the AC loader evaluates subdivision surfaces (indicated by the presence - of the 'subdiv' attribute in the file). By default, Assimp performs - the subdivision using the standard Catmull-Clark algorithm. The default value is true. - - - - - Gets the string name used by ACEvaluateSubdivisionConfig. - - - - - Constructs a new ACEvaluateSubdivisionConfig. - - True if the AC loader should evaluate subdivisions, false otherwise. - - - - Configures the UNREAL 3D loader to separate faces with different surface flags (e.g. two-sided vs single-sided). - The default value is true. - - - - - Gets the string name used by UnrealHandleFlagsConfig. - - - - - Constructs a new UnrealHandleFlagsConfig. - - True if the unreal loader should separate faces with different surface flags, false otherwise. - - - - Configures the terragen import plugin to compute UV's for terrains, if - they are not given. Furthermore, a default texture is assigned. The default value is false. - UV coordinates for terrains are so simple to compute that you'll usually - want to compute them on your own, if you need them. This option is intended for model viewers which - want to offer an easy way to apply textures to terrains. - - - - - Gets the string name used by TerragenComputeTexCoordsConfig. - - - - - Constructs a new TerragenComputeTexCoordsConfig. - - True if terran UV coordinates should be computed, false otherwise. - - - - Configures the ASE loader to always reconstruct normal vectors basing on the smoothing groups - loaded from the file. Some ASE files carry invalid normals, others don't. The default value is true. - - - - - Gets the string name used by ASEReconstructNormalsConfig. - - - - - Constructs a new ASEReconstructNormalsConfig. - - True if normals should be re-computed, false otherwise. - - - - Configures the M3D loader to detect and process multi-part Quake player models. These models - usually consit of three files, lower.md3, upper.md3 and head.md3. If this propery is - set to true, Assimp will try to load and combine all three files if one of them is loaded. The - default value is true. - - - - - Gets the string name used by MD3HandleMultiPartConfig. - - - - - Constructs a new MD3HandleMultiPartConfig. - - True if the split files should be loaded and combined, false otherwise. - - - - Tells the MD3 loader which skin files to load. When loading MD3 files, Assimp checks - whether a file named "md3_file_name"_"skin_name".skin exists. These files are used by - Quake III to be able to assign different skins (e.g. red and blue team) to models. 'default', 'red', 'blue' - are typical skin names. The default string value is "default". - - - - - Gets the string name used by MD3SkinNameConfig. - - - - - Constructs a new MD3SkinNameConfig. - - The skin name. - - - - Specifies the Quake 3 shader file to be used for a particular MD3 file. This can be a full path or - relative to where all MD3 shaders reside. the default string value is an empty string. - - - - - Gets the string name used by MD3ShaderSourceConfig. - - - - - Constructs a new MD3ShaderSourceConfig. - - The shader file. - - - - Configures the LWO loader to load just one layer from the model. - LWO files consist of layers and in some cases it could be useful to load only one of them. - This property can be either a string - which specifies the name of the layer - or an integer - the index - of the layer. If the property is not set then the whole LWO model is loaded. Loading fails - if the requested layer is not vailable. The layer index is zero-based and the layer name may not be empty - The default value is false (all layers are loaded). - - - - - Gets the string name used by LWOImportOneLayerConfig. - - - - - Constructs a new LWOImportOneLayerConfig. - - True if only one layer should be imported, false if all layers should be imported. - - - - Configures the MD5 loader to not load the MD5ANIM file for a MD5MESH file automatically. - The default value is false. - The default strategy is to look for a file with the same name but with the MD5ANIm extension - in the same directory. If it is found it is loaded and combined with the MD5MESH file. This configuration - option can be used to disable this behavior. - - - - - Gets the string name used by MD5NoAnimationAutoLoadConfig. - - - - - Constructs a new MD5NoAnimationAutoLoadConfig. - - True if animations should not be automatically loaded, false if they should be. - - - - Defines the beginning of the time range for which the LWS loader evaluates animations and computes - AiNodeAnim's. The default value is the one taken from the file. - Assimp provides full conversion of Lightwave's envelope system, including pre and post - conditions. The loader computes linearly subsampled animation channels with the frame rate - given in the LWS file. This property defines the start time. - Animation channels are only generated if a node has at least one envelope with more than one key - assigned. This property is given in frames where '0' is the first. By default, - if this property is not set, the importer takes the animation start from the input LWS - file ('FirstFrame' line) - - - - - Gets the string name used by LWSAnimationStartConfig. - - - - - Constructs a new LWSAnimationStartConfig. - - Beginning of the time range - - - - Defines the ending of the time range for which the LWS loader evaluates animations and computes - AiNodeAnim's. The default value is the one taken from the file - Assimp provides full conversion of Lightwave's envelope system, including pre and post - conditions. The loader computes linearly subsampled animation channels with the frame rate - given in the LWS file. This property defines the end time. - Animation channels are only generated if a node has at least one envelope with more than one key - assigned. This property is given in frames where '0' is the first. By default, - if this property is not set, the importer takes the animation end from the input LWS - file. - - - - - Gets the string name used by LWSAnimationEndConfig. - - - - - Constructs a new LWSAnimationEndConfig. - - Ending of the time range - - - - Defines the output frame rate of the IRR loader. - IRR animations are difficult to convert for Assimp and there will always be - a loss of quality. This setting defines how many keys per second are returned by the converter. - The default value is 100 frames per second. - - - - - Gets the string name used by IRRAnimationFrameRateConfig. - - - - - Constructs a new IRRAnimationFramerateConfig. - - Number of frames per second to output. - - - - The Ogre importer will try to load this MaterialFile. Ogre meshes reference with material names, this does not tell Assimp - where the file is located. Assimp will try to find the source file in the following order: [material-name].material, [mesh-filename-base].material, - and lastly the material name defined by this config property. The default value is "Scene.Material". - - - - - Gets the string name used by OgreMaterialFileConfig. - - - - - Constructs a new OgreMaterialFileConfig. - - Material file name to load. - - - - The Ogre importer will detect the texture usage from the filename. Normally a texture is loaded as a color map, if no target is specified - in the material file. If this is enabled, then Assimp will try to detect the type from the texture filename postfix: - - Normal Maps: _n, _nrm, _nrml, _normal, _normals, _normalmap - Specular Maps: _s, _spec, _specular, _specularmap - Light Maps: _l, _light, _lightmap, _occ, _occlusion - Displacement Maps: _dis, _displacement - - The matching is case insensitive. Postfix is taken between the last "_" and last ".". The default behavior is to detect type from lower cased - texture unit name by matching against: normalmap, specularmap, lightmap, and displacementmap. For both cases if no match is found then, - is used. The default value is false. - - - - - Gets the string name used by OgreTextureTypeFromFilenameConfig. - - - - - Constructs a new OgreTextureTypeFromFilenameConfig. - - True if the filename defines texture usage, false otherwise. - - - - Specifies whether the IFC loader skips over IfcSpace elements. IfcSpace elements (and their geometric representations) are used to represent free space in a building story. - - - - - Gets the string name used by IFCSkipSpaceRepresentationsConfig. - - - - - Constructs a new IFCSkipSpaceRepresentationsConfig. - - True if the IfcSpace elements are skipped, false if otherwise. - - - - Specifies whether the IFC loader will use its own, custom triangulation algorithm to triangulate wall and floor meshes. If this is set to false, - walls will be either triangulated by the post process triangulation or will be passed through as huge polygons with faked holes (e.g. holes that are connected - with the outer boundary using a dummy edge). It is highly recommended to leave this property set to true as the default post process has some known - issues with these kind of polygons. - - - - - Gets the string name used by IFCUseCustomTriangulationConfig. - - - - - Constructs a new IFCUseCustomTriangulationConfig. - - True if the loader should use its own triangulation routine for walls/floors, false otherwise. - - - - Specifies the tessellation conic angle for IFC smoothing curves. Accepted range of values is between [5, 120] - - - - - Gets the string name used by IFCSmoothingAngleConfig. - - - - - Constructs a new IFCSmoothingAngleConfig. - - Smoothing angle when tessellating curves. Needs to be in the range of [5, 120]. - - - - Specifies the tessellation for IFC cylindrical shapes. E.g. the number of segments used to approximate a circle. Accepted range of values is between [3, 180]. - - - - - Gets the string name used by IFCCylindricalTessellationConfig. - - - - - Constructs a new IFCCylindricalTessellationConfig. - - Tessellation of cylindrical shapes (e.g. the number of segments used to approximate a circle). Needs to be in the range of [3, 180]. - - - - Specifies whether the collada loader will ignore the up direction. Default is false. - - - - - Gets the string name used by ColladaIgnoreUpDirectionConfig. - - - - - Constructs a new ColladaIgnoreUpDirectionConfig. - - True if the loader should ignore the up direction, false otherwise. - - - - Specifies whether the FBX importer will merge all geometry layers present in the source file or import only the first. Default is true. - - - - - Gets the string name used by FBXImportAllGeometryLayersConfig. - - - - - Constructs a new FBXImportAllGeometryLayersConfig. - - True if all geometry layers should be merged, false otherwise to take only the first layer. - - - - Specifies whether the FBX importer will import all materials present in the source file or take only the referenced materials, - if the importer is configured to import materials at all. Otherwise this will have no effect. Default is false. - - - - - Gets the string name used by FBXImportAllMaterialsConfig. - - - - - Constructs a new FBXImportAllMaterialsConfig. - - True if the FBX importer should import ALL materials even if not referenced, false otherwise (take only the referenced materials). - - - - Specifies whether the FBX importer will import materials. Default is true. - - - - - Gets the string name used by FBXImportMaterialsConfig. - - - - - Constructs a new FBXImportMaterialsConfig. - - True if the FBX importer should import materials, false otherwise. - - - - Specifies whether the FBX importer will import embedded textures. Default is true. - - - - - - Gets the string name used by FBXImportEmbeddedTexturesConfig. - - - - - Constructs a new FBXImportEmbeddedTexturesConfig. - - True if the FBX importer should import embedded textures, false otherwise. - - - - Specifies if the FBX importer should search for embedded loaded textures, where no embedded texture data is provided. Default is false. - - - - - Gets the string name used by FBXImportSearchEmbeddedTexturesConfig. - - - - - Constructs a new FBXImportSearchEmbeddedTexturesConfig. - - True if the FBX importer should search for embedded loaded textures, where no embedded texture data is provided. - - - - Specifies whether the FBX importer will import cameras. Default is true. - - - - - Gets the string name used by FBXImportCamerasConfig. - - - - - Constructs a new FBXImportCamerasConfig. - - True if the FBX importer should import cameras, false otherwise. - - - - Specifies whether the FBX importer will import lights. Default is true. - - - - - Gets the string name used by FBXImportLightsConfig. - - - - - Constructs a new FBXImportLightsConfig. - - True if the FBX importer should import lights, false otherwise. - - - - Specifies whether the FBX importer will import animations. Default is true. - - - - - Gets the string name used by FBXImportAnimationsConfig. - - - - - Constructs a new FBXImportAnimationsConfig. - - True if the FBX importer should import animations, false otherwise. - - - - Specifies whether the FBX importer will act in strict mode in which only the FBX 2013 - format is supported and any other sub formats are rejected. FBX 2013 is the primary target for the importer, so this - format is best supported and well-tested. Default is false. - - - - - Gets the string name used by FBXStrictModeConfig. - - - - - Constructs a new FBXStrictModeConfig. - - True if FBX strict mode should be used, false otherwise. - - - - Specifies whether the FBX importer will preserve pivot points for transformations (as extra nodes). If set to false, pivots - and offsets will be evaluated whenever possible. Default value is true. - - - - - Gets the string name used by FBXPreservePivotsConfig. - - - - - Constructs a new FBXPreservePivotsConfig. - - True if pivots should be preserved, false otherwise. - - - - Specifies whether the importer will drop empty animation curves or animation curves which match the bind pose - transformation over their entire defined range. Default value is true. - - - - - Gets the string name used by FBXOptimizeEmptyAnimationCurvesConfig. - - - - - Constructs a new FBXOptimizeEmptyAnimationCurvesConfig. - - True if empty animation curves should be dropped, false otherwise. - - - - Specifies if the X-file exporter should use 64-bit doubles rather than 32-bit floats. - - - - - Gets the string name used by XFileUseDoublesConfig. - - - - - Constructs a new XFileUseDoublesConfig. - - True if the x file uses 64-bit double values rather than 32-bit float values. - - - - Represents an embedded texture. Some file formats directly embed texture assets. - Embedded textures may be uncompressed, where the data is given in an uncompressed format. - Or it may be compressed in a format like png or jpg. In the latter case, the raw - file bytes are given so the application must utilize an image decoder (e.g. DevIL) to - get access to the actual color data. This object represents both types, so some properties may or may not be valid depending - if it is compressed or not. - - - - - Gets if the texture is compressed or not. - - - - - Gets the width of the texture in pixels. Only valid for non-compressed textures. - - - - - Gets the height of the texture in pixels. Only valid for non-compressed textures. - - - - - Gets if the texture has non-compressed texel data. Only valid for non-compressed textures. - - - - - Gets the size of the non-compressed texel data. Only valid for non-compressed textures. - - - - - Gets the non-compressed texel data, the array is of size Width * Height. Only valid for non-compressed textures. - - - - - Gets if the embedded texture has compressed data. Only valid for compressed textures. - - - - - Gets the size of the compressed data. Only valid for compressed textures. - - - - - Gets the raw byte data representing the compressed texture. Only valid for compressed textures. - - - - - Gets the format hint to determine the type of compressed data. This hint - is a three-character lower-case hint like "dds", "jpg", "png". - - - - - Constructs a new instance of the class. Should use only if - reading from a native value. - - - - - Constructs a new instance of the class. This creates a compressed - embedded texture. - - The 3 character format hint. - The compressed data. - - - - Constructs a new instance of the class. This creates an uncompressed - embedded texture. - - Width of the texture - Height of the texture - Color data - Thrown if the data size does not match width * height. - - - - Gets if the native value type is blittable (that is, does not require marshaling by the runtime, e.g. has MarshalAs attributes). - - - - - Writes the managed data to the native value. - - Optional pointer to the memory that will hold the native value. - Output native value - - - - Reads the unmanaged data from the native value. - - Input native value - - - - Frees unmanaged memory created by . - - Native value to free - True if the unmanaged memory should be freed, false otherwise. - - - - Enumerates metadata data types. - - - - - Metadata is a boolean. - - - - - Metadata is an integer. - - - - - Metadata is an unsigned 64-bit integer. - - - - - Metadata is a float. - - - - - Metadata is a double. - - - - - Metadata is a string. - - - - - Metadata is a . - - - - - Post processing flag options, specifying a number of steps - that can be run on the data to either generate additional vertex - data or optimize the imported data. - - - - - No flags enabled. - - - - - Calculates the tangents and binormals (bitangents) - for the imported meshes. - - This does nothing if a mesh does not have normals. You might - want this post processing step to be executed if you plan - to use tangent space calculations such as normal mapping. There is a - config setting AI_CONFIG_PP_CT_MAX_SMOOTHING_ANGLE which - allows you to specify a maximimum smoothing angle for the algorithm. - However, usually you'll want to leave it at the default value. - - - - - - Identifies and joins identical vertex data sets within all - imported meshes. - - After this step is run each mesh does contain only unique vertices - anymore, so a vertex is possibly used by multiple faces. You usually - want to use this post processing step. If your application deals with - indexed geometry, this step is compulsory or you'll just waste rendering - time. - If this flag is not specified, no vertices are referenced by more than one - face and no index buffer is required for rendering. - - - - - Converts all imported data to a left handed coordinate space. - - By default the data is returned in a right-handed coordinate space, - where +X points to the right, +Z towards the viewer, and +Y upwards. - - - - - Triangulates all faces of all meshes. - - By default the imported mesh data might contain faces with more than - three indices. For rendering you'll usually want all faces to - be triangles. This post processing step splits up all - higher faces to triangles. Line and point primitives are *not* - modified. If you want 'triangles only' with no other kinds of primitives, - try the following: - - - - Specify both and . - - - Ignore all point and line meshes when you process Assimp's output - - - - - - - Removes some parts of the data structure (animations, materials, - light sources, cameras, textures, vertex components). - - The components to be removed are specified in a separate configuration - option, AI_CONFIG_PP_RVC_FLAGS. This is quite useful if you don't - need all parts of the output structure. Especially vertex colors are rarely used today...calling this step to remove - unrequired stuff from the pipeline as early as possible results in an increased - performance and a better optimized output data structure. - - - This step is also useful if you want to force Assimp to recompute normals - or tangents. the corresponding steps don't recompute them if they're already - there (loaded from the source asset). By using this step you can make sure - they are NOT there. - - - - - Generates normals for all faces of all meshes. It may not be - specified together with . - - This is ignored if normals are already there at the time where this - flag is evaluated. Model importers try to load them from the source file, - so they're usually already there. Face normals are shared between all - points of a single face, so a single point can have multiple normals, - which in other words, forces the library to duplicate vertices in - some cases. This makes senseless then. - - - - - - Generates smooth normals for all vertices of all meshes. It - may not be specified together with . - - This is ignored if normals are already there at the time where - this flag is evaluated. Model importers try to load them from the - source file, so they're usually already there. - - The configuration option AI_CONFIG_PP_GSN_MAX_SMOOTHING_ANGLE - allows you to specify an angle maximum for the normal smoothing algorithm. - Normals exceeding this limit are not smoothed, resulting in a 'hard' seam - between two faces. using a decent angle here (e.g. 80 degrees) results in a very good visual - appearance. - - - - - Splits large meshes into smaller submeshes. - - This is useful for realtime rendering where the number - of triangles which can be maximally processed in a single draw call is - usually limited by the video driver/hardware. The maximum vertex buffer - is usually limited, too. Both requirements can be met with this step: - you may specify both a triangle and a vertex limit for a single mesh. - - The split limits can be set through the AI_CONFIG_PP_SLM_VERTEX_LIMIT - and AI_CONFIG_PP_SLM_TRIANGLE_LIMIT config settings. The default - values are 1,000,000. - - Warning: This can be a time consuming task. - - - - - Removes the node graph and "bakes" (pre-transforms) all - vertices with the local transformation matrices of their nodes. - The output scene does still contain nodes, however, there is only - a root node with children, each one referencing only one mesh. - Each mesh referencing one material. For rendering, you can simply render - all meshes in order, you don't need to pay attention to local transformations - and the node hierarchy. - - Warning: Animations are removed during this step. - - - - - Limits the number of bones simultaneously affecting a single - vertex to a maximum value. - - If any vertex is affected by more than that number of bones, - the least important vertex weights are removed and the remaining vertex - weights are re-normalized so that the weights still sum up to 1. - - The default bone weight limit is 4 and uses the - AI_LMW_MAX_WEIGHTS config. If you intend to perform the skinning in hardware, this post processing - step might be of interest for you. - - - - - Validates the imported scene data structure. - - This makes sure that all indices are valid, all animations - and bones are linked correctly, all material references are - correct, etc. - - It is recommended to capture Assimp's log output if you use this flag, - so you can easily find out what's actually wrong if a file fails the - validation. The validator is quite rude and will find *all* inconsistencies - in the data structure. There are two types of failures: - - - Error: There's something wrong with the imported data. Further - postprocessing is not possible and the data is not usable at all. The import - fails. - - - Warning: There are some minor issues (e.g. 1000000 animation keyframes - with the same time), but further postprocessing and use of the data structure is still - safe. Warning details are written to the log file. - - - - - - - Re-orders triangles for better vertex cache locality. - - This step tries to improve the ACMR (average post-transform vertex cache - miss ratio) for all meshes. The implementation runs in O(n) time - and is roughly based on the 'tipsify' algorithm. - - If you intend to render huge models in hardware, this step might be of interest for you. - The AI_CONFIG_PP_ICL_PTCACHE_SIZE config setting can be used to fine tune - the cache optimization. - - - - - Searches for redundant/unreferenced materials and removes them. - - This is especially useful in combination with the PreTransformVertices - and OptimizeMeshes flags. Both join small meshes with equal characteristics, but - they can't do their work if two meshes have different materials. Because several - material settings are always lost during Assimp's import filders and because many - exporters don't check for redundant materials, huge models often have materials which - are defined several times with exactly the same settings. - - Several material settings not contributing to the final appearance of a surface - are ignored in all comparisons ... the material name is one of them. So, if you're passing - additional information through the content pipeline (probably using *magic* material names), - don't specify this flag. Alternatively, take a look at the AI_CONFIG_PP_RRM_EXCLUDE_LIST - setting. - - - - - This step tries to determine which meshes have normal vectors - that are facing inwards. - - The algorithm is simple but effective: - - The bounding box of all vertices and their normals are compared - against the volume of the bounding box of all vertices without their normals. - This works well for most objects, problems might occur with planar surfaces. However, - the step tries to filter such cases. The step inverts all in-facing normals. - Generally, it is recommended to enable this step, although the result is not - always correct. - - - - - This step splits meshes with more than one primitive type in homogeneous submeshes. - - This step is executed after triangulation and after it returns, just one - bit is set in aiMesh:mPrimitiveTypes. This is especially useful for real-time - rendering where point and line primitives are often ignored or rendered separately. - - - You can use AI_CONFIG_PP_SBP_REMOVE option to specify which primitive types you need. - This can be used to easily exclude lines and points, which are rarely used, - from the import. - - - - - - This step searches all meshes for degenerated primitives and - converts them to proper lines or points. A face is 'degenerated' if one or more of its points are identical. - - To have degenerated primitives removed, specify the flag - try one of the following procedures: - - - - To support lines and points: Set the - AI_CONFIG_PP_FD_REMOVE option to one. This will cause the step to remove degenerated triangles as - soon as they are detected. They won't pass any further pipeline steps. - - - If you don't support lines and points: Specify flag, which - will move line and point primitives to separate meshes. Then set the AI_CONFIG_PP_SBP_REMOVE - option to and to cause step - to reject point and line meshes from the scene. - - - - Degenerated polygons are not necessarily evil and that's why they are not removed by default. There are several - file formats which do not support lines or points where exporters bypass the format specification and write - them as degenerated triangles instead. - - - - - - This step searches all meshes for invalid data, such as zeroed - normal vectors or invalid UV coordinates and removes or fixes them. - This is intended to get rid of some common exporter rrors. - - This is especially useful for normals. If they are invalid, - and the step recognizes this, they will be removed and can later - be recomputed, e.g. by the GenerateSmoothNormals flag. The step - will also remove meshes that are infinitely small and reduce animation - tracks consisting of hundreds of redundant keys to a single key. The - AI_CONFIG_PP_FID_ANIM_ACCURACY config property decides the accuracy of the check - for duplicate animation tracks. - - - - - This step converts non-UV mappings (such as spherical or - cylindrical mapping) to proper texture coordinate channels. - - Most applications will support UV mapping only, so you will - probably want to specify this step in every case. Note that Assimp - is not always able to match the original mapping implementation of the 3D - app which produced a model perfectly. It's always better - to let the father app compute the UV channels, at least 3DS max, maya, blender, - lightwave, modo, .... are able to achieve this. - - If this step is not requested, you'll need to process the MATKEY_MAPPING - material property in order to display all assets properly. - - - - - Applies per-texture UV transformations and bakes them to stand-alone vtexture - coordinate channels. - - UV Transformations are specified per-texture - see the MATKEY_UVTRANSFORM material - key for more information. This step processes all textures with transformed input UV coordinates - and generates new (pretransformed) UV channel transformations, so you will probably - want to specify this step. - - UV transformations are usually implemented in realtime apps by - transforming texture coordinates in a vertex shader stage with a 3x3 (homogenous) - transformation matrix. - - - - - Searches for duplicated meshes and replaces them with a reference - to the first mesh. - - This is time consuming, so don't use it if you have no time. Its - main purpose is to work around the limitation with some - file formats that don't support instanced meshes, so exporters - duplicate meshes. - - - - - - Attempts to reduce the number of meshes (and draw calls). - - This is recommended to be used together with - and is fully compatible with both and . - - - - - - Optimizes scene hierarchy. Nodes with no animations, bones, - lights, or cameras assigned are collapsed and joined. - - Node names can be lost during this step, you can specify - names of nodes that should'nt be touched or modified - with AI_CONFIG_PP_OG_EXCLUDE_LIST. - - Use this flag with caution. Most simple files will be collapsed to a - single node, complex hierarchies are usually completely lost. That's not - the right choice for editor environments, but probably a very effective - optimization if you just want to get the model data, convert it to your - own format and render it as fast as possible. - - This flag is designed to be used with for best - results. - - Scenes with thousands of extremely small meshes packed - in deeply nested nodes exist for almost all file formats. - Usage of this and usually fixes them all and - makes them renderable. - - - - - Flips all UV coordinates along the y-axis - and adjusts material settings/bitangents accordingly. - - - - - Flips face winding order from CCW (default) to CW. - - - - - Splits meshes with many bones into submeshes so that each submesh has fewer or as many bones as a given limit. - - - - - Removes bones losslessly or according to some threshold. In some cases (e.g. formats that require it) exporters - are faced to assign dummy bone weights to otherwise static meshes assigned to animated meshes. Full, weight-based skinning is expensive while - animating nodes is extremely cheap, so this step is offered to clean up the data in that regard. - - Usage of the configuration AI_CONFIG_PP_DB_THRESHOLD to control the threshold and AI_CONFIG_PP_DB_ALL_OR_NONE if you want bones - removed if and only if all bones within the scene qualify for removal. - - - - - This step will perform a global scale of the model. Some importers provide a mechanism to define a scaling unit for the model, which this processing step can utilize. - Use AI_CONFIG_GLOBAL_SCALE_FACTOR_KEY to control this. - - - - - Enumerates components of the scene or mesh data that - can be excluded from the import using the post process step - RemoveComponent. - - - - - No components to be excluded. - - - - - Removes normal vectors - - - - - Removes tangents/binormals - - - - - Removes all color sets. - - - - - Removes all texture UV sets. - - - - - Remove all boneweights from all meshes. Scenegraph - nodes corresponding to the bones are NOT removed. - Use OptimizeGraph step to remove them. - - - - - Removes all node animations. Coressponding scenegraph - nodes are NOT removed. Use OptimizeGraph step to - remove them. - - - - - Removes all embedded textures. - - - - - Removes all light sources. The corresponding scenegraph nodes are - NOT removed. Use the OptimizeGraph step to do this. - - - - - Removes all cameras. The corresponding scenegraph - nodes are NOT removed. Use the OptimizeGraph step - to do this. - - - - - Removes all meshes. - - - - - Removes all materials. One default material will be generated. - - - - - Enumerates geometric primitive types. - - - - - Point primitive. This is just a single vertex - in the virtual world. A face has one index for such a primitive. - - - - - Line primitive. This is a line defined through a start and an - end position. A face contains exactly two indices for such a primitive. - - - - - Triangle primitive, consisting of three indices. - - - - - A n-Gon that has more than three edges (thus is not a triangle). - - - - - Defines an animation channel behaves outside the defined - time range. This corresponds to the prestate and poststates - of the animation node. - - - - - The value from the default node transformation is taken. - - - - - The nearest key value is used without interpolation. - - - - - The value of the nearest two keys is linearly extrapolated for the current - time value. - - - - - The animation is repeated. If the animation key goes from n to m - and the current time is t, use the value at (t - n ) % (|m-n|). - - - - - Defines the methods of mesh morphing supported. - - - - - No morphing. - - - - - Interpolation between morph targets. - - - - - Normalized morphing between morph targets. - - - - - Relative morphing between morph targets. - - - - - Enumerates all supported light sources. - - - - - Unknown light. - - - - - Directional light source that has a well-defined - direction but is infinitely far away, e.g. the sun. - - - - - Point light source that has a well-defined position in - space but is omni-directional, e.g. a light bulb. - - - - - Spot light source emits light from a position in space, - in a certain direction that is limited by an angle, like - a cone. - - - - - Generic light level of the world, including the bounces of all other light sources. Typically, there's at most one ambient light in a scene and - is usually just a constant color. This light does not have a valid position, direction, or other properties - just the color. - - - - - An area light is a rectangle with a predefined size that uniformly emits light from one of its sides. The position is center of the rectangle and the direction is its normal vector. - - - - - Defines alpha blending flags, how the final - color value of a pixel is computed, based on the following equation: - - sourceColor * sourceBlend + destColor * destBlend - - - Where the destColor is the previous color in the frame buffer - and sourceColor is the material color before the - transparency calculation. This corresponds to the AI_MATKEY_BLEND_FUNC property. - - - - - Default blending: sourceColor * sourceAlpha + destColor * (1 - sourceAlpha) - - - - - Additive blending: sourcecolor * 1 + destColor * 1. - - - - - Defines all shading models supported by the library. - - The list of shading modes has been taken from Blender. See Blender - documentation for more information. - - - - - - No shading mode defined. - - - - - Flat shading. Shading is done on a per-face basis and is diffuse only. Also known - as 'faceted shading'. - - - - - Simple Gouraud shading. - - - - - Phong Shading. - - - - - Phong-Blinn Shading. - - - - - Toon-shading, also known as a 'comic' shader. - - - - - OrenNayer shading model. Extension to standard Lambertian shading, taking the roughness - of the material into account. - - - - - Minnaert shading model. Extension to standard Lambertian shading, taking the "darkness" of - the material into account. - - - - - CookTorrance shading model. Special shader for metallic surfaces. - - - - - No shading at all. Constant light influence of 1.0. - - - - - Fresnel shading. - - - - - Defines some mixed flags for a particular texture. This corresponds - to the AI_MAT_KEY_TEXFLAGS property. - - - - - The texture's color values have to be inverted (componentwise 1-n). - - - - - Explicit request to the application to process the alpha channel of the texture. This is mutually - exclusive with . These flags are - set if the library can say for sure that the alpha channel is used/is not used. - If the model format does not define this, iti s left to the application to decide - whether the texture alpha channel - if any - is evaluated or not. - - - - - Explicit request to the application to ignore the alpha channel of the texture. This is mutually - exclusive with . - - - - - Defines how UV coordinates outside the [0..1] range are handled. Commonly - referred to as the 'wrapping mode' - - - - - A texture coordinate u|v is translated to u % 1| v % 1. - - - - - Texture coordinates outside [0...1] are clamped to the nearest valid value. - - - - - A texture coordinate u|v becomes u1|v1 if (u - (u % 1)) % 2 is zero - and 1 - (u % 1) | 1 - (v % 1) otherwise. - - - - - If the texture coordinates for a pixel are outside [0...1] the texture is not - applied to that pixel. - - - - - Defines how texture coordinates are generated - - Real-time applications typically require full UV coordinates. So the use - of step is highly recommended. - It generates proper UV channels for non-UV mapped objects, as long as an accurate - description of how the mapping should look like is given. - - - - - - Coordinates are taken from the an existing UV channel. - - The AI_MATKEY_UVWSRC key specifies from the UV channel the texture coordinates - are to be taken from since meshes can have more than one UV channel. - - - - - - Spherical mapping - - - - - Cylinder mapping - - - - - Cubic mapping - - - - - Planar mapping - - - - - Unknown mapping that is not recognied. - - - - - Defines how the Nth texture of a specific type is combined - with the result of all previous layers. - - Example (left: key, right: value): - - DiffColor0 - gray - DiffTextureOp0 - TextureOperation.Multiply - DiffTexture0 - tex1.png - DiffTextureOp0 - TextureOperation.Add - DiffTexture1 - tex2.png - - - Written as an equation, the final diffuse term for a specific - pixel would be: - - - diffFinal = DiffColor0 * sampleTex(DiffTexture0, UV0) + sampleTex(DiffTexture1, UV0) * diffContrib; - - - - - - - T = T1 * T2 - - - - - T = T1 + T2 - - - - - T = T1 - T2 - - - - - T = T1 / T2 - - - - - T = (T1 + T2) - (T1 * T2) - - - - - T = T1 + (T2 - 0.5) - - - - - Defines the purpose of a texture. - - - - - No texture, but the value can be used as a 'texture semantic'. - - - - - A diffuse texture that is combined with the result of the diffuse lighting equation. - - - - - A specular texture that is combined with the result of the specular lighting equation. - - - - - An ambient texture that is combined with the ambient lighting equation. - - - - - An emissive texture that is added to the result of the lighting calculation. It is not influenced - by incoming light, instead it represents the light that the object is naturally emitting. - - - - - A height map texture. by convention, higher gray-scale values stand for - higher elevations from some base height. - - - - - A tangent-space normal map. There are several conventions for normal maps - and Assimp does (intentionally) not distinguish here. - - - - - A texture that defines the glossiness of the material. This is the exponent of the specular (phong) - lighting equation. Usually there is a conversion function defined to map the linear color values - in the texture to a suitable exponent. - - - - - The texture defines per-pixel opacity. usually 'white' means opaque and 'black' means 'transparency. Or quite - the opposite. - - - - - A displacement texture. The exact purpose and format is application-dependent. Higher color values stand for higher vertex displacements. - - - - - A lightmap texture (aka Ambient occlusion). Both 'lightmaps' and dedicated 'ambient occlusion maps' are covered by this material property. The - texture contains a scaling value for the final color value of a pixel. Its intensity is not affected by incoming light. - - - - - A reflection texture. Contains the color of a perfect mirror reflection. This is rarely used, almost never for real-time applications. - - - - - An unknown texture that does not mention any of the defined texture type definitions. It is still imported, but is excluded from any - further postprocessing. - - - - - Defines the state of the imported scene data structure. - - - - - Default state of the scene, it imported successfully. - - - - - Specifies that the scene data structure that was imported is not complete. - This flag bypasses some internal validations and allows the import - of animation skeletons, material libaries, or camera animation paths - using Assimp. Most applications won't support such data. - - - - - This flag is set by the - post process step if validation is successful. In a validated scene you can be sure that any - cross references in the data structure (e.g. vertex indices) are valid. - - - - - This flag is set by the - post process step if validation is successful, but some issues have been found. This can for example - mean that a texture that does not exist is referenced by a material or that the bone weights for a vertex - do not sum to 1.0. In most cases you should still be able to use the import. This flag can be useful - for applications which do not capture Assimp's log output. - - - - - This flag is set by the post process step. - It indicates that the vertices of the output mesh are not in the internal verbose format anymore. In the - verbose format, all vertices are unique where no vertex is ever referenced by more than one face. - - - - - Denotes the scene is pure height-map terrain data. Pure terrains usually consist of quads, sometimes triangles, - in a regular grid. The x,y coordinates of all vertex positions refer to the x,y coordinates on the terrain height map, the - z-axis stores the elevation at a specific point. - - TER (Terragen) and HMP (3D Game Studio) are height map formats. - - - - - - Specifies that the scene data can be shared between structures. For example: one vertex in a few faces. This differs from as - that has internal meanings about postprocessing steps. - - - - - Enumerates Assimp function result codes. - - - - - Function returned successfully. - - - - - There was an error. - - - - - Assimp ran out of memory. - - - - - Seek origins for Assimp's virtual file system API. - - - - - Beginning of the file - - - - - Current position of the file pointer. - - - - - End of the file, offsets must be negative. - - - - - Enumerates predefined log streaming destinations. - - - - - Stream log to a file - - - - - Stream log to the standard output - - - - - Stream log to the standard error output. - - - - - MSVC only: Stream the log to the debugger (this relies - on OutputDebugString from the Win32 SDK). - - - - - Defines material property types. - - - - - Array of single-precision (32 bit) floats. - - - - - Array of double-precision (64 bit) floats. - - - - - Property is a string. - - - - - Array of 32 bit integers. - - - - - Byte buffer where the content is undefined. - - - - - Enumerates how the native Assimp DLL was compiled - - - - - Assimp compiled as a shared object (Windows: DLL); - - - - - Assimp was compiled against STLport - - - - - Assimp was compiled as a debug build - - - - - Assimp was compiled with the boost work around. - - - - - Assimp was compiled built to run single threaded. - - - - - Defines how UV coordinates should be transformed. - - - - - Scaling is evaluated. - - - - - Rotation is evaluated. - - - - - Translation is evaluated. - - - - - Defines the desired file I/O mode is when opening a new file. - - - - - Open the file for writing. - - - - - Open the file for writing binary data to it. - - - - - Open the file for writing text data to it. - - - - - Open the file for reading. - - - - - Open the file for reading binary data from it. - - - - - Open the file for reading text data from it. - - - - - Defines flags that indicate level of support for common features for a given importer. - - - - - Indicates there is a textual encoding of the file format and it is supported. - - - - - Indicates there is a binary encoding of the file format and it is supported. - - - - - Indicates there is a compressed encoding of the file format and it is supported. - - - - - Indicates that the importer reads only a very particular subset of the file format. This is common - for formats that cannot easily be mapped to the Scene data structure. - - - - - Indicates that the importer is experimental and used with caution - this is only reserved for importers still in - development, and not typically yet in released production code. - - - - - Describes a blob of exported scene data. Blobs can be nested - each blob may reference another blob, which in - turn can reference another and so on. This is used to allow exporters to write more than one output for a given - scene, such as material files. Existence of such files depends on the format. - - - The stream representation of an ExportDataBlob is as follows: - - String: Name of the Blob - int: Length of Binary Data - byte[]: Binary Data - bool: If has next data blob - String: Name of nested blob - int: Length of nested blob binary data - byte[]: Nested blob binary data - bool: If nested blob has next data blob - .... - - - - - - Gets the name of the blob. The first and primary blob always has an empty string for a name. Auxillary files - that are nested will have names. - - - - - Get the blob data. - - - - - Gets the next data blob. - - - - - Gets if the blob data is valid. - - - - - Creates a new ExportDataBlob. - - Unmanaged structure. - - - - Creates a new ExportDataBlob. - - Name - Data - - - - Writes the data blob to the specified stream. - - Output stream - - - - Reads a data blob from the specified stream. - - Input stream - Data blob - - - - Describes a file format which Assimp can export to. - - - - - Gets a short string ID to uniquely identify the export format. E.g. "collada" or "obj". - - - - - Gets a short description of the file format to present to users. - - - - - Gets the recommended file extension for the exported file in lower case. - - - - - Constructs a new ExportFormatDescription. - - Unmanaged structure - - - - A single face in a mesh, referring to multiple vertices. This can be a triangle - if the index count is equal to three, or a polygon if the count is greater than three. - - Since multiple primitive types can be contained in a single mesh, this approach - allows you to better examine how the mesh is constructed. If you use the - post process step flag during import, then each mesh will be homogenous where primitive type is concerned. - - - - - Gets the number of indices defined in the face. - - - - - Gets if the face has faces (should always be true). - - - - - Gets or sets the indices that refer to positions of vertex data in the mesh's vertex - arrays. - - - - - Constructs a new instance of the class. - - - - - Constructs a new instance of the class. - - Face indices - - - - Gets if the native value type is blittable (that is, does not require marshaling by the runtime, e.g. has MarshalAs attributes). - - - - - Writes the managed data to the native value. - - Optional pointer to the memory that will hold the native value. - Output native value - - - - Reads the unmanaged data from the native value. - - Input native value - - - - Frees unmanaged memory created by . - - Native value to free - True if the unmanaged memory should be freed, false otherwise. - - - - Simple implementation of an IOSystem that searches for files on the disk. This implementation - can be given a number of search directories that it will attempt to locate the file in first, before - using the file path given by Assimp. That way, you can load models that have files distributed in a number of other - directories besides the root model's. - - - - - Constructs a new FileIOSystem that does not have any search directories. - - - - - Constructs a new FileIOSystem that uses the specified search directories. - - Search directories to search for files in - - - - Sets the search directories the FileIOSystem will use when searching for files. - - Directory paths - - - - Gets the search directories the FileIOSystem is using. - - Directory paths - - - - Opens a stream to a file. - - Path to the file - Desired file access mode - The IO stream - - - - Finds the first file that matches the file name (name + extension) in the search paths. - - File name (+ extension) to search for - Found file path - True if the file was found, false otherwise - - - - Wraps a FileStream. - - - - - Metadata and feature support information for a given importer. - - - - - Gets the name of the importer (e.g. Blender3D Importer) - - - - - Gets the original author (blank if unknown or assimp team). - - - - - Gets the name of the current maintainer, if empty then the author maintains. - - - - - Gets any implementation comments. - - - - - Gets the features supported by the importer. - - - - - Gets the minimum version of the file format supported. If no version scheme, forwards compatible, or importer doesn't care, major/min will be zero. - - - - - Gets the maximum version of the file format supported. If no version scheme, forwards compatible, or importer doesn't care, major/min will be zero. - - - - - Gets the list of file extensions the importer can handle. All entries are lower case and do NOT have a leading dot. - - - - - Represents an object that can be marshaled to and from a native representation. - - Managed object type - Native value type - - - - Gets if the native value type is blittable (that is, does not require marshaling by the runtime, e.g. has MarshalAs attributes). - - - - - Writes the managed data to the native value. - - Optional pointer to the memory that will hold the native value. - Output native value - - - - Reads the unmanaged data from the native value. - - Input native value - - - - Custom marshaler for usage with the for performing marshaling - to-and-from unmanaged memory for non-blittable types. A type must be attributed with - to automatically have an instance of its marshaler be utilized. - - - - - Gets the native data size in bytes. - - - - - Marshals the managed object to the unmanaged chunk of memory. - - Managed object to marshal. - Unmanaged chunk of memory to write to. - - - - Marshals the managed object from the unmanaged chunk of memory. - - Unmanaged chunk of memory to read from. - Managed object marshaled. - - - - Defines a stream to some file input or output source. This object is responsible for reading/writing data - that is used by Assimp. - - - - - Gets whether or not this IOStream has been disposed. - - - - - Gets the original path to file given by Assimp. - - - - - Gets the original desired file access mode. - - - - - Gets whether the stream is in fact valid - that is, the input/output has been - properly located and can be read/written. - - - - - Constructs a new IOStream. - - Path to file given by Assimp - Desired file access mode - - - - Finalizes an instance of the class. - - - - - Disposes of resources held by the IOStream. - - - - - Releases unmanaged and - optionally - managed resources. - - True to release both managed and unmanaged resources; False to release only unmanaged resources. - - - - Writes data to the stream. - - Data to write - Number of bytes to write - Number of bytes actually written. Should be equal to the specified count, unless if EoF was hit or an error occured. - - - - Reads data from the stream. - - Byte buffer to store the read data in - Number of bytes to read - Number of bytes actually read. Should be equal to the specified count, unless if EoF was hit or an error occured. - - - - Sets the current file position pointer. - - Offset in bytes from the origin - Origin reference - ReturnCode indicating success or failure. - - - - Gets the current file position pointer (in bytes). - - Current file position pointer (in bytes) - - - - Gets the total file size (in bytes). - - File size in bytes - - - - Flushes all data currently in the stream buffers. - - - - - Closes the stream - flushing any data not yet read/written and disposes of resources. - - - - - Defines a custom IO handler that can be registered to an importer that will handle I/O for assimp. This includes searching/opening - files to read during import, and creating/writing to files during export. - - - - - Gets whether or not this IOSystem has been disposed. - - - - - Gets the number of currently opened streams. - - - - - Constructs a new IOSystem. - - - - - Finalizes an instance of the class. - - - - - Opens a stream to a file. - - Path to the file - Desired file access mode - The IO stream - - - - Closes a stream that is owned by this IOSystem. - - Stream to close - - - - Closes all outstanding streams owned by this IOSystem. - - - - - Disposes of all resources held by this object. - - - - - Releases unmanaged and - optionally - managed resources. - - True to release both managed and unmanaged resources; False to release only unmanaged resources. - - - - Describes a light source in the scene. Assimp supports multiple light sources - including spot, point, and directional lights. All are defined by a single structure - and distinguished by their parameters. Lights have corresponding nodes in the scenegraph. - Some file formats such as 3DS and ASE export a "target point", e.g. the point - a spot light is looking at (it can even be animated). Assimp writes the target point as a subnode - of a spotlight's main node called "spotName.Target". However, this is just additional information - then, the transform tracks of the main node make the spot light already point in the right direction. - - - - - Gets or sets the name of the light source. This corresponds to a node present in the scenegraph. - - - - - Gets or sets the type of light source. This should never be undefined. - - - - - Gets or sets the inner angle of a spot light's light cone. The spot light has - maximum influence on objects inside this angle. The angle is given in radians, it - is 2PI for point lights and defined for directional lights. - - - - - Gets or sets the outer angle of a spot light's light cone. The spot light does not affect objects outside - this angle. The angle is given in radians. It is 2PI for point lights and undefined for - directional lights. The outer angle must be greater than or equal to the inner angle. - - - - - Gets or sets the constant light attenuation factor. The intensity of the light source - at a given distance 'd' from the light position is Atten = 1 / (att0 + att1 * d + att2 * d*d). - This member corresponds to the att0 variable in the equation and is undefined for directional lights. - - - - - Gets or sets the linear light attenuation factor. The intensity of the light source - at a given distance 'd' from the light position is Atten = 1 / (att0 + att1 * d + att2 * d*d) - This member corresponds to the att1 variable in the equation and is undefined for directional lights. - - - - - Gets or sets the quadratic light attenuation factor. The intensity of the light source - at a given distance 'd' from the light position is Atten = 1 / (att0 + att1 * d + att2 * d*d). - This member corresponds to the att2 variable in the equation and is undefined for directional lights. - - - - - Gets or sets the position of the light source in space, relative to the - transformation of the node corresponding to the light. This is undefined for - directional lights. - - - - - Gets or sets the direction of the light source in space, relative to the transformation - of the node corresponding to the light. This is undefined for point lights. - - - - - Gets or sets the up vector of the light source in space, relative to the transformation of the node corresponding to the light. - This is undefined for point lights. - - - - - Gets or sets the diffuse color of the light source. The diffuse light color is multiplied with - the diffuse material color to obtain the final color that contributes to the diffuse shading term. - - - - - Gets or sets the specular color of the light source. The specular light color is multiplied with the - specular material color to obtain the final color that contributes to the specular shading term. - - - - - Gets or sets the ambient color of the light source. The ambient light color is multiplied with the ambient - material color to obtain the final color that contributes to the ambient shading term. - - - - - Gets or sets the Width (X) and Height (Y) of the area that represents an light. - - - - - Constructs a new instance of the class. - - - - - Gets if the native value type is blittable (that is, does not require marshaling by the runtime, e.g. has MarshalAs attributes). - - - - - Writes the managed data to the native value. - - Optional pointer to the memory that will hold the native value. - Output native value - - - - Reads the unmanaged data from the native value. - - Input native value - - - - Frees unmanaged memory created by . - - Native value to free - True if the unmanaged memory should be freed, false otherwise. - - - - Callback delegate for Assimp's LogStream. - - Log message - Supplied user data - - - - Represents a log stream, which receives all log messages and streams them somewhere. - - - - - Gets or sets, if verbose logging is enabled globally. - - - - - Gets or sets the user data to be passed to the callback. - - - - - Gets whether the logstream has been disposed or not. - - - - - Gets whether or not the logstream is currently attached to the library. - - - - - Static constructor. - - - - - Constructs a new LogStream. - - - - - Constructs a new LogStream. - - User-supplied data - - - - Constructs a new LogStream. - - Logging callback that is called when messages are received by the log stream. - - - - Constructs a new LogStream. - - Logging callback that is called when messages are received by the log stream. - User-supplied data - - - - Finalizes an instance of the class. - - - - - Detaches all active logstreams from the library. - - - - - Gets all active logstreams that are currently attached to the library. - - Collection of active logstreams attached to the library. - - - - Attaches the logstream to the library. - - - - - Detaches the logstream from the library. - - - - - Logs a message. - - Message contents - - - - Releases unmanaged resources held by the LogStream. This should not be called by the user if the logstream is currently attached to an assimp importer. - - - - - Releases unmanaged and - optionally - managed resources. - - True to release both managed and unmanaged resources; False to release only unmanaged resources. - - - - Override this method to log a message for a subclass of Logstream, if no callback - was set. - - Message - User data - - - - Called when the log stream has been attached to the assimp importer. At this point it may start receiving messages. - - - - - Called when the log stream has been detatched from the assimp importer. After this point it will stop receiving - messages until it is re-attached. - - - - - Log stream that writes messages to the Console. - - - - - Constructs a new console logstream. - - - - - Constructs a new console logstream. - - User supplied data - - - - Log a message to the console. - - Message - Userdata - - - - A material contains all the information that describes how to render a mesh. E.g. textures, colors, and render states. Internally - all this information is stored as key-value pair properties. The class contains many convienence methods and properties for - accessing non-texture/texture properties without having to know the Assimp material key names. Not all properties may be present, - and if they aren't a default value will be returned. - - - - - Gets the number of properties contained in the material. - - - - - Checks if the material has a name property. - - - - - Gets the material name value, if any. Default value is an empty string. - - - - - Checks if the material has a two-sided property. - - - - - Gets if the material should be rendered as two-sided. Default value is false. - - - - - Checks if the material has a shading-mode property. - - - - - Gets the shading mode. Default value is , meaning it is not defined. - - - - - Checks if the material has a wireframe property. - - - - - Gets if wireframe should be enabled. Default value is false. - - - - - Checks if the material has a blend mode property. - - - - - Gets the blending mode. Default value is . - - - - - Checks if the material has an opacity property. - - - - - Gets the opacity. Default value is 1.0f. - - - - - Checks if the material has a bump scaling property. - - - - - Gets the bump scaling. Default value is 0.0f; - - - - - Checks if the material has a shininess property. - - - - - Gets the shininess. Default value is 0.0f; - - - - - Checks if the material has a shininess strength property. - - - - - Gets the shininess strength. Default vaulue is 1.0f. - - - - - Checks if the material has a reflectivty property. - - - - - Gets the reflectivity. Default value is 0.0f; - - - - - Checks if the material has a color diffuse property. - - - - - Gets the color diffuse. Default value is white. - - - - - Checks if the material has a color ambient property. - - - - - Gets the color ambient. Default value is (.2f, .2f, .2f, 1.0f). - - - - - Checks if the material has a color specular property. - - - - - Gets the color specular. Default value is black. - - - - - Checks if the material has a color emissive property. - - - - - Gets the color emissive. Default value is black. - - - - - Checks if the material has a color transparent property. - - - - - Gets the color transparent. Default value is black. - - - - - Checks if the material has a color reflective property. - - - - - Gets the color reflective. Default value is black. - - - - - Gets if the material has a diffuse texture in the first texture index. - - - - - Gets or sets diffuse texture properties in the first texture index. - - - - - Gets if the material has a specular texture in the first texture index. - - - - - Gets or sets specular texture properties in the first texture index. - - - - - Gets if the material has a ambient texture in the first texture index. - - - - - Gets or sets ambient texture properties in the first texture index. - - - - - Gets if the material has a emissive texture in the first texture index. - - - - - Gets or sets emissive texture properties in the first texture index. - - - - - Gets if the material has a height texture in the first texture index. - - - - - Gets or sets height texture properties in the first texture index. - - - - - Gets if the material has a normal texture in the first texture index. - - - - - Gets or sets normal texture properties in the first texture index. - - - - - Gets if the material has an opacity texture in the first texture index. - - - - - Gets or sets opacity texture properties in the first texture index. - - - - - Gets if the material has a displacement texture in the first texture index. - - - - - Gets or sets displacement texture properties in the first texture index. - - - - - Gets if the material has a light map texture in the first texture index. - - - - - Gets or sets light map texture properties in the first texture index. - - - - - Gets if the material has a reflection texture in the first texture index. - - - - - Gets or sets reflection texture properties in the first texture index. - - - - - Constructs a new instance of the class. - - - - - Helper method to construct a fully qualified name from the input parameters. All the input parameters are combined into the fully qualified name: {baseName},{texType},{texIndex}. E.g. - "$clr.diffuse,0,0" or "$tex.file,1,0". This is the name that is used as the material dictionary key. - - Key basename, this must not be null or empty - Texture type; non-texture properties should leave this - Texture index; non-texture properties should leave this zero. - The fully qualified name - - - - Gets the non-texture properties contained in this Material. The name should be - the "base name", as in it should not contain texture type/texture index information. E.g. "$clr.diffuse" rather than "$clr.diffuse,0,0". The extra - data will be filled in automatically. - - Key basename - The material property, if it exists - - - - Gets the material property. All the input parameters are combined into the fully qualified name: {baseName},{texType},{texIndex}. E.g. - "$clr.diffuse,0,0" or "$tex.file,1,0". - - Key basename - Texture type; non-texture properties should leave this - Texture index; non-texture properties should leave this zero. - The material property, if it exists - - - - Gets the material property by its fully qualified name. The format is: {baseName},{texType},{texIndex}. E.g. - "$clr.diffuse,0,0" or "$tex.file,1,0". - - Fully qualified name of the property - The material property, if it exists - - - - Checks if the material has the specified non-texture property. The name should be - the "base name", as in it should not contain texture type/texture index information. E.g. "$clr.diffuse" rather than "$clr.diffuse,0,0". The extra - data will be filled in automatically. - - Key basename - True if the property exists, false otherwise. - - - - Checks if the material has the specified property. All the input parameters are combined into the fully qualified name: {baseName},{texType},{texIndex}. E.g. - "$clr.diffuse,0,0" or "$tex.file,1,0". - - Key basename - Texture type; non-texture properties should leave this - Texture index; non-texture properties should leave this zero. - True if the property exists, false otherwise. - - - - Checks if the material has the specified property by looking up its fully qualified name. The format is: {baseName},{texType},{texIndex}. E.g. - "$clr.diffuse,0,0" or "$tex.file,1,0". - - Fully qualified name of the property - True if the property exists, false otherwise. - - - - Adds a property to this material. - - Material property - True if the property was successfully added, false otherwise (e.g. null or key already present). - - - - Removes a non-texture property from the material. - - Property name - True if the property was removed, false otherwise - - - - Removes a property from the material. - - Name of the property - Property texture type - Property texture index - True if the property was removed, false otherwise - - - - Removes a property from the material. - - Fully qualified name of the property ({basename},{texType},{texIndex}) - True if the property was removed, false otherwise - - - - Removes all properties from the material; - - - - - Gets -all- properties contained in the Material. - - All properties in the material property map. - - - - Gets all the number of textures that are of the specified texture type. - - Texture type - Texture count - - - - Adds a texture to the material - this bulk creates a property for each field. This will - either create properties or overwrite existing properties. If the texture has no - file path, nothing is added. - - Texture to add - True if the texture properties were added or modified - - - - Adds a texture to the material - this bulk creates a property for each field. This will - either create properties or overwrite existing properties. If the texture has no - file path, nothing is added. - - Texture to add - True to only set the texture's file path, false otherwise - True if the texture properties were added or modified - - - - Removes a texture from the material - this bulk removes a property for each field. - If the texture has no file path, nothing is removed - - Texture to remove - True if the texture was removed, false otherwise. - - - - Gets a texture that corresponds to the type/index. - - Texture type - Texture index - Texture description - True if the texture was found in the material - - - - Gets all textures that correspond to the type. - - Texture type - The array of textures - - - - Gets all textures in the material. - - The array of textures - - - - Gets if the native value type is blittable (that is, does not require marshaling by the runtime, e.g. has MarshalAs attributes). - - - - - Writes the managed data to the native value. - - Optional pointer to the memory that will hold the native value. - Output native value - - - - Reads the unmanaged data from the native value. - - Input native value - - - - Frees unmanaged memory created by . - - Native value to free - True if the unmanaged memory should be freed, false otherwise. - - - - A key-value pairing that represents some material property. - - - - - Gets or sets the property key name. E.g. $tex.file. This corresponds to the - "AiMatKeys" base name constants. - - - - - Gets or sets the type of property. - - - - - Gets the raw byte data count. - - - - - Checks if the property has data. - - - - - Gets the raw byte data. To modify/read this data, see the Get/SetXXXValue methods. - - - - - Gets or sets the texture type semantic, for non-texture properties this is always . - - - - - Gets or sets the texture index, for non-texture properties this is always zero. - - - - - Gets the property's fully qualified name. Format: "{base name},{texture type semantic},{texture index}". E.g. "$clr.diffuse,0,0". This - is the key that is used to index the property in the material property map. - - - - - Constructs a new instance of the class. - - - - - Constructs a new instance of the class. Constructs a buffer property. - - Base name of the property - Property value - - - - Constructs a new instance of the class. Constructs a float property. - - Base name of the property - Property value - - - - Constructs a new instance of the class. Constructs an integer property. - - Base name of the property - Property value - - - - Constructs a new instance of the class. Constructs a boolean property. - - Name of the property - Property value - - - - Constructs a new instance of the class. Creates a string property. - - Base name of the property - Property value - - - - Constructs a new instance of the class. Creates a texture property. - - Base name of the property - Property value - Texture type - Texture index - - - - Constructs a new instance of the class. Creates a float array property. - - Base name of the property - Property values - - - - Constructs a new instance of the class. Creates a int array property. - - Base name of the property - Property values - - - - Constructs a new instance of the class. Creates a Color3D property. - - Base name of the property - Property value - - - - Constructs a new instance of the class. Creates a Color4D property. - - Base name of the property - Property value - - - - Gets the property raw data as a float. - - Float - - - - Sets the property raw data with a float. - - Float. - True if successful, false otherwise - - - - Gets the property raw data as a double. - - Double - - - - Sets the property raw data with a double. - - Double. - True if successful, false otherwise. - - - - Gets the property raw data as an integer. - - Integer - - - - Sets the property raw data as an integer. - - Integer - True if successful, false otherwise - - - - Gets the property raw data as a string. - - String - - - - Sets the property raw data as string. - - String - True if successful, false otherwise - - - - Gets the property raw data as a float array. - - Number of elements to get - Float array - - - - Gets the property raw data as a float array. - - Float array - - - - Sets the property raw data as a float array. - - Values to set - True if successful, otherwise false - - - - Gets the property raw data as a double array. - - Double array - - - - Sets the property raw data as a double array. - - Values to set - True if successful, otherwise false - - - - Gets the property raw data as an integer array. - - Number of elements to get - Integer array - - - - Gets the property raw data as an integer array. - - Integer array - - - - Sets the property raw data as an integer array. - - Values to set - True if successful, otherwise false - - - - Gets the property raw data as a boolean. - - Boolean - - - - Sets the property raw data as a boolean. - - Boolean value - True if successful, false otherwise - - - - Gets the property raw data as a Color3D. - - Color3D - - - - Sets the property raw data as a Color3D. - - Color3D - True if successful, false otherwise - - - - Gets the property raw data as a Color4D. - - Color4D - - - - Sets the property raw data as a Color4D. - - Color4D - True if successful, false otherwise - - - - Gets if the native value type is blittable (that is, does not require marshaling by the runtime, e.g. has MarshalAs attributes). - - - - - Writes the managed data to the native value. - - Optional pointer to the memory that will hold the native value. - Output native value - - - - Reads the unmanaged data from the native value. - - Input native value - - - - Frees unmanaged memory created by . - - Native value to free - True if the unmanaged memory should be freed, false otherwise. - - - - Represents a 3x3 matrix. Assimp docs say their matrices are always row-major, - and it looks like they're only describing the memory layout. Matrices are treated - as column vectors however (X base in the first column, Y base the second, and Z base the third) - - - - - Value at row 1, column 1 of the matrix - - - - - Value at row 1, column 2 of the matrix - - - - - Value at row 1, column 3 of the matrix - - - - - Value at row 2, column 1 of the matrix - - - - - Value at row 2, column 2 of the matrix - - - - - Value at row 2, column 3 of the matrix - - - - - Value at row 3, column 1 of the matrix - - - - - Value at row 3, column 2 of the matrix - - - - - Value at row 3, column 3 of the matrix - - - - - Gets the identity matrix. - - - - - Gets if this matrix is an identity matrix. - - - - - Gets or sets the value at the specific one-based row, column - index. E.g. i = 1, j = 2 gets the value in row 1, column 2 (MA2). Indices - out of range return a value of zero. - - - One-based Row index - One-based Column index - Matrix value - - - - Constructs a new Matrix3x3. - - Element at row 1, column 1 - Element at row 1, column 2 - Element at row 1, column 3 - Element at row 2, column 1 - Element at row 2, column 2 - Element at row 2, column 3 - Element at row 3, column 1 - Element at row 3, column 2 - Element at row 3, column 3 - - - - Constructs a new Matrix3x3. - - A 4x4 matrix to construct from, only taking the rotation/scaling part. - - - - Transposes this matrix (rows become columns, vice versa). - - - - - Inverts the matrix. If the matrix is *not* invertible all elements are set to . - - - - - Compute the determinant of this matrix. - - The determinant - - - - Creates a rotation matrix from a set of euler angles. - - Rotation angle about the x-axis, in radians. - Rotation angle about the y-axis, in radians. - Rotation angle about the z-axis, in radians. - The rotation matrix - - - - Creates a rotation matrix from a set of euler angles. - - Vector containing the rotation angles about the x, y, z axes, in radians. - The rotation matrix - - - - Creates a rotation matrix for a rotation about the x-axis. - - Rotation angle in radians. - The rotation matrix - - - - Creates a rotation matrix for a rotation about the y-axis. - - Rotation angle in radians. - The rotation matrix - - - - Creates a rotation matrix for a rotation about the z-axis. - - Rotation angle in radians. - The rotation matrix - - - - Creates a rotation matrix for a rotation about an arbitrary axis. - - Rotation angle, in radians - Rotation axis, which should be a normalized vector. - The rotation matrix - - - - Creates a scaling matrix. - - Scaling vector - The scaling vector - - - - Creates a rotation matrix that rotates a vector called "from" into another - vector called "to". Based on an algorithm by Tomas Moller and John Hudges: - - "Efficiently Building a Matrix to Rotate One Vector to Another" - Journal of Graphics Tools, 4(4):1-4, 1999 - - - Starting vector - Ending vector - Rotation matrix to rotate from the start to end. - - - - Tests equality between two matrices. - - First matrix - Second matrix - True if the matrices are equal, false otherwise - - - - Tests inequality between two matrices. - - First matrix - Second matrix - True if the matrices are not equal, false otherwise - - - - Performs matrix multiplication.Multiplication order is B x A. That way, SRT concatenations - are left to right. - - First matrix - Second matrix - Multiplied matrix - - - - Implicit conversion from a 4x4 matrix to a 3x3 matrix. - - 4x4 matrix - 3x3 matrix - - - - Tests equality between this matrix and another. - - Other matrix to test - True if the matrices are equal, false otherwise - - - - Determines whether the specified is equal to this instance. - - The to compare with this instance. - - true if the specified is equal to this instance; otherwise, false. - - - - - Returns a hash code for this instance. - - - A hash code for this instance, suitable for use in hashing algorithms and data structures like a hash table. - - - - - Returns a that represents this instance. - - - A that represents this instance. - - - - - Represents a 4x4 column-vector matrix (X base is the first column, Y base is the second, Z base the third, and translation the fourth). - Memory layout is row major. Right handed conventions are used by default. - - - - - Value at row 1, column 1 of the matrix - - - - - Value at row 1, column 2 of the matrix - - - - - Value at row 1, column 3 of the matrix - - - - - Value at row 1, column 4 of the matrix - - - - - Value at row 2, column 1 of the matrix - - - - - Value at row 2, column 2 of the matrix - - - - - Value at row 2, column 3 of the matrix - - - - - Value at row 2, column 4 of the matrix - - - - - Value at row 3, column 1 of the matrix - - - - - Value at row 3, column 2 of the matrix - - - - - Value at row 3, column 3 of the matrix - - - - - Value at row 3, column 4 of the matrix - - - - - Value at row 4, column 1 of the matrix - - - - - Value at row 4, column 2 of the matrix - - - - - Value at row 4, column 3 of the matrix - - - - - Value at row 4, column 4 of the matrix - - - - - Gets the identity matrix. - - - - - Gets if this matrix is an identity matrix. - - - - - Gets or sets the value at the specific one-based row, column - index. E.g. i = 1, j = 2 gets the value in row 1, column 2 (MA2). Indices - out of range return a value of zero. - - - One-based Row index - One-based Column index - Matrix value - - - - Constructs a new Matrix4x4. - - Element at row 1, column 1 - Element at row 1, column 2 - Element at row 1, column 3 - Element at row 1, column 4 - Element at row 2, column 1 - Element at row 2, column 2 - Element at row 2, column 3 - Element at row 2, column 4 - Element at row 3, column 1 - Element at row 3, column 2 - Element at row 3, column 3 - Element at row 3, column 4 - Element at row 4, column 1 - Element at row 4, column 2 - Element at row 4, column 3 - Element at row 4, column 4 - - - - Constructs a new Matrix4x4. - - Rotation matrix to copy values from. - - - - Transposes this matrix (rows become columns, vice versa). - - - - - Inverts the matrix. If the matrix is *not* invertible all elements are set to . - - - - - Compute the determinant of this matrix. - - The determinant - - - - Decomposes a transformation matrix into its original scale, rotation, and translation components. The - scaling vector receives the scaling for the x, y, z axes. The rotation is returned as a hamilton quaternion. And - the translation is the output position for the x, y, z axes. - - Vector to hold the scaling component - Quaternion to hold the rotation component - Vector to hold the translation component - - - - Decomposes a transformation matrix with no scaling. The rotation is returned as a hamilton - quaternion. The translation receives the output position for the x, y, z axes. - - Quaternion to hold the rotation component - Vector to hold the translation component - - - - Creates a rotation matrix from a set of euler angles. - - Rotation angle about the x-axis, in radians. - Rotation angle about the y-axis, in radians. - Rotation angle about the z-axis, in radians. - The rotation matrix - - - - Creates a rotation matrix from a set of euler angles. - - Vector containing the rotation angles about the x, y, z axes, in radians. - The rotation matrix - - - - Creates a rotation matrix for a rotation about the x-axis. - - Rotation angle in radians. - The rotation matrix - - - - Creates a rotation matrix for a rotation about the y-axis. - - Rotation angle in radians. - The rotation matrix - - - - Creates a rotation matrix for a rotation about the z-axis. - - Rotation angle in radians. - The rotation matrix - - - - Creates a rotation matrix for a rotation about an arbitrary axis. - - Rotation angle, in radians - Rotation axis, which should be a normalized vector. - The rotation matrix - - - - Creates a translation matrix. - - Translation vector - The translation matrix - - - - Creates a scaling matrix. - - Scaling vector - The scaling vector - - - - Creates a rotation matrix that rotates a vector called "from" into another - vector called "to". Based on an algorithm by Tomas Moller and John Hudges: - - "Efficiently Building a Matrix to Rotate One Vector to Another" - Journal of Graphics Tools, 4(4):1-4, 1999 - - - Starting vector - Ending vector - Rotation matrix to rotate from the start to end. - - - - Tests equality between two matrices. - - First matrix - Second matrix - True if the matrices are equal, false otherwise - - - - Tests inequality between two matrices. - - First matrix - Second matrix - True if the matrices are not equal, false otherwise - - - - Performs matrix multiplication. Multiplication order is B x A. That way, SRT concatenations - are left to right. - - First matrix - Second matrix - Multiplied matrix - - - - Implicit conversion from a 3x3 matrix to a 4x4 matrix. - - 3x3 matrix - 4x4 matrix - - - - Tests equality between this matrix and another. - - Other matrix to test - True if the matrices are equal, false otherwise - - - - Determines whether the specified is equal to this instance. - - The to compare with this instance. - - true if the specified is equal to this instance; otherwise, false. - - - - - Returns a hash code for this instance. - - - A hash code for this instance, suitable for use in hashing algorithms and data structures like a hash table. - - - - - Returns a that represents this instance. - - - A that represents this instance. - - - - - Delegate for performing unmanaged memory cleanup. - - Location in unmanaged memory of the value to cleanup - True if the unmanaged memory should be freed, false otherwise - - - - Helper static class containing functions that aid dealing with unmanaged memory to managed memory conversions. - - - - - Marshals an array of managed values to a c-style unmanaged array (void*). - - Managed type - Native type - Array of managed values - Pointer to unmanaged memory - - - - Marshals an array of managed values to a c-style unmanaged array (void*). This also can optionally marshal to - an unmanaged array of pointers (void**). - - Managed type - Native type - Array of managed values - True if the pointer is an array of pointers, false otherwise. - Pointer to unmanaged memory - - - - Marshals an array of managed values from a c-style unmanaged array (void*). - - Managed type - Native type - Pointer to unmanaged memory - Number of elements to marshal - Marshaled managed values - - - - Marshals an array of managed values from a c-style unmanaged array (void*). This also can optionally marshal from - an unmanaged array of pointers (void**). - - Managed type - Native type - Pointer to unmanaged memory - Number of elements to marshal - True if the pointer is an array of pointers, false otherwise. - Marshaled managed values - - - - Marshals an array of blittable structs to a c-style unmanaged array (void*). This should not be used on non-blittable types - that require marshaling by the runtime (e.g. has MarshalAs attributes). - - Struct type - Managed array of structs - Pointer to unmanaged memory - - - - Marshals an array of blittable structs from a c-style unmanaged array (void*). This should not be used on non-blittable types - that require marshaling by the runtime (e.g. has MarshalAs attributes). - - Struct type - Pointer to unmanaged memory - Number of elements to read - Managed array - - - - Frees an unmanaged array and performs cleanup for each value. This can be used on any type that can be - marshaled into unmanaged memory. - - Struct type - Pointer to unmanaged memory - Number of elements to free - Delegate that performs the necessary cleanup - - - - Frees an unmanaged array and performs cleanup for each value. Optionally can free an array of pointers. This can be used on any type that can be - marshaled into unmanaged memory. - - Struct type - Pointer to unmanaged memory - Number of elements to free - Delegate that performs the necessary cleanup - True if the pointer is an array of pointers, false otherwise. - - - - Marshals a managed value to unmanaged memory. - - Managed type - Unmanaged type - Managed value to marshal - Pointer to unmanaged memory - - - - Marshals a managed value from unmanaged memory. - - Managed type - Unmanaged type - Pointer to unmanaged memory - The marshaled managed value - - - - Convienence method for marshaling a pointer to a structure. Only use if the type is not blittable, otherwise - use the read methods for blittable types. - - Struct type - Pointer to marshal - The marshaled structure - - - - Convienence method for marshaling a pointer to a structure. Only use if the type is not blittable, otherwise - use the read methods for blittable types. - - Struct type - Pointer to marshal - The marshaled structure - - - - Convienence method for marshaling a structure to a pointer. Only use if the type is not blittable, otherwise - use the write methods for blittable types. - - Struct type - Struct to marshal - Pointer to unmanaged chunk of memory which must be allocated prior to this call - - - - Computes the size of the struct type using Marshal SizeOf. Only use if the type is not blittable, thus requiring marshaling by the runtime, - (e.g. has MarshalAs attributes), otherwise use the SizeOf methods for blittable types. - - Struct type - Size of the struct in bytes. - - - - Computes the size of the struct array using Marshal SizeOf. Only use if the type is not blittable, thus requiring marshaling by the runtime, - (e.g. has MarshalAs attributes), otherwise use the SizeOf methods for blittable types. - - Struct type - Array of structs - Total size, in bytes, of the array's contents. - - - - Pins an object in memory, which allows a pointer to it to be returned. While the object remains pinned the runtime - cannot move the object around in memory, which may degrade performance. - - Object to pin. - Pointer to pinned object's memory location. - - - - Unpins an object in memory, allowing it to once again freely be moved around by the runtime. - - Object to unpin. - - - - Convienence method to dispose all items in the collection - - IDisposable type - Collection of disposables - - - - Casts an underlying value type to an enum type, WITHOUT first casting the value to an Object. So this avoid boxing the value. - - Underlying value type. - Enum type. - Value to cast. - Enum value. - - - - Allocates unmanaged memory. This memory should only be freed by this helper. - - Size to allocate - Alignment of the memory, by default aligned along 16-byte boundary. - Pointer to the allocated unmanaged memory. - - - - Allocates unmanaged memory that is cleared to a certain value. This memory should only be freed by this helper. - - Size to allocate - Value the memory will be cleared to, by default zero. - Alignment of the memory, by default aligned along 16-byte boundary. - Pointer to the allocated unmanaged memory. - - - - Frees unmanaged memory that was allocated by this helper. - - Pointer to unmanaged memory to free. - - - - Checks if the memory is aligned to the specified alignment. - - Pointer to the memory - Alignment value, by defauly 16-byte - True if is aligned, false otherwise. - - - - Swaps the value between two references. - - Type of data to swap. - First reference - Second reference - - - - Computes a hash code using the FNV modified algorithmm. - - Byte data to hash. - Hash code for the data. - - - - Reads a stream until the end is reached into a byte array. Based on - Jon Skeet's implementation. - It is up to the caller to dispose of the stream. - - Stream to read all bytes from - Initial buffer length, default is 32K - The byte array containing all the bytes from the stream - - - - Compares two arrays of bytes for equivalence. - - First array of data. - Second array of data. - True if both arrays contain the same data, false otherwise. - - - - Clears the memory to the specified value. - - Pointer to the memory. - Value the memory will be cleared to. - Number of bytes, starting from the memory pointer, to clear. - - - - Computes the size of the struct type. - - Struct type - Size of the struct in bytes. - - - - Casts the by-ref value into a pointer. - - Struct type. - By-ref value. - Pointer to the value. - - - - Casts the readonly by-ref value into a pointer. - - Struct type. - By-ref value. - Pointer to the value. - - - - Casts the pointer into a by-ref value of the specified type. - - Struct type. - Memory location. - By-ref value. - - - - Casts one by-ref type to another, unsafely. - - From struct type - To struct type - Source by-ref value. - Reference as the from type. - - - - Casts one readonly by-ref type to another, unsafely. - - From struct type - To struct type - Source by-ref value. - Reference as the from type. - - - - Computes the size of the struct array. - - Struct type - Array of structs - Total size, in bytes, of the array's contents. - - - - Adds an offset to the pointer. - - Pointer - Offset - Pointer plus the offset - - - - Performs a memcopy that copies data from the memory pointed to by the source pointer to the memory pointer by the destination pointer. - - Destination memory location - Source memory location - Number of bytes to copy - - - - Returns the number of elements in the enumerable. - - Type of element in collection. - Enumerable collection - The number of elements in the enumerable collection. - - - - Converts typed element array to a byte array. - - Struct type - Element array - Byte array copy or null if the source array was not valid. - - - - Converts a byte array to a typed element array. - - Struct type - Byte array - Typed element array or null if the source array was not valid. - - - - Copies bytes from a byte array to an element array. - - Struct type - Source byte array - Starting index in destination array - Destination element array - Starting index in destination array - Number of elements to copy - - - - Copies bytes from an element array to a byte array. - - Struct type - Source element array - Starting index in source array - Destination byte array - Starting index in destination array - Number of elements to copy - - - - Reads data from the memory location into the array. - - Struct type - Pointer to memory location - Array to store the copied data - Zero-based element index to start writing data to in the element array. - Number of elements to copy - - - - Reads a single element from the memory location. - - Struct type - Pointer to memory location - The read value - - - - Reads a single element from the memory location. - - Struct type - Pointer to memory location - The read value. - - - - Writes data from the array to the memory location. - - Struct type - Pointer to memory location - Array containing data to write - Zero-based element index to start reading data from in the element array. - Number of elements to copy - - - - Writes a single element to the memory location. - - Struct type - Pointer to memory location - The value to write - - - - A mesh represents geometry with a single material. - - - - - Gets or sets the mesh name. This tends to be used - when formats name nodes and meshes independently, - vertex animations refer to meshes by their names, - or importers split meshes up, each mesh will reference - the same (dummy) name. - - - - - Gets or sets the primitive type. This may contain more than one - type unless if - option is not set. - - - - - Gets or sets the index of the material associated with this mesh. - - - - - Gets the number of vertices in this mesh. This is the count that all - per-vertex lists should be the size of. - - - - - Gets if the mesh has a vertex array. This should always return - true provided no special scene flags are set. - - - - - Gets the vertex position list. - - - - - Gets if the mesh as normals. If it does exist, the count should be the same as the vertex count. - - - - - Gets the vertex normal list. - - - - - Gets if the mesh has tangents and bitangents. It is not - possible for one to be without the other. If it does exist, the count should be the same as the vertex count. - - - - - Gets the vertex tangent list. - - - - - Gets the vertex bitangent list. - - - - - Gets the number of faces contained in the mesh. - - - - - Gets if the mesh contains faces. If no special - scene flags are set, this should always return true. - - - - - Gets the mesh's faces. Each face will contain indices - to the vertices. - - - - - Gets the number of valid vertex color channels contained in the - mesh (list is not empty/not null). This can be a value between zero and the maximum vertex color count. Each individual channel - should be the size of . - - - - - Gets the number of valid texture coordinate channels contained - in the mesh (list is not empty/not null). This can be a value between zero and the maximum texture coordinate count. - Each individual channel should be the size of . - - - - - Gets the array that contains each vertex color channels, by default all are lists of zero (but can be set to null). Each index - in the array corresponds to the texture coordinate channel. The length of the array corresponds to Assimp's maximum vertex color channel limit. - - - - - Gets the array that contains each texture coordinate channel, by default all are lists of zero (but can be set to null). Each index - in the array corresponds to the texture coordinate channel. The length of the array corresponds to Assimp's maximum UV channel limit. - - - - - Gets the array that contains the count of UV(W) components for each texture coordinate channel, usually 2 (UV) or 3 (UVW). A component - value of zero means the texture coordinate channel does not exist. The channel index (index in the array) corresponds - to the texture coordinate channel index. - - - - - Gets the number of bones that influence this mesh. - - - - - Gets if this mesh has bones. - - - - - Gets the bones that influence this mesh. - - - - - Gets the number of mesh animation attachments that influence this mesh. - - - - - Gets if this mesh has mesh animation attachments. - - - - - Gets the mesh animation attachments that influence this mesh. - - - - - Gets or sets the morph method used when animation attachments are used. - - - - - Constructs a new instance of the class. - - - - - Constructs a new instance of the class. - - Name of the mesh. - - - - Constructs a new instance of the class. - - Primitive types contained in the mesh. - - - - Constructs a new instance of the class. - - Name of the mesh - Primitive types contained in the mesh. - - - - Checks if the mesh has vertex colors for the specified channel. This returns false if the list - is null or empty. The channel, if it exists, should contain the same number of entries as . - - Channel index - True if vertex colors are present in the channel. - - - - Checks if the mesh has texture coordinates for the specified channel. This returns false if the list - is null or empty. The channel, if it exists, should contain the same number of entries as . - - Channel index - True if texture coordinates are present in the channel. - - - - Convienence method for setting this meshe's face list from an index buffer. - - Index buffer - Indices per face - True if the operation succeeded, false otherwise (e.g. not enough data) - - - - Convienence method for accumulating all face indices into a single - index array. - - int index array - - - - Convienence method for accumulating all face indices into a single index - array as unsigned integers (the default from Assimp, if you need them). - - uint index array - - - - Convienence method for accumulating all face indices into a single - index array. - - short index array - - - - Gets if the native value type is blittable (that is, does not require marshaling by the runtime, e.g. has MarshalAs attributes). - - - - - Writes the managed data to the native value. - - Optional pointer to the memory that will hold the native value. - Output native value - - - - Reads the unmanaged data from the native value. - - Input native value - - - - Frees unmanaged memory created by . - - Native value to free - True if the unmanaged memory should be freed, false otherwise. - - - - A mesh attachment store per-vertex animations for a particular frame. You may - think of this as a 'patch' for the host mesh, since the mesh attachment replaces only certain - vertex data streams at a particular time. Each mesh stores 'n' attached meshes. The actual - relationship between the time line and mesh attachments is established by the mesh animation channel, - which references singular mesh attachments by their ID and binds them to a time offset. - - - - - Gets the number of vertices in this mesh. This is a replacement - for the host mesh's vertex count. Likewise, a mesh attachment - cannot add or remove per-vertex attributes, therefore the existance - of vertex data will match the existance of data in the mesh. - - - - - Checks whether the attachment mesh overrides the vertex positions - of its host mesh. - - - - - Gets the vertex position list. - - - - - Checks whether the attachment mesh overrides the vertex normals of - its host mesh. - - - - - Gets the vertex normal list. - - - - - Checks whether the attachment mesh overrides the vertex - tangents and bitangents of its host mesh. - - - - - Gets the vertex tangent list. - - - - - Gets the vertex bitangent list. - - - - - Gets the number of valid vertex color channels contained in the - mesh (list is not empty/not null). This can be a value between zero and the maximum vertex color count. Each individual channel - should be the size of . - - - - - Gets the number of valid texture coordinate channels contained - in the mesh (list is not empty/not null). This can be a value between zero and the maximum texture coordinate count. - Each individual channel should be the size of . - - - - - Gets the array that contains each vertex color channels that override a specific channel in the host mesh, by default all are lists of zero (but can be set to null). - Each index in the array corresponds to the texture coordinate channel. The length of the array corresponds to Assimp's maximum vertex color channel limit. - - - - - Gets the array that contains each texture coordinate channel that override a specific channel in the host mesh, by default all are lists of zero (but can be set to null). - Each index in the array corresponds to the texture coordinate channel. The length of the array corresponds to Assimp's maximum UV channel limit. - - - - - Gets or sets the weight of the mesh animation. - - - - - Constructs a new instance of the class. - - - - - Checks if the mesh attachment overrides a particular set of vertex colors on - the host mesh. This returns false if the list is null or empty. The index is between - zero and the maximumb number of vertex color channels. - - Channel index - True if vertex colors are present in the channel. - - - - Checks if the mesh attachment overrides a particular set of texture coordinates on - the host mesh. This returns false if the list is null or empty. The index is - between zero and the maximum number of texture coordinate channels. - - Channel index - True if texture coordinates are present in the channel. - - - - Gets if the native value type is blittable (that is, does not require marshaling by the runtime, e.g. has MarshalAs attributes). - - - - - Writes the managed data to the native value. - - Optional pointer to the memory that will hold the native value. - Output native value - - - - Reads the unmanaged data from the native value. - - Input native value - - - - Frees unmanaged memory created by . - - Native value to free - True if the unmanaged memory should be freed, false otherwise. - - - - Describes vertex-based animations for a single mesh or a group of meshes. Meshes - carry the animation data for each frame. The purpose of this object is to define - keyframes, linking each mesh attachment to a particular point in a time. - - - - - Gets or sets the name of the mesh to be animated. Empty strings are not allowed, - animation meshes need to be named (not necessarily uniquely, the name can basically - serve as a wildcard to select a group of meshes with similar animation setup). - - - - - Gets the number of meshkeys in this animation channel. There will always - be at least one key. - - - - - Gets if this animation channel has mesh keys - this should always be true. - - - - - Gets the mesh keyframes of the animation. This should not be null. - - - - - Constructs a new instance of the class. - - - - - Gets if the native value type is blittable (that is, does not require marshaling by the runtime, e.g. has MarshalAs attributes). - - - - - Writes the managed data to the native value. - - Optional pointer to the memory that will hold the native value. - Output native value - - - - Reads the unmanaged data from the native value. - - Input native value - - - - Frees unmanaged memory created by . - - Native value to free - True if the unmanaged memory should be freed, false otherwise. - - - - Binds an anim mesh (referenced by an index) to a specific point in time. - - - - - The time of this key. - - - - - Index of the anim mesh that corresponds to this keyframe. - - - - - Constructs a new MeshKey. - - The time of this key. - Index of the anim mesh that corresponds to this keyframe. - - - - Tests equality between two keys. - - The first key - The second key - True if the key's indices are the same, false otherwise - - - - Tests inequality between two keys. - - The first key - The second key - True if the key's indices are not equal, false otherwise. - - - - Tests inequality between two keys. - - The first key - The second key - True if the first key's time is less than the second key's. - - - - Tests inequality between two keys. - - The first key - The second key - True if the first key's time is greater than the second key's. - - - - Determines whether the specified is equal to this instance. - - The to compare with this instance. - - true if the specified is equal to this instance; otherwise, false. - - - - - Tests equality between this key and another. - - Other key to test - True if their indices are equal - - - - Returns a hash code for this instance. - - - A hash code for this instance, suitable for use in hashing algorithms and data structures like a hash table. - - - - - Returns a that represents this instance. - - - A that represents this instance. - - - - - Describes morph-based keyframe animations for a single mesh or a group of meshes. - - - - - Gets or sets the name of the mesh to be animated. Empty strings are not allowed, - animation meshes need to be named (not necessarily uniquely, the name can basically - serve as a wildcard to select a group of meshes with similar animation setup). - - - - - Gets the number of mesh morph keys in this animation channel. There will always be at least one key. - - - - - Gets if this animation channel has mesh keys - this should always be true. - - - - - Gets the mesh morph keyframes of the animation. This should not be null. - - - - - Constructs a new instance of the class. - - - - - Gets if the native value type is blittable (that is, does not require marshaling by the runtime, e.g. has MarshalAs attributes). - - - - - Reads the unmanaged data from the native value. - - Input native value - - - - Writes the managed data to the native value. - - Optional pointer to the memory that will hold the native value. - Output native value - - - - Frees unmanaged memory created by . - - Native value to free - True if the unmanaged memory should be freed, false otherwise. - - - - Binds a morph animation mesh to a specific point in time. - - - - - Gets or sets the time of this keyframe. - - - - - Gets the values at the time of this keyframe. Number of values must equal number of weights. - - - - - Gets the weights at the time of this keyframe. Number of weights must equal number of values. - - - - - Constructs a new instance of the class. - - - - - Gets if the native value type is blittable (that is, does not require marshaling by the runtime, e.g. has MarshalAs attributes). - - - - - Writes the managed data to the native value. - - Optional pointer to the memory that will hold the native value. - Output native value - - - - Reads the unmanaged data from the native value. - - Input native value - - - - Frees unmanaged memory created by . - - Native value to free - True if the unmanaged memory should be freed, false otherwise. - - - - Represents a container for holding metadata, representing as key-value pairs. - - - - - Constructs a new instance of the class. - - - - - Gets if the native value type is blittable (that is, does not require marshaling by the runtime, e.g. has MarshalAs attributes). - - - - - Writes the managed data to the native value. - - Optional pointer to the memory that will hold the native value. - Output native value - - - - Reads the unmanaged data from the native value. - - Input native value - - - - Frees unmanaged memory created by . - - Native value to free - True if the unmanaged memory should be freed, false otherwise. - - - - Represents an entry in a metadata container. - - - - - Gets the type of metadata. - - - - - Gets the metadata data stored in this entry. - - - - - Constructs a new instance of the struct. - - Type of the data. - The data. - - - - Tests equality between two entries. - - First entry - Second entry - True if the entries are equal, false otherwise - - - - Tests inequality between two entries. - - First entry - Second entry - True if the entries are not equal, false otherwise - - - - Gets the data as the specified type. If it cannot be casted to the type, then null is returned. - - Type to cast the data to. - Casted data or null. - - - - Determines whether the specified is equal to this instance. - - The to compare with this instance. - True if the specified is equal to this instance; otherwise, false. - - - - Indicates whether the current object is equal to another object of the same type. - - An object to compare with this object. - True if the current object is equal to the parameter; otherwise, false. - - - - Returns a hash code for this instance. - - A hash code for this instance, suitable for use in hashing algorithms and data structures like a hash table. - - - - Returns the fully qualified type name of this instance. - - A containing a fully qualified type name. - - - - Attribute for assocating a type with an instance. - - - - - Gets the associated marshaler. - - - - - Constructs a new instance of the class. - - Type that implements - Thrown if the type is null. - Thrown if the type does not implement . - - - - A node in the imported model hierarchy. - - - - - Gets or sets the name of the node. - - - - - Gets or sets the transformation of the node relative to its parent. - - - - - Gets the node's parent, if it exists. - - - - - Gets the number of children that is owned by this node. - - - - - Gets if the node contains children. - - - - - Gets the node's children. - - - - - Gets the number of meshes referenced by this node. - - - - - Gets if the node contains mesh references. - - - - - Gets the indices of the meshes referenced by this node. Meshes can be - shared between nodes, so there is a mesh collection owned by the scene - that each node can reference. - - - - - Gets the node's metadata container. - - - - - Constructs a new instance of the class. - - - - - Constructs a new instance of the class. - - Name of the node - - - - Constructs a new instance of the class. - - Name of the node - Parent of the node - - - - Finds a node with the specific name, which may be this node - or any children or children's children, and so on, if it exists. - - Node name - The node or null if it does not exist - - - - Gets a value indicating whether this instance is native blittable. - - - - - Writes the managed data to the native value. - - Optional pointer to the memory that will hold the native value. - Output native value - - - - Reads the unmanaged data from the native value. - - Input native value - - - - Frees unmanaged memory created by . - - Native value to free - True if the unmanaged memory should be freed, false otherwise. - - - - Describes the animation of a single node. The name specifies the bone/node which is affected by - this animation chanenl. The keyframes are given in three separate seties of values, - one for each position, rotation, and scaling. The transformation matrix is computed from - these values and replaces the node's original transformation matrix at a specific time. - This means all keys are absolute and not relative to the bone default pose. - The order which the transformations are to be applied is scaling, rotation, and translation (SRT). - Keys are in chronological order and duplicate keys do not pass the validation step. There most likely will be no - negative time values, but they are not forbidden. - - - - - Gets or sets the name of the node affected by this animation. It must exist and it must - be unique. - - - - - Gets the number of position keys in the animation channel. - - - - - Gets if this animation channel contains position keys. - - - - - Gets the position keys of this animation channel. Positions are - specified as a 3D vector. If there are position keys, there should - also be -at least- one scaling and one rotation key. - - - - - Gets the number of rotation keys in the animation channel. - - - - - Gets if the animation channel contains rotation keys. - - - - - Gets the rotation keys of this animation channel. Rotations are - given as quaternions. If this exists, there should be -at least- one - scaling and one position key. - - - - - Gets the number of scaling keys in the animation channel. - - - - - Gets if the animation channel contains scaling keys. - - - - - Gets the scaling keys of this animation channel. Scalings are - specified in a 3D vector. If there are scaling keys, there should - also be -at least- one position and one rotation key. - - - - - Gets or sets how the animation behaves before the first key is encountered. By default the original - transformation matrix of the affected node is used. - - - - - Gets or sets how the animation behaves after the last key was processed. By default the original - transformation matrix of the affected node is taken. - - - - - Constructs a new instance of the class. - - - - - Gets if the native value type is blittable (that is, does not require marshaling by the runtime, e.g. has MarshalAs attributes). - - - - - Writes the managed data to the native value. - - Optional pointer to the memory that will hold the native value. - Output native value - - - - Reads the unmanaged data from the native value. - - Input native value - - - - Frees unmanaged memory created by . - - Native value to free - True if the unmanaged memory should be freed, false otherwise. - - - - A collection of child nodes owned by a parent node. Manages access to the collection while maintaing parent-child linkage. - - - - - Gets the number of elements contained in the . - - - - - Gets or sets the element at the specified index. - - The child index - - - - Gets a value indicating whether the is read-only. - - true if the is read-only; otherwise, false. - - - - Constructs a new instance of the class. - - Parent node - - - - Adds an item to the . - - The object to add to the . - - - - Adds a range of items to the list. - - Item array - - - - Removes all items from the . - - - - - Determines whether the contains a specific value. - - The object to locate in the . - - true if is found in the ; otherwise, false. - - - - - Copies collection contents to the array - - The array to copy to. - Index of the array to start copying. - - - - Determines the index of a specific item in the . - - The object to locate in the . - - The index of if found in the list; otherwise, -1. - - - - - Inserts an item to the at the specified index. - - The zero-based index at which should be inserted. - The object to insert into the . - - - - Removes the item at the specified index. - - The zero-based index of the item to remove. - - - - Removes the first occurrence of a specific object from the . - - The object to remove from the . - - true if was successfully removed from the ; otherwise, false. This method also returns false if is not found in the original . - - - - - Copies elements in the collection to a new array. - - Array of copied elements - - - - Returns an enumerator that iterates through the collection. - - A that can be used to iterate through the collection. - - - - Returns an enumerator that iterates through a collection. - - An object that can be used to iterate through the collection. - - - - Represents a plane in three-dimensional euclidean space where - A, B, C are components of the plane normal and D is the distance along the - normal from the origin to the plane. - - - - - X component of the normal vector. - - - - - Y component of the normal vector. - - - - - Z component of the normal vector. - - - - - Distance from the origin to the plane along the normal vector. - - - - - Constructs a new Plane. - - X component of the normal vector. - Y component of the normal vector. - Z component of the normal vector. - Distance from the origin to the plane along the normal vector. - - - - Static class containing preset properties for post processing options. - - - - - PostProcess configuration for (some) Direct3D conventions, - left handed geometry, upper left origin for UV coordinates, - and clockwise face order, suitable for CCW culling. - - - - - PostProcess configuration for optimizing data for real-time. - Does the following steps: - - , , - , , - , and - - - - - PostProcess configuration for optimizing - data for real-time rendering. Does the following steps: - - , , - , , - , - , , - , , and - - - - - - PostProcess configuration for heavily optimizing the data - for real-time rendering. Includes all flags in - as well as - , , and - - - - - - A 4D vector that represents a rotation. - - - - - Rotation component of the quaternion/ - - - - - X component of the vector part of the quaternion. - - - - - Y component of the vector part of the quaternion. - - - - - Z component of the vector part of the quaternion. - - - - - Constructs a new Quaternion. - - W component - X component - Y component - Z component - - - - Constructs a new Quaternion from a rotation matrix. - - Rotation matrix to create the Quaternion from. - - - - Constructs a new Quaternion from three euler angles. - - Pitch - Yaw - Roll - - - - Constructs a new Quaternion from an axis-angle. - - Axis - Angle about the axis - - - - Normalizes the quaternion. - - - - - Transforms this quaternion into its conjugate. - - - - - Returns a matrix representation of the quaternion. - - Rotation matrix representing the quaternion. - - - - Spherical interpolation between two quaternions. - - Start rotation when factor == 0 - End rotation when factor == 1 - Interpolation factor between 0 and 1, values beyond this range yield undefined values - Interpolated quaternion. - - - - Rotates a point by this quaternion. - - Point to rotate - Quaternion representing the rotation - Rotated point. - - - - Multiplies two quaternions. - - First quaternion - Second quaternion - Resulting quaternion - - - - Tests equality between two quaternions. - - First quaternion - Second quaternion - True if the quaternions are equal, false otherwise. - - - - Tests inequality between two quaternions. - - First quaternion - Second quaternion - True if the quaternions are not equal, false otherwise. - - - - Tests equality between two quaternions. - - Quaternion to compare - True if the quaternions are equal. - - - - Tests equality between this color and another object. - - Object to test against - True if the object is a color and the components are equal - - - - Returns a hash code for this instance. - - - A hash code for this instance, suitable for use in hashing algorithms and data structures like a hash table. - - - - - Returns a that represents this instance. - - - A that represents this instance. - - - - - Time-value pair specifying a rotation for a given time. - - - - - The time of this key. - - - - - The rotation of this key. - - - - - Constructs a new QuaternionKey. - - Time of the key. - Quaternion rotation at the time frame. - - - - Tests equality between two keys. - - The first key - The second key - True if the key's rotations are the same, false otherwise. - - - - Tests inequality between two keys. - - The first key - The second key - True if the key's rotations are not the same, false otherwise. - - - - Tests inequality between two keys. - - The first key - The second key - True if the first key's time is less than the second key's. - - - - Tests inequality between two keys. - - The first key - The second key - True if the first key's time is greater than the second key's. - - - - Determines whether the specified is equal to this instance. - - The to compare with this instance. - - true if the specified is equal to this instance; otherwise, false. - - - - - Tests equality between this key and another. - - Other key to test - True if their rotations are equal. - - - - Returns a hash code for this instance. - - - A hash code for this instance, suitable for use in hashing algorithms and data structures like a hash table. - - - - - Returns a that represents this instance. - - - A that represents this instance. - - - - - Defines a 3D ray with a point of origin and a direction. - - - - - Origin of the ray in space. - - - - - Direction of the ray. - - - - - Constructs a new Ray. - - Origin of the ray. - Direction of the ray. - - - - Represents a completely imported model or scene. Everything that was imported from the given file can be - accessed from here. Once the scene is loaded from unmanaged memory, it resides solely in managed memory - and Assimp's read only copy is released. - - - - - Gets or sets the state of the imported scene. By default no flags are set, but - issues can arise if the flag is set to incomplete. - - - - - Gets or sets the root node of the scene graph. There will always be at least the root node - if the import was successful and no special flags have been set. Presence of further nodes - depends on the format and content of the imported file. - - - - - Gets if the scene contains meshes. Unless if no special scene flags are set - this should always be true. - - - - - Gets the number of meshes in the scene. - - - - - Gets the meshes contained in the scene, if any. - - - - - Gets if the scene contains any lights. - - - - - Gets the number of lights in the scene. - - - - - Gets the lights in the scene, if any. - - - - - Gets if the scene contains any cameras. - - - - - Gets the number of cameras in the scene. - - - - - Gets the cameras in the scene, if any. - - - - - Gets if the scene contains embedded textures. - - - - - Gets the number of embedded textures in the scene. - - - - - Gets the embedded textures in the scene, if any. - - - - - Gets if the scene contains any animations. - - - - - Gets the number of animations in the scene. - - - - - Gets the animations in the scene, if any. - - - - - Gets if the scene contains any materials. There should always be at least the - default Assimp material if no materials were loaded. - - - - - Gets the number of materials in the scene. There should always be at least the - default Assimp material if no materials were loaded. - - - - - Gets the materials in the scene. - - - - - Constructs a new instance of the class. - - - - - Clears the scene of all components. - - - - - Marshals a managed scene to unmanaged memory. The unmanaged memory must be freed with a call to - , the memory is owned by AssimpNet and cannot be freed by the native library. - - Scene data - Unmanaged scene or NULL if the scene is null. - - - - Marshals an unmanaged scene to managed memory. This does not free the unmanaged memory. - - The unmanaged scene data - The managed scene, or null if the pointer is NULL - - - - Frees unmanaged memory allocated -ONLY- in . To free an unmanaged scene allocated by the unmanaged Assimp library, - call the appropiate function. - - Pointer to unmanaged scene data. - - - - Gets if the native value type is blittable (that is, does not require marshaling by the runtime, e.g. has MarshalAs attributes). - - - - - Writes the managed data to the native value. - - Optional pointer to the memory that will hold the native value. - Output native value - - - - Reads the unmanaged data from the native value. - - Input native value - - - - Frees unmanaged memory created by . - - Native value to free - True if the unmanaged memory should be freed, false otherwise. - - - - Represents a texel in ARGB8888 format. - - - - - Blue component. - - - - - Green component. - - - - - Red component. - - - - - Alpha component. - - - - - Constructs a new Texel. - - Blue component. - Green component. - Red component. - Alpha component. - - - - Tests equality between two texels. - - First texel - Second texel - True if the texels are equal, false otherwise. - - - - Tests inequality between two texels. - - First texel - Second texel - True if the texels are not equal, false otherwise. - - - - Implicitly converts a texel to a Color4D. - - Texel to convert - Converted Color4D - - - - Determines whether the specified is equal to this instance. - - The to compare with this instance. - - true if the specified is equal to this instance; otherwise, false. - - - - - Tests equality between this key and another. - - Other key to test - True if their indices are equal - - - - Returns a hash code for this instance. - - - A hash code for this instance, suitable for use in hashing algorithms and data structures like a hash table. - - - - - Returns a that represents this instance. - - - A that represents this instance. - - - - - Describes all the values pertaining to a particular texture slot in a material. - - - - - Gets the texture file path. - - - - - Gets the texture type semantic. - - - - - Gets the texture index in the material. - - - - - Gets the texture mapping. - - - - - Gets the UV channel index that corresponds to this texture from the mesh. - - - - - Gets the blend factor. - - - - - Gets the texture operation. - - - - - Gets the texture wrap mode for the U coordinate. - - - - - Gets the texture wrap mode for the V coordinate. - - - - - Gets misc flags. - - - - - Constructs a new TextureSlot. - - Texture filepath - Texture type semantic - Texture index in the material - Texture mapping - UV channel in mesh that corresponds to this texture - Blend factor - Texture operation - Texture wrap mode for U coordinate - Texture wrap mode for V coordinate - Misc flags - - - - Defines configurable properties for importing models. All properties - have default values. Setting config properties are done via the SetProperty* - methods in AssimpMethods. - - - - - Enables time measurements. If enabled the time needed for each - part of the loading process is timed and logged. - Type: bool. Default: false - - - - - Sets Assimp's multithreading policy. This is ignored if Assimp is - built without boost.thread support. Possible values are: -1 to - let Assimp decide, 0 to disable multithreading, and nay number larger than 0 - to force a specific number of threads. This is only a hint and may be - ignored by Assimp. - Type: integer. Default: -1 - - - - - Global setting to disable generation of skeleton dummy meshes. These are generated as a visualization aid - in cases which the input data contains no geometry, but only animation data. So the geometry are visualizing - the bones. - Type: Bool. Default: false. - - - - - Specifies the maximum angle that may be between two vertex tangents that their tangents - and bitangents are smoothed during the step to calculate the tangent basis. The angle specified - is in degrees. The maximum value is 175 degrees. - Type: float. Default: 45 degrees - - - - - Specifies the maximum angle that may be between two face normals at the same vertex position that - their normals will be smoothed together during the calculate smooth normals step. This is commonly - called the "crease angle". The angle is specified in degrees. Maximum value is 175 degrees (all vertices - smoothed). - Type: float. Default: 175 degrees - - - - - Sets the colormap(= palette) to be used to decode embedded textures in MDL (Quake or 3DG5) files. - This must be a valid path to a file. The file is 768 (256 * 3) bytes large and contains - RGB triplets for each of the 256 palette entries. If the file is not found, a default - palette (from Quake 1) is used. - Type: string. Default: "colormap.lmp" - - - - - Configures the step to - keep materials matching a name in a given list. This is a list of - 1 to n strings where whitespace ' ' serves as a delimiter character. Identifiers - containing whitespaces must be enclosed in *single* quotation marks. Tabs or - carriage returns are treated as whitespace. - If a material matches one of these names, it will not be modified - or removed by the post processing step nor will other materials be replaced - by a reference to it. - Default: string. Default: "" - - - - - Configures the step - to keep the scene hierarchy. Meshes are moved to worldspace, but no optimization - is performed where meshes with the same materials are not joined. - This option could be of used if you have a scene hierarchy that contains - important additional information which you intend to parse. - Type: bool. Default: false - - - - - Configures the step - to normalize all vertex components into the -1...1 range. That is, a bounding - box for the whole scene is computed where the maximum component is taken - and all meshes are scaled uniformly. This is useful if you don't know the spatial dimension - of the input data. - Type: bool. Default: false - - - - - Configures the step - to remove degenerated primitives from the import immediately. - The default behavior converts degenerated triangles to lines and - degenerated lines to points. - Type: bool. Default: false - - - - - Configures the step - to check the area of a triangle to be greater than 1e-6. If this is not the case, the triangle will be removed if is set to true. - Type: bool. Default: false - - - - - Configures the step - to preserve nodes matching a name in a given list. This is a list of 1 to n strings, whitespace ' ' serves as a delimter character. - Identifiers containing whitespaces must be enclosed in *single* quotation marks. Carriage returns - and tabs are treated as white space. - If a node matches one of these names, it will not be modified or removed by the - postprocessing step. - Type: string. Default: "" - - - - - Sets the maximum number of triangles a mesh can contain. This is used by the - step to determine - whether a mesh must be split or not. - Type: int. Default: AiDefines.AI_SLM_DEFAULT_MAX_TRIANGLES - - - - - Sets the maximum number of vertices in a mesh. This is used by the - step to determine - whether a mesh must be split or not. - Type: integer. Default: AiDefines.AI_SLM_DEFAULT_MAX_VERTICES - - - - - Sets the maximum number of bones that can affect a single vertex. This is used - by the step. - Type: integer. Default: AiDefines.AI_LBW_MAX_WEIGHTS - - - - - Sets the size of the post-transform vertex cache to optimize vertices for. This is - for the step. The size - is given in vertices. Of course you can't know how the vertex format will exactly look - like after the import returns, but you can still guess what your meshes will - probably have. The default value *has* resulted in slight performance improvements - for most Nvidia/AMD cards since 2002. - Type: integer. Default: AiDefines.PP_ICL_PTCACHE_SIZE - - - - - Input parameter to the step. - It specifies the parts of the data structure to be removed. - This is a bitwise combination of the flag. If no valid mesh is remaining after - the step is executed, the import FAILS. - Type: integer. Default: 0 - - - - - Input parameter to the step. - It specifies which primitive types are to be removed by the step. - This is a bitwise combination of the flag. - Specifying ALL types is illegal. - Type: integer. Default: 0 - - - - - Input parameter to the step. - It specifies the floating point accuracy for animation values, specifically the epislon - during the comparison. The step checks for animation tracks where all frame values are absolutely equal - and removes them. Two floats are considered equal if the invariant abs(n0-n1) > epislon holds - true for all vector/quaternion components. - Type: float. Default: 0.0f (comparisons are exact) - - - - - Input parameter to the step. - It specifies which UV transformations are to be evaluated. - This is bitwise combination of the flag. - Type: integer. Default: AiDefines.AI_UV_TRAFO_ALL (All combinations) - - - - - A hint to Assimp to favour speed against import quality. Enabling this option - may result in faster loading, or it may not. It is just a hint to loaders and post-processing - steps to use faster code paths if possible. A value not equal to zero stands - for true. - Type: integer. Default: 0 - - - - - Maximum bone cone per mesh for the step. Meshes - are split until the max number of bones is reached. - Type: integer. Default: 60 - - - - - Source UV channel for tangent space computation. The specified channel must exist or an error will be raised. - Type: integer. Default: 0 - - - - - Threshold used to determine if a bone is kept or removed during the step. - Type: float. Default: 1.0f - - - - - Require all bones to qualify for deboning before any are removed. - Type: bool. Default: false - - - - - Configures the step to use a user defined matrix as the scene root node - transformation before transforming vertices. - Type: bool. Default: false - - - - - Configures the step to use a user defined matrix as the scene root node transformation - before transforming vertices. - Type: Matrix4x4. Default: Identity Matrix - - - - - Configures the step to scale the entire scene by a certain amount. Some importers provide a mechanism to define a scaling unit for the model, - which this processing step can utilize. - Type: Float. Default: 1.0f. - - - - - Sets the vertex animation keyframe to be imported. Assimp does not support - vertex keyframes (only bone animation is supported). The libary reads only one frame of models - with vertex animations. By default this is the first frame. - The default value is 0. This option applies to all importers. However, it is - also possible to override the global setting for a specific loader. You can use the - AI_CONFIG_IMPORT_XXX_KEYFRAME options where XXX is a placeholder for the file format which - you want to override the global setting. - Type: integer. Default: 0 - - - - - See the documentation for . - - - - - See the documentation for . - - - - - See the documentation for . - - - - - See the documentation for . - - - - - See the documentation for . - - - - - See the documentation for . - - - - - Configures the AC loader to collect all surfaces which have the "Backface cull" flag set in separate - meshes. - Type: bool. Default: true - - - - - Configures whether the AC loader evaluates subdivision surfaces (indicated by the presence - of the 'subdiv' attribute in the file). By default, Assimp performs - the subdivision using the standard Catmull-Clark algorithm. - Type: bool. Default: true - - - - - Configures the UNREAL 3D loader to separate faces with different surface flags (e.g. two-sided vs single-sided). - Type: bool. Default: true - - - - - Configures the terragen import plugin to compute UV's for terrains, if - they are not given. Furthermore, a default texture is assigned. - UV coordinates for terrains are so simple to compute that you'll usually - want to compute them on your own, if you need them. This option is intended for model viewers which - want to offer an easy way to apply textures to terrains. - Type: bool. Default: false - - - - - Configures the ASE loader to always reconstruct normal vectors basing on the smoothing groups - loaded from the file. Some ASE files carry invalid normals, others don't. - Type: bool. Default: true - - - - - Configures the M3D loader to detect and process multi-part Quake player models. These models - usually consit of three files, lower.md3, upper.md3 and head.md3. If this propery is - set to true, Assimp will try to load and combine all three files if one of them is loaded. - Type: bool. Default: true - - - - - Tells the MD3 loader which skin files to load. When loading MD3 files, Assimp checks - whether a file named "md3_file_name"_"skin_name".skin exists. These files are used by - Quake III to be able to assign different skins (e.g. red and blue team) to models. 'default', 'red', 'blue' - are typical skin names. - Type: string. Default: "default" - - - - - Specifies the Quake 3 shader file to be used for a particular MD3 file. This can be a full path or - relative to where all MD3 shaders reside. - Type: string. Default: "" - - - - - Configures the LWO loader to load just one layer from the model. - LWO files consist of layers and in some cases it could be useful to load only one of them. - This property can be either a string - which specifies the name of the layer - or an integer - the index - of the layer. If the property is not set then the whole LWO model is loaded. Loading fails - if the requested layer is not vailable. The layer index is zero-based and the layer name may not be empty - Type: bool. Default: false (All layers are loaded) - - - - - Configures the MD5 loader to not load the MD5ANIM file for a MD5MESH file automatically. - The default strategy is to look for a file with the same name but with the MD5ANIm extension - in the same directory. If it is found it is loaded and combined with the MD5MESH file. This configuration - option can be used to disable this behavior. - Type: bool. Default: false - - - - - Defines the beginning of the time range for which the LWS loader evaluates animations and computes - AiNodeAnim's. - Assimp provides full conversion of Lightwave's envelope system, including pre and post - conditions. The loader computes linearly subsampled animation channels with the frame rate - given in the LWS file. This property defines the start time. - Animation channels are only generated if a node has at least one envelope with more than one key - assigned. This property is given in frames where '0' is the first. By default, - if this property is not set, the importer takes the animation start from the input LWS - file ('FirstFrame' line) - Type: integer. Default: taken from file - - - - - Defines the ending of the time range for which the LWS loader evaluates animations and computes - AiNodeAnim's. - Assimp provides full conversion of Lightwave's envelope system, including pre and post - conditions. The loader computes linearly subsampled animation channels with the frame rate - given in the LWS file. This property defines the end time. - Animation channels are only generated if a node has at least one envelope with more than one key - assigned. This property is given in frames where '0' is the first. By default, - if this property is not set, the importer takes the animation end from the input LWS - file. - Type: integer. Default: taken from file - - - - - Defines the output frame rate of the IRR loader. - IRR animations are difficult to convert for Assimp and there will always be - a loss of quality. This setting defines how many keys per second are returned by the converter. - Type: integer. Default: 100 - - - - - The Ogre importer will try to load this MaterialFile. Ogre meshes reference with material names, this does not tell Assimp - where the file is located. Assimp will try to find the source file in the following order: [material-name].material, [mesh-filename-base].material, - and lastly the material name defined by this config property. - Type: string. Default: "Scene.Material" - - - - - The Ogre importer will detect the texture usage from the filename. Normally a texture is loaded as a color map, if no target is specified - in the material file. If this is enabled, then Assimp will try to detect the type from the texture filename postfix: - - Normal Maps: _n, _nrm, _nrml, _normal, _normals, _normalmap - Specular Maps: _s, _spec, _specular, _specularmap - Light Maps: _l, _light, _lightmap, _occ, _occlusion - Displacement Maps: _dis, _displacement - - The matching is case insensitive. Postfix is taken between the last "_" and last ".". The default behavior is to detect type from lower cased - texture unit name by matching against: normalmap, specularmap, lightmap, and displacementmap. For both cases if no match is found then, - is used. - Type: Bool. Default: false. - - - - - Specifies whether the IFC loader skips over IfcSpace elements. IfcSpace elements (and their geometric representations) are used to represent free space in a building story. - Type: Bool. Default: true. - - - - - Specifies whether the IFC loader will use its own, custom triangulation algorithm to triangulate wall and floor meshes. If this is set to false, - walls will be either triangulated by the post process triangulation or will be passed through as huge polygons with faked holes (e.g. holes that are connected - with the outer boundary using a dummy edge). It is highly recommended to leave this property set to true as the default post process has some known - issues with these kind of polygons. - Type: Bool. Default: true. - - - - - Specifies the tessellation conic angle for IFC smoothing curves. Accepted range of values is between [5, 120] - Type: Float. Default: 10.0f - - - - - Specifies the tessellation for IFC cylindrical shapes. E.g. the number of segments used to approximate a circle. Accepted range of values is between [3, 180]. - Type: Integer. Default: 32 - - - - - Specifies whether the collada loader will ignore the up direction. - Type: Bool. Default: false - - - - - Specifies whether the FBX importer will merge all geometry layers present in the source file or take only the first. - Type: bool. Default: true. - - - - - Specifies whether the FBX importer will read all materials present in the source file or take only the referenced materials, if the importer - will read materials, otherwise this has no effect. - Type: Bool. Default: false. - - - - - Specifies whether the FBX importer will read materials. - Type: Bool. Default: true. - - - - - Specifies whether the FBX importer will read embedded textures. - Type: Bool. Default: true. - - - - - Specifies whether the FBX importer will search for embedded loaded textures, where no embedded texture data is provided. - Type: Bool. Default: false. - - - - - Specifies whether the FBX importer will read cameras. - Type: Bool. Default: true. - - - - - Specifies whether the FBX importer will read light sources. - Type: Bool. Default: true. - - - - - Specifies whether the FBX importer will read animations. - Type: Bool. default: true. - - - - - Specifies whether the FBX importer will act in strict mode in which only the FBX 2013 - format is supported and any other sub formats are rejected. FBX 2013 is the primary target for the importer, so this - format is best supported and well-tested. - Type: Bool. Default: false. - - - - - Specifies whether the FBX importer will preserve pivot points for transformations (as extra nodes). If set to false, pivots - and offsets will be evaluated whenever possible. - Type: Bool. Default: true. - - - - - Specifies whether the importer will drop empty animation curves or animation curves which match the bind pose - transformation over their entire defined range. - Type: Bool. Default: true. - - - - - Specifies if the X-file exporter should use 64-bit doubles rather than 32-bit floats. - Type: Bool. Default: false. - - - - - Static class that has a number of constants that are found in Assimp. These can be limits to configuration property default values. The constants - are grouped according to their usage or where they're found in the Assimp include files. - - - - - Default value for . - - - - - Default value for . - - - - - Default value for . - - - - - Default value for . - - - - - Default value for - - - - - Defines the maximum number of indices per face (polygon). - - - - - Defines the maximum number of bone weights. - - - - - Defines the maximum number of vertices per mesh. - - - - - Defines the maximum number of faces per mesh. - - - - - Defines the maximum number of vertex color sets per mesh. - - - - - Defines the maximum number of texture coordinate sets (UV(W) channels) per mesh. - - - - - Defines the default bone count limit. - - - - - Defines the deboning threshold. - - - - - Defines the maximum length of a string used in AiString. - - - - - Defines the default color material. - - - - - Defines the default textured material (if the meshes have UV coords). - - - - - Static class containing material key constants. A fully qualified mat key - name here means that it's a string that combines the mat key (base) name, its - texture type semantic, and its texture index into a single string delimited by - commas. For non-texture material properties, the texture type semantic and texture - index are always zero. - - - - - Material name (String) - - - - - Material name (String) - - - - - Two sided property (boolean) - - - - - Two sided property (boolean) - - - - - Shading mode property (ShadingMode) - - - - - Shading mode property (ShadingMode) - - - - - Enable wireframe property (boolean) - - - - - Enable wireframe property (boolean) - - - - - Blending function (BlendMode) - - - - - Blending function (BlendMode) - - - - - Opacity (float) - - - - - Opacity (float) - - - - - Bumpscaling (float) - - - - - Bumpscaling (float) - - - - - Shininess (float) - - - - - Shininess (float) - - - - - Reflectivity (float) - - - - - Reflectivity (float) - - - - - Shininess strength (float) - - - - - Shininess strength (float) - - - - - Refracti (float) - - - - - Refracti (float) - - - - - Diffuse color (Color4D) - - - - - Diffuse color (Color4D) - - - - - Ambient color (Color4D) - - - - - Ambient color (Color4D) - - - - - Specular color (Color4D) - - - - - Specular color (Color4D) - - - - - Emissive color (Color4D) - - - - - Emissive color (Color4D) - - - - - Transparent color (Color4D) - - - - - Transparent color (Color4D) - - - - - Reflective color (Color4D) - - - - - Reflective color (Color4D) - - - - - Background image (String) - - - - - Background image (String) - - - - - Texture base name - - - - - UVWSRC base name - - - - - Texture op base name - - - - - Mapping base name - - - - - Texture blend base name. - - - - - Mapping mode U base name - - - - - Mapping mode V base name - - - - - Texture map axis base name - - - - - UV transform base name - - - - - Texture flags base name - - - - - Helper function to get the fully qualified name of a texture property type name. Takes - in a base name constant, a texture type, and a texture index and outputs the name in the format: - "baseName,TextureType,texIndex" - - Base name - Texture type - Texture index - Fully qualified texture name - - - - Helper function to get the base name from a fully qualified name of a material property type name. The format - of such a string is: - "baseName,TextureType,texIndex" - - Fully qualified material property name. - Base name of the property type. - - - - Singleton that governs access to the unmanaged Assimp library functions. - - - - - Default name of the unmanaged library. Based on runtime implementation the prefix ("lib" on non-windows) and extension (.dll, .so, .dylib) will be appended automatically. - - - - - Gets the AssimpLibrary instance. - - - - - Gets if the Assimp unmanaged library supports multithreading. If it was compiled for single threading only, - then it will not utilize multiple threads during import. - - - - - Imports a file. - - Valid filename - Post process flags specifying what steps are to be run after the import. - Property store containing config name-values, may be null. - Pointer to the unmanaged data structure. - - - - Imports a file. - - Valid filename - Post process flags specifying what steps are to be run after the import. - Pointer to an instance of AiFileIO, a custom file IO system used to open the model and - any associated file the loader needs to open, passing NULL uses the default implementation. - Property store containing config name-values, may be null. - Pointer to the unmanaged data structure. - - - - Imports a scene from a stream. This uses the "aiImportFileFromMemory" function. The stream can be from anyplace, - not just a memory stream. It is up to the caller to dispose of the stream. - - Stream containing the scene data - Post processing flags - A hint to Assimp to decide which importer to use to process the data - Property store containing the config name-values, may be null. - Pointer to the unmanaged data structure. - - - - Releases the unmanaged scene data structure. This should NOT be used for unmanaged scenes that were marshaled - from the managed scene structure - only for scenes whose memory was allocated by the native library! - - Pointer to the unmanaged scene data structure. - - - - Applies a post-processing step on an already imported scene. - - Pointer to the unmanaged scene data structure. - Post processing steps to run. - Pointer to the unmanaged scene data structure. - - - - Gets all supported export formats. - - Array of supported export formats. - - - - Exports the given scene to a chosen file format. Returns the exported data as a binary blob which you can embed into another data structure or file. - - Scene to export, it is the responsibility of the caller to free this when finished. - Format id describing which format to export to. - Pre processing flags to operate on the scene during the export. - Exported binary blob, or null if there was an error. - - - - Exports the given scene to a chosen file format and writes the result file(s) to disk. - - The scene to export, which needs to be freed by the caller. The scene is expected to conform to Assimp's Importer output format. In short, - this means the model data should use a right handed coordinate system, face winding should be counter clockwise, and the UV coordinate origin assumed to be upper left. If the input is different, specify the pre processing flags appropiately. - Format id describing which format to export to. - Output filename to write to - Pre processing flags - accepts any post processing step flag. In reality only a small subset are actually supported, e.g. to ensure the input - conforms to the standard Assimp output format. Some may be redundant, such as triangulation, which some exporters may have to enforce due to the export format. - Return code specifying if the operation was a success. - - - - Exports the given scene to a chosen file format and writes the result file(s) to disk. - - The scene to export, which needs to be freed by the caller. The scene is expected to conform to Assimp's Importer output format. In short, - this means the model data should use a right handed coordinate system, face winding should be counter clockwise, and the UV coordinate origin assumed to be upper left. If the input is different, specify the pre processing flags appropiately. - Format id describing which format to export to. - Output filename to write to - Pointer to an instance of AiFileIO, a custom file IO system used to open the model and - any associated file the loader needs to open, passing NULL uses the default implementation. - Pre processing flags - accepts any post processing step flag. In reality only a small subset are actually supported, e.g. to ensure the input - conforms to the standard Assimp output format. Some may be redundant, such as triangulation, which some exporters may have to enforce due to the export format. - Return code specifying if the operation was a success. - - - - Creates a modifyable copy of a scene, useful for copying the scene that was imported so its topology can be modified - and the scene be exported. - - Valid scene to be copied - Modifyable copy of the scene - - - - Attaches a log stream callback to catch Assimp messages. - - Pointer to an instance of AiLogStream. - - - - Enables verbose logging. - - True if verbose logging is to be enabled or not. - - - - Gets if verbose logging is enabled. - - True if verbose logging is enabled, false otherwise. - - - - Detaches a logstream callback. - - Pointer to an instance of AiLogStream. - A return code signifying if the function was successful or not. - - - - Detaches all logstream callbacks currently attached to Assimp. - - - - - Create an empty property store. Property stores are used to collect import settings. - - Pointer to property store - - - - Deletes a property store. - - Pointer to property store - - - - Sets an integer property value. - - Pointer to property store - Property name - Property value - - - - Sets a float property value. - - Pointer to property store - Property name - Property value - - - - Sets a string property value. - - Pointer to property store - Property name - Property value - - - - Sets a matrix property value. - - Pointer to property store - Property name - Property value - - - - Retrieves a color value from the material property table. - - Material to retrieve the data from - Ai mat key (base) name to search for - Texture Type semantic, always zero for non-texture properties - Texture index, always zero for non-texture properties - The color if it exists. If not, the default Color4D value is returned. - - - - Retrieves an array of float values with the specific key from the material. - - Material to retrieve the data from - Ai mat key (base) name to search for - Texture Type semantic, always zero for non-texture properties - Texture index, always zero for non-texture properties - The maximum number of floats to read. This may not accurately describe the data returned, as it may not exist or be smaller. If this value is less than - the available floats, then only the requested number is returned (e.g. 1 or 2 out of a 4 float array). - The float array, if it exists - - - - Retrieves an array of integer values with the specific key from the material. - - Material to retrieve the data from - Ai mat key (base) name to search for - Texture Type semantic, always zero for non-texture properties - Texture index, always zero for non-texture properties - The maximum number of integers to read. This may not accurately describe the data returned, as it may not exist or be smaller. If this value is less than - the available integers, then only the requested number is returned (e.g. 1 or 2 out of a 4 float array). - The integer array, if it exists - - - - Retrieves a material property with the specific key from the material. - - Material to retrieve the property from - Ai mat key (base) name to search for - Texture Type semantic, always zero for non-texture properties - Texture index, always zero for non-texture properties - The material property, if found. - - - - Retrieves a string from the material property table. - - Material to retrieve the data from - Ai mat key (base) name to search for - Texture Type semantic, always zero for non-texture properties - Texture index, always zero for non-texture properties - The string, if it exists. If not, an empty string is returned. - - - - Gets the number of textures contained in the material for a particular texture type. - - Material to retrieve the data from - Texture Type semantic - The number of textures for the type. - - - - Gets the texture filepath contained in the material. - - Material to retrieve the data from - Texture type semantic - Texture index - The texture filepath, if it exists. If not an empty string is returned. - - - - Gets all values pertaining to a particular texture from a material. - - Material to retrieve the data from - Texture type semantic - Texture index - Returns the texture slot struct containing all the information. - - - - Gets the last error logged in Assimp. - - The last error message logged. - - - - Checks whether the model format extension is supported by Assimp. - - Model format extension, e.g. ".3ds" - True if the format is supported, false otherwise. - - - - Gets all the model format extensions that are currently supported by Assimp. - - Array of supported format extensions - - - - Gets a collection of importer descriptions that detail metadata and feature support for each importer. - - Collection of importer descriptions - - - - Gets the memory requirements of the scene. - - Pointer to the unmanaged scene data structure. - The memory information about the scene. - - - - Creates a quaternion from the 3x3 rotation matrix. - - Quaternion struct to fill - Rotation matrix - - - - Decomposes a 4x4 matrix into its scaling, rotation, and translation parts. - - 4x4 Matrix to decompose - Scaling vector - Quaternion containing the rotation - Translation vector - - - - Transposes the 4x4 matrix. - - Matrix to transpose - - - - Transposes the 3x3 matrix. - - Matrix to transpose - - - - Transforms the vector by the 3x3 rotation matrix. - - Vector to transform - Rotation matrix - - - - Transforms the vector by the 4x4 matrix. - - Vector to transform - Matrix transformation - - - - Multiplies two 4x4 matrices. The destination matrix receives the result. - - First input matrix and is also the Matrix to receive the result - Second input matrix, to be multiplied with "dst". - - - - Multiplies two 3x3 matrices. The destination matrix receives the result. - - First input matrix and is also the Matrix to receive the result - Second input matrix, to be multiplied with "dst". - - - - Creates a 3x3 identity matrix. - - Matrix to hold the identity - - - - Creates a 4x4 identity matrix. - - Matrix to hold the identity - - - - Gets the Assimp legal info. - - String containing Assimp legal info. - - - - Gets the native Assimp DLL's minor version number. - - Assimp minor version number - - - - Gets the native Assimp DLL's major version number. - - Assimp major version number - - - - Gets the native Assimp DLL's revision version number. - - Assimp revision version number - - - - Gets the native Assimp DLL's current version number as "major.minor.revision" string. This is the - version of Assimp that this wrapper is currently using. - - Unmanaged DLL version - - - - Gets the native Assimp DLL's current version number as a .NET version object. - - Unmanaged DLL version - - - - Get the compilation flags that describe how the native Assimp DLL was compiled. - - Compilation flags - - - - Defines all the unmanaged assimp C-function names. - - - - - Defines all of the delegates that represent the unmanaged assimp functions. - - - - - Enumerates supported platforms. - - - - - Windows platform. - - - - - Linux platform. - - - - - Mac platform. - - - - - An attribute that represents the name of an unmanaged function to import. - - - - - Name of the unmanaged function. - - - - - Constructs a new . - - Name of the function. - - - - Represents management and access to an unmanaged library. An unmanaged library can be loaded and unloaded dynamically. The library then searches for a list - of exported functions to create managed delegates for, allowing callers to access the library. Each OS platform has its own implementation to determine how to load - unmanaged libraries. - - - - - Occurs when the unmanaged library is loaded. - - - - - Occurs when the unmanaged library is freed. - - - - - Queries if the unmanaged library has been loaded or not. - - - - - Gets the default name of the unmanaged library DLL. This is dependent based on the platform extension and name prefix. Additional - names can be set in the (e.g. to load versioned DLLs) - - - - - Gets the path to the unmanaged library DLL that is currently loaded. - - - - - Gets the resolver used to find the unmanaged library DLL when loading. - - - - - Gets or sets whether an is thrown if the unmanaged DLL fails to load for whatever reason. By - default this is true. - - - - - Queries if the OS is 64-bit, if false then it is 32-bit. - - - - - Constructs a new . - - Default name (NOT path) of the unmanaged library. - Delegate types to instantiate and load. - - - - Gets an enum representing the current OS that is application is executing on. - - Platform enumeration. - - - - Loads the unmanaged library using the . - - True if the library was found and successfully loaded. - - - - Loads the unmanaged library using the supplied 32 and 64 bit paths, the one chosen is based on the OS bitness. - - Path to the 32-bit DLL - Path to the 64-bit DLL - True if the library was found and successfully loaded. - - - - Loads the unmanaged library using the supplied path. - - Path to the unmanaged DLL. - True if the library was found and successfully loaded. - - - - Frees the unmanaged library that is currently loaded. - - True if the library was sucessfully freed. - - - - Gets a delegate based on the unmanaged function name. - - Type of delegate. - Name of unmanaged function that is exported by the library. - The delegate, or null if not found. - - - - If library is not explicitly loaded by user, call this when trying to call an unmanaged function to load the unmanaged library - from the default path. This function is thread safe. - - - - - Called when the library is loaded. - - - - - Called when the library is freed. - - - - - Resolves unmanaged DLLs for . The process is completely configurable, where the user can supply alternative library names (e.g. versioned libs), - an override library name, and probing paths. These can be set for both 32/64 bit, or seperately for 32 or 64 bit. See - for the search strategy. - - - - - Gets the platform that the application is running on. - - - - - Constructs a new instance of the class. - - Platform we're resolving binaries for. - - - - Sets the collection of fallback library names (e.g. versioned libs) for 32-bit probing. - - Null to clear, or set of fallback library names. - - - - Sets the collection of fallback library names (e.g. versioned libs) for 64-bit probing. - - Null to clear, or set of fallback library names. - - - - Sets the collection of fallback library names (e.g. versioned libs) for both 32-bit and 64-bit probing. - - Null to clear, or set of fallback library names. - - - - Sets the collection of file paths to probe for 32-bit libraries. These paths always are first to be searched, in the order - that they are given. - - Null to clear, or set of paths to probe. - - - - Sets the collection of file paths to probe for 64-bit libraries. These paths always are first to be searched, in the order - that they are given. - - Null to clear, or set of paths to probe. - - - - Sets the collection of file paths to probe for both 32-bit and 64-bit libraries. These paths always are first to be searched, in the order - that they are given. - - Null to clear, or set of paths to probe. - - - - Sets an override 32-bit library name. By default, the implementations creates a default name for the library, which - is passed into for resolving. If the override is non-null, it will be used instead. This is useful if the library - to be loaded is not conforming to the platform's default prefix/extension scheme (e.g. libXYZ.so on linux where "lib" is the prefix and ".so" the extension). - - Null to clear, or override library name. - - - - Sets an override 64-bit library name. By default, the implementations creates a default name for the library, which - is passed into for resolving. If the override is non-null, it will be used instead. This is useful if the library - to be loaded is not conforming to the platform's default prefix/extension scheme (e.g. libXYZ.so on linux where "lib" is the prefix and ".so" the extension). - - Null to clear, or override library name. - - - - Sets an override 32-bit and 64-bit library name. By default, the implementations creates a default name for the library, which - is passed into for resolving. If the override is non-null, it will be used instead. This is useful if the library - to be loaded is not conforming to the platform's default prefix/extension scheme (e.g. libXYZ.so on linux where "lib" is the prefix and ".so" the extension). - - Null to clear, or override library name. - - - - Given a library name, this function attempts to resolve the file path from which it can be loaded. Each step of the search strategy uses the fallback - library names if the given name was not found in the current step. If the search is unsuccessfully, the library name is returned which means the OS will try - and do its own search strategy when attempting to load the library (this is dependent on the OS). The search strategy is the following, in order of execution: - - - Search user-specified probing paths. - Search {AppBaseDirectory}/runtimes/{RID}/native/. - Search {AppBaseDirectory}/. - Search nuget package path, e.g. {UserProfile}/.nuget/packages/{PackageId}/{PackageVersion}/runtimes/{RID}/native/. - - - - The search strategy gives priority to user-specified probing paths, then local paths to the application, then finally examining the global nuget cache. The RID - is the Runtime Identifier based on the platform/architecture, see also Microsoft's RID Catalog. - - - Name of the library to attempt to resolve. - Full file path to the library, or the file name if not found (e.g. "libXYZ.so"). - - - - Represents an aiScene struct. - - - - - unsigned int, flags about the state of the scene - - - - - aiNode*, root node of the scenegraph. - - - - - Number of meshes contained. - - - - - aiMesh**, meshes in the scene. - - - - - Number of materials contained. - - - - - aiMaterial**, materials in the scene. - - - - - Number of animations contained. - - - - - aiAnimation**, animations in the scene. - - - - - Number of embedded textures contained. - - - - - aiTexture**, textures in the scene. - - - - - Number of lights contained. - - - - - aiLight**, lights in the scene. - - - - - Number of cameras contained. - - - - - aiCamera**, cameras in the scene. - - - - - void*, Private data do not touch! - - - - - Represents an aiNode struct. - - - - - Name of the node. - - - - - Node's transform relative to its parent. - - - - - aiNode*, node's parent. - - - - - Number of children the node owns. - - - - - aiNode**, array of nodes this node owns. - - - - - Number of meshes referenced by this node. - - - - - unsigned int*, array of mesh indices. - - - - - aiMetadata*, pointer to a metadata container. May be NULL, if an importer doesn't document metadata then it doesn't write any. - - - - - Represents an aiMetadataEntry struct. - - - - - Type of metadata. - - - - - Pointer to data. - - - - - Represents an aiMetadata struct. - - - - - Length of the Keys and Values arrays. - - - - - aiString*, array of keys. May not be NULL. Each entry must exist. - - - - - aiMetadataEntry*, array of values. May not be NULL. Entries may be NULL if the corresponding property key has no assigned value. - - - - - Represents an aiMesh struct. Note: This structure requires marshaling, due to the arrays of IntPtrs. - - - - - unsigned int, bitwise flag detailing types of primitives contained. - - - - - Number of vertices in the mesh, denotes length of - -all- per-vertex arrays. - - - - - Number of faces in the mesh. - - - - - aiVector3D*, array of positions. - - - - - aiVector3D*, array of normals. - - - - - aiVector3D*, array of tangents. - - - - - aiVector3D*, array of bitangents. - - - - - aiColor4D*[Max_Value], array of arrays of vertex colors. Max_Value is defined as . - - - - - aiVector3D*[Max_Value], array of arrays of texture coordinates. Max_Value is defined as . - - - - - unsigned int[Max_Value], array of ints denoting the number of components for each set of texture coordinates - UV (2), UVW (3) for example. - Max_Value is defined as . - - - - - aiFace*, array of faces. - - - - - Number of bones in the mesh. - - - - - aiBone**, array of bones. - - - - - Material index referencing the material in the scene. - - - - - Optional name of the mesh. - - - - - Number of attachment meshes. NOT CURRENTLY IN USE. - - - - - aiAnimMesh**, array of attachment meshes for vertex-based animation. NOT CURRENTLY IN USE. - - - - - unsigned int, method of morphing when anim meshes are specified. - - - - - Represents an aiTexture struct. - - - - - Width of the texture. - - - - - Height of the texture. - - - - - sbyte[9], format extension hint. Fixed size char is two bytes regardless of encoding. Unmanaged assimp uses a char that - maps to one byte. 8 for string + 1 for terminator. - - - - - aiTexel*, array of texel data. - - - - - Sets the format hint. - - Format hint - must be 3 characters or less - - - - Gets the format hint. - - The format hint - - - - Gets the format hint. Use this to avoid struct copy if the string was passed by read-only ref. - - AiTexture - The format hint - - - - Represents an aiFace struct. - - - - - Number of indices in the face. - - - - - unsigned int*, array of indices. - - - - - Represents an aiBone struct. - - - - - Name of the bone. - - - - - Number of weights. - - - - - VertexWeight*, array of vertex weights. - - - - - Matrix that transforms the vertex from mesh to bone space in bind pose - - - - - Represents an aiMaterialProperty struct. - - - - - Name of the property (key). - - - - - Textures: Specifies texture usage. None texture properties - have this zero (or None). - - - - - Textures: Specifies the index of the texture. For non-texture properties - this is always zero. - - - - - Size of the buffer data in bytes. This value may not be zero. - - - - - Type of value contained in the buffer. - - - - - char*, byte buffer to hold the property's value. - - - - - Represents an aiMaterial struct. - - - - - aiMaterialProperty**, array of material properties. - - - - - Number of key-value properties. - - - - - Storage allocated for key-value properties. - - - - - Represents an aiNodeAnim struct. - - - - - Name of the node affected by the animation. The node must exist - and be unique. - - - - - Number of position keys. - - - - - VectorKey*, position keys of this animation channel. Positions - are 3D vectors and are accompanied by at least one scaling and one rotation key. - - - - - The number of rotation keys. - - - - - QuaternionKey*, rotation keys of this animation channel. Rotations are 4D vectors (quaternions). - If there are rotation keys there will be at least one scaling and one position key. - - - - - Number of scaling keys. - - - - - VectorKey*, scaling keys of this animation channel. Scalings are specified as a - 3D vector, and if there are scaling keys, there will at least be one position - and one rotation key. - - - - - Defines how the animation behaves before the first key is encountered. - - - - - Defines how the animation behaves after the last key was processed. - - - - - Represents an aiMeshAnim struct. - - - - - Name of the mesh to be animated. Empty string not allowed. - - - - - Number of keys, there is at least one. - - - - - aiMeshkey*, the key frames of the animation. There must exist at least one. - - - - - Represents an aiMeshMorphKey struct. - - - - - The time of this key. - - - - - unsigned int*, values at the time of this key. - - - - - double*, weights at the time of this key. - - - - - unsigned int, the number of values/weights. - - - - - Represents an aiMeshMorphAnim struct. - - - - - aiString, the name of the mesh to be animated. Empty strings are not allowed, animated meshes need to be named (not necessarily uniquely, - the name can basically serve as a wildcard to select a group of meshes with similar animation setup). - - - - - unsigned int, number of key frames. Must be at least one. - - - - - aiMeshMorphKey*, key frames of the animation. - - - - - Represents an aiAnimation struct. - - - - - Name of the animation. - - - - - Duration of the animation in ticks. - - - - - Ticks per second, 0 if not specified in imported file. - - - - - Number of bone animation channels, each channel affects a single node. - - - - - aiNodeAnim**, node animation channels. Each channel affects a single node. - - - - - Number of mesh animation channels. Each channel affects a single mesh and defines - vertex-based animation. - - - - - aiMeshAnim**, mesh animation channels. Each channel affects a single mesh. - - - - - Number of mesh morph animation channels. Each channel affects a single mesh and defines - morphing animation. - - - - - aiMeshMorphAnim**, mesh morph animation channels. Each channel affects a single mesh. - - - - - Represents an aiLight struct. - - - - - Name of the light. - - - - - Type of light. - - - - - Position of the light. - - - - - Direction of the spot/directional light. - - - - - Up direction of the light source in space. Undefined for point lights. - - - - - Attenuation constant value. - - - - - Attenuation linear value. - - - - - Attenuation quadratic value. - - - - - Diffuse color. - - - - - Specular color. - - - - - Ambient color. - - - - - Spot light inner angle. - - - - - Spot light outer angle. - - - - - Width (X) and Height (Y) of the area that represents an light. - - - - - Represents an aiCamera struct. - - - - - Name of the camera. - - - - - Position of the camera. - - - - - Up vector of the camera. - - - - - Viewing direction of the camera. - - - - - Field Of View of the camera. - - - - - Near clip plane distance. - - - - - Far clip plane distance. - - - - - The Aspect ratio. - - - - - Represents an aiString struct. - - - - - Byte length of the UTF-8 string. - - - - - Actual string data. - - - - - Constructs a new instance of the struct. - - The string data - - - - Convienence method for getting the AiString string - if the length is not greater than zero, it returns - an empty string rather than garbage. Use this to avoid struct copy if the string was passed by read-only ref. - - AiString - AiString string data - - - - Convienence method for getting the AiString string - if the length is not greater than zero, it returns - an empty string rather than garbage. - - AiString string data - - - - Convienence method for setting the AiString string (and length). - - String data to set - True if the operation was successful, false otherwise. - - - - Returns the fully qualified type name of this instance. - - A containing a fully qualified type name. - - - - Represents a log stream, which receives all log messages and streams them somewhere. - - - - - Function pointer that gets called when a message is to be logged. - - - - - char*, user defined opaque data. - - - - - Represents the memory requirements for the different components of an imported - scene. All sizes in in bytes. - - - - - Size of the storage allocated for texture data, in bytes. - - - - - Size of the storage allocated for material data, in bytes. - - - - - Size of the storage allocated for mesh data, in bytes. - - - - - Size of the storage allocated for node data, in bytes. - - - - - Size of the storage allocated for animation data, in bytes. - - - - - Size of the storage allocated for camera data, in bytes. - - - - - Size of the storage allocated for light data, in bytes. - - - - - Total storage allocated for the imported scene, in bytes. - - - - - Represents an aiAnimMesh struct. Note: This structure requires marshaling, due to the array of IntPtrs. - - - - - aiVector3D*, replacement position array. - - - - - aiVector3D*, replacement normal array. - - - - - aiVector3D*, replacement tangent array. - - - - - aiVector3D*, replacement bitangent array. - - - - - aiColor4D*[Max_Value], array of arrays of vertex colors. Max_Value is defined as . - - - - - aiVector3D*[Max_Value], array of arrays of texture coordinates. Max_Value is defined as . - - - - - unsigned int, number of vertices. - - - - - float, weight of the AnimMesh. - - - - - Describes a variety of information about an importer. - - - - - char*, full name of the importer (e.g. Blender3D Importer) - - - - - char*, original author (blank if unknown or assimp team) - - - - - char*, current maintainer, left blank if the author maintains. - - - - - char*, implementation comments. E.g. unimplemented features. - - - - - unsigned int, features supported by the importer. - - - - - unsigned int, max major version of format supported. If no version scheme or importer doesn't care, will be zero. - - - - - unsigned int, min major version of format supported. If no version scheme or importer doesn't care, will be zero. - - - - - unsigned int, max major version of format supported. If no version scheme, forwards compatible, or importer doesn't care, will be zero. - - - - - unsigned int, min major version of format supported. If no version scheme, forwards compatible, or importer doesn't care, will be zero. - - - - - char*, list of file extensions the importer can handle. Entries are separated by space characters, and all entries are lower case WITHOUT a leading dot. (e.g. "xml dae"). - Multiple importers may respond to the same file extension, assim - - - - - Describes a file format which Assimp can export to. - - - - - char*, a short string ID to uniquely identify the export format. e.g. "collada" or "obj" - - - - - char*, a short description of the file format to present to users. - - - - - char*, a recommended file extension of the exported file in lower case. - - - - - Describes a blob of exported scene data. Blobs can be nested, the first blob always has an empty name. Nested - blobs represent auxillary files produced by the exporter (e.g. material files) and are named accordingly. - - - - - size_t, size of the data in bytes. - - - - - void*, the data. - - - - - AiString, name of the blob. - - - - - aiExportDataBlob*, pointer to the next blob in the chain. - - - - - Contains callbacks to implement a custom file system to open and close files. - - - - - Function pointer to open a new file. - - - - - Function pointer used to close an existing file. - - - - - Char*, user defined opaque data. - - - - - Contains callbacks to read and write to a file opened by a custom file system. - - - - - Function pointer to read from a file. - - - - - Function pointer to write to a file. - - - - - Function pointer to retrieve the current position of the file cursor. - - - - - Function pointer to retrieve the size of the file. - - - - - Function pointer to set the current position of the file cursor. - - - - - Function pointer to flush the file contents. - - - - - Char*, user defined opaque data. - - - - - Callback delegate for Assimp's LogStream. - - Log message - char* pointer to user data that is passed to the callback - - - - Callback delegate for a custom file system, to write to a file. - - Pointer to an AiFile instance - Char* pointer to data to write (casted from a void*) - Size of a single element in bytes to write - Number of elements to write - Number of elements successfully written. Should be zero if either size or numElements is zero. May be less than numElements if an error occured. - - - - Callback delegate for a custom file system, to read from a file. - - Pointer to an AiFile instance. - Char* pointer that will store the data read (casted from a void*) - Size of a single element in bytes to read - Number of elements to read - Number of elements succesfully read. Should be zero if either size or numElements is zero. May be less than numElements if end of file is encountered, or if an error occured. - - - - Callback delegate for a custom file system, to tell offset/size information about the file. - - Pointer to an AiFile instance. - Returns the current file cursor or the file size in bytes. May be -1 if an error has occured. - - - - Callback delegate for a custom file system, to flush the contents of the file to the disk. - - Pointer to an AiFile instance. - - - - Callback delegate for a custom file system, to set the current position of the file cursor. - - Pointer to An AiFile instance. - Offset from the origin. - Position used as a reference - Returns success, if successful - - - - Callback delegate for a custom file system, to open a given file and create a new AiFile instance. - - Pointer to an AiFileIO instance. - Path to the target file - Read-write permissions to request - Pointer to an AiFile instance. - - - - Callback delegate for a custom file system, to close a given file and free its memory. - - Pointer to an AiFileIO instance. - Pointer to an AiFile instance that will be closed. - - - - Fixed length array for representing the color channels of a mesh. Length is equal - to . - - - - - Gets the length of the array. - - - - - Gets or sets an array value at the specified index. - - Zero-based index. - - - - Fixed length array for representing the texture coordinate channels of a mesh. Length is equal - to . - - - - - Gets the length of the array. - - - - - Gets or sets an array value at the specified index. - - Zero-based index. - - - - Fixed length array for representing the number of UV components for each texture coordinate channel of a mesh. Length is equal - to . - - - - - Gets the length of the array. - - - - - Gets or sets an array value at the specified index. - - Zero-based index. - - - - Defines how an UV channel is transformed. - - - - - Translation on the U and V axes. Default is 0|0 - - - - - Scaling on the U and V axes. Default is 1|1. - - - - - Rotation in counter-clockwise direction, specfied in - radians. The rotation center is 0.5f|0.5f and the - default value is zero. - - - - - Represents a two-dimensional vector. - - - - - X component. - - - - - Y component - - - - - Gets or sets the component value at the specified zero-based index - in the order of XY (index 0 access X, 1 access Y. If - the index is not in range, a value of zero is returned. - - Zero-based index. - The component value - - - - Constructs a new Vector2D. - - X component - Y component - - - - Constructs a new Vector2D with both components - set the same value. - - Value to set both X and Y to - - - - Sets the X and Y values. - - X component - Y component - - - - Calculates the length of the vector. - - Vector's length - - - - Calculates the length of the vector squared. - - Vector's length squared - - - - Normalizes the vector where all components add to one (Unit Vector), but preserves - the direction that the vector represents. - - - - - Negates the vector. - - - - - Adds two vectors together. - - First vector - Second vector - Added vector - - - - Subtracts the second vector from the first vector. - - First vector - Second vector - Resulting vector - - - - Multiplies two vectors together. - - First vector - Second vector - Multiplied vector - - - - Multiplies a vector by a scalar. - - Source vector - Scalar value - Scaled vector - - - - Multiplies a vector by a scalar. - - Scalar value - Source vector - Scaled vector - - - - Divides the first vector by the second vector. - - First vector - Second vector - Divided vector - - - - Divides the vector by a divisor value. - - Source vector - Divisor - Divided vector - - - - Negates the vector. - - Source vector - Negated vector - - - - Tests equality between two vectors. - - First vector - Second vector - True if the vectors are equal, false otherwise - - - - Tests inequality between two vectors. - - First vector - Second vector - True if the vectors are not equal, false otherwise - - - - Tests equality between this vector and another vector. - - Vector to test against - True if components are equal - - - - Tests equality between this vector and another object. - - Object to test against - True if the object is a vector and the components are equal - - - - Returns a hash code for this instance. - - - A hash code for this instance, suitable for use in hashing algorithms and data structures like a hash table. - - - - - Returns a that represents this instance. - - - A that represents this instance. - - - - - Represents a three-dimensional vector. - - - - - X component. - - - - - Y component. - - - - - Z component. - - - - - Gets or sets the component value at the specified zero-based index - in the order of XYZ (index 0 access X, 1 access Y, etc). If - the index is not in range, a value of zero is returned. - - Zero-based index. - The component value - - - - Constructs a new Vector3D. - - X component - Y component - Z component - - - - Constructs a new Vector3D. - - Vector2D containing the X, Y values - Z component - - - - Constructs a new Vector3D where each component is set - to the same value. - - Value to set X, Y, and Z to - - - - Sets the X, Y, and Z values. - - X component - Y component - Z component - - - - Calculates the length of the vector. - - Vector's length - - - - Calculates the length of the vector squared. - - Vector's length squared - - - - Normalizes the vector where all components add to one (Unit Vector), but preserves - the direction that the vector represents. - - - - - Negates the vector. - - - - - Calculates the cross product of two vectors. - - First vector - Second vector - Resulting vector - - - - Calculates the dot product of two vectors. - - First vector - Second vector - Resulting vector - - - - Adds two vectors together. - - First vector - Second vector - Added vector - - - - Subtracts the second vector from the first vector. - - First vector - Second vector - Resulting vector - - - - Multiplies two vectors together. - - First vector - Second vector - Multiplied vector - - - - Multiplies a vector by a scalar. - - Source vector - Scalar value - Scaled vector - - - - Multiplies a vector by a scalar. - - Scalar value - Source vector - Scaled vector - - - - Transforms this vector by a 3x3 matrix. This "post-multiplies" the two. - - Source matrix - Source vector - Transformed vector - - - - Transforms this vector by a 4x4 matrix. This "post-multiplies" the two. - - Source matrix - Source vector - Transformed vector - - - - Divides the first vector by the second vector. - - First vector - Second vector - Divided vector - - - - Divides the vector by a divisor value. - - Source vector - Divisor - Divided vector - - - - Negates the vector. - - Source vector - Negated vector - - - - Tests equality between two vectors. - - First vector - Second vector - True if the vectors are equal, false otherwise - - - - Tests inequality between two vectors. - - First vector - Second vector - True if the vectors are not equal, false otherwise - - - - Tests equality between this vector and another vector. - - Vector to test against - True if components are equal - - - - Tests equality between this vector and another object. - - Object to test against - True if the object is a vector and the components are equal - - - - Returns a hash code for this instance. - - - A hash code for this instance, suitable for use in hashing algorithms and data structures like a hash table. - - - - - Returns a that represents this instance. - - - A that represents this instance. - - - - - Time-value pair specifying a 3D vector for a given time. - - - - - The time of this key. - - - - - The 3D vector value of this key. - - - - - Constructs a new VectorKey. - - The time of this key. - The 3D vector value of this key. - - - - Tests equality between two keys. - - The first key - The second key - True if the key's 3D vectors are the same, false otherwise. - - - - Tests inequality between two keys. - - The first key - The second key - True if the key's 3D vectors are not the same, false otherwise. - - - - Tests inequality between two keys. - - The first key - The second key - True if the first key's time is less than the second key's. - - - - Tests inequality between two keys. - - The first key - The second key - True if the first key's time is greater than the second key's. - - - - Determines whether the specified is equal to this instance. - - The to compare with this instance. - - true if the specified is equal to this instance; otherwise, false. - - - - - Tests equality between this key and another. - - Other key to test - True if their 3D vectors are equal. - - - - Returns a hash code for this instance. - - - A hash code for this instance, suitable for use in hashing algorithms and data structures like a hash table. - - - - - Returns a that represents this instance. - - - A that represents this instance. - - - - - Represents a single influence of a bone on a vertex. - - - - - Index of the vertex which is influenced by the bone. - - - - - Strength of the influence in range of (0...1). All influences - from all bones at one vertex amounts to 1. - - - - - Constructs a new VertexWeight. - - Index of the vertex. - Weight of the influence. - - - - Returns a that represents this instance. - - - A that represents this instance. - - - - - Internal stub type used by MemoryInterop.ILPatcher to inject fast-interop code. Depending on the type of method, the IL injection is either inline (replacing the call) or - replaces the entire method body. Recommended types to use are generally blittable structs. - - - - - Casts the by-ref value from one type to another. - - Type to cast from. - Type to cast to. - By-ref value. - Ref to the value, as the new type. - - - - Casts the readonly by-ref value from one type to another. - - Type to cast from. - Type to cast to. - By-ref value. - Ref to the value, as the new type. - - - - Casts the pointer to a by-ref value of the specified type. - - Type to cast to. - Pointer. - Ref to the value, as the new type. - - - - Write data from the managed array to the memory location. This will temporarily pin the array and do a memcpy. - - Type of data. - Pointer to memory location to receive the data. - Array containing data to write. - Zero-based index to start reading data from the array. - Number of elements to copy. - - - - Write data from the managed array to the memory location. This will temporarily pin the array and do an unaligned memcpy. - - Type of data. - Pointer to memory location to write the data. - Array containing data to write. - Zero-based index to start reading data from the array. - Number of elements to copy. - - - - Read data from the memory location to the managed array. This will temporarily pin the array and do a memcpy. - - Type of data. - Pointer to memory location to read the data. - Array to store the copied data. - Zero-based index to start writing data to in the array. - Number of elements to copy. - - - - Read data from the memory location to the managed array. This will temporarily pin the array and do an unaligned memcpy. - - Type of data. - Pointer to memory location to read the data. - Array to store the copied data. - Zero-based index to start writing data to in the array. - Number of elements to copy. - - - - Computes the size of the type (inlined). - - Type of data. - Size of the type in bytes. - - - - Casts the by-ref value to a pointer (inlined). Note: This does not do any sort of pinning. - - Type of data. - Ref to a value. - Pointer to the memory location. - - - - Casts the readonly by-ref value to a pointer (inlined). Note: This does not do any sort of pinning. - - Type of data. - Ref to a value. - Pointer to the memory location. - - - - Writes a single element to the memory location (inlined). - - Type of data. - Pointer to memory location. - Value to be written. - - - - Writes a single element to the memory location (inlined, unaligned copy). - - Type of data. - Pointer to memory location. - Value to be written. - - - - Reads a single element from the memory location (inlined). - - Type of data. - Pointer to memory location. - Value read. - - - - Reads a single element from the memory location (inlined, unaligned copy). - - Type of data. - Pointer to memory location. - Value read. - - - - Copies the number of bytes from one pointer to the other (inlined). - - Pointer to the destination memory location. - Pointer to the source memory location - Number of bytes to copy - - - - Copies the number of bytes from one pointer to the other (inlined, unaligned copy). - - Pointer to the destination memory location. - Pointer to the source memory location - Number of bytes to copy - - - - Clears the memory to a specified value (inlined). - - Pointer to the memory location. - Value the memory will be cleared to. - Number of bytes to to set. - - - - Clears the memory to a specified value (inlined, unaligned init). - - Pointer to the memory location. - Value the memory will be cleared to. - Number of bytes to to set. - - - diff --git a/packages/AssimpNet.4.1.0/runtimes/linux-x64/native/libassimp.so b/packages/AssimpNet.4.1.0/runtimes/linux-x64/native/libassimp.so deleted file mode 100644 index dfaecb8a..00000000 Binary files a/packages/AssimpNet.4.1.0/runtimes/linux-x64/native/libassimp.so and /dev/null differ diff --git a/packages/AssimpNet.4.1.0/runtimes/osx-x64/native/libassimp.dylib b/packages/AssimpNet.4.1.0/runtimes/osx-x64/native/libassimp.dylib deleted file mode 100644 index 603bd33f..00000000 Binary files a/packages/AssimpNet.4.1.0/runtimes/osx-x64/native/libassimp.dylib and /dev/null differ diff --git a/packages/AssimpNet.4.1.0/runtimes/win-x64/native/assimp.dll b/packages/AssimpNet.4.1.0/runtimes/win-x64/native/assimp.dll deleted file mode 100644 index fd87b2d1..00000000 Binary files a/packages/AssimpNet.4.1.0/runtimes/win-x64/native/assimp.dll and /dev/null differ diff --git a/packages/AssimpNet.4.1.0/runtimes/win-x86/native/assimp.dll b/packages/AssimpNet.4.1.0/runtimes/win-x86/native/assimp.dll deleted file mode 100644 index 1f8b10dd..00000000 Binary files a/packages/AssimpNet.4.1.0/runtimes/win-x86/native/assimp.dll and /dev/null differ diff --git a/packages/CsvHelper.8.0.0-beta01/.signature.p7s b/packages/CsvHelper.8.0.0-beta01/.signature.p7s deleted file mode 100644 index 6b2bf2de..00000000 Binary files a/packages/CsvHelper.8.0.0-beta01/.signature.p7s and /dev/null differ diff --git a/packages/CsvHelper.8.0.0-beta01/CsvHelper.8.0.0-beta01.nupkg b/packages/CsvHelper.8.0.0-beta01/CsvHelper.8.0.0-beta01.nupkg deleted file mode 100644 index d9c3055c..00000000 Binary files a/packages/CsvHelper.8.0.0-beta01/CsvHelper.8.0.0-beta01.nupkg and /dev/null differ diff --git a/packages/CsvHelper.8.0.0-beta01/lib/net45/CsvHelper.dll b/packages/CsvHelper.8.0.0-beta01/lib/net45/CsvHelper.dll deleted file mode 100644 index d0b3eb74..00000000 Binary files a/packages/CsvHelper.8.0.0-beta01/lib/net45/CsvHelper.dll and /dev/null differ diff --git a/packages/CsvHelper.8.0.0-beta01/lib/net45/CsvHelper.xml b/packages/CsvHelper.8.0.0-beta01/lib/net45/CsvHelper.xml deleted file mode 100644 index dfa47a5d..00000000 --- a/packages/CsvHelper.8.0.0-beta01/lib/net45/CsvHelper.xml +++ /dev/null @@ -1,6687 +0,0 @@ - - - - CsvHelper - - - - - Represents errors that occur due to bad data. - - - - - Initializes a new instance of the class. - - The reading context. - - - - Initializes a new instance of the class - with a specified error message. - - The reading context. - The message that describes the error. - - - - Initializes a new instance of the class - with a specified error message and a reference to the inner exception that - is the cause of this exception. - - The reading context. - The error message that explains the reason for the exception. - The exception that is the cause of the current exception, or a null reference (Nothing in Visual Basic) if no inner exception is specified. - - - - Types of caches. - - - - - None. - - - - - Named index. - - - - - Delegate that creates objects when reading. - - - - - Delegate that writes objects to strings when writing. - - - - - Type converter options. - - - - - Raw record. - - - - - The string values used to represent a boolean false when converting. - - - - - Gets the false values. - - - - - The string values used to represent a boolean false when converting. - - The false values. - - - - The string values used to represent a boolean false when converting. - - The false values. - - - - The string values used to represent a boolean true when converting. - - - - - Gets the true values. - - - - - The string values used to represent a boolean true when converting. - - - - - - The string values used to represent a boolean true when converting. - - - - - - The constant value that will be used for every record when - reading and writing. This value will always be used no matter - what other mapping configurations are specified. - - - - - Gets the constant. - - - - - The constant value that will be used for every record when - reading and writing. This value will always be used no matter - what other mapping configurations are specified. - - The constant. - - - - The used when type converting. - This will override the global - setting. - - - - - Gets the culture info. - - - - - The used when type converting. - This will override the global - setting. - - The culture. - - - - The to use when type converting. - This is used when doing any conversions. - - - - - Gets the date time styles. - - - - - The to use when type converting. - This is used when doing any conversions. - - The date time styles. - - - - The default value that will be used when reading when - the CSV field is empty. - - - - - Gets the default value. - - - - - The default value that will be used when reading when - the CSV field is empty. - - The default value - - - - The string format to be used when type converting. - - - - - Gets the formats. - - - - - The string format to be used when type converting. - - The format. - - - - The string format to be used when type converting. - - The formats. - - - - Appends a prefix to the header of each field of the reference member. - - - - - Gets the prefix. - - - - - Appends a prefix to the header of each field of the reference member. - - - - - Appends a prefix to the header of each field of the reference member. - - The prefix. - - - - Ignore the member when reading and writing. - If this member has already been mapped as a reference - member, either by a class map, or by automapping, calling - this method will not ingore all the child members down the - tree that have already been mapped. - - - - - When reading, is used to get the field at - the given index. When writing, the fields - will be written in the order of the field - indexes. - - - - - Gets the index. - - - - - Gets the index end. - - - - - When reading, is used to get the field at - the given index. When writing, the fields - will be written in the order of the field - indexes. - - The index. - The index end. - - - - When reading, is used to get the field - at the index of the name if there was a - header specified. It will look for the - first name match in the order listed. - When writing, sets the name of the - field in the header record. - The first name will be used. - - - - - Gets the names. - - - - - When reading, is used to get the field - at the index of the name if there was a - header specified. It will look for the - first name match in the order listed. - When writing, sets the name of the - field in the header record. - The first name will be used. - - The name - - - - When reading, is used to get the field - at the index of the name if there was a - header specified. It will look for the - first name match in the order listed. - When writing, sets the name of the - field in the header record. - The first name will be used. - - The names. - - - - When reading, is used to get the - index of the name used when there - are multiple names that are the same. - - - - - The name index. - - - - - When reading, is used to get the - index of the name used when there - are multiple names that are the same. - - The name index. - - - - The string values used to represent null when converting. - - - - - Gets the null values. - - - - - The string values used to represent null when converting. - - The null values. - - - - The string values used to represent null when converting. - - The null values. - - - - The to use when type converting. - This is used when doing any number conversions. - - - - - Gets the number styles. - - - - - The to use when type converting. - This is used when doing any number conversions. - - The number styles. - - - - Specifies the to use - when converting the member to and from a CSV field. - - - - - Gets the type converter. - - - - - Specifies the to use - when converting the member to and from a CSV field. - - - - - - Maps class members to CSV fields. - - - - - The type of the class this map is for. - - - - - The class constructor parameter mappings. - - - - - The class member mappings. - - - - - The class member reference mappings. - - - - - Allow only internal creation of CsvClassMap. - - The type of the class this map is for. - - - - Maps a member to a CSV field. - - The type of the class this map is for. This may not be the same type - as the member.DeclaringType or the current ClassType due to nested member mappings. - The member to map. - If true, an existing map will be used if available. - If false, a new map is created for the same member. - The member mapping. - - - - Maps a non-member to a CSV field. This allows for writing - data that isn't mapped to a class member. - - The member mapping. - - - - Maps a member to another class map. - - The type of the class map. - The member. - Constructor arguments used to create the reference map. - The reference mapping for the member. - - - - Auto maps all members for the given type. If a member - is mapped again it will override the existing map. - - - - - Auto maps all members for the given type. If a member - is mapped again it will override the existing map. - - The configuration. - - - - Get the largest index for the - members and references. - - The max index. - - - - Resets the indexes based on the given start index. - - The index start. - The last index + 1. - - - - Auto maps the given map and checks for circular references as it goes. - - The map to auto map. - The configuration. - The list of parents for the map. - The index starting point. - - - - Auto maps the given map using constructor parameters. - - The map. - The configuration. - The list of parents for the map. - The index starting point. - - - - Checks for circular references. - - The type to check for. - The list of parents to check against. - A value indicating if a circular reference was found. - True if a circular reference was found, otherwise false. - - - - Gets the generic type for this class map. - - - - - Applies attribute configurations to the map. - - The member map. - - - - Applies attribute configurations to the map. - - The reference map. - - - - Has mapping capabilities. - - The class type. - - - - Maps a member to a CSV field. - - The member to map. - If true, an existing map will be used if available. - If false, a new map is created for the same member. - The member mapping. - - - - Options after a mapping call. - - The class type. - The member type. - - - - Has type converter capabilities. - - The class type. - The member type. - - - - Specifies the to use - when converting the member to and from a CSV field. - - The TypeConverter to use. - - - - Specifies the to use - when converting the member to and from a CSV field. - - The of the - to use. - - - - Options after a type converter call. - - The class type. - The member type. - - - - Has index capabilities. - - The class type. - The member type. - - - - When reading, is used to get the field at - the given index. When writing, the fields - will be written in the order of the field - indexes. - - The index of the CSV field. - The end index used when mapping to an member. - - - - Options after an index call. - - The class type. - The member type. - - - - Has name capabilities. - - The class type. - The member type. - - - - When reading, is used to get the field - at the index of the name if there was a - header specified. It will look for the - first name match in the order listed. - When writing, sets the name of the - field in the header record. - The first name will be used. - - The possible names of the CSV field. - - - - Options after a name call. - - The class type. - The member type. - - - - Has name index capabilities. - - The class type. - The member type. - - - - When reading, is used to get the - index of the name used when there - are multiple names that are the same. - - The index of the name. - - - - Options after a name index call. - - The class type. - The member type. - - - - Has convert using capabilities. - - The class type. - The member type. - - - - Specifies an expression to be used to convert data in the - row to the member. - - The convert expression. - - - - Specifies an expression to be used to convert the object - to a field. - - The convert expression. - - - - Has default capabilities. - - The class type. - The member type. - - - - The default value that will be used when reading when - the CSV field is empty. - - The default value. - - - - The default value that will be used when reading when - the CSV field is empty. This value is not type checked - and will use a to convert - the field. This could potentially have runtime errors. - - The default value. - - - - Options after a default call. - - The class type. - The member type. - - - - Has constant capabilities. - - The class type. - The member type. - - - - The constant value that will be used for every record when - reading and writing. This value will always be used no matter - what other mapping configurations are specified. - - The constant value. - - - - Has validate capabilities. - - The class type. - The member type. - - - - The validate expression that will be called on every field when reading. - The expression should return true if the field is valid. - If false is returned, a - will be thrown. - - The validation expression. - - - - Has build capabilities. - - The class type. - - - - Builds the . - - - - - Collection that holds CsvClassMaps for record types. - - - - - Gets the for the specified record type. - - - The . - - The record type. - The for the specified record type. - - - - Creates a new instance using the given configuration. - - The configuration. - - - - Finds the for the specified record type. - - The record type. - The for the specified record type. - - - - Adds the specified map for it's record type. If a map - already exists for the record type, the specified - map will replace it. - - The map. - - - - Removes the class map. - - The class map type. - - - - Removes all maps. - - - - - Goes up the inheritance tree to find the type instance of CsvClassMap{}. - - The type to traverse. - The type that is CsvClassMap{}. - - - - Sets defaults for the mapping tree. The defaults used - to be set inside the classes, but this didn't allow for - the TypeConverter to be created from the Configuration's - TypeConverterFactory. - - The map to set defaults on. - - - - Maps class members to CSV fields. - - The of class to map. - - - - Creates an instance of . - - - - - Maps a member to a CSV field. - - The member to map. - If true, an existing map will be used if available. - If false, a new map is created for the same member. - The member mapping. - - - - Meant for internal use only. - Maps a member to another class map. When this is used, accessing a property through - sub-property mapping later won't work. You can only use one or the other. When using - this, ConvertUsing will also not work. - - The type of the class map. - The expression. - Constructor arguments used to create the reference map. - The reference mapping for the member. - - - - Configuration used for reading and writing CSV data. - - - - - Gets or sets the . - - - - - Gets or sets the . - - - - - Gets or sets a value indicating if the - CSV file has a header record. - Default is true. - - - - - Gets or sets the function that is called when a header validation check is ran. The default function - will throw a if there is no header for a given member mapping. - You can supply your own function to do other things like logging the issue instead of throwing an exception. - Arguments: isValid, headerNames, headerNameIndex, context - - - - - Gets or sets the function that is called when a missing field is found. The default function will - throw a . You can supply your own function to do other things - like logging the issue instead of throwing an exception. - Arguments: headerNames, index, context - - - - - Gets or sets the function that is called when bad field data is found. A field - has bad data if it contains a quote and the field is not quoted (escaped). - You can supply your own function to do other things like logging the issue - instead of throwing an exception. - Arguments: context - - - - - Gets or sets the function that is called when a reading exception occurs. - The default function will re-throw the given exception. If you want to ignore - reading exceptions, you can supply your own function to do other things like - logging the issue. - Arguments: exception - - - - - Gets or sets the callback that will be called to - determine whether to skip the given record or not. - - - - - Gets or sets a value indicating if fields should be sanitized - to prevent malicious injection. This covers MS Excel, - Google Sheets and Open Office Calc. - - - - - Gets or sets the characters that are used for injection attacks. - - - - - Gets or sets the character used to escape a detected injection. - - - - - Gets or sets a value indicating whether changes in the column - count should be detected. If true, a - will be thrown if a different column count is detected. - - - true if [detect column count changes]; otherwise, false. - - - - - Prepares the header field for matching against a member name. - The header field and the member name are both ran through this function. - You should do things like trimming, removing whitespace, removing underscores, - and making casing changes to ignore case. - - - - - Determines if constructor parameters should be used to create - the class instead of the default constructor and members. - - - - - Chooses the constructor to use for constuctor mapping. - - - - - Gets or sets a value indicating whether references - should be ignored when auto mapping. True to ignore - references, otherwise false. Default is false. - - - - - Gets or sets the field trimming options. - - - - - Gets or sets the delimiter used to separate fields. - Default is ","; - - - - - Gets or sets the character used to quote fields. - Default is '"'. - - - - - Gets a string representation of the currently configured Quote character. - - - The new quote string. - - - - - Gets a string representation of two of the currently configured Quote characters. - - - The new double quote string. - - - - - Gets an array characters that require - the field to be quoted. - - - - - Gets or sets the character used to denote - a line that is commented out. Default is '#'. - - - - - Gets or sets a value indicating if comments are allowed. - True to allow commented out lines, otherwise false. - - - - - Gets or sets the size of the buffer - used for reading CSV files. - Default is 2048. - - - - - Gets or sets a value indicating whether all fields are quoted when writing, - or just ones that have to be. and - cannot be true at the same time. Turning one - on will turn the other off. - - - true if all fields should be quoted; otherwise, false. - - - - - Gets or sets a value indicating whether no fields are quoted when writing. - and cannot be true - at the same time. Turning one on will turn the other off. - - - true if [quote no fields]; otherwise, false. - - - - - Gets or sets a value indicating whether the number of bytes should - be counted while parsing. Default is false. This will slow down parsing - because it needs to get the byte count of every char for the given encoding. - The needs to be set correctly for this to be accurate. - - - - - Gets or sets the encoding used when counting bytes. - - - - - Gets or sets the culture info used to read an write CSV files. - - - - - Gets or sets a value indicating if quotes should be - ignored when parsing and treated like any other character. - - - - - Gets or sets a value indicating if private - member should be read from and written to. - True to include private member, otherwise false. Default is false. - - - - - Gets or sets the member types that are used when auto mapping. - MemberTypes are flags, so you can choose more than one. - Default is Properties. - - - - - Gets or sets a value indicating if blank lines - should be ignored when reading. - True to ignore, otherwise false. Default is true. - - - - - Gets or sets a callback that will return the prefix for a reference header. - Arguments: memberType, memberName - - - - - Builds the values for the RequiredQuoteChars property. - - - - - The configured s. - - - - - Gets or sets a value indicating that during writing if a new - object should be created when a reference member is null. - True to create a new object and use it's defaults for the - fields, or false to leave the fields empty for all the - reference member's member. - - - - - Creates a new CsvConfiguration. - - - - - Use a to configure mappings. - When using a class map, no members are mapped by default. - Only member specified in the mapping are used. - - The type of mapping class to use. - - - - Use a to configure mappings. - When using a class map, no members are mapped by default. - Only members specified in the mapping are used. - - The type of mapping class to use. - - - - Registers the class map. - - The class map to register. - - - - Unregisters the class map. - - The map type to unregister. - - - - Unregisters the class map. - - The map type to unregister. - - - - Unregisters all class maps. - - - - - Generates a for the type. - - The type to generate the map for. - The generate map. - - - - Generates a for the type. - - The type to generate for the map. - The generate map. - - - - Represents configuration errors that occur. - - - - - Initializes a new instance of the class. - - - - - Initializes a new instance of the class - with a specified error message. - - The message that describes the error. - - - - Initializes a new instance of the class - with a specified error message and a reference to the inner exception that - is the cause of this exception. - - The error message that explains the reason for the exception. - The exception that is the cause of the current exception, or a null reference (Nothing in Visual Basic) if no inner exception is specified. - - - - A default that can be used - to create a class map dynamically. - - - - - - Configuration used for the . - - - - - Gets or sets the size of the buffer - used for reading CSV files. - Default is 2048. - - - - - Gets or sets a value indicating whether the number of bytes should - be counted while parsing. Default is false. This will slow down parsing - because it needs to get the byte count of every char for the given encoding. - The needs to be set correctly for this to be accurate. - - - - - Gets or sets the encoding used when counting bytes. - - - - - Gets or sets the function that is called when bad field data is found. A field - has bad data if it contains a quote and the field is not quoted (escaped). - You can supply your own function to do other things like logging the issue - instead of throwing an exception. - Arguments: context - - - - - Gets or sets the character used to denote - a line that is commented out. Default is '#'. - - - - - Gets or sets a value indicating if comments are allowed. - True to allow commented out lines, otherwise false. - - - - - Gets or sets a value indicating if blank lines - should be ignored when reading. - True to ignore, otherwise false. Default is true. - - - - - Gets or sets a value indicating if quotes should be - ingored when parsing and treated like any other character. - - - - - Gets or sets the character used to quote fields. - Default is '"'. - - - - - Gets or sets the delimiter used to separate fields. - Default is ","; - - - - - Gets or sets the field trimming options. - - - - - Configuration used for the . - - - - - Gets or sets a value indicating if the - CSV file has a header record. - Default is true. - - - - - Gets or sets the function that is called when a header validation check is ran. The default function - will throw a if there is no header for a given member mapping. - You can supply your own function to do other things like logging the issue instead of throwing an exception. - Arguments: isValid, headerNames, headerNameIndex, context - - - - - Gets or sets the function that is called when a missing field is found. The default function will - throw a . You can supply your own function to do other things - like logging the issue instead of throwing an exception. - Arguments: headerNames, index, context - - - - - Gets or sets the function that is called when a reading exception occurs. - The default function will re-throw the given exception. If you want to ignore - reading exceptions, you can supply your own function to do other things like - logging the issue. - Arguments: exception - - - - - Gets or sets the culture info used to read an write CSV files. - - - - - Gets or sets the . - - - - - Gets or sets the . - - - - - Prepares the header field for matching against a member name. - The header field and the member name are both ran through this function. - You should do things like trimming, removing whitespace, removing underscores, - and making casing changes to ignore case. - - - - - Determines if constructor parameters should be used to create - the class instead of the default constructor and members. - - - - - Chooses the constructor to use for constuctor mapping. - - - - - Gets or sets a value indicating whether references - should be ignored when auto mapping. True to ignore - references, otherwise false. Default is false. - - - - - Gets or sets the callback that will be called to - determine whether to skip the given record or not. - - - - - Gets or sets a value indicating if private - member should be read from and written to. - True to include private member, otherwise false. Default is false. - - - - - Gets or sets a callback that will return the prefix for a reference header. - Arguments: memberType, memberName - - - - - Gets or sets a value indicating whether changes in the column - count should be detected. If true, a - will be thrown if a different column count is detected. - - - true if [detect column count changes]; otherwise, false. - - - - - Gets or sets the member types that are used when auto mapping. - MemberTypes are flags, so you can choose more than one. - Default is Properties. - - - - - The configured s. - - - - - Use a to configure mappings. - When using a class map, no members are mapped by default. - Only member specified in the mapping are used. - - The type of mapping class to use. - - - - Use a to configure mappings. - When using a class map, no member are mapped by default. - Only member specified in the mapping are used. - - The type of mapping class to use. - - - - Registers the class map. - - The class map to register. - - - - Unregisters the class map. - - The map type to unregister. - - - - Unregisters the class map. - - The map type to unregister. - - - - Unregisters all class maps. - - - - - Generates a for the type. - - The type to generate the map for. - The generate map. - - - - Generates a for the type. - - The type to generate for the map. - The generate map. - - - - Configuration used for the . - - - - - Gets or sets the delimiter used to separate fields. - Default is ','; - - - - - Gets or sets the character used to quote fields. - Default is '"'. - - - - - Gets or sets the field trimming options. - - - - - Gets or sets a value indicating if fields should be sanitized - to prevent malicious injection. This covers MS Excel, - Google Sheets and Open Office Calc. - - - - - Gets or sets the characters that are used for injection attacks. - - - - - Gets or sets the character used to escape a detected injection. - - - - - Configuration used for the . - - - - - Gets or sets a value indicating whether all fields are quoted when writing, - or just ones that have to be. and - cannot be true at the same time. Turning one - on will turn the other off. - - - true if all fields should be quoted; otherwise, false. - - - - - Gets or sets a value indicating whether no fields are quoted when writing. - and cannot be true - at the same time. Turning one on will turn the other off. - - - true if [quote no fields]; otherwise, false. - - - - - Gets a string representation of the currently configured Quote character. - - - The new quote string. - - - - - Gets an array characters that require - the field to be quoted. - - - - - Builds the values for the RequiredQuoteChars property. - - - - - Gets a string representation of two of the currently configured Quote characters. - - - The new double quote string. - - - - - Gets or sets the culture info used to read an write CSV files. - - - - - Gets or sets the . - - - - - Gets or sets the . - - - - - Gets or sets a value indicating if comments are allowed. - True to allow commented out lines, otherwise false. - - - - - Gets or sets the character used to denote - a line that is commented out. Default is '#'. - - - - - Gets or sets a value indicating if the - CSV file has a header record. - Default is true. - - - - - Gets or sets a value indicating whether references - should be ignored when auto mapping. True to ignore - references, otherwise false. Default is false. - - - - - Gets or sets a value indicating if private - member should be read from and written to. - True to include private member, otherwise false. Default is false. - - - - - Gets or sets a callback that will return the prefix for a reference header. - Arguments: memberType, memberName - - - - - Gets or sets the member types that are used when auto mapping. - MemberTypes are flags, so you can choose more than one. - Default is Properties. - - - - - The configured s. - - - - - Use a to configure mappings. - When using a class map, no member are mapped by default. - Only member specified in the mapping are used. - - The type of mapping class to use. - - - - Use a to configure mappings. - When using a class map, no member are mapped by default. - Only member specified in the mapping are used. - - The type of mapping class to use. - - - - Registers the class map. - - The class map to register. - - - - Unregisters the class map. - - The map type to unregister. - - - - Unregisters the class map. - - The map type to unregister. - - - - Unregisters all class maps. - - - - - Generates a for the type. - - The type to generate the map for. - The generate map. - - - - Generates a for the type. - - The type to generate for the map. - The generate map. - - - - Gets or sets a value indicating that during writing if a new - object should be created when a reference member is null. - True to create a new object and use it's defaults for the - fields, or false to leave the fields empty for all the - reference member's member. - - - - - Sets type converter options on a member map. - - - - - Creates a new instance using the given . - - The member map the options are being applied to. - - - - The used when type converting. - This will override the global - setting. - - The culture info. - - - - The to use when type converting. - This is used when doing any conversions. - - The date time style. - - - - The to use when type converting. - This is used when doing any number conversions. - - - - - - The string format to be used when type converting. - - The format. - - - - The string values used to represent a boolean when converting. - - A value indicating whether true values or false values are being set. - A value indication if the current values should be cleared before adding the new ones. - The string boolean values. - - - - The string values used to represent null when converting. - - The values that represent null. - - - - - The string values used to represent null when converting. - - A value indication if the current values should be cleared before adding the new ones. - The values that represent null. - - - - - Mapping info for a member to a CSV field. - - - - - Gets the member map data. - - - - - Type converter options. - - - - - Creates an instance of using the given Type and . - - Type of the class the member being mapped belongs to. - The member being mapped. - - - - When reading, is used to get the field - at the index of the name if there was a - header specified. It will look for the - first name match in the order listed. - When writing, sets the name of the - field in the header record. - The first name will be used. - - The possible names of the CSV field. - - - - When reading, is used to get the - index of the name used when there - are multiple names that are the same. - - The index of the name. - - - - When reading, is used to get the field at - the given index. When writing, the fields - will be written in the order of the field - indexes. - - The index of the CSV field. - The end index used when mapping to an member. - - - - Ignore the member when reading and writing. - If this member has already been mapped as a reference - member, either by a class map, or by automapping, calling - this method will not ingore all the child members down the - tree that have already been mapped. - - - - - Ignore the member when reading and writing. - If this member has already been mapped as a reference - member, either by a class map, or by automapping, calling - this method will not ingore all the child members down the - tree that have already been mapped. - - True to ignore, otherwise false. - - - - The default value that will be used when reading when - the CSV field is empty. - - The default value. - - - - The default value that will be used when reading when - the CSV field is empty. This value is not type checked - and will use a to convert - the field. This could potentially have runtime errors. - - The default value. - - - - The constant value that will be used for every record when - reading and writing. This value will always be used no matter - what other mapping configurations are specified. - - The constant value. - - - - Specifies the to use - when converting the member to and from a CSV field. - - The TypeConverter to use. - - - - Specifies the to use - when converting the member to and from a CSV field. - - The of the - to use. - - - - Specifies an expression to be used to validate a field when reading. - - - - - - A collection that holds 's. - - - - - Gets the number of elements contained in the . - - - The number of elements contained in the . - - - - - Gets a value indicating whether the is read-only. - - - true if the is read-only; otherwise, false. - - - - - Initializes a new instance of the class. - - - - - Initializes a new instance of the class. - - The comparer to use when sorting the member maps. - - - - Returns an enumerator that iterates through the collection. - - - A that can be used to iterate through the collection. - - 1 - - - - Returns an enumerator that iterates through a collection. - - - An object that can be used to iterate through the collection. - - 2 - - - - Adds an item to the . - - The object to add to the . - The is read-only. - - - - - Adds a range of items to the . - - The collection to add. - - - - Removes all items from the . - - The is read-only. - - - - - Determines whether the contains a specific value. - - - true if is found in the ; otherwise, false. - - The object to locate in the . - - - - - Copies the elements of the to an , starting at a particular index. - - The one-dimensional that is the destination of the elements copied from . The must have zero-based indexing.The zero-based index in at which copying begins. is null. is less than 0.The number of elements in the source is greater than the available space from to the end of the destination . - - - - Removes the first occurrence of a specific object from the . - - - true if was successfully removed from the ; otherwise, false. This method also returns false if is not found in the original . - - The object to remove from the . - The is read-only. - - - - - Determines the index of a specific item in the . - - - The index of if found in the list; otherwise, -1. - - The object to locate in the . - - - - - Inserts an item to the at the specified index. - - The zero-based index at which should be inserted. - The object to insert into the . - is not a valid index in the . - The is read-only. - - - - - Removes the item at the specified index. - - The zero-based index of the item to remove. - is not a valid index in the . - The is read-only. - - - - - Gets or sets the element at the specified index. - - - The element at the specified index. - - The zero-based index of the element to get or set. - is not a valid index in the . - The member is set and the is read-only. - - - - - Finds the using the given member expression. - - The the member is on. - The member expression. - The for the given expression, or null if not found. - - - - Finds the using the given member. - - The member. - The for the given expression, or null if not found. - - - - Adds the members from the mapping. This will recursively - traverse the mapping tree and add all members for - reference maps. - - The mapping where the members are added from. - - - - Used to compare s. - The order is by field index ascending. Any - fields that don't have an index are pushed - to the bottom. - - - - - Compares two objects and returns a value indicating whether one is less than, equal to, or greater than the other. - - - Value - Condition - Less than zero - is less than . - Zero - equals . - Greater than zero - is greater than . - - The first object to compare. - The second object to compare. - Neither nor implements the interface. - -or- - and are of different types and neither one can handle comparisons with the other. - 2 - - - - Compares two objects and returns a value indicating whether one is less than, equal to, or greater than the other. - - - Value - Condition - Less than zero - is less than . - Zero - equals . - Greater than zero - is greater than . - - The first object to compare. - The second object to compare. - - - - - The configured data for the member map. - - - - - Gets the that the data - is associated with. - - - - - Gets the list of column names. - - - - - Gets or sets the index of the name. - This is used if there are multiple - columns with the same names. - - - - - Gets or sets a value indicating if the name was - explicitly set. True if it was explicity set, - otherwise false. - - - - - Gets or sets the column index. - - - - - Gets or sets the index end. The Index end is used to specify a range for use - with a collection member. Index is used as the start of the range, and IndexEnd - is the end of the range. - - - - - Gets or sets a value indicating if the index was - explicitly set. True if it was explicitly set, - otherwise false. - - - - - Gets or sets the type converter. - - - - - Gets or sets the type converter options. - - - - - Gets or sets a value indicating whether the field should be ignored. - - - - - Gets or sets the default value used when a CSV field is empty. - - - - - Gets or sets a value indicating whether this instance is default value set. - the default value was explicitly set. True if it was - explicitly set, otherwise false. - - - - - Gets or sets the constant value used for every record. - - - - - Gets or sets a value indicating if a constant was explicitly set. - - - - - Gets or sets the expression used to convert data in the - row to the member. - - - - - Gets or sets the expression to be used to convert the object - to a field. - - - - - Gets or sets the expression use to validate a field. - - - - - Initializes a new instance of the class. - - The member. - - - - Mapping info for a member to a CSV field. - - - - - Creates a new instance using the specified member. - - - - - When reading, is used to get the field - at the index of the name if there was a - header specified. It will look for the - first name match in the order listed. - When writing, sets the name of the - field in the header record. - The first name will be used. - - The possible names of the CSV field. - - - - When reading, is used to get the - index of the name used when there - are multiple names that are the same. - - The index of the name. - - - - When reading, is used to get the field at - the given index. When writing, the fields - will be written in the order of the field - indexes. - - The index of the CSV field. - The end index used when mapping to an member. - - - - Ignore the member when reading and writing. - If this member has already been mapped as a reference - member, either by a class map, or by automapping, calling - this method will not ingore all the child members down the - tree that have already been mapped. - - - - - Ignore the member when reading and writing. - If this member has already been mapped as a reference - member, either by a class map, or by automapping, calling - this method will not ingore all the child members down the - tree that have already been mapped. - - True to ignore, otherwise false. - - - - The default value that will be used when reading when - the CSV field is empty. - - The default value. - - - - The default value that will be used when reading when - the CSV field is empty. This value is not type checked - and will use a to convert - the field. This could potentially have runtime errors. - - The default value. - - - - The constant value that will be used for every record when - reading and writing. This value will always be used no matter - what other mapping configurations are specified. - - The constant value. - - - - Specifies the to use - when converting the member to and from a CSV field. - - The TypeConverter to use. - - - - Specifies the to use - when converting the member to and from a CSV field. - - The of the - to use. - - - - Specifies an expression to be used to convert data in the - row to the member. - - The convert expression. - - - - Specifies an expression to be used to convert the object - to a field. - - The convert expression. - - - - Specifies an expression to be used to validate a field when reading. - - - - - - A collection that holds member names. - - - - - Gets the name at the given index. If a prefix is set, - it will be prepended to the name. - - - - - - - Gets the prefix to use for each name. - - - - - Gets the raw list of names without - the prefix being prepended. - - - - - Gets the count. - - - - - Adds the given name to the collection. - - The name to add. - - - - Clears all names from the collection. - - - - - Adds a range of names to the collection. - - The range to add. - - - - Returns an enumerator that iterates through the collection. - - - A that can be used to iterate through the collection. - - 1 - - - - Returns an enumerator that iterates through a collection. - - - An object that can be used to iterate through the collection. - - 2 - - - - Mapping info for a reference member mapping to a class. - - - - - Gets the member reference map data. - - - - - Initializes a new instance of the class. - - The member. - The to use for the reference map. - - - - Appends a prefix to the header of each field of the reference member. - - The prefix to be prepended to headers of each reference member. - The current - - - - Get the largest index for the - members and references. - - The max index. - - - - A collection that holds 's. - - - - Gets the number of elements contained in the . - The number of elements contained in the . - - - Gets a value indicating whether the is read-only. - true if the is read-only; otherwise, false. - - - Gets or sets the element at the specified index. - The element at the specified index. - The zero-based index of the element to get or set. - - is not a valid index in the . - The member is set and the is read-only. - - - Returns an enumerator that iterates through the collection. - A that can be used to iterate through the collection. - 1 - - - Returns an enumerator that iterates through a collection. - An object that can be used to iterate through the collection. - 2 - - - Adds an item to the . - The object to add to the . - The is read-only. - - - Removes all items from the . - The is read-only. - - - Determines whether the contains a specific value. - true if is found in the ; otherwise, false. - The object to locate in the . - - - Copies the elements of the to an , starting at a particular index. - The one-dimensional that is the destination of the elements copied from . The must have zero-based indexing. - The zero-based index in at which copying begins. - - is null. - - is less than 0. - The number of elements in the source is greater than the available space from to the end of the destination . - - - Removes the first occurrence of a specific object from the . - true if was successfully removed from the ; otherwise, false. This method also returns false if is not found in the original . - The object to remove from the . - The is read-only. - - - Determines the index of a specific item in the . - The index of if found in the list; otherwise, -1. - The object to locate in the . - - - Inserts an item to the at the specified index. - The zero-based index at which should be inserted. - The object to insert into the . - - is not a valid index in the . - The is read-only. - - - Removes the item at the specified index. - The zero-based index of the item to remove. - - is not a valid index in the . - The is read-only. - - - - Finds the using the given member expression. - - The the member is on. - The member expression. - The for the given expression, or null if not found. - - - - Finds the using the given member. - - The member. - The for the given expression, or null if not found. - - - - The configuration data for the reference map. - - - - - Gets or sets the header prefix to use. - - - - - Gets the that the data - is associated with. - - - - - Gets the mapping this is a reference for. - - - - - Initializes a new instance of the class. - - The member. - The mapping this is a reference for. - - - - Flags for the type of members that - can be used for auto mapping. - - - - - No members. This is not a valid value - and will cause an exception if used. - - - - - Properties on a class. - - - - - Fields on a class. - - - - - Mapping for a constructor parameter. - This may contain value type data, a constructor type map, - or a reference map, depending on the type of the parameter. - - - - - Gets the parameter map data. - - - - - Gets or sets the map for a constructor type. - - - - - Gets or sets the map for a reference type. - - - - - Creates an instance of using - the given information. - - The parameter being mapped. - - - - The constructor paramter data for the map. - - - - - Gets the that the data - is associated with. - - - - - Gets or sets the type converter. - - - - - Gets or sets the type converter options. - - - - - Gets or sets the column index. - - - - - Gets or sets the column name. - - - - - Initializes a new instance of the class. - - The constructor parameter. - - - - Mapping info for a reference parameter mapping to a class. - - - - - Gets the parameter reference map data. - - - - - Initializes a new instance of the class. - - The parameter. - The to use for the reference map. - - - - Appends a prefix to the header of each field of the reference parameter. - - The prefix to be prepended to headers of each reference parameter. - The current - - - - Get the largest index for the - members and references. - - The max index. - - - - The configuration data for the reference map. - - - - - Gets or sets the header prefix to use. - - - - - Gets the that the data - is associated with. - - - - - Gets the mapping this is a reference for. - - - - - Initializes a new instance of the class. - - The parameter. - The mapping this is a reference for. - - - - Options for trimming of fields. - - - - - No trimming. - - - - - Trims the whitespace around a field. - - - - - Trims the whitespace inside of quotes around a field. - - - - - Reads fields from a . - - - - - Gets the reading context. - - - - - Gets a value indicating if the buffer is empty. - True if the buffer is empty, otherwise false. - - - - - Fills the buffer. - - True if there is more data left. - False if all the data has been read. - - - - Fills the buffer. - - True if there is more data left. - False if all the data has been read. - - - - Creates a new using the given - and . - - The text reader. - The configuration. - - - - Creates a new using the given - , - and leaveOpen flag. - - The text reader. - The configuration. - A value indicating if the should be left open when disposing. - - - - Gets the next char as an . - - - - - Gets the field. This will append any reading progress. - - The current field. - - - - Appends the current reading progress. - - - - - Move's the buffer position according to the given offset. - - The offset to move the buffer. - - - - Sets the start of the field to the current buffer position. - - An offset for the field start. - The offset should be less than 1. - - - - Sets the end of the field to the current buffer position. - - An offset for the field start. - The offset should be less than 1. - - - - Sets the raw recodr start to the current buffer position; - - An offset for the raw record start. - The offset should be less than 1. - - - - Sets the raw record end to the current buffer position. - - An offset for the raw record end. - The offset should be less than 1. - - - - Performs application-defined tasks associated with freeing, releasing, or resetting unmanaged resources. - - 2 - - - - Performs application-defined tasks associated with freeing, releasing, or resetting unmanaged resources. - - True if the instance needs to be disposed of. - - - - Represents errors that occur in CsvHelper. - - - - - Gets the context used when reading. - - - - - Gets the context used when writing. - - - - - Initializes a new instance of the CsvHelperException class. - - - - - Initializes a new instance of the CsvHelperException class. - - The message that describes the error. - - - - Initializes a new instance of the CsvHelperException class. - - The error message that explains the reason for the exception. - The exception that is the cause of the current exception, or a null reference (Nothing in Visual Basic) if no inner exception is specified. - - - - Initializes a new instance of the class. - - - - - Initializes a new instance of the class. - - - - - Initializes a new instance of the class - with a specified error message. - - The reading context. - The message that describes the error. - - - - Initializes a new instance of the class - with a specified error message and a reference to the inner exception that - is the cause of this exception. - - The reading context. - The error message that explains the reason for the exception. - The exception that is the cause of the current exception, or a null reference (Nothing in Visual Basic) if no inner exception is specified. - - - - Initializes a new instance of the class - with a specified error message. - - The writing context. - The message that describes the error. - - - - Initializes a new instance of the class - with a specified error message and a reference to the inner exception that - is the cause of this exception. - - The writing context. - The error message that explains the reason for the exception. - The exception that is the cause of the current exception, or a null reference (Nothing in Visual Basic) if no inner exception is specified. - - - - Parses a CSV file. - - - - - Gets the reading context. - - - - - Gets the configuration. - - - - - Gets the . - - - - - Creates a new parser using the given . - - The with the CSV file data. - - - - Creates a new parser using the given . - - The with the CSV file data. - true to leave the reader open after the CsvReader object is disposed, otherwise false. - - - - Creates a new parser using the given and . - - The with the CSV file data. - The configuration. - - - - Creates a new parser using the given and . - - The with the CSV file data. - The configuration. - true to leave the reader open after the CsvReader object is disposed, otherwise false. - - - - Creates a new parser using the given . - - The field reader. - - - - Reads a record from the CSV file. - - A of fields for the record read. - - - - Reads a record from the CSV file asynchronously. - - A of fields for the record read. - - - - Performs application-defined tasks associated with freeing, releasing, or resetting unmanaged resources. - - 2 - - - - Performs application-defined tasks associated with freeing, releasing, or resetting unmanaged resources. - - True if the instance needs to be disposed of. - - - - Reads a line of the CSV file. - - The CSV line. - - - - Reads a line of the CSV file. - - The CSV line. - - - - Reads a blank line. This accounts for empty lines - and commented out lines. - - - - - Reads a blank line. This accounts for empty lines - and commented out lines. - - - - - Reads until a delimiter or line ending is found. - - True if the end of the line was found, otherwise false. - - - - Reads until a delimiter or line ending is found. - - True if the end of the line was found, otherwise false. - - - - Reads until the field is not quoted and a delimeter is found. - - True if the end of the line was found, otherwise false. - - - - Reads until the field is not quoted and a delimeter is found. - - True if the end of the line was found, otherwise false. - - - - Reads until the delimeter is done. - - True if a delimiter was read. False if the sequence of - chars ended up not being the delimiter. - - - - Reads until the delimeter is done. - - True if a delimiter was read. False if the sequence of - chars ended up not being the delimiter. - - - - Reads until the line ending is done. - - The field start offset. - - - - Reads until the line ending is done. - - The field start offset. - - - - Reads until a non-space character is found. - - True if there is more data to read. - False if the end of the file has been reached. - - - - Reads until a non-space character is found. - - True if there is more data to read. - False if the end of the file has been reached. - - - - Reads data that was parsed from . - - - - - Gets the reading context. - - - - - Gets the configuration. - - - - - Gets the parser. - - - - - Creates a new CSV reader using the given . - - The reader. - - - - Creates a new CSV reader using the given . - - The reader. - true to leave the reader open after the CsvReader object is disposed, otherwise false. - - - - Creates a new CSV reader using the given and - and as the default parser. - - The reader. - The configuration. - - - - Creates a new CSV reader using the given . - - The reader. - The configuration. - true to leave the reader open after the CsvReader object is disposed, otherwise false. - - - - Creates a new CSV reader using the given . - - The used to parse the CSV file. - - - - Reads the header record without reading the first row. - - True if there are more records, otherwise false. - - - - Validates the header. A header is bad if all the mapped members don't match. - If the header is not valid, a will be thrown. - - The type to validate the header against. - - - - Validates the header. A header is bad if all the mapped members don't match. - If the header is not valid, a will be thrown. - - The type to validate the header against. - - - - Validates the header against the given map. - - The map to validate against. - - - - Advances the reader to the next record. This will not read headers. - You need to call then - for the headers to be read. - - True if there are more records, otherwise false. - - - - Advances the reader to the next record. This will not read headers. - You need to call then - for the headers to be read. - - True if there are more records, otherwise false. - - - - Gets the raw field at position (column) index. - - The zero based index of the field. - The raw field. - - - - Gets the raw field at position (column) name. - - The named index of the field. - The raw field. - - - - Gets the raw field at position (column) name. - - The named index of the field. - The zero based index of the field. - The raw field. - - - - Gets the raw field at position (column) index. - - The zero based index of the field. - The raw field. - - - - Gets the raw field at position (column) name. - - The named index of the field. - The raw field. - - - - Gets the raw field at position (column) name and the index - instance of that field. The index is used when there are - multiple columns with the same header name. - - The named index of the field. - The zero based index of the instance of the field. - The raw field. - - - - Gets the field converted to using - the specified . - - The type of the field. - The index of the field. - The field converted to . - - - - Gets the field converted to using - the specified . - - The type of the field. - The named index of the field. - The field converted to . - - - - Gets the field converted to using - the specified . - - The type of the field. - The named index of the field. - The zero based index of the instance of the field. - The field converted to . - - - - Gets the field converted to using - the specified . - - The type of the field. - The index of the field. - The used to convert the field to . - The field converted to . - - - - Gets the field converted to using - the specified . - - The type of the field. - The named index of the field. - The used to convert the field to . - The field converted to . - - - - Gets the field converted to using - the specified . - - The type of the field. - The named index of the field. - The zero based index of the instance of the field. - The used to convert the field to . - The field converted to . - - - - Gets the field converted to T at position (column) index. - - The of the field. - The zero based index of the field. - The field converted to T. - - - - Gets the field converted to T at position (column) name. - - The of the field. - The named index of the field. - The field converted to T. - - - - Gets the field converted to T at position - (column) name and the index instance of that field. The index - is used when there are multiple columns with the same header name. - - - The named index of the field. - The zero based index of the instance of the field. - - - - - Gets the field converted to T at position (column) index using - the given . - - The of the field. - The zero based index of the field. - The used to convert the field to T. - The field converted to T. - - - - Gets the field converted to T at position (column) name using - the given . - - The of the field. - The named index of the field. - The used to convert the field to T. - The field converted to T. - - - - Gets the field converted to T at position - (column) name and the index instance of that field. The index - is used when there are multiple columns with the same header name. - - - The named index of the field. - The zero based index of the instance of the field. - The used to convert the field to T. - The field converted to T. - - - - Gets the field converted to T at position (column) index using - the given . - - The of the field. - The used to convert the field to T. - The zero based index of the field. - The field converted to T. - - - - Gets the field converted to T at position (column) name using - the given . - - The of the field. - The used to convert the field to T. - The named index of the field. - The field converted to T. - - - - Gets the field converted to T at position - (column) name and the index instance of that field. The index - is used when there are multiple columns with the same header name. - - The of the field. - The used to convert the field to T. - The named index of the field. - The zero based index of the instance of the field. - The field converted to T. - - - - Gets the field converted to T at position (column) index. - - The of the field. - The zero based index of the field. - The field converted to type T. - A value indicating if the get was successful. - - - - Gets the field converted to T at position (column) name. - - The of the field. - The named index of the field. - The field converted to T. - A value indicating if the get was successful. - - - - Gets the field converted to T at position - (column) name and the index instance of that field. The index - is used when there are multiple columns with the same header name. - - The of the field. - The named index of the field. - The zero based index of the instance of the field. - The field converted to T. - A value indicating if the get was successful. - - - - Gets the field converted to T at position (column) index - using the specified . - - The of the field. - The zero based index of the field. - The used to convert the field to T. - The field converted to T. - A value indicating if the get was successful. - - - - Gets the field converted to T at position (column) name - using the specified . - - The of the field. - The named index of the field. - The used to convert the field to T. - The field converted to T. - A value indicating if the get was successful. - - - - Gets the field converted to T at position (column) name - using the specified . - - The of the field. - The named index of the field. - The zero based index of the instance of the field. - The used to convert the field to T. - The field converted to T. - A value indicating if the get was successful. - - - - Gets the field converted to T at position (column) index. - - The of the field. - The zero based index of the field. - The field converted to type T. - A value indicating if the get was successful. - - - - Gets the field converted to T at position (column) name. - - The of the field. - The named index of the field. - The field converted to T. - A value indicating if the get was successful. - - - - Gets the field converted to T at position - (column) name and the index instance of that field. The index - is used when there are multiple columns with the same header name. - - - The named index of the field. - The zero based index of the instance of the field. - The field converted to T. - A value indicating if the get was successful. - - - - Gets the field converted to T at position (column) index - using the specified . - - The of the field. - The zero based index of the field. - The used to convert the field to T. - The field converted to T. - A value indicating if the get was successful. - - - - Gets the field converted to T at position (column) name - using the specified . - - The of the field. - The named index of the field. - The used to convert the field to T. - The field converted to T. - A value indicating if the get was successful. - - - - Gets the field converted to T at position (column) name - using the specified . - - The of the field. - The named index of the field. - The zero based index of the instance of the field. - The used to convert the field to T. - The field converted to T. - A value indicating if the get was successful. - - - - Gets the field converted to T at position (column) index - using the specified . - - The of the field. - The used to convert the field to T. - The zero based index of the field. - The field converted to T. - A value indicating if the get was successful. - - - - Gets the field converted to T at position (column) name - using the specified . - - The of the field. - The used to convert the field to T. - The named index of the field. - The field converted to T. - A value indicating if the get was successful. - - - - Gets the field converted to T at position (column) name - using the specified . - - The of the field. - The used to convert the field to T. - The named index of the field. - The zero based index of the instance of the field. - The field converted to T. - A value indicating if the get was successful. - - - - Gets the record converted into T. - - The of the record. - The record converted to T. - - - - Get the record converted into T. - - The of the record. - The anonymous type definition to use for the record. - The record converted to T. - - - - Gets the record. - - The of the record. - The record. - - - - Gets all the records in the CSV file and - converts each to T. The Read method - should not be used when using this. - - The of the record. - An of records. - - - - Gets all the records in the CSV file and converts - each to T. The read method - should not be used when using this. - - The of the record. - The anonymous type definition to use for the records. - An of records. - - - - Gets all the records in the CSV file and - converts each to T. The Read method - should not be used when using this. - - The of the record. - An of records. - - - - Enumerates the records hydrating the given record instance with row data. - The record instance is re-used and not cleared on each enumeration. - This only works for streaming rows. If any methods are called on the projection - that force the evaluation of the IEnumerable, such as ToList(), the entire list - will contain the same instance of the record, which is the last row. - - The type of the record. - The record to fill each enumeration. - An of records. - - - - Gets the index of the field at name if found. - - The name of the field to get the index for. - The index of the field if there are multiple fields with the same name. - A value indicating if the call was initiated from a TryGet. - The index of the field if found, otherwise -1. - Thrown if there is no header record. - Thrown if there isn't a field with name. - - - - Gets the index of the field at name if found. - - The possible names of the field to get the index for. - The index of the field if there are multiple fields with the same name. - A value indicating if the call was initiated from a TryGet. - The index of the field if found, otherwise -1. - Thrown if there is no header record. - Thrown if there isn't a field with name. - - - - Determines if the member for the - can be read. - - The member map. - A value indicating of the member can be read. True if it can, otherwise false. - - - - Determines if the member for the - can be read. - - The reference map. - A value indicating of the member can be read. True if it can, otherwise false. - - - - Performs application-defined tasks associated with freeing, releasing, or resetting unmanaged resources. - - 2 - - - - Performs application-defined tasks associated with freeing, releasing, or resetting unmanaged resources. - - True if the instance needs to be disposed of. - - - - Checks if the reader has been read yet. - - - - - - Parses the named indexes from the header record. - - - - - Defines methods used to serialize data into a CSV file. - - - - - Gets the writing context. - - - - - Gets the configuration. - - - - - Creates a new serializer using the given . - - The to write the CSV file data to. - - - - Creates a new serializer using the given . - - The to write the CSV file data to. - true to leave the reader open after the CsvReader object is disposed, otherwise false. - - - - Creates a new serializer using the given - and . - - The to write the CSV file data to. - The configuration. - - - - Creates a new serializer using the given - and . - - The to write the CSV file data to. - The configuration. - true to leave the reader open after the CsvReader object is disposed, otherwise false. - - - - Writes a record to the CSV file. - - The record to write. - - - - Writes a record to the CSV file. - - The record to write. - - - - Writes a new line to the CSV file. - - - - - Writes a new line to the CSV file. - - - - - Performs application-defined tasks associated with freeing, releasing, or resetting unmanaged resources. - - 2 - - - - Performs application-defined tasks associated with freeing, releasing, or resetting unmanaged resources. - - True if the instance needs to be disposed of. - - - - Sanitizes the field to prevent injection. - - The field to sanitize. - - - - Used to write CSV files. - - - - - Gets the writing context. - - - - - Gets the configuration. - - - - - Creates a new CSV writer using the given . - - The writer used to write the CSV file. - - - - Creates a new CSV writer using the given . - - The writer used to write the CSV file. - true to leave the writer open after the CsvWriter object is disposed, otherwise false. - - - - Creates a new CSV writer using the given . - - The use to write the CSV file. - The configuration. - - - - Creates a new CSV writer using the given . - - The use to write the CSV file. - The configuration. - true to leave the writer open after the CsvWriter object is disposed, otherwise false. - - - - Creates a new CSV writer using the given . - - The serializer. - - - - Writes a field that has already been converted to a - from an . - If the field is null, it won't get written. A type converter - will always return a string, even if field is null. If the - converter returns a null, it means that the converter has already - written data, and the returned value should not be written. - - The converted field to write. - - - - Writes the field to the CSV file. The field - may get quotes added to it. - When all fields are written for a record, - must be called - to complete writing of the current record. - - The field to write. - - - - Writes the field to the CSV file. This will - ignore any need to quote and ignore the - - and just quote based on the shouldQuote - parameter. - When all fields are written for a record, - must be called - to complete writing of the current record. - - The field to write. - True to quote the field, otherwise false. - - - - Writes the field to the CSV file. - When all fields are written for a record, - must be called - to complete writing of the current record. - - The type of the field. - The field to write. - - - - Writes the field to the CSV file. - When all fields are written for a record, - must be called - to complete writing of the current record. - - The type of the field. - The field to write. - The converter used to convert the field into a string. - - - - Writes the field to the CSV file - using the given . - When all fields are written for a record, - must be called - to complete writing of the current record. - - The type of the field. - The type of the converter. - The field to write. - - - - Serializes the row to the . - - - - - Serializes the row to the . - - - - - Ends writing of the current record and starts a new record. - This automatically flushes the writer. - - - - - Ends writing of the current record and starts a new record. - This automatically flushes the writer. - - - - - Writes a comment. - - The comment to write. - - - - Writes the header record from the given members. - - The type of the record. - - - - Writes the header record from the given members. - - The type of the record. - - - - Writes the header record for the given dynamic object. - - The dynamic record to write. - - - - Writes the record to the CSV file. - - The type of the record. - The record to write. - - - - Writes the list of records to the CSV file. - - The list of records to write. - - - - Writes the list of records to the CSV file. - - Record type. - The list of records to write. - - - - Checks if the member can be written. - - The member map that we are checking. - A value indicating if the member can be written. - True if the member can be written, otherwise false. - - - - Gets the type for the record. If the generic type - is an object due to boxing, it will call GetType() - on the record itself. - - The record type. - The record. - - - - Performs application-defined tasks associated with freeing, releasing, or resetting unmanaged resources. - - 2 - - - - Performs application-defined tasks associated with freeing, releasing, or resetting unmanaged resources. - - True if the instance needs to be disposed of. - - - - Creates dynamic records. - - - - - Initializes a new instance. - - The reader. - - - - Creates a of type - that will create a record of the given type using the current - reader row. - - The record type. - - - - Creates a dynamic record of the current reader row. - - - - - Write dynamic records. - - - - - Initializes a new instance using the given writer. - - The writer. - - - - Creates a of type - that will write the given record using the current writer row. - - The record type. - The record. - - - - Writes expando objects. - - - - - Initializes a new instance using the given writer. - - The writer. - - - - Creates a of type - that will write the given record using the current writer row. - - The record type. - The record. - - - - Manages expression creation. - - - - - Initializes a new instance using the given reader. - - The reader. - - - - Initializes a new instance using the given writer. - - The writer. - - - - Creates the member assignments for the given . - - The mapping to create the assignments for. - The assignments that will be added to from the mapping. - - - - Creates an expression the represents getting the field for the given - member and converting it to the member's type. - - The mapping for the member. - - - - Creates a member expression for the given member on the record. - This will recursively traverse the mapping to find the member - and create a safe member accessor for each level as it goes. - - The current member expression. - The mapping to look for the member to map on. - The member map to look for on the mapping. - An Expression to access the given member. - - - - Creates an instance of the given type using (in turn using the ObjectResolver), then assigns - the given member assignments to that instance. - - The type of the record we're creating. - The member assignments that will be assigned to the created instance. - A representing the instance creation and assignments. - - - - Creates objects. - - - - - Initializes a new instnace using the given reader. - - - - - - Creates a of type - that will create a record of the given type using the current - reader row. - - The record type. - - - - Creates the constructor arguments used to create a type. - - The mapping to create the arguments for. - The arguments that will be added to the mapping. - - - - Writes objects. - - - - - Initializes a new instance using the given writer. - - The writer. - - - - Creates a of type - that will write the given record using the current writer row. - - The record type. - The record. - - - - Creates primitive records. - - - - - Initializes a new instance using the given reader. - - The reader. - - - - Creates a of type - that will create a record of the given type using the current - reader row. - - The record type. - - - - Writes primitives. - - - - - Initializes a new instance using the given writer. - - The writer. - - - - Creates a of type - that will write the given record using the current writer row. - - The record type. - The record. - - - - Base implementation for classes that create records. - - - - - The reader. - - - - - The expression manager. - - - - - Initializes a new instance using the given reader. - - The reader. - - - - Create a record of the given type using the current row. - - The record type. - - - - Create a record of the given type using the current row. - - The record type. - - - - Gets the delegate to create a record for the given record type. - If the delegate doesn't exist, one will be created and cached. - - The record type. - - - - Creates a of type - that will create a record of the given type using the current - reader row. - - The record type. - - - - Factory to create record creators. - - - - - Initializes a new instance using the given reader. - - The reader. - - - - Creates a record creator for the given record type. - - The record type. - - - - Hydrates members of an existing record. - - - - - Creates a new instance using the given reader. - - The reader. - - - - Hydrates members of the given record using the current reader row. - - The record type. - The record. - - - - Gets the action delegate used to hydrate a custom class object's members with data from the reader. - - The record type. - - - - Creates the action delegate used to hydrate a record's members with data from the reader. - - The record type. - - - - Manages record manipulation. - - - - - Initializes a new instance using the given reader. - - - - - - Initializes a new instance using the given writer. - - The writer. - - - - Creates a record of the given type using the current reader row. - - The type of record to create. - - - - Creates a record of the given type using the current reader row. - - The type of record to create. - - - - Hydrates the given record using the current reader row. - - The type of the record. - The record to hydrate. - - - - Writes the given record to the current writer row. - - The type of the record. - The record. - - - - Base implementation for classes that write records. - - - - - Gets the writer. - - - - - The expression manager. - - - - - Initializes a new instance using the given writer. - - The writer. - - - - Writes the record to the current row. - - Type of the record. - The record. - - - - Gets the delegate to write the given record. - If the delegate doesn't exist, one will be created and cached. - - The record type. - The record. - - - - Creates a of type - that will write the given record using the current writer row. - - The record type. - The record. - - - - Combines the delegates into a single multicast delegate. - This is needed because Silverlight doesn't have the - Delegate.Combine( params Delegate[] ) overload. - - The delegates to combine. - A multicast delegate combined from the given delegates. - - - - Factory to create record writers. - - - - - Initializes a new instance using the given writer. - - The writer. - - - - Creates a new record writer for the given record. - - The type of the record. - The record. - - - - Creates CsvHelper classes. - - - - - Creates an . - - The text reader to use for the csv parser. - The configuration to use for the csv parser. - The created parser. - - - - Creates an . - - The text reader to use for the csv parser. - The created parser. - - - - Creates an . - - The text reader to use for the csv reader. - The configuration to use for the reader. - The created reader. - - - - Creates an . - - The text reader to use for the csv reader. - The created reader. - - - - Creates an . - - The parser used to create the reader. - The created reader. - - - - Creates an . - - The text writer to use for the csv writer. - The configuration to use for the writer. - The created writer. - - - - Creates an . - - The text writer to use for the csv writer. - The created writer. - - - - Access point for fluent interface to dynamically build a - - Type you will be making a class map for - Options to further configure the - - - - Defines methods used to create - CsvHelper classes. - - - - - Creates an . - - The text reader to use for the csv parser. - The configuration to use for the csv parser. - The created parser. - - - - Creates an . - - The text reader to use for the csv parser. - The created parser. - - - - Creates an . - - The text reader to use for the csv reader. - The configuration to use for the reader. - The created reader. - - - - Creates an . - - The text reader to use for the csv reader. - The created reader. - - - - Creates an . - - The parser used to create the reader. - The created reader. - - - - Creates an . - - The text writer to use for the csv writer. - The configuration to use for the writer. - The created writer. - - - - Creates an . - - The text writer to use for the csv writer. - The created writer. - - - - Provides a fluent interface for dynamically creating s - - Type of class to map - Next available options - - - - Defines methods used to read a field in a CSV file. - - - - - Gets the reading context. - - - - - Gets a value indicating if the buffer is empty. - True if the buffer is empty, otherwise false. - - - - - Fills the buffer. - - True if there is more data left. - False if all the data has been read. - - - - Fills the buffer asynchronously. - - True if there is more data left. - False if all the data has been read. - - - - Gets the next char as an . - - - - - Gets the field. This will append any reading progress. - - The current field. - - - - Appends the current reading progress. - - - - - Move's the buffer position according to the given offset. - - The offset to move the buffer. - - - - Sets the start of the field to the current buffer position. - - An offset for the field start. - The offset should be less than 1. - - - - Sets the end of the field to the current buffer position. - - An offset for the field start. - The offset should be less than 1. - - - - Sets the raw recodr start to the current buffer position; - - An offset for the raw record start. - The offset should be less than 1. - - - - Sets the raw record end to the current buffer position. - - An offset for the raw record end. - The offset should be less than 1. - - - - Defines the functionality of a class that creates objects - from a given type. - - - - - A value indicating if the resolver's - returns false that an object will still be created using - CsvHelper's object creation. True to fallback, otherwise false. - Default value is true. - - - - - A value indicating if the resolver is able to resolve - the given type. True if the type can be resolved, - otherwise false. - - - - - The function that creates an object from a given type. - - - - - Creates an object from the given type using the - function. If is false, the object will be - created using CsvHelper's default object creation. If - is false, an exception is thrown. - - The type to create an instance from. The created object - may not be the same type as the given type. - Constructor arguments used to create the type. - - - - Creates an object from the given type using the - function. If is false, the object will be - created using CsvHelper's default object creation. If - is false, an exception is thrown. - - The type to create an instance from. The created object - may not be the same type as the given type. - Constructor arguments used to create the type. - - - - Defines methods used the parse a CSV file. - - - - - Gets the reading context. - - - - - Gets the configuration. - - - - - Gets the . - - - - - Reads a record from the CSV file. - - A of fields for the record read. - - - - Reads a record from the CSV file asynchronously. - - A of fields for the record read. - - - - Defines methods used to read parsed data - from a CSV file. - - - - - Gets the parser. - - - - - Reads the header record without reading the first row. - - True if there are more records, otherwise false. - - - - Advances the reader to the next record. This will not read headers. - You need to call then - for the headers to be read. - - True if there are more records, otherwise false. - - - - Advances the reader to the next record. This will not read headers. - You need to call then - for the headers to be read. - - True if there are more records, otherwise false. - - - - Gets all the records in the CSV file and - converts each to T. The Read method - should not be used when using this. - - The of the record. - An of records. - - - - Gets all the records in the CSV file and converts - each to T. The read method - should not be used when using this. - - The of the record. - The anonymous type definition to use for the records. - An of records. - - - - Gets all the records in the CSV file and - converts each to T. The Read method - should not be used when using this. - - The of the record. - An of records. - - - - Enumerates the records hydrating the given record instance with row data. - The record instance is re-used and not cleared on each enumeration. - This only works for streaming rows. If any methods are called on the projection - that force the evaluation of the IEnumerable, such as ToList(), the entire list - will contain the same instance of the record, which is the last row. - - The type of the record. - The record to fill each enumeration. - An of records. - - - - Defines methods used to read parsed data - from a CSV file row. - - - - - Gets the reading context. - - - - - Gets or sets the configuration. - - - - - Gets the raw field at position (column) index. - - The zero based index of the field. - The raw field. - - - - Gets the raw field at position (column) name. - - The named index of the field. - The raw field. - - - - Gets the raw field at position (column) name. - - The named index of the field. - The zero based index of the field. - The raw field. - - - - Gets the raw field at position (column) index. - - The zero based index of the field. - The raw field. - - - - Gets the raw field at position (column) name. - - The named index of the field. - The raw field. - - - - Gets the raw field at position (column) name and the index - instance of that field. The index is used when there are - multiple columns with the same header name. - - The named index of the field. - The zero based index of the instance of the field. - The raw field. - - - - Gets the field converted to using - the specified . - - The type of the field. - The index of the field. - The field converted to . - - - - Gets the field converted to using - the specified . - - The type of the field. - The named index of the field. - The field converted to . - - - - Gets the field converted to using - the specified . - - The type of the field. - The named index of the field. - The zero based index of the instance of the field. - The field converted to . - - - - Gets the field converted to using - the specified . - - The type of the field. - The index of the field. - The used to convert the field to . - The field converted to . - - - - Gets the field converted to using - the specified . - - The type of the field. - The named index of the field. - The used to convert the field to . - The field converted to . - - - - Gets the field converted to using - the specified . - - The type of the field. - The named index of the field. - The zero based index of the instance of the field. - The used to convert the field to . - The field converted to . - - - - Gets the field converted to T at position (column) index. - - The of the field. - The zero based index of the field. - The field converted to T. - - - - Gets the field converted to T at position (column) name. - - The of the field. - The named index of the field. - The field converted to T. - - - - Gets the field converted to T at position - (column) name and the index instance of that field. The index - is used when there are multiple columns with the same header name. - - - The named index of the field. - The zero based index of the instance of the field. - - - - - Gets the field converted to T at position (column) index using - the given . - - The of the field. - The zero based index of the field. - The used to convert the field to T. - The field converted to T. - - - - Gets the field converted to T at position (column) name using - the given . - - The of the field. - The named index of the field. - The used to convert the field to T. - The field converted to T. - - - - Gets the field converted to T at position - (column) name and the index instance of that field. The index - is used when there are multiple columns with the same header name. - - The of the field. - The named index of the field. - The zero based index of the instance of the field. - The used to convert the field to T. - The field converted to T. - - - - Gets the field converted to T at position (column) index using - the given . - - The of the field. - The used to convert the field to T. - The zero based index of the field. - The field converted to T. - - - - Gets the field converted to T at position (column) name using - the given . - - The of the field. - The used to convert the field to T. - The named index of the field. - The field converted to T. - - - - Gets the field converted to T at position - (column) name and the index instance of that field. The index - is used when there are multiple columns with the same header name. - - The of the field. - The used to convert the field to T. - The named index of the field. - The zero based index of the instance of the field. - The field converted to T. - - - - Gets the field converted to T at position (column) index. - - The of the field. - The zero based index of the field. - The field converted to type T. - A value indicating if the get was successful. - - - - Gets the field converted to T at position (column) name. - - The of the field. - The named index of the field. - The field converted to T. - A value indicating if the get was successful. - - - - Gets the field converted to T at position - (column) name and the index instance of that field. The index - is used when there are multiple columns with the same header name. - - The of the field. - The named index of the field. - The zero based index of the instance of the field. - The field converted to T. - A value indicating if the get was successful. - - - - Gets the field converted to T at position (column) index - using the specified . - - The of the field. - The zero based index of the field. - The used to convert the field to T. - The field converted to T. - A value indicating if the get was successful. - - - - Gets the field converted to T at position (column) name - using the specified . - - The of the field. - The named index of the field. - The used to convert the field to T. - The field converted to T. - A value indicating if the get was successful. - - - - Gets the field converted to T at position (column) name - using the specified . - - The of the field. - The named index of the field. - The zero based index of the instance of the field. - The used to convert the field to T. - The field converted to T. - A value indicating if the get was successful. - - - - Gets the field converted to T at position (column) index. - - The of the field. - The zero based index of the field. - The field converted to type T. - A value indicating if the get was successful. - - - - Gets the field converted to T at position (column) name. - - The of the field. - The named index of the field. - The field converted to T. - A value indicating if the get was successful. - - - - Gets the field converted to T at position - (column) name and the index instance of that field. The index - is used when there are multiple columns with the same header name. - - - The named index of the field. - The zero based index of the instance of the field. - The field converted to T. - A value indicating if the get was successful. - - - - Gets the field converted to T at position (column) index - using the specified . - - The of the field. - The zero based index of the field. - The used to convert the field to T. - The field converted to T. - A value indicating if the get was successful. - - - - Gets the field converted to T at position (column) name - using the specified . - - The of the field. - The named index of the field. - The used to convert the field to T. - The field converted to T. - A value indicating if the get was successful. - - - - Gets the field converted to T at position (column) name - using the specified . - - The of the field. - The named index of the field. - The zero based index of the instance of the field. - The used to convert the field to T. - The field converted to T. - A value indicating if the get was successful. - - - - Gets the field converted to T at position (column) index - using the specified . - - The of the field. - The used to convert the field to T. - The zero based index of the field. - The field converted to T. - A value indicating if the get was successful. - - - - Gets the field converted to T at position (column) name - using the specified . - - The of the field. - The used to convert the field to T. - The named index of the field. - The field converted to T. - A value indicating if the get was successful. - - - - Gets the field converted to T at position (column) name - using the specified . - - The of the field. - The used to convert the field to T. - The named index of the field. - The zero based index of the instance of the field. - The field converted to T. - A value indicating if the get was successful. - - - - Gets the record converted into T. - - The of the record. - The record converted to T. - - - - Get the record converted into T. - - The of the record. - The anonymous type definition to use for the record. - The record converted to T. - - - - Gets the record. - - The of the record. - The record. - - - - Defines methods used to serialize data into a CSV file. - - - - - Gets the writing context. - - - - - Gets the configuration. - - - - - Writes a record to the CSV file. - - The record to write. - - - - Writes a record to the CSV file. - - The record to write. - - - - Writes a new line to the CSV file. - - - - - Writes a new line to the CSV file. - - - - - Defines methods used to write to a CSV file. - - - - - Serializes the row to the . - - - - - Serializes the row to the . - - - - - Ends writing of the current record and starts a new record. - This automatically flushes the writer. - - - - - Ends writing of the current record and starts a new record. - This automatically flushes the writer. - - - - - Writes the list of records to the CSV file. - - The list of records to write. - - - - Writes the list of records to the CSV file. - - Record type. - The list of records to write. - - - - Defines methods used to write a CSV row. - - - - - Gets the writing context. - - - - - Gets or sets the configuration. - - - - - Writes a field that has already been converted to a - from an . - If the field is null, it won't get written. A type converter - will always return a string, even if field is null. If the - converter returns a null, it means that the converter has already - written data, and the returned value should not be written. - - The converted field to write. - - - - Writes the field to the CSV file. The field - may get quotes added to it. - When all fields are written for a record, - must be called - to complete writing of the current record. - - The field to write. - - - - Writes the field to the CSV file. This will - ignore any need to quote and ignore the - - and just quote based on the shouldQuote - parameter. - When all fields are written for a record, - must be called - to complete writing of the current record. - - The field to write. - True to quote the field, otherwise false. - - - - Writes the field to the CSV file. - When all fields are written for a record, - must be called - to complete writing of the current record. - - The type of the field. - The field to write. - - - - Writes the field to the CSV file. - When all fields are written for a record, - must be called - to complete writing of the current record. - - The type of the field. - The field to write. - The converter used to convert the field into a string. - - - - Writes the field to the CSV file - using the given . - When all fields are written for a record, - must be called - to complete writing of the current record. - - The type of the field. - The type of the converter. - The field to write. - - - - Writes a comment. - - The comment to write. - - - - Writes the header record from the given members. - - The type of the record. - - - - Writes the header record from the given members. - - The type of the record. - - - - Writes the record to the CSV file. - - The type of the record. - The record to write. - - - - Represents an error caused because a field is missing - in the header while reading a CSV file. - - - - - Initializes a new instance of the class. - - The reading context. - - - - Initializes a new instance of the class - with a specified error message. - - The reading context. - The message that describes the error. - - - - Initializes a new instance of the class - with a specified error message and a reference to the inner exception that - is the cause of this exception. - - The reading context. - The error message that explains the reason for the exception. - The exception that is the cause of the current exception, or a null reference (Nothing in Visual Basic) if no inner exception is specified. - - - - Creates objects from a given type. - - - - - Gets or sets the current resolver. - - - - - A value indicating if the resolver's - returns false that an object will still be created using - CsvHelper's object creation. True to fallback, otherwise false. - Default value is true. - - - - - A function that returns a value indicating if the resolver - is able to resolve the given type. True if the type can be - resolved, otherwise false. - - - - - The function that creates an object from a given type. - - - - - Creates an instance of the object resolver using default values. - - - - - Creates an instance of the object resolver using the given can create function - and creat function. - - A function that returns a value indicating if the resolver - is able to resolve the given type. True if the type can be - resolved, otherwise false. - The function that creates an object from a given type. - A value indicating if the resolver's - returns false that an object will still be created using - CsvHelper's object creation. True to fallback, otherwise false. - Default value is true. - - - - Creates an object from the given type using the - function. If is false, the object will be - created using CsvHelper's default object creation. If - is false, an exception is thrown. - - The type to create an instance from. The created object - may not be the same type as the given type. - Constructor arguments used to create the type. - - - - Creates an object from the given type using the - function. If is false, the object will be - created using CsvHelper's default object creation. If - is false, an exception is thrown. - - The type to create an instance from. The created object - may not be the same type as the given type. - Constructor arguments used to create the type. - - - - Represents errors that occur while parsing a CSV file. - - - - - Initializes a new instance of the class. - - The reading context. - - - - Initializes a new instance of the class - with a specified error message. - - The reading context. - The message that describes the error. - - - - Initializes a new instance of the class - with a specified error message and a reference to the inner exception that - is the cause of this exception. - - The reading context. - The error message that explains the reason for the exception. - The exception that is the cause of the current exception, or a null reference (Nothing in Visual Basic) if no inner exception is specified. - - - - Represents errors that occur while reading a CSV file. - - - - - Initializes a new instance of the class. - - The reading context. - - - - Initializes a new instance of the class - with a specified error message. - - The reading context. - The message that describes the error. - - - - Initializes a new instance of the class - with a specified error message and a reference to the inner exception that - is the cause of this exception. - - The reading context. - The error message that explains the reason for the exception. - The exception that is the cause of the current exception, or a null reference (Nothing in Visual Basic) if no inner exception is specified. - - - - CSV reading state. - - - - - Gets the raw record builder. - - - - - Gets the field builder. - - - - - Gets the record builder. - - - - - Gets the named indexes. - - - - - Getse the named indexes cache. - - - - - Gets the type converter options cache. - - - - - Gets the create record functions. - - - - - Gets the hydrate record actions. - - - - - Gets the reusable member map data. - - - - - Gets the that is read from. - - - - - Gets a value indicating if the - should be left open when disposing. - - - - - Gets the buffer used to store data from the . - - - - - Gets the buffer position. - - - - - Gets the field start position. - - - - - Gets the field end position. - - - - - Gets the raw record start position. - - - - - Gets the raw record end position. - - - - - Gets the number of characters read from the . - - - - - Gets the character position. - - - - - Gets the byte position. - - - - - Gets a value indicating if the field is bad. - True if the field is bad, otherwise false. - A field is bad if a quote is found in a field - that isn't escaped. - - - - - Gets the record. - - - - - Gets the row of the CSV file that the parser is currently on. - - - - - Gets the row of the CSV file that the parser is currently on. - This is the actual file row. - - - - - Gets a value indicating if reading has begun. - - - - - Gets the header record. - - - - - Gets the current index. - - - - - Gets the column count. - - - - - Gets the configuration. - - - - - Gets the configuration. - - - - - Gets all the characters of the record including - quotes, delimeters, and line endings. - - - - - Gets the field. - - - - - Initializes a new instance. - - The reader. - The configuration. - A value indicating if the TextReader should be left open when disposing. - - - - Clears the specified caches. - - The caches to clear. - - - - Performs application-defined tasks associated with freeing, releasing, or resetting unmanaged resources. - - 2 - - - - Performs application-defined tasks associated with freeing, releasing, or resetting unmanaged resources. - - True if the instance needs to be disposed of. - - - - Builds CSV records. - - - - - The number of records. - - - - - The total record capacity. - - - - - Creates a new using defaults. - - - - - Creatse a new using the given capacity. - - The initial capacity. - - - - Adds a new field to the . - - The field to add. - The current instance of the . - - - - Clears the records. - - The current instance of the . - - - - Returns the record as an . - - The record as an . - - - - Extensions to help with reflection. - - - - - Gets the type from the member. - - The member to get the type from. - The type. - - - - Gets a member expression for the member. - - The member to get the expression for. - The member expression. - The member expression. - - - - Gets a value indicating if the given type is anonymous. - True for anonymous, otherwise false. - - The type. - - - - Gets a value indicating if the given type has a parameterless constructor. - True if it has a parameterless constructor, otherwise false. - - The type. - - - - Gets a value indicating if the given type has any constructors. - - The type. - - - - Gets the constructor that contains the most parameters. - - The type. - - - - Gets a value indicating if the type is a user defined struct. - True if it is a user defined struct, otherwise false. - - The type. - - - - Common reflection tasks. - - - - - Creates an instance of type T using the current . - - The type of instance to create. - The constructor arguments. - A new instance of type T. - - - - Creates an instance of the specified type using the current . - - The type of instance to create. - The constructor arguments. - A new instance of the specified type. - - - - Creates an instance of the specified type without using the - current . - - The type of instance to create. - The constructor arguments. - A new instance of the specified type. - - - - Gets the from the type where the property was declared. - - The type the property belongs to. - The property to search. - Flags for how the property is retrieved. - - - - Gets the property from the expression. - - The type of the model. - The type of the property. - The expression. - The for the expression. - - - - Gets the member inheritance chain as a stack. - - The type of the model. - The type of the property. - The member expression. - The inheritance chain for the given member expression as a stack. - - - - Converts an to and from a . - - - - - Converts the string to an object. - - The string to convert to an object. - The for the current record. - The for the member being created. - The object created from the string. - - - - Converts a to and from a . - - - - - Converts the string to an object. - - The string to convert to an object. - The for the current record. - The for the member being created. - The object created from the string. - - - - Converts a to and from a . - - - - - Creates a new ByteArrayConverter using the given . - - The options. - - - - Converts the object to a string. - - The object to convert to a string. - The for the current record. - The for the member being written. - The string representation of the object. - - - - Converts the string to an object. - - The string to convert to an object. - The for the current record. - The for the member being created. - The object created from the string. - - - - Options for converting byte arrays. - - - - - No options. - - - - - Hexadecimal encoding. - - - - - Base64 encoding. - - - - - Use dashes in between hex values. - - - - - Prefix hex number with 0x. - - - - - Converts a to and from a . - - - - - Converts the string to an object. - - The string to convert to an object. - The for the current record. - The for the member being created. - The object created from the string. - - - - Converts a to and from a . - - - - - Converts the string to an object. - - The string to convert to an object. - The for the current record. - The for the member being created. - The object created from the string. - - - - Converts a to and from a . - - - - - Converts the string to an object. - - The string to convert to an object. - The for the current record. - The for the member being created. - The object created from the string. - - - - Converts a to and from a . - - - - - Converts the string to an object. - - The string to convert to an object. - The for the current record. - The for the member being created. - The object created from the string. - - - - Converts a to and from a . - - - - - Converts the string to an object. - - The string to convert to an object. - The for the current record. - The for the member being created. - The object created from the string. - - - - Converts a to and from a . - - - - - Converts the string to an object. - - The string to convert to an object. - The for the current record. - The for the member being created. - The object created from the string. - - - - Converts an to and from a . - - - - - Converts the object to a string. - - The object to convert to a string. - The for the current record. - The for the member being written. - The string representation of the object. - - - - Converts the string to an object. - - The string to convert to an object. - The for the current record. - The for the member being created. - The object created from the string. - - - - Converts a to and from a . - - - - - Converts the string to an object. - - The string to convert to an object. - The for the current record. - The for the member being created. - The object created from the string. - - - - Converts an to and from a . - - - - - Creates a new for the given . - - The type of the Enum. - - - - Converts the string to an object. - - The string to convert to an object. - The for the current record. - The for the member being created. - The object created from the string. - - - - Throws an exception when used. This is here so that it's apparent - that there is no support for type coversion. A custom - converter will need to be created to have a field convert to and - from an IEnumerable. - - - - - Throws an exception. - - The string to convert to an object. - The for the current record. - The for the member being created. - The object created from the string. - - - - Throws an exception. - - The object to convert to a string. - The for the current record. - The for the member being written. - The string representation of the object. - - - - Converts a to and from a . - - - - - Converts the string to an object. - - The string to convert to an object. - The for the current record. - The for the member being created. - The object created from the string. - - - - Converts an to and from a . - - - - - Converts the object to a string. - - The object to convert to a string. - The for the current record. - The for the member being written. - The string representation of the object. - - - - Converts the string to an object. - - The string to convert to an object. - The for the current record. - The for the member being created. - The object created from the string. - - - - Converts an to and from a . - - - - - Converts the string to an object. - - The string to convert to an object. - The for the current record. - The for the member being created. - The object created from the string. - - - - Converts an to and from a . - - - - - Converts the object to a string. - - The object to convert to a string. - - - The string representation of the object. - - - - Converts the string to an object. - - The string to convert to an object. - The for the current record. - The for the member being created. - The object created from the string. - - - - Converts an to and from a . - - - - - Converts the string to an object. - - The string to convert to an object. - The for the current record. - The for the member being created. - The object created from the string. - - - - Converts a to and from a . - - - - - Converts the string to an object. - - The string to convert to an object. - The for the current record. - The for the member being created. - The object created from the string. - - - - Converts an to and from a . - - - - - Converts the string to an object. - - The string to convert to an object. - The for the current record. - The for the member being created. - The object created from the string. - - - - Converts an to and from a . - - - - - Converts the string to an object. - - The string to convert to an object. - The for the current record. - The for the member being created. - The object created from the string. - - - - Converts objects to and from strings. - - - - - Converts the object to a string. - - The object to convert to a string. - The for the current record. - The for the member being written. - The string representation of the object. - - - - Converts the string to an object. - - The string to convert to an object. - The for the current record. - The for the member being created. - The object created from the string. - - - - Converts a to and from a . - - - - - Gets the type of the nullable. - - - The type of the nullable. - - - - - Gets the underlying type of the nullable. - - - The underlying type. - - - - - Gets the type converter for the underlying type. - - - The type converter. - - - - - Creates a new for the given . - - The nullable type. - The type converter factory. - type is not a nullable type. - - - - Converts the string to an object. - - The string to convert to an object. - The for the current record. - The for the member being created. - The object created from the string. - - - - Converts the object to a string. - - The object to convert to a string. - - - The string representation of the object. - - - - Converts a to and from a . - - - - - Converts the string to an object. - - The string to convert to an object. - The for the current record. - The for the member being created. - The object created from the string. - - - - Converts a to and from a . - - - - - Converts the string to an object. - - The string to convert to an object. - The for the current record. - The for the member being created. - The object created from the string. - - - - Converts a to and from a . - - - - - Converts the string to an object. - - The string to convert to an object. - The for the current record. - The for the member being created. - The object created from the string. - - - - Converts a to and from a . - - - - - Converts the string to an object. - - The string to convert to an object. - The for the current record. - The for the member being created. - The object created from the string. - - - - Caches s for a given type. - - - - - Initializes the class. - - - - - Adds the for the given . - - The type the converter converts. - The type converter that converts the type. - - - - Adds the for the given . - - The type the converter converts. - The type converter that converts the type. - - - - Removes the for the given . - - The type to remove the converter for. - - - - Removes the for the given . - - The type to remove the converter for. - - - - Gets the converter for the given . - - The type to get the converter for. - The for the given . - - - - Gets the converter for the given . - - The type to get the converter for. - The for the given . - - - - Represents errors that occur while reading a CSV file. - - - - - The text used in ConvertFromString. - - - - - The value used in ConvertToString. - - - - - The type converter. - - - - - The member map data used in ConvertFromString and ConvertToString. - - - - - Initializes a new instance of the class. - - The type converter. - The member map data. - The text. - The reading context. - - - - Initializes a new instance of the class. - - The type converter. - The member map data. - The value. - The writing context. - - - - Initializes a new instance of the class - with a specified error message. - - The type converter. - The member map data. - The text. - The reading context. - The message that describes the error. - - - - Initializes a new instance of the class - with a specified error message. - - The type converter. - The member map data. - The value. - The writing context. - The message that describes the error. - - - - Initializes a new instance of the class - with a specified error message and a reference to the inner exception that - is the cause of this exception. - - The type converter. - The member map data. - The text. - The reading context. - The error message that explains the reason for the exception. - The exception that is the cause of the current exception, or a null reference (Nothing in Visual Basic) if no inner exception is specified. - - - - Initializes a new instance of the class - with a specified error message and a reference to the inner exception that - is the cause of this exception. - - The type converter. - The member map data. - The value. - The writing context. - The error message that explains the reason for the exception. - The exception that is the cause of the current exception, or a null reference (Nothing in Visual Basic) if no inner exception is specified. - - - - Options used when doing type conversion. - - - - - Gets or sets the culture info. - - - - - Gets or sets the date time style. - - - - - Gets or sets the time span style. - - - - - Gets or sets the number style. - - - - - Gets or sets the string format. - - - - - Gets the list of values that can be - used to represent a boolean of true. - - - - - Gets the list of values that can be - used to represent a boolean of false. - - - - - Gets the list of values that can be used to represent a null value. - - - - - Merges TypeConverterOptions by applying the values of sources in order on to each other. - The first object is the source object. - - The sources that will be applied. - The updated source object. - - - - Caches for a given type. - - - - - Adds the for the given . - - The type the options are for. - The options. - - - - Adds the for the given . - - The type the options are for. - The options. - - - - Removes the for the given type. - - The type to remove the options for. - - - - Removes the for the given type. - - The type to remove the options for. - - - - Get the for the given . - - The type the options are for. - The options for the given type. - - - - Get the for the given . - - The type the options are for. - The options for the given type. - - - - Converts a to and from a . - - - - - Converts the string to an object. - - The string to convert to an object. - The for the current record. - The for the member being created. - The object created from the string. - - - - Converts a to and from a . - - - - - Converts the string to an object. - - The string to convert to an object. - The for the current record. - The for the member being created. - The object created from the string. - - - - Converts a to and from a . - - - - - Converts the string to an object. - - The string to convert to an object. - The for the current record. - The for the member being created. - The object created from the string. - - - - Represents a user supplied validation failure. - - - - - Initializes a new instance of the class. - - The reading context. - - - - Initializes a new instance of the class - with a specified error message. - - The reading context. - The message that describes the error. - - - - Initializes a new instance of the class - with a specified error message and a reference to the inner exception that - is the cause of this exception. - - The reading context. - The error message that explains the reason for the exception. - The exception that is the cause of the current exception, or a null reference (Nothing in Visual Basic) if no inner exception is specified. - - - - Represents errors that occur while writing a CSV file. - - - - - Initializes a new instance of the class. - - The writing context. - - - - Initializes a new instance of the class - with a specified error message. - - The writing context. - The message that describes the error. - - - - Initializes a new instance of the class - with a specified error message and a reference to the inner exception that - is the cause of this exception. - - The writing context. - The error message that explains the reason for the exception. - The exception that is the cause of the current exception, or a null reference (Nothing in Visual Basic) if no inner exception is specified. - - - - CSV writing state. - - - - - Gets the type actions. - - - - - Gets the type converter options. - - - - - Gets or sets the reusable member map data. - - - - - Gets the writer configuration. - - - - - Gets the serializer configuration. - - - - - Gets the . - - - - - Gets a value indicating if the - should be left open when disposing. - - - - - Gets the current row. - - - - - Get the current record; - - - - - Gets a value indicating if the header has been written. - - - - - Gets a value indicating if a record has been written. - - - - - Initializes a new instance. - - The writer. - The configuration. - A value indicating if the TextWriter should be left open. - - - - Clears the specified caches. - - The caches to clear. - - - - Performs application-defined tasks associated with freeing, releasing, or resetting unmanaged resources. - - 2 - - - - Performs application-defined tasks associated with freeing, releasing, or resetting unmanaged resources. - - True if the instance needs to be disposed of. - - - diff --git a/packages/CsvHelper.8.0.0-beta01/lib/netstandard2.0/CsvHelper.dll b/packages/CsvHelper.8.0.0-beta01/lib/netstandard2.0/CsvHelper.dll deleted file mode 100644 index ac8f6c6d..00000000 Binary files a/packages/CsvHelper.8.0.0-beta01/lib/netstandard2.0/CsvHelper.dll and /dev/null differ diff --git a/packages/CsvHelper.8.0.0-beta01/lib/netstandard2.0/CsvHelper.xml b/packages/CsvHelper.8.0.0-beta01/lib/netstandard2.0/CsvHelper.xml deleted file mode 100644 index dfa47a5d..00000000 --- a/packages/CsvHelper.8.0.0-beta01/lib/netstandard2.0/CsvHelper.xml +++ /dev/null @@ -1,6687 +0,0 @@ - - - - CsvHelper - - - - - Represents errors that occur due to bad data. - - - - - Initializes a new instance of the class. - - The reading context. - - - - Initializes a new instance of the class - with a specified error message. - - The reading context. - The message that describes the error. - - - - Initializes a new instance of the class - with a specified error message and a reference to the inner exception that - is the cause of this exception. - - The reading context. - The error message that explains the reason for the exception. - The exception that is the cause of the current exception, or a null reference (Nothing in Visual Basic) if no inner exception is specified. - - - - Types of caches. - - - - - None. - - - - - Named index. - - - - - Delegate that creates objects when reading. - - - - - Delegate that writes objects to strings when writing. - - - - - Type converter options. - - - - - Raw record. - - - - - The string values used to represent a boolean false when converting. - - - - - Gets the false values. - - - - - The string values used to represent a boolean false when converting. - - The false values. - - - - The string values used to represent a boolean false when converting. - - The false values. - - - - The string values used to represent a boolean true when converting. - - - - - Gets the true values. - - - - - The string values used to represent a boolean true when converting. - - - - - - The string values used to represent a boolean true when converting. - - - - - - The constant value that will be used for every record when - reading and writing. This value will always be used no matter - what other mapping configurations are specified. - - - - - Gets the constant. - - - - - The constant value that will be used for every record when - reading and writing. This value will always be used no matter - what other mapping configurations are specified. - - The constant. - - - - The used when type converting. - This will override the global - setting. - - - - - Gets the culture info. - - - - - The used when type converting. - This will override the global - setting. - - The culture. - - - - The to use when type converting. - This is used when doing any conversions. - - - - - Gets the date time styles. - - - - - The to use when type converting. - This is used when doing any conversions. - - The date time styles. - - - - The default value that will be used when reading when - the CSV field is empty. - - - - - Gets the default value. - - - - - The default value that will be used when reading when - the CSV field is empty. - - The default value - - - - The string format to be used when type converting. - - - - - Gets the formats. - - - - - The string format to be used when type converting. - - The format. - - - - The string format to be used when type converting. - - The formats. - - - - Appends a prefix to the header of each field of the reference member. - - - - - Gets the prefix. - - - - - Appends a prefix to the header of each field of the reference member. - - - - - Appends a prefix to the header of each field of the reference member. - - The prefix. - - - - Ignore the member when reading and writing. - If this member has already been mapped as a reference - member, either by a class map, or by automapping, calling - this method will not ingore all the child members down the - tree that have already been mapped. - - - - - When reading, is used to get the field at - the given index. When writing, the fields - will be written in the order of the field - indexes. - - - - - Gets the index. - - - - - Gets the index end. - - - - - When reading, is used to get the field at - the given index. When writing, the fields - will be written in the order of the field - indexes. - - The index. - The index end. - - - - When reading, is used to get the field - at the index of the name if there was a - header specified. It will look for the - first name match in the order listed. - When writing, sets the name of the - field in the header record. - The first name will be used. - - - - - Gets the names. - - - - - When reading, is used to get the field - at the index of the name if there was a - header specified. It will look for the - first name match in the order listed. - When writing, sets the name of the - field in the header record. - The first name will be used. - - The name - - - - When reading, is used to get the field - at the index of the name if there was a - header specified. It will look for the - first name match in the order listed. - When writing, sets the name of the - field in the header record. - The first name will be used. - - The names. - - - - When reading, is used to get the - index of the name used when there - are multiple names that are the same. - - - - - The name index. - - - - - When reading, is used to get the - index of the name used when there - are multiple names that are the same. - - The name index. - - - - The string values used to represent null when converting. - - - - - Gets the null values. - - - - - The string values used to represent null when converting. - - The null values. - - - - The string values used to represent null when converting. - - The null values. - - - - The to use when type converting. - This is used when doing any number conversions. - - - - - Gets the number styles. - - - - - The to use when type converting. - This is used when doing any number conversions. - - The number styles. - - - - Specifies the to use - when converting the member to and from a CSV field. - - - - - Gets the type converter. - - - - - Specifies the to use - when converting the member to and from a CSV field. - - - - - - Maps class members to CSV fields. - - - - - The type of the class this map is for. - - - - - The class constructor parameter mappings. - - - - - The class member mappings. - - - - - The class member reference mappings. - - - - - Allow only internal creation of CsvClassMap. - - The type of the class this map is for. - - - - Maps a member to a CSV field. - - The type of the class this map is for. This may not be the same type - as the member.DeclaringType or the current ClassType due to nested member mappings. - The member to map. - If true, an existing map will be used if available. - If false, a new map is created for the same member. - The member mapping. - - - - Maps a non-member to a CSV field. This allows for writing - data that isn't mapped to a class member. - - The member mapping. - - - - Maps a member to another class map. - - The type of the class map. - The member. - Constructor arguments used to create the reference map. - The reference mapping for the member. - - - - Auto maps all members for the given type. If a member - is mapped again it will override the existing map. - - - - - Auto maps all members for the given type. If a member - is mapped again it will override the existing map. - - The configuration. - - - - Get the largest index for the - members and references. - - The max index. - - - - Resets the indexes based on the given start index. - - The index start. - The last index + 1. - - - - Auto maps the given map and checks for circular references as it goes. - - The map to auto map. - The configuration. - The list of parents for the map. - The index starting point. - - - - Auto maps the given map using constructor parameters. - - The map. - The configuration. - The list of parents for the map. - The index starting point. - - - - Checks for circular references. - - The type to check for. - The list of parents to check against. - A value indicating if a circular reference was found. - True if a circular reference was found, otherwise false. - - - - Gets the generic type for this class map. - - - - - Applies attribute configurations to the map. - - The member map. - - - - Applies attribute configurations to the map. - - The reference map. - - - - Has mapping capabilities. - - The class type. - - - - Maps a member to a CSV field. - - The member to map. - If true, an existing map will be used if available. - If false, a new map is created for the same member. - The member mapping. - - - - Options after a mapping call. - - The class type. - The member type. - - - - Has type converter capabilities. - - The class type. - The member type. - - - - Specifies the to use - when converting the member to and from a CSV field. - - The TypeConverter to use. - - - - Specifies the to use - when converting the member to and from a CSV field. - - The of the - to use. - - - - Options after a type converter call. - - The class type. - The member type. - - - - Has index capabilities. - - The class type. - The member type. - - - - When reading, is used to get the field at - the given index. When writing, the fields - will be written in the order of the field - indexes. - - The index of the CSV field. - The end index used when mapping to an member. - - - - Options after an index call. - - The class type. - The member type. - - - - Has name capabilities. - - The class type. - The member type. - - - - When reading, is used to get the field - at the index of the name if there was a - header specified. It will look for the - first name match in the order listed. - When writing, sets the name of the - field in the header record. - The first name will be used. - - The possible names of the CSV field. - - - - Options after a name call. - - The class type. - The member type. - - - - Has name index capabilities. - - The class type. - The member type. - - - - When reading, is used to get the - index of the name used when there - are multiple names that are the same. - - The index of the name. - - - - Options after a name index call. - - The class type. - The member type. - - - - Has convert using capabilities. - - The class type. - The member type. - - - - Specifies an expression to be used to convert data in the - row to the member. - - The convert expression. - - - - Specifies an expression to be used to convert the object - to a field. - - The convert expression. - - - - Has default capabilities. - - The class type. - The member type. - - - - The default value that will be used when reading when - the CSV field is empty. - - The default value. - - - - The default value that will be used when reading when - the CSV field is empty. This value is not type checked - and will use a to convert - the field. This could potentially have runtime errors. - - The default value. - - - - Options after a default call. - - The class type. - The member type. - - - - Has constant capabilities. - - The class type. - The member type. - - - - The constant value that will be used for every record when - reading and writing. This value will always be used no matter - what other mapping configurations are specified. - - The constant value. - - - - Has validate capabilities. - - The class type. - The member type. - - - - The validate expression that will be called on every field when reading. - The expression should return true if the field is valid. - If false is returned, a - will be thrown. - - The validation expression. - - - - Has build capabilities. - - The class type. - - - - Builds the . - - - - - Collection that holds CsvClassMaps for record types. - - - - - Gets the for the specified record type. - - - The . - - The record type. - The for the specified record type. - - - - Creates a new instance using the given configuration. - - The configuration. - - - - Finds the for the specified record type. - - The record type. - The for the specified record type. - - - - Adds the specified map for it's record type. If a map - already exists for the record type, the specified - map will replace it. - - The map. - - - - Removes the class map. - - The class map type. - - - - Removes all maps. - - - - - Goes up the inheritance tree to find the type instance of CsvClassMap{}. - - The type to traverse. - The type that is CsvClassMap{}. - - - - Sets defaults for the mapping tree. The defaults used - to be set inside the classes, but this didn't allow for - the TypeConverter to be created from the Configuration's - TypeConverterFactory. - - The map to set defaults on. - - - - Maps class members to CSV fields. - - The of class to map. - - - - Creates an instance of . - - - - - Maps a member to a CSV field. - - The member to map. - If true, an existing map will be used if available. - If false, a new map is created for the same member. - The member mapping. - - - - Meant for internal use only. - Maps a member to another class map. When this is used, accessing a property through - sub-property mapping later won't work. You can only use one or the other. When using - this, ConvertUsing will also not work. - - The type of the class map. - The expression. - Constructor arguments used to create the reference map. - The reference mapping for the member. - - - - Configuration used for reading and writing CSV data. - - - - - Gets or sets the . - - - - - Gets or sets the . - - - - - Gets or sets a value indicating if the - CSV file has a header record. - Default is true. - - - - - Gets or sets the function that is called when a header validation check is ran. The default function - will throw a if there is no header for a given member mapping. - You can supply your own function to do other things like logging the issue instead of throwing an exception. - Arguments: isValid, headerNames, headerNameIndex, context - - - - - Gets or sets the function that is called when a missing field is found. The default function will - throw a . You can supply your own function to do other things - like logging the issue instead of throwing an exception. - Arguments: headerNames, index, context - - - - - Gets or sets the function that is called when bad field data is found. A field - has bad data if it contains a quote and the field is not quoted (escaped). - You can supply your own function to do other things like logging the issue - instead of throwing an exception. - Arguments: context - - - - - Gets or sets the function that is called when a reading exception occurs. - The default function will re-throw the given exception. If you want to ignore - reading exceptions, you can supply your own function to do other things like - logging the issue. - Arguments: exception - - - - - Gets or sets the callback that will be called to - determine whether to skip the given record or not. - - - - - Gets or sets a value indicating if fields should be sanitized - to prevent malicious injection. This covers MS Excel, - Google Sheets and Open Office Calc. - - - - - Gets or sets the characters that are used for injection attacks. - - - - - Gets or sets the character used to escape a detected injection. - - - - - Gets or sets a value indicating whether changes in the column - count should be detected. If true, a - will be thrown if a different column count is detected. - - - true if [detect column count changes]; otherwise, false. - - - - - Prepares the header field for matching against a member name. - The header field and the member name are both ran through this function. - You should do things like trimming, removing whitespace, removing underscores, - and making casing changes to ignore case. - - - - - Determines if constructor parameters should be used to create - the class instead of the default constructor and members. - - - - - Chooses the constructor to use for constuctor mapping. - - - - - Gets or sets a value indicating whether references - should be ignored when auto mapping. True to ignore - references, otherwise false. Default is false. - - - - - Gets or sets the field trimming options. - - - - - Gets or sets the delimiter used to separate fields. - Default is ","; - - - - - Gets or sets the character used to quote fields. - Default is '"'. - - - - - Gets a string representation of the currently configured Quote character. - - - The new quote string. - - - - - Gets a string representation of two of the currently configured Quote characters. - - - The new double quote string. - - - - - Gets an array characters that require - the field to be quoted. - - - - - Gets or sets the character used to denote - a line that is commented out. Default is '#'. - - - - - Gets or sets a value indicating if comments are allowed. - True to allow commented out lines, otherwise false. - - - - - Gets or sets the size of the buffer - used for reading CSV files. - Default is 2048. - - - - - Gets or sets a value indicating whether all fields are quoted when writing, - or just ones that have to be. and - cannot be true at the same time. Turning one - on will turn the other off. - - - true if all fields should be quoted; otherwise, false. - - - - - Gets or sets a value indicating whether no fields are quoted when writing. - and cannot be true - at the same time. Turning one on will turn the other off. - - - true if [quote no fields]; otherwise, false. - - - - - Gets or sets a value indicating whether the number of bytes should - be counted while parsing. Default is false. This will slow down parsing - because it needs to get the byte count of every char for the given encoding. - The needs to be set correctly for this to be accurate. - - - - - Gets or sets the encoding used when counting bytes. - - - - - Gets or sets the culture info used to read an write CSV files. - - - - - Gets or sets a value indicating if quotes should be - ignored when parsing and treated like any other character. - - - - - Gets or sets a value indicating if private - member should be read from and written to. - True to include private member, otherwise false. Default is false. - - - - - Gets or sets the member types that are used when auto mapping. - MemberTypes are flags, so you can choose more than one. - Default is Properties. - - - - - Gets or sets a value indicating if blank lines - should be ignored when reading. - True to ignore, otherwise false. Default is true. - - - - - Gets or sets a callback that will return the prefix for a reference header. - Arguments: memberType, memberName - - - - - Builds the values for the RequiredQuoteChars property. - - - - - The configured s. - - - - - Gets or sets a value indicating that during writing if a new - object should be created when a reference member is null. - True to create a new object and use it's defaults for the - fields, or false to leave the fields empty for all the - reference member's member. - - - - - Creates a new CsvConfiguration. - - - - - Use a to configure mappings. - When using a class map, no members are mapped by default. - Only member specified in the mapping are used. - - The type of mapping class to use. - - - - Use a to configure mappings. - When using a class map, no members are mapped by default. - Only members specified in the mapping are used. - - The type of mapping class to use. - - - - Registers the class map. - - The class map to register. - - - - Unregisters the class map. - - The map type to unregister. - - - - Unregisters the class map. - - The map type to unregister. - - - - Unregisters all class maps. - - - - - Generates a for the type. - - The type to generate the map for. - The generate map. - - - - Generates a for the type. - - The type to generate for the map. - The generate map. - - - - Represents configuration errors that occur. - - - - - Initializes a new instance of the class. - - - - - Initializes a new instance of the class - with a specified error message. - - The message that describes the error. - - - - Initializes a new instance of the class - with a specified error message and a reference to the inner exception that - is the cause of this exception. - - The error message that explains the reason for the exception. - The exception that is the cause of the current exception, or a null reference (Nothing in Visual Basic) if no inner exception is specified. - - - - A default that can be used - to create a class map dynamically. - - - - - - Configuration used for the . - - - - - Gets or sets the size of the buffer - used for reading CSV files. - Default is 2048. - - - - - Gets or sets a value indicating whether the number of bytes should - be counted while parsing. Default is false. This will slow down parsing - because it needs to get the byte count of every char for the given encoding. - The needs to be set correctly for this to be accurate. - - - - - Gets or sets the encoding used when counting bytes. - - - - - Gets or sets the function that is called when bad field data is found. A field - has bad data if it contains a quote and the field is not quoted (escaped). - You can supply your own function to do other things like logging the issue - instead of throwing an exception. - Arguments: context - - - - - Gets or sets the character used to denote - a line that is commented out. Default is '#'. - - - - - Gets or sets a value indicating if comments are allowed. - True to allow commented out lines, otherwise false. - - - - - Gets or sets a value indicating if blank lines - should be ignored when reading. - True to ignore, otherwise false. Default is true. - - - - - Gets or sets a value indicating if quotes should be - ingored when parsing and treated like any other character. - - - - - Gets or sets the character used to quote fields. - Default is '"'. - - - - - Gets or sets the delimiter used to separate fields. - Default is ","; - - - - - Gets or sets the field trimming options. - - - - - Configuration used for the . - - - - - Gets or sets a value indicating if the - CSV file has a header record. - Default is true. - - - - - Gets or sets the function that is called when a header validation check is ran. The default function - will throw a if there is no header for a given member mapping. - You can supply your own function to do other things like logging the issue instead of throwing an exception. - Arguments: isValid, headerNames, headerNameIndex, context - - - - - Gets or sets the function that is called when a missing field is found. The default function will - throw a . You can supply your own function to do other things - like logging the issue instead of throwing an exception. - Arguments: headerNames, index, context - - - - - Gets or sets the function that is called when a reading exception occurs. - The default function will re-throw the given exception. If you want to ignore - reading exceptions, you can supply your own function to do other things like - logging the issue. - Arguments: exception - - - - - Gets or sets the culture info used to read an write CSV files. - - - - - Gets or sets the . - - - - - Gets or sets the . - - - - - Prepares the header field for matching against a member name. - The header field and the member name are both ran through this function. - You should do things like trimming, removing whitespace, removing underscores, - and making casing changes to ignore case. - - - - - Determines if constructor parameters should be used to create - the class instead of the default constructor and members. - - - - - Chooses the constructor to use for constuctor mapping. - - - - - Gets or sets a value indicating whether references - should be ignored when auto mapping. True to ignore - references, otherwise false. Default is false. - - - - - Gets or sets the callback that will be called to - determine whether to skip the given record or not. - - - - - Gets or sets a value indicating if private - member should be read from and written to. - True to include private member, otherwise false. Default is false. - - - - - Gets or sets a callback that will return the prefix for a reference header. - Arguments: memberType, memberName - - - - - Gets or sets a value indicating whether changes in the column - count should be detected. If true, a - will be thrown if a different column count is detected. - - - true if [detect column count changes]; otherwise, false. - - - - - Gets or sets the member types that are used when auto mapping. - MemberTypes are flags, so you can choose more than one. - Default is Properties. - - - - - The configured s. - - - - - Use a to configure mappings. - When using a class map, no members are mapped by default. - Only member specified in the mapping are used. - - The type of mapping class to use. - - - - Use a to configure mappings. - When using a class map, no member are mapped by default. - Only member specified in the mapping are used. - - The type of mapping class to use. - - - - Registers the class map. - - The class map to register. - - - - Unregisters the class map. - - The map type to unregister. - - - - Unregisters the class map. - - The map type to unregister. - - - - Unregisters all class maps. - - - - - Generates a for the type. - - The type to generate the map for. - The generate map. - - - - Generates a for the type. - - The type to generate for the map. - The generate map. - - - - Configuration used for the . - - - - - Gets or sets the delimiter used to separate fields. - Default is ','; - - - - - Gets or sets the character used to quote fields. - Default is '"'. - - - - - Gets or sets the field trimming options. - - - - - Gets or sets a value indicating if fields should be sanitized - to prevent malicious injection. This covers MS Excel, - Google Sheets and Open Office Calc. - - - - - Gets or sets the characters that are used for injection attacks. - - - - - Gets or sets the character used to escape a detected injection. - - - - - Configuration used for the . - - - - - Gets or sets a value indicating whether all fields are quoted when writing, - or just ones that have to be. and - cannot be true at the same time. Turning one - on will turn the other off. - - - true if all fields should be quoted; otherwise, false. - - - - - Gets or sets a value indicating whether no fields are quoted when writing. - and cannot be true - at the same time. Turning one on will turn the other off. - - - true if [quote no fields]; otherwise, false. - - - - - Gets a string representation of the currently configured Quote character. - - - The new quote string. - - - - - Gets an array characters that require - the field to be quoted. - - - - - Builds the values for the RequiredQuoteChars property. - - - - - Gets a string representation of two of the currently configured Quote characters. - - - The new double quote string. - - - - - Gets or sets the culture info used to read an write CSV files. - - - - - Gets or sets the . - - - - - Gets or sets the . - - - - - Gets or sets a value indicating if comments are allowed. - True to allow commented out lines, otherwise false. - - - - - Gets or sets the character used to denote - a line that is commented out. Default is '#'. - - - - - Gets or sets a value indicating if the - CSV file has a header record. - Default is true. - - - - - Gets or sets a value indicating whether references - should be ignored when auto mapping. True to ignore - references, otherwise false. Default is false. - - - - - Gets or sets a value indicating if private - member should be read from and written to. - True to include private member, otherwise false. Default is false. - - - - - Gets or sets a callback that will return the prefix for a reference header. - Arguments: memberType, memberName - - - - - Gets or sets the member types that are used when auto mapping. - MemberTypes are flags, so you can choose more than one. - Default is Properties. - - - - - The configured s. - - - - - Use a to configure mappings. - When using a class map, no member are mapped by default. - Only member specified in the mapping are used. - - The type of mapping class to use. - - - - Use a to configure mappings. - When using a class map, no member are mapped by default. - Only member specified in the mapping are used. - - The type of mapping class to use. - - - - Registers the class map. - - The class map to register. - - - - Unregisters the class map. - - The map type to unregister. - - - - Unregisters the class map. - - The map type to unregister. - - - - Unregisters all class maps. - - - - - Generates a for the type. - - The type to generate the map for. - The generate map. - - - - Generates a for the type. - - The type to generate for the map. - The generate map. - - - - Gets or sets a value indicating that during writing if a new - object should be created when a reference member is null. - True to create a new object and use it's defaults for the - fields, or false to leave the fields empty for all the - reference member's member. - - - - - Sets type converter options on a member map. - - - - - Creates a new instance using the given . - - The member map the options are being applied to. - - - - The used when type converting. - This will override the global - setting. - - The culture info. - - - - The to use when type converting. - This is used when doing any conversions. - - The date time style. - - - - The to use when type converting. - This is used when doing any number conversions. - - - - - - The string format to be used when type converting. - - The format. - - - - The string values used to represent a boolean when converting. - - A value indicating whether true values or false values are being set. - A value indication if the current values should be cleared before adding the new ones. - The string boolean values. - - - - The string values used to represent null when converting. - - The values that represent null. - - - - - The string values used to represent null when converting. - - A value indication if the current values should be cleared before adding the new ones. - The values that represent null. - - - - - Mapping info for a member to a CSV field. - - - - - Gets the member map data. - - - - - Type converter options. - - - - - Creates an instance of using the given Type and . - - Type of the class the member being mapped belongs to. - The member being mapped. - - - - When reading, is used to get the field - at the index of the name if there was a - header specified. It will look for the - first name match in the order listed. - When writing, sets the name of the - field in the header record. - The first name will be used. - - The possible names of the CSV field. - - - - When reading, is used to get the - index of the name used when there - are multiple names that are the same. - - The index of the name. - - - - When reading, is used to get the field at - the given index. When writing, the fields - will be written in the order of the field - indexes. - - The index of the CSV field. - The end index used when mapping to an member. - - - - Ignore the member when reading and writing. - If this member has already been mapped as a reference - member, either by a class map, or by automapping, calling - this method will not ingore all the child members down the - tree that have already been mapped. - - - - - Ignore the member when reading and writing. - If this member has already been mapped as a reference - member, either by a class map, or by automapping, calling - this method will not ingore all the child members down the - tree that have already been mapped. - - True to ignore, otherwise false. - - - - The default value that will be used when reading when - the CSV field is empty. - - The default value. - - - - The default value that will be used when reading when - the CSV field is empty. This value is not type checked - and will use a to convert - the field. This could potentially have runtime errors. - - The default value. - - - - The constant value that will be used for every record when - reading and writing. This value will always be used no matter - what other mapping configurations are specified. - - The constant value. - - - - Specifies the to use - when converting the member to and from a CSV field. - - The TypeConverter to use. - - - - Specifies the to use - when converting the member to and from a CSV field. - - The of the - to use. - - - - Specifies an expression to be used to validate a field when reading. - - - - - - A collection that holds 's. - - - - - Gets the number of elements contained in the . - - - The number of elements contained in the . - - - - - Gets a value indicating whether the is read-only. - - - true if the is read-only; otherwise, false. - - - - - Initializes a new instance of the class. - - - - - Initializes a new instance of the class. - - The comparer to use when sorting the member maps. - - - - Returns an enumerator that iterates through the collection. - - - A that can be used to iterate through the collection. - - 1 - - - - Returns an enumerator that iterates through a collection. - - - An object that can be used to iterate through the collection. - - 2 - - - - Adds an item to the . - - The object to add to the . - The is read-only. - - - - - Adds a range of items to the . - - The collection to add. - - - - Removes all items from the . - - The is read-only. - - - - - Determines whether the contains a specific value. - - - true if is found in the ; otherwise, false. - - The object to locate in the . - - - - - Copies the elements of the to an , starting at a particular index. - - The one-dimensional that is the destination of the elements copied from . The must have zero-based indexing.The zero-based index in at which copying begins. is null. is less than 0.The number of elements in the source is greater than the available space from to the end of the destination . - - - - Removes the first occurrence of a specific object from the . - - - true if was successfully removed from the ; otherwise, false. This method also returns false if is not found in the original . - - The object to remove from the . - The is read-only. - - - - - Determines the index of a specific item in the . - - - The index of if found in the list; otherwise, -1. - - The object to locate in the . - - - - - Inserts an item to the at the specified index. - - The zero-based index at which should be inserted. - The object to insert into the . - is not a valid index in the . - The is read-only. - - - - - Removes the item at the specified index. - - The zero-based index of the item to remove. - is not a valid index in the . - The is read-only. - - - - - Gets or sets the element at the specified index. - - - The element at the specified index. - - The zero-based index of the element to get or set. - is not a valid index in the . - The member is set and the is read-only. - - - - - Finds the using the given member expression. - - The the member is on. - The member expression. - The for the given expression, or null if not found. - - - - Finds the using the given member. - - The member. - The for the given expression, or null if not found. - - - - Adds the members from the mapping. This will recursively - traverse the mapping tree and add all members for - reference maps. - - The mapping where the members are added from. - - - - Used to compare s. - The order is by field index ascending. Any - fields that don't have an index are pushed - to the bottom. - - - - - Compares two objects and returns a value indicating whether one is less than, equal to, or greater than the other. - - - Value - Condition - Less than zero - is less than . - Zero - equals . - Greater than zero - is greater than . - - The first object to compare. - The second object to compare. - Neither nor implements the interface. - -or- - and are of different types and neither one can handle comparisons with the other. - 2 - - - - Compares two objects and returns a value indicating whether one is less than, equal to, or greater than the other. - - - Value - Condition - Less than zero - is less than . - Zero - equals . - Greater than zero - is greater than . - - The first object to compare. - The second object to compare. - - - - - The configured data for the member map. - - - - - Gets the that the data - is associated with. - - - - - Gets the list of column names. - - - - - Gets or sets the index of the name. - This is used if there are multiple - columns with the same names. - - - - - Gets or sets a value indicating if the name was - explicitly set. True if it was explicity set, - otherwise false. - - - - - Gets or sets the column index. - - - - - Gets or sets the index end. The Index end is used to specify a range for use - with a collection member. Index is used as the start of the range, and IndexEnd - is the end of the range. - - - - - Gets or sets a value indicating if the index was - explicitly set. True if it was explicitly set, - otherwise false. - - - - - Gets or sets the type converter. - - - - - Gets or sets the type converter options. - - - - - Gets or sets a value indicating whether the field should be ignored. - - - - - Gets or sets the default value used when a CSV field is empty. - - - - - Gets or sets a value indicating whether this instance is default value set. - the default value was explicitly set. True if it was - explicitly set, otherwise false. - - - - - Gets or sets the constant value used for every record. - - - - - Gets or sets a value indicating if a constant was explicitly set. - - - - - Gets or sets the expression used to convert data in the - row to the member. - - - - - Gets or sets the expression to be used to convert the object - to a field. - - - - - Gets or sets the expression use to validate a field. - - - - - Initializes a new instance of the class. - - The member. - - - - Mapping info for a member to a CSV field. - - - - - Creates a new instance using the specified member. - - - - - When reading, is used to get the field - at the index of the name if there was a - header specified. It will look for the - first name match in the order listed. - When writing, sets the name of the - field in the header record. - The first name will be used. - - The possible names of the CSV field. - - - - When reading, is used to get the - index of the name used when there - are multiple names that are the same. - - The index of the name. - - - - When reading, is used to get the field at - the given index. When writing, the fields - will be written in the order of the field - indexes. - - The index of the CSV field. - The end index used when mapping to an member. - - - - Ignore the member when reading and writing. - If this member has already been mapped as a reference - member, either by a class map, or by automapping, calling - this method will not ingore all the child members down the - tree that have already been mapped. - - - - - Ignore the member when reading and writing. - If this member has already been mapped as a reference - member, either by a class map, or by automapping, calling - this method will not ingore all the child members down the - tree that have already been mapped. - - True to ignore, otherwise false. - - - - The default value that will be used when reading when - the CSV field is empty. - - The default value. - - - - The default value that will be used when reading when - the CSV field is empty. This value is not type checked - and will use a to convert - the field. This could potentially have runtime errors. - - The default value. - - - - The constant value that will be used for every record when - reading and writing. This value will always be used no matter - what other mapping configurations are specified. - - The constant value. - - - - Specifies the to use - when converting the member to and from a CSV field. - - The TypeConverter to use. - - - - Specifies the to use - when converting the member to and from a CSV field. - - The of the - to use. - - - - Specifies an expression to be used to convert data in the - row to the member. - - The convert expression. - - - - Specifies an expression to be used to convert the object - to a field. - - The convert expression. - - - - Specifies an expression to be used to validate a field when reading. - - - - - - A collection that holds member names. - - - - - Gets the name at the given index. If a prefix is set, - it will be prepended to the name. - - - - - - - Gets the prefix to use for each name. - - - - - Gets the raw list of names without - the prefix being prepended. - - - - - Gets the count. - - - - - Adds the given name to the collection. - - The name to add. - - - - Clears all names from the collection. - - - - - Adds a range of names to the collection. - - The range to add. - - - - Returns an enumerator that iterates through the collection. - - - A that can be used to iterate through the collection. - - 1 - - - - Returns an enumerator that iterates through a collection. - - - An object that can be used to iterate through the collection. - - 2 - - - - Mapping info for a reference member mapping to a class. - - - - - Gets the member reference map data. - - - - - Initializes a new instance of the class. - - The member. - The to use for the reference map. - - - - Appends a prefix to the header of each field of the reference member. - - The prefix to be prepended to headers of each reference member. - The current - - - - Get the largest index for the - members and references. - - The max index. - - - - A collection that holds 's. - - - - Gets the number of elements contained in the . - The number of elements contained in the . - - - Gets a value indicating whether the is read-only. - true if the is read-only; otherwise, false. - - - Gets or sets the element at the specified index. - The element at the specified index. - The zero-based index of the element to get or set. - - is not a valid index in the . - The member is set and the is read-only. - - - Returns an enumerator that iterates through the collection. - A that can be used to iterate through the collection. - 1 - - - Returns an enumerator that iterates through a collection. - An object that can be used to iterate through the collection. - 2 - - - Adds an item to the . - The object to add to the . - The is read-only. - - - Removes all items from the . - The is read-only. - - - Determines whether the contains a specific value. - true if is found in the ; otherwise, false. - The object to locate in the . - - - Copies the elements of the to an , starting at a particular index. - The one-dimensional that is the destination of the elements copied from . The must have zero-based indexing. - The zero-based index in at which copying begins. - - is null. - - is less than 0. - The number of elements in the source is greater than the available space from to the end of the destination . - - - Removes the first occurrence of a specific object from the . - true if was successfully removed from the ; otherwise, false. This method also returns false if is not found in the original . - The object to remove from the . - The is read-only. - - - Determines the index of a specific item in the . - The index of if found in the list; otherwise, -1. - The object to locate in the . - - - Inserts an item to the at the specified index. - The zero-based index at which should be inserted. - The object to insert into the . - - is not a valid index in the . - The is read-only. - - - Removes the item at the specified index. - The zero-based index of the item to remove. - - is not a valid index in the . - The is read-only. - - - - Finds the using the given member expression. - - The the member is on. - The member expression. - The for the given expression, or null if not found. - - - - Finds the using the given member. - - The member. - The for the given expression, or null if not found. - - - - The configuration data for the reference map. - - - - - Gets or sets the header prefix to use. - - - - - Gets the that the data - is associated with. - - - - - Gets the mapping this is a reference for. - - - - - Initializes a new instance of the class. - - The member. - The mapping this is a reference for. - - - - Flags for the type of members that - can be used for auto mapping. - - - - - No members. This is not a valid value - and will cause an exception if used. - - - - - Properties on a class. - - - - - Fields on a class. - - - - - Mapping for a constructor parameter. - This may contain value type data, a constructor type map, - or a reference map, depending on the type of the parameter. - - - - - Gets the parameter map data. - - - - - Gets or sets the map for a constructor type. - - - - - Gets or sets the map for a reference type. - - - - - Creates an instance of using - the given information. - - The parameter being mapped. - - - - The constructor paramter data for the map. - - - - - Gets the that the data - is associated with. - - - - - Gets or sets the type converter. - - - - - Gets or sets the type converter options. - - - - - Gets or sets the column index. - - - - - Gets or sets the column name. - - - - - Initializes a new instance of the class. - - The constructor parameter. - - - - Mapping info for a reference parameter mapping to a class. - - - - - Gets the parameter reference map data. - - - - - Initializes a new instance of the class. - - The parameter. - The to use for the reference map. - - - - Appends a prefix to the header of each field of the reference parameter. - - The prefix to be prepended to headers of each reference parameter. - The current - - - - Get the largest index for the - members and references. - - The max index. - - - - The configuration data for the reference map. - - - - - Gets or sets the header prefix to use. - - - - - Gets the that the data - is associated with. - - - - - Gets the mapping this is a reference for. - - - - - Initializes a new instance of the class. - - The parameter. - The mapping this is a reference for. - - - - Options for trimming of fields. - - - - - No trimming. - - - - - Trims the whitespace around a field. - - - - - Trims the whitespace inside of quotes around a field. - - - - - Reads fields from a . - - - - - Gets the reading context. - - - - - Gets a value indicating if the buffer is empty. - True if the buffer is empty, otherwise false. - - - - - Fills the buffer. - - True if there is more data left. - False if all the data has been read. - - - - Fills the buffer. - - True if there is more data left. - False if all the data has been read. - - - - Creates a new using the given - and . - - The text reader. - The configuration. - - - - Creates a new using the given - , - and leaveOpen flag. - - The text reader. - The configuration. - A value indicating if the should be left open when disposing. - - - - Gets the next char as an . - - - - - Gets the field. This will append any reading progress. - - The current field. - - - - Appends the current reading progress. - - - - - Move's the buffer position according to the given offset. - - The offset to move the buffer. - - - - Sets the start of the field to the current buffer position. - - An offset for the field start. - The offset should be less than 1. - - - - Sets the end of the field to the current buffer position. - - An offset for the field start. - The offset should be less than 1. - - - - Sets the raw recodr start to the current buffer position; - - An offset for the raw record start. - The offset should be less than 1. - - - - Sets the raw record end to the current buffer position. - - An offset for the raw record end. - The offset should be less than 1. - - - - Performs application-defined tasks associated with freeing, releasing, or resetting unmanaged resources. - - 2 - - - - Performs application-defined tasks associated with freeing, releasing, or resetting unmanaged resources. - - True if the instance needs to be disposed of. - - - - Represents errors that occur in CsvHelper. - - - - - Gets the context used when reading. - - - - - Gets the context used when writing. - - - - - Initializes a new instance of the CsvHelperException class. - - - - - Initializes a new instance of the CsvHelperException class. - - The message that describes the error. - - - - Initializes a new instance of the CsvHelperException class. - - The error message that explains the reason for the exception. - The exception that is the cause of the current exception, or a null reference (Nothing in Visual Basic) if no inner exception is specified. - - - - Initializes a new instance of the class. - - - - - Initializes a new instance of the class. - - - - - Initializes a new instance of the class - with a specified error message. - - The reading context. - The message that describes the error. - - - - Initializes a new instance of the class - with a specified error message and a reference to the inner exception that - is the cause of this exception. - - The reading context. - The error message that explains the reason for the exception. - The exception that is the cause of the current exception, or a null reference (Nothing in Visual Basic) if no inner exception is specified. - - - - Initializes a new instance of the class - with a specified error message. - - The writing context. - The message that describes the error. - - - - Initializes a new instance of the class - with a specified error message and a reference to the inner exception that - is the cause of this exception. - - The writing context. - The error message that explains the reason for the exception. - The exception that is the cause of the current exception, or a null reference (Nothing in Visual Basic) if no inner exception is specified. - - - - Parses a CSV file. - - - - - Gets the reading context. - - - - - Gets the configuration. - - - - - Gets the . - - - - - Creates a new parser using the given . - - The with the CSV file data. - - - - Creates a new parser using the given . - - The with the CSV file data. - true to leave the reader open after the CsvReader object is disposed, otherwise false. - - - - Creates a new parser using the given and . - - The with the CSV file data. - The configuration. - - - - Creates a new parser using the given and . - - The with the CSV file data. - The configuration. - true to leave the reader open after the CsvReader object is disposed, otherwise false. - - - - Creates a new parser using the given . - - The field reader. - - - - Reads a record from the CSV file. - - A of fields for the record read. - - - - Reads a record from the CSV file asynchronously. - - A of fields for the record read. - - - - Performs application-defined tasks associated with freeing, releasing, or resetting unmanaged resources. - - 2 - - - - Performs application-defined tasks associated with freeing, releasing, or resetting unmanaged resources. - - True if the instance needs to be disposed of. - - - - Reads a line of the CSV file. - - The CSV line. - - - - Reads a line of the CSV file. - - The CSV line. - - - - Reads a blank line. This accounts for empty lines - and commented out lines. - - - - - Reads a blank line. This accounts for empty lines - and commented out lines. - - - - - Reads until a delimiter or line ending is found. - - True if the end of the line was found, otherwise false. - - - - Reads until a delimiter or line ending is found. - - True if the end of the line was found, otherwise false. - - - - Reads until the field is not quoted and a delimeter is found. - - True if the end of the line was found, otherwise false. - - - - Reads until the field is not quoted and a delimeter is found. - - True if the end of the line was found, otherwise false. - - - - Reads until the delimeter is done. - - True if a delimiter was read. False if the sequence of - chars ended up not being the delimiter. - - - - Reads until the delimeter is done. - - True if a delimiter was read. False if the sequence of - chars ended up not being the delimiter. - - - - Reads until the line ending is done. - - The field start offset. - - - - Reads until the line ending is done. - - The field start offset. - - - - Reads until a non-space character is found. - - True if there is more data to read. - False if the end of the file has been reached. - - - - Reads until a non-space character is found. - - True if there is more data to read. - False if the end of the file has been reached. - - - - Reads data that was parsed from . - - - - - Gets the reading context. - - - - - Gets the configuration. - - - - - Gets the parser. - - - - - Creates a new CSV reader using the given . - - The reader. - - - - Creates a new CSV reader using the given . - - The reader. - true to leave the reader open after the CsvReader object is disposed, otherwise false. - - - - Creates a new CSV reader using the given and - and as the default parser. - - The reader. - The configuration. - - - - Creates a new CSV reader using the given . - - The reader. - The configuration. - true to leave the reader open after the CsvReader object is disposed, otherwise false. - - - - Creates a new CSV reader using the given . - - The used to parse the CSV file. - - - - Reads the header record without reading the first row. - - True if there are more records, otherwise false. - - - - Validates the header. A header is bad if all the mapped members don't match. - If the header is not valid, a will be thrown. - - The type to validate the header against. - - - - Validates the header. A header is bad if all the mapped members don't match. - If the header is not valid, a will be thrown. - - The type to validate the header against. - - - - Validates the header against the given map. - - The map to validate against. - - - - Advances the reader to the next record. This will not read headers. - You need to call then - for the headers to be read. - - True if there are more records, otherwise false. - - - - Advances the reader to the next record. This will not read headers. - You need to call then - for the headers to be read. - - True if there are more records, otherwise false. - - - - Gets the raw field at position (column) index. - - The zero based index of the field. - The raw field. - - - - Gets the raw field at position (column) name. - - The named index of the field. - The raw field. - - - - Gets the raw field at position (column) name. - - The named index of the field. - The zero based index of the field. - The raw field. - - - - Gets the raw field at position (column) index. - - The zero based index of the field. - The raw field. - - - - Gets the raw field at position (column) name. - - The named index of the field. - The raw field. - - - - Gets the raw field at position (column) name and the index - instance of that field. The index is used when there are - multiple columns with the same header name. - - The named index of the field. - The zero based index of the instance of the field. - The raw field. - - - - Gets the field converted to using - the specified . - - The type of the field. - The index of the field. - The field converted to . - - - - Gets the field converted to using - the specified . - - The type of the field. - The named index of the field. - The field converted to . - - - - Gets the field converted to using - the specified . - - The type of the field. - The named index of the field. - The zero based index of the instance of the field. - The field converted to . - - - - Gets the field converted to using - the specified . - - The type of the field. - The index of the field. - The used to convert the field to . - The field converted to . - - - - Gets the field converted to using - the specified . - - The type of the field. - The named index of the field. - The used to convert the field to . - The field converted to . - - - - Gets the field converted to using - the specified . - - The type of the field. - The named index of the field. - The zero based index of the instance of the field. - The used to convert the field to . - The field converted to . - - - - Gets the field converted to T at position (column) index. - - The of the field. - The zero based index of the field. - The field converted to T. - - - - Gets the field converted to T at position (column) name. - - The of the field. - The named index of the field. - The field converted to T. - - - - Gets the field converted to T at position - (column) name and the index instance of that field. The index - is used when there are multiple columns with the same header name. - - - The named index of the field. - The zero based index of the instance of the field. - - - - - Gets the field converted to T at position (column) index using - the given . - - The of the field. - The zero based index of the field. - The used to convert the field to T. - The field converted to T. - - - - Gets the field converted to T at position (column) name using - the given . - - The of the field. - The named index of the field. - The used to convert the field to T. - The field converted to T. - - - - Gets the field converted to T at position - (column) name and the index instance of that field. The index - is used when there are multiple columns with the same header name. - - - The named index of the field. - The zero based index of the instance of the field. - The used to convert the field to T. - The field converted to T. - - - - Gets the field converted to T at position (column) index using - the given . - - The of the field. - The used to convert the field to T. - The zero based index of the field. - The field converted to T. - - - - Gets the field converted to T at position (column) name using - the given . - - The of the field. - The used to convert the field to T. - The named index of the field. - The field converted to T. - - - - Gets the field converted to T at position - (column) name and the index instance of that field. The index - is used when there are multiple columns with the same header name. - - The of the field. - The used to convert the field to T. - The named index of the field. - The zero based index of the instance of the field. - The field converted to T. - - - - Gets the field converted to T at position (column) index. - - The of the field. - The zero based index of the field. - The field converted to type T. - A value indicating if the get was successful. - - - - Gets the field converted to T at position (column) name. - - The of the field. - The named index of the field. - The field converted to T. - A value indicating if the get was successful. - - - - Gets the field converted to T at position - (column) name and the index instance of that field. The index - is used when there are multiple columns with the same header name. - - The of the field. - The named index of the field. - The zero based index of the instance of the field. - The field converted to T. - A value indicating if the get was successful. - - - - Gets the field converted to T at position (column) index - using the specified . - - The of the field. - The zero based index of the field. - The used to convert the field to T. - The field converted to T. - A value indicating if the get was successful. - - - - Gets the field converted to T at position (column) name - using the specified . - - The of the field. - The named index of the field. - The used to convert the field to T. - The field converted to T. - A value indicating if the get was successful. - - - - Gets the field converted to T at position (column) name - using the specified . - - The of the field. - The named index of the field. - The zero based index of the instance of the field. - The used to convert the field to T. - The field converted to T. - A value indicating if the get was successful. - - - - Gets the field converted to T at position (column) index. - - The of the field. - The zero based index of the field. - The field converted to type T. - A value indicating if the get was successful. - - - - Gets the field converted to T at position (column) name. - - The of the field. - The named index of the field. - The field converted to T. - A value indicating if the get was successful. - - - - Gets the field converted to T at position - (column) name and the index instance of that field. The index - is used when there are multiple columns with the same header name. - - - The named index of the field. - The zero based index of the instance of the field. - The field converted to T. - A value indicating if the get was successful. - - - - Gets the field converted to T at position (column) index - using the specified . - - The of the field. - The zero based index of the field. - The used to convert the field to T. - The field converted to T. - A value indicating if the get was successful. - - - - Gets the field converted to T at position (column) name - using the specified . - - The of the field. - The named index of the field. - The used to convert the field to T. - The field converted to T. - A value indicating if the get was successful. - - - - Gets the field converted to T at position (column) name - using the specified . - - The of the field. - The named index of the field. - The zero based index of the instance of the field. - The used to convert the field to T. - The field converted to T. - A value indicating if the get was successful. - - - - Gets the field converted to T at position (column) index - using the specified . - - The of the field. - The used to convert the field to T. - The zero based index of the field. - The field converted to T. - A value indicating if the get was successful. - - - - Gets the field converted to T at position (column) name - using the specified . - - The of the field. - The used to convert the field to T. - The named index of the field. - The field converted to T. - A value indicating if the get was successful. - - - - Gets the field converted to T at position (column) name - using the specified . - - The of the field. - The used to convert the field to T. - The named index of the field. - The zero based index of the instance of the field. - The field converted to T. - A value indicating if the get was successful. - - - - Gets the record converted into T. - - The of the record. - The record converted to T. - - - - Get the record converted into T. - - The of the record. - The anonymous type definition to use for the record. - The record converted to T. - - - - Gets the record. - - The of the record. - The record. - - - - Gets all the records in the CSV file and - converts each to T. The Read method - should not be used when using this. - - The of the record. - An of records. - - - - Gets all the records in the CSV file and converts - each to T. The read method - should not be used when using this. - - The of the record. - The anonymous type definition to use for the records. - An of records. - - - - Gets all the records in the CSV file and - converts each to T. The Read method - should not be used when using this. - - The of the record. - An of records. - - - - Enumerates the records hydrating the given record instance with row data. - The record instance is re-used and not cleared on each enumeration. - This only works for streaming rows. If any methods are called on the projection - that force the evaluation of the IEnumerable, such as ToList(), the entire list - will contain the same instance of the record, which is the last row. - - The type of the record. - The record to fill each enumeration. - An of records. - - - - Gets the index of the field at name if found. - - The name of the field to get the index for. - The index of the field if there are multiple fields with the same name. - A value indicating if the call was initiated from a TryGet. - The index of the field if found, otherwise -1. - Thrown if there is no header record. - Thrown if there isn't a field with name. - - - - Gets the index of the field at name if found. - - The possible names of the field to get the index for. - The index of the field if there are multiple fields with the same name. - A value indicating if the call was initiated from a TryGet. - The index of the field if found, otherwise -1. - Thrown if there is no header record. - Thrown if there isn't a field with name. - - - - Determines if the member for the - can be read. - - The member map. - A value indicating of the member can be read. True if it can, otherwise false. - - - - Determines if the member for the - can be read. - - The reference map. - A value indicating of the member can be read. True if it can, otherwise false. - - - - Performs application-defined tasks associated with freeing, releasing, or resetting unmanaged resources. - - 2 - - - - Performs application-defined tasks associated with freeing, releasing, or resetting unmanaged resources. - - True if the instance needs to be disposed of. - - - - Checks if the reader has been read yet. - - - - - - Parses the named indexes from the header record. - - - - - Defines methods used to serialize data into a CSV file. - - - - - Gets the writing context. - - - - - Gets the configuration. - - - - - Creates a new serializer using the given . - - The to write the CSV file data to. - - - - Creates a new serializer using the given . - - The to write the CSV file data to. - true to leave the reader open after the CsvReader object is disposed, otherwise false. - - - - Creates a new serializer using the given - and . - - The to write the CSV file data to. - The configuration. - - - - Creates a new serializer using the given - and . - - The to write the CSV file data to. - The configuration. - true to leave the reader open after the CsvReader object is disposed, otherwise false. - - - - Writes a record to the CSV file. - - The record to write. - - - - Writes a record to the CSV file. - - The record to write. - - - - Writes a new line to the CSV file. - - - - - Writes a new line to the CSV file. - - - - - Performs application-defined tasks associated with freeing, releasing, or resetting unmanaged resources. - - 2 - - - - Performs application-defined tasks associated with freeing, releasing, or resetting unmanaged resources. - - True if the instance needs to be disposed of. - - - - Sanitizes the field to prevent injection. - - The field to sanitize. - - - - Used to write CSV files. - - - - - Gets the writing context. - - - - - Gets the configuration. - - - - - Creates a new CSV writer using the given . - - The writer used to write the CSV file. - - - - Creates a new CSV writer using the given . - - The writer used to write the CSV file. - true to leave the writer open after the CsvWriter object is disposed, otherwise false. - - - - Creates a new CSV writer using the given . - - The use to write the CSV file. - The configuration. - - - - Creates a new CSV writer using the given . - - The use to write the CSV file. - The configuration. - true to leave the writer open after the CsvWriter object is disposed, otherwise false. - - - - Creates a new CSV writer using the given . - - The serializer. - - - - Writes a field that has already been converted to a - from an . - If the field is null, it won't get written. A type converter - will always return a string, even if field is null. If the - converter returns a null, it means that the converter has already - written data, and the returned value should not be written. - - The converted field to write. - - - - Writes the field to the CSV file. The field - may get quotes added to it. - When all fields are written for a record, - must be called - to complete writing of the current record. - - The field to write. - - - - Writes the field to the CSV file. This will - ignore any need to quote and ignore the - - and just quote based on the shouldQuote - parameter. - When all fields are written for a record, - must be called - to complete writing of the current record. - - The field to write. - True to quote the field, otherwise false. - - - - Writes the field to the CSV file. - When all fields are written for a record, - must be called - to complete writing of the current record. - - The type of the field. - The field to write. - - - - Writes the field to the CSV file. - When all fields are written for a record, - must be called - to complete writing of the current record. - - The type of the field. - The field to write. - The converter used to convert the field into a string. - - - - Writes the field to the CSV file - using the given . - When all fields are written for a record, - must be called - to complete writing of the current record. - - The type of the field. - The type of the converter. - The field to write. - - - - Serializes the row to the . - - - - - Serializes the row to the . - - - - - Ends writing of the current record and starts a new record. - This automatically flushes the writer. - - - - - Ends writing of the current record and starts a new record. - This automatically flushes the writer. - - - - - Writes a comment. - - The comment to write. - - - - Writes the header record from the given members. - - The type of the record. - - - - Writes the header record from the given members. - - The type of the record. - - - - Writes the header record for the given dynamic object. - - The dynamic record to write. - - - - Writes the record to the CSV file. - - The type of the record. - The record to write. - - - - Writes the list of records to the CSV file. - - The list of records to write. - - - - Writes the list of records to the CSV file. - - Record type. - The list of records to write. - - - - Checks if the member can be written. - - The member map that we are checking. - A value indicating if the member can be written. - True if the member can be written, otherwise false. - - - - Gets the type for the record. If the generic type - is an object due to boxing, it will call GetType() - on the record itself. - - The record type. - The record. - - - - Performs application-defined tasks associated with freeing, releasing, or resetting unmanaged resources. - - 2 - - - - Performs application-defined tasks associated with freeing, releasing, or resetting unmanaged resources. - - True if the instance needs to be disposed of. - - - - Creates dynamic records. - - - - - Initializes a new instance. - - The reader. - - - - Creates a of type - that will create a record of the given type using the current - reader row. - - The record type. - - - - Creates a dynamic record of the current reader row. - - - - - Write dynamic records. - - - - - Initializes a new instance using the given writer. - - The writer. - - - - Creates a of type - that will write the given record using the current writer row. - - The record type. - The record. - - - - Writes expando objects. - - - - - Initializes a new instance using the given writer. - - The writer. - - - - Creates a of type - that will write the given record using the current writer row. - - The record type. - The record. - - - - Manages expression creation. - - - - - Initializes a new instance using the given reader. - - The reader. - - - - Initializes a new instance using the given writer. - - The writer. - - - - Creates the member assignments for the given . - - The mapping to create the assignments for. - The assignments that will be added to from the mapping. - - - - Creates an expression the represents getting the field for the given - member and converting it to the member's type. - - The mapping for the member. - - - - Creates a member expression for the given member on the record. - This will recursively traverse the mapping to find the member - and create a safe member accessor for each level as it goes. - - The current member expression. - The mapping to look for the member to map on. - The member map to look for on the mapping. - An Expression to access the given member. - - - - Creates an instance of the given type using (in turn using the ObjectResolver), then assigns - the given member assignments to that instance. - - The type of the record we're creating. - The member assignments that will be assigned to the created instance. - A representing the instance creation and assignments. - - - - Creates objects. - - - - - Initializes a new instnace using the given reader. - - - - - - Creates a of type - that will create a record of the given type using the current - reader row. - - The record type. - - - - Creates the constructor arguments used to create a type. - - The mapping to create the arguments for. - The arguments that will be added to the mapping. - - - - Writes objects. - - - - - Initializes a new instance using the given writer. - - The writer. - - - - Creates a of type - that will write the given record using the current writer row. - - The record type. - The record. - - - - Creates primitive records. - - - - - Initializes a new instance using the given reader. - - The reader. - - - - Creates a of type - that will create a record of the given type using the current - reader row. - - The record type. - - - - Writes primitives. - - - - - Initializes a new instance using the given writer. - - The writer. - - - - Creates a of type - that will write the given record using the current writer row. - - The record type. - The record. - - - - Base implementation for classes that create records. - - - - - The reader. - - - - - The expression manager. - - - - - Initializes a new instance using the given reader. - - The reader. - - - - Create a record of the given type using the current row. - - The record type. - - - - Create a record of the given type using the current row. - - The record type. - - - - Gets the delegate to create a record for the given record type. - If the delegate doesn't exist, one will be created and cached. - - The record type. - - - - Creates a of type - that will create a record of the given type using the current - reader row. - - The record type. - - - - Factory to create record creators. - - - - - Initializes a new instance using the given reader. - - The reader. - - - - Creates a record creator for the given record type. - - The record type. - - - - Hydrates members of an existing record. - - - - - Creates a new instance using the given reader. - - The reader. - - - - Hydrates members of the given record using the current reader row. - - The record type. - The record. - - - - Gets the action delegate used to hydrate a custom class object's members with data from the reader. - - The record type. - - - - Creates the action delegate used to hydrate a record's members with data from the reader. - - The record type. - - - - Manages record manipulation. - - - - - Initializes a new instance using the given reader. - - - - - - Initializes a new instance using the given writer. - - The writer. - - - - Creates a record of the given type using the current reader row. - - The type of record to create. - - - - Creates a record of the given type using the current reader row. - - The type of record to create. - - - - Hydrates the given record using the current reader row. - - The type of the record. - The record to hydrate. - - - - Writes the given record to the current writer row. - - The type of the record. - The record. - - - - Base implementation for classes that write records. - - - - - Gets the writer. - - - - - The expression manager. - - - - - Initializes a new instance using the given writer. - - The writer. - - - - Writes the record to the current row. - - Type of the record. - The record. - - - - Gets the delegate to write the given record. - If the delegate doesn't exist, one will be created and cached. - - The record type. - The record. - - - - Creates a of type - that will write the given record using the current writer row. - - The record type. - The record. - - - - Combines the delegates into a single multicast delegate. - This is needed because Silverlight doesn't have the - Delegate.Combine( params Delegate[] ) overload. - - The delegates to combine. - A multicast delegate combined from the given delegates. - - - - Factory to create record writers. - - - - - Initializes a new instance using the given writer. - - The writer. - - - - Creates a new record writer for the given record. - - The type of the record. - The record. - - - - Creates CsvHelper classes. - - - - - Creates an . - - The text reader to use for the csv parser. - The configuration to use for the csv parser. - The created parser. - - - - Creates an . - - The text reader to use for the csv parser. - The created parser. - - - - Creates an . - - The text reader to use for the csv reader. - The configuration to use for the reader. - The created reader. - - - - Creates an . - - The text reader to use for the csv reader. - The created reader. - - - - Creates an . - - The parser used to create the reader. - The created reader. - - - - Creates an . - - The text writer to use for the csv writer. - The configuration to use for the writer. - The created writer. - - - - Creates an . - - The text writer to use for the csv writer. - The created writer. - - - - Access point for fluent interface to dynamically build a - - Type you will be making a class map for - Options to further configure the - - - - Defines methods used to create - CsvHelper classes. - - - - - Creates an . - - The text reader to use for the csv parser. - The configuration to use for the csv parser. - The created parser. - - - - Creates an . - - The text reader to use for the csv parser. - The created parser. - - - - Creates an . - - The text reader to use for the csv reader. - The configuration to use for the reader. - The created reader. - - - - Creates an . - - The text reader to use for the csv reader. - The created reader. - - - - Creates an . - - The parser used to create the reader. - The created reader. - - - - Creates an . - - The text writer to use for the csv writer. - The configuration to use for the writer. - The created writer. - - - - Creates an . - - The text writer to use for the csv writer. - The created writer. - - - - Provides a fluent interface for dynamically creating s - - Type of class to map - Next available options - - - - Defines methods used to read a field in a CSV file. - - - - - Gets the reading context. - - - - - Gets a value indicating if the buffer is empty. - True if the buffer is empty, otherwise false. - - - - - Fills the buffer. - - True if there is more data left. - False if all the data has been read. - - - - Fills the buffer asynchronously. - - True if there is more data left. - False if all the data has been read. - - - - Gets the next char as an . - - - - - Gets the field. This will append any reading progress. - - The current field. - - - - Appends the current reading progress. - - - - - Move's the buffer position according to the given offset. - - The offset to move the buffer. - - - - Sets the start of the field to the current buffer position. - - An offset for the field start. - The offset should be less than 1. - - - - Sets the end of the field to the current buffer position. - - An offset for the field start. - The offset should be less than 1. - - - - Sets the raw recodr start to the current buffer position; - - An offset for the raw record start. - The offset should be less than 1. - - - - Sets the raw record end to the current buffer position. - - An offset for the raw record end. - The offset should be less than 1. - - - - Defines the functionality of a class that creates objects - from a given type. - - - - - A value indicating if the resolver's - returns false that an object will still be created using - CsvHelper's object creation. True to fallback, otherwise false. - Default value is true. - - - - - A value indicating if the resolver is able to resolve - the given type. True if the type can be resolved, - otherwise false. - - - - - The function that creates an object from a given type. - - - - - Creates an object from the given type using the - function. If is false, the object will be - created using CsvHelper's default object creation. If - is false, an exception is thrown. - - The type to create an instance from. The created object - may not be the same type as the given type. - Constructor arguments used to create the type. - - - - Creates an object from the given type using the - function. If is false, the object will be - created using CsvHelper's default object creation. If - is false, an exception is thrown. - - The type to create an instance from. The created object - may not be the same type as the given type. - Constructor arguments used to create the type. - - - - Defines methods used the parse a CSV file. - - - - - Gets the reading context. - - - - - Gets the configuration. - - - - - Gets the . - - - - - Reads a record from the CSV file. - - A of fields for the record read. - - - - Reads a record from the CSV file asynchronously. - - A of fields for the record read. - - - - Defines methods used to read parsed data - from a CSV file. - - - - - Gets the parser. - - - - - Reads the header record without reading the first row. - - True if there are more records, otherwise false. - - - - Advances the reader to the next record. This will not read headers. - You need to call then - for the headers to be read. - - True if there are more records, otherwise false. - - - - Advances the reader to the next record. This will not read headers. - You need to call then - for the headers to be read. - - True if there are more records, otherwise false. - - - - Gets all the records in the CSV file and - converts each to T. The Read method - should not be used when using this. - - The of the record. - An of records. - - - - Gets all the records in the CSV file and converts - each to T. The read method - should not be used when using this. - - The of the record. - The anonymous type definition to use for the records. - An of records. - - - - Gets all the records in the CSV file and - converts each to T. The Read method - should not be used when using this. - - The of the record. - An of records. - - - - Enumerates the records hydrating the given record instance with row data. - The record instance is re-used and not cleared on each enumeration. - This only works for streaming rows. If any methods are called on the projection - that force the evaluation of the IEnumerable, such as ToList(), the entire list - will contain the same instance of the record, which is the last row. - - The type of the record. - The record to fill each enumeration. - An of records. - - - - Defines methods used to read parsed data - from a CSV file row. - - - - - Gets the reading context. - - - - - Gets or sets the configuration. - - - - - Gets the raw field at position (column) index. - - The zero based index of the field. - The raw field. - - - - Gets the raw field at position (column) name. - - The named index of the field. - The raw field. - - - - Gets the raw field at position (column) name. - - The named index of the field. - The zero based index of the field. - The raw field. - - - - Gets the raw field at position (column) index. - - The zero based index of the field. - The raw field. - - - - Gets the raw field at position (column) name. - - The named index of the field. - The raw field. - - - - Gets the raw field at position (column) name and the index - instance of that field. The index is used when there are - multiple columns with the same header name. - - The named index of the field. - The zero based index of the instance of the field. - The raw field. - - - - Gets the field converted to using - the specified . - - The type of the field. - The index of the field. - The field converted to . - - - - Gets the field converted to using - the specified . - - The type of the field. - The named index of the field. - The field converted to . - - - - Gets the field converted to using - the specified . - - The type of the field. - The named index of the field. - The zero based index of the instance of the field. - The field converted to . - - - - Gets the field converted to using - the specified . - - The type of the field. - The index of the field. - The used to convert the field to . - The field converted to . - - - - Gets the field converted to using - the specified . - - The type of the field. - The named index of the field. - The used to convert the field to . - The field converted to . - - - - Gets the field converted to using - the specified . - - The type of the field. - The named index of the field. - The zero based index of the instance of the field. - The used to convert the field to . - The field converted to . - - - - Gets the field converted to T at position (column) index. - - The of the field. - The zero based index of the field. - The field converted to T. - - - - Gets the field converted to T at position (column) name. - - The of the field. - The named index of the field. - The field converted to T. - - - - Gets the field converted to T at position - (column) name and the index instance of that field. The index - is used when there are multiple columns with the same header name. - - - The named index of the field. - The zero based index of the instance of the field. - - - - - Gets the field converted to T at position (column) index using - the given . - - The of the field. - The zero based index of the field. - The used to convert the field to T. - The field converted to T. - - - - Gets the field converted to T at position (column) name using - the given . - - The of the field. - The named index of the field. - The used to convert the field to T. - The field converted to T. - - - - Gets the field converted to T at position - (column) name and the index instance of that field. The index - is used when there are multiple columns with the same header name. - - The of the field. - The named index of the field. - The zero based index of the instance of the field. - The used to convert the field to T. - The field converted to T. - - - - Gets the field converted to T at position (column) index using - the given . - - The of the field. - The used to convert the field to T. - The zero based index of the field. - The field converted to T. - - - - Gets the field converted to T at position (column) name using - the given . - - The of the field. - The used to convert the field to T. - The named index of the field. - The field converted to T. - - - - Gets the field converted to T at position - (column) name and the index instance of that field. The index - is used when there are multiple columns with the same header name. - - The of the field. - The used to convert the field to T. - The named index of the field. - The zero based index of the instance of the field. - The field converted to T. - - - - Gets the field converted to T at position (column) index. - - The of the field. - The zero based index of the field. - The field converted to type T. - A value indicating if the get was successful. - - - - Gets the field converted to T at position (column) name. - - The of the field. - The named index of the field. - The field converted to T. - A value indicating if the get was successful. - - - - Gets the field converted to T at position - (column) name and the index instance of that field. The index - is used when there are multiple columns with the same header name. - - The of the field. - The named index of the field. - The zero based index of the instance of the field. - The field converted to T. - A value indicating if the get was successful. - - - - Gets the field converted to T at position (column) index - using the specified . - - The of the field. - The zero based index of the field. - The used to convert the field to T. - The field converted to T. - A value indicating if the get was successful. - - - - Gets the field converted to T at position (column) name - using the specified . - - The of the field. - The named index of the field. - The used to convert the field to T. - The field converted to T. - A value indicating if the get was successful. - - - - Gets the field converted to T at position (column) name - using the specified . - - The of the field. - The named index of the field. - The zero based index of the instance of the field. - The used to convert the field to T. - The field converted to T. - A value indicating if the get was successful. - - - - Gets the field converted to T at position (column) index. - - The of the field. - The zero based index of the field. - The field converted to type T. - A value indicating if the get was successful. - - - - Gets the field converted to T at position (column) name. - - The of the field. - The named index of the field. - The field converted to T. - A value indicating if the get was successful. - - - - Gets the field converted to T at position - (column) name and the index instance of that field. The index - is used when there are multiple columns with the same header name. - - - The named index of the field. - The zero based index of the instance of the field. - The field converted to T. - A value indicating if the get was successful. - - - - Gets the field converted to T at position (column) index - using the specified . - - The of the field. - The zero based index of the field. - The used to convert the field to T. - The field converted to T. - A value indicating if the get was successful. - - - - Gets the field converted to T at position (column) name - using the specified . - - The of the field. - The named index of the field. - The used to convert the field to T. - The field converted to T. - A value indicating if the get was successful. - - - - Gets the field converted to T at position (column) name - using the specified . - - The of the field. - The named index of the field. - The zero based index of the instance of the field. - The used to convert the field to T. - The field converted to T. - A value indicating if the get was successful. - - - - Gets the field converted to T at position (column) index - using the specified . - - The of the field. - The used to convert the field to T. - The zero based index of the field. - The field converted to T. - A value indicating if the get was successful. - - - - Gets the field converted to T at position (column) name - using the specified . - - The of the field. - The used to convert the field to T. - The named index of the field. - The field converted to T. - A value indicating if the get was successful. - - - - Gets the field converted to T at position (column) name - using the specified . - - The of the field. - The used to convert the field to T. - The named index of the field. - The zero based index of the instance of the field. - The field converted to T. - A value indicating if the get was successful. - - - - Gets the record converted into T. - - The of the record. - The record converted to T. - - - - Get the record converted into T. - - The of the record. - The anonymous type definition to use for the record. - The record converted to T. - - - - Gets the record. - - The of the record. - The record. - - - - Defines methods used to serialize data into a CSV file. - - - - - Gets the writing context. - - - - - Gets the configuration. - - - - - Writes a record to the CSV file. - - The record to write. - - - - Writes a record to the CSV file. - - The record to write. - - - - Writes a new line to the CSV file. - - - - - Writes a new line to the CSV file. - - - - - Defines methods used to write to a CSV file. - - - - - Serializes the row to the . - - - - - Serializes the row to the . - - - - - Ends writing of the current record and starts a new record. - This automatically flushes the writer. - - - - - Ends writing of the current record and starts a new record. - This automatically flushes the writer. - - - - - Writes the list of records to the CSV file. - - The list of records to write. - - - - Writes the list of records to the CSV file. - - Record type. - The list of records to write. - - - - Defines methods used to write a CSV row. - - - - - Gets the writing context. - - - - - Gets or sets the configuration. - - - - - Writes a field that has already been converted to a - from an . - If the field is null, it won't get written. A type converter - will always return a string, even if field is null. If the - converter returns a null, it means that the converter has already - written data, and the returned value should not be written. - - The converted field to write. - - - - Writes the field to the CSV file. The field - may get quotes added to it. - When all fields are written for a record, - must be called - to complete writing of the current record. - - The field to write. - - - - Writes the field to the CSV file. This will - ignore any need to quote and ignore the - - and just quote based on the shouldQuote - parameter. - When all fields are written for a record, - must be called - to complete writing of the current record. - - The field to write. - True to quote the field, otherwise false. - - - - Writes the field to the CSV file. - When all fields are written for a record, - must be called - to complete writing of the current record. - - The type of the field. - The field to write. - - - - Writes the field to the CSV file. - When all fields are written for a record, - must be called - to complete writing of the current record. - - The type of the field. - The field to write. - The converter used to convert the field into a string. - - - - Writes the field to the CSV file - using the given . - When all fields are written for a record, - must be called - to complete writing of the current record. - - The type of the field. - The type of the converter. - The field to write. - - - - Writes a comment. - - The comment to write. - - - - Writes the header record from the given members. - - The type of the record. - - - - Writes the header record from the given members. - - The type of the record. - - - - Writes the record to the CSV file. - - The type of the record. - The record to write. - - - - Represents an error caused because a field is missing - in the header while reading a CSV file. - - - - - Initializes a new instance of the class. - - The reading context. - - - - Initializes a new instance of the class - with a specified error message. - - The reading context. - The message that describes the error. - - - - Initializes a new instance of the class - with a specified error message and a reference to the inner exception that - is the cause of this exception. - - The reading context. - The error message that explains the reason for the exception. - The exception that is the cause of the current exception, or a null reference (Nothing in Visual Basic) if no inner exception is specified. - - - - Creates objects from a given type. - - - - - Gets or sets the current resolver. - - - - - A value indicating if the resolver's - returns false that an object will still be created using - CsvHelper's object creation. True to fallback, otherwise false. - Default value is true. - - - - - A function that returns a value indicating if the resolver - is able to resolve the given type. True if the type can be - resolved, otherwise false. - - - - - The function that creates an object from a given type. - - - - - Creates an instance of the object resolver using default values. - - - - - Creates an instance of the object resolver using the given can create function - and creat function. - - A function that returns a value indicating if the resolver - is able to resolve the given type. True if the type can be - resolved, otherwise false. - The function that creates an object from a given type. - A value indicating if the resolver's - returns false that an object will still be created using - CsvHelper's object creation. True to fallback, otherwise false. - Default value is true. - - - - Creates an object from the given type using the - function. If is false, the object will be - created using CsvHelper's default object creation. If - is false, an exception is thrown. - - The type to create an instance from. The created object - may not be the same type as the given type. - Constructor arguments used to create the type. - - - - Creates an object from the given type using the - function. If is false, the object will be - created using CsvHelper's default object creation. If - is false, an exception is thrown. - - The type to create an instance from. The created object - may not be the same type as the given type. - Constructor arguments used to create the type. - - - - Represents errors that occur while parsing a CSV file. - - - - - Initializes a new instance of the class. - - The reading context. - - - - Initializes a new instance of the class - with a specified error message. - - The reading context. - The message that describes the error. - - - - Initializes a new instance of the class - with a specified error message and a reference to the inner exception that - is the cause of this exception. - - The reading context. - The error message that explains the reason for the exception. - The exception that is the cause of the current exception, or a null reference (Nothing in Visual Basic) if no inner exception is specified. - - - - Represents errors that occur while reading a CSV file. - - - - - Initializes a new instance of the class. - - The reading context. - - - - Initializes a new instance of the class - with a specified error message. - - The reading context. - The message that describes the error. - - - - Initializes a new instance of the class - with a specified error message and a reference to the inner exception that - is the cause of this exception. - - The reading context. - The error message that explains the reason for the exception. - The exception that is the cause of the current exception, or a null reference (Nothing in Visual Basic) if no inner exception is specified. - - - - CSV reading state. - - - - - Gets the raw record builder. - - - - - Gets the field builder. - - - - - Gets the record builder. - - - - - Gets the named indexes. - - - - - Getse the named indexes cache. - - - - - Gets the type converter options cache. - - - - - Gets the create record functions. - - - - - Gets the hydrate record actions. - - - - - Gets the reusable member map data. - - - - - Gets the that is read from. - - - - - Gets a value indicating if the - should be left open when disposing. - - - - - Gets the buffer used to store data from the . - - - - - Gets the buffer position. - - - - - Gets the field start position. - - - - - Gets the field end position. - - - - - Gets the raw record start position. - - - - - Gets the raw record end position. - - - - - Gets the number of characters read from the . - - - - - Gets the character position. - - - - - Gets the byte position. - - - - - Gets a value indicating if the field is bad. - True if the field is bad, otherwise false. - A field is bad if a quote is found in a field - that isn't escaped. - - - - - Gets the record. - - - - - Gets the row of the CSV file that the parser is currently on. - - - - - Gets the row of the CSV file that the parser is currently on. - This is the actual file row. - - - - - Gets a value indicating if reading has begun. - - - - - Gets the header record. - - - - - Gets the current index. - - - - - Gets the column count. - - - - - Gets the configuration. - - - - - Gets the configuration. - - - - - Gets all the characters of the record including - quotes, delimeters, and line endings. - - - - - Gets the field. - - - - - Initializes a new instance. - - The reader. - The configuration. - A value indicating if the TextReader should be left open when disposing. - - - - Clears the specified caches. - - The caches to clear. - - - - Performs application-defined tasks associated with freeing, releasing, or resetting unmanaged resources. - - 2 - - - - Performs application-defined tasks associated with freeing, releasing, or resetting unmanaged resources. - - True if the instance needs to be disposed of. - - - - Builds CSV records. - - - - - The number of records. - - - - - The total record capacity. - - - - - Creates a new using defaults. - - - - - Creatse a new using the given capacity. - - The initial capacity. - - - - Adds a new field to the . - - The field to add. - The current instance of the . - - - - Clears the records. - - The current instance of the . - - - - Returns the record as an . - - The record as an . - - - - Extensions to help with reflection. - - - - - Gets the type from the member. - - The member to get the type from. - The type. - - - - Gets a member expression for the member. - - The member to get the expression for. - The member expression. - The member expression. - - - - Gets a value indicating if the given type is anonymous. - True for anonymous, otherwise false. - - The type. - - - - Gets a value indicating if the given type has a parameterless constructor. - True if it has a parameterless constructor, otherwise false. - - The type. - - - - Gets a value indicating if the given type has any constructors. - - The type. - - - - Gets the constructor that contains the most parameters. - - The type. - - - - Gets a value indicating if the type is a user defined struct. - True if it is a user defined struct, otherwise false. - - The type. - - - - Common reflection tasks. - - - - - Creates an instance of type T using the current . - - The type of instance to create. - The constructor arguments. - A new instance of type T. - - - - Creates an instance of the specified type using the current . - - The type of instance to create. - The constructor arguments. - A new instance of the specified type. - - - - Creates an instance of the specified type without using the - current . - - The type of instance to create. - The constructor arguments. - A new instance of the specified type. - - - - Gets the from the type where the property was declared. - - The type the property belongs to. - The property to search. - Flags for how the property is retrieved. - - - - Gets the property from the expression. - - The type of the model. - The type of the property. - The expression. - The for the expression. - - - - Gets the member inheritance chain as a stack. - - The type of the model. - The type of the property. - The member expression. - The inheritance chain for the given member expression as a stack. - - - - Converts an to and from a . - - - - - Converts the string to an object. - - The string to convert to an object. - The for the current record. - The for the member being created. - The object created from the string. - - - - Converts a to and from a . - - - - - Converts the string to an object. - - The string to convert to an object. - The for the current record. - The for the member being created. - The object created from the string. - - - - Converts a to and from a . - - - - - Creates a new ByteArrayConverter using the given . - - The options. - - - - Converts the object to a string. - - The object to convert to a string. - The for the current record. - The for the member being written. - The string representation of the object. - - - - Converts the string to an object. - - The string to convert to an object. - The for the current record. - The for the member being created. - The object created from the string. - - - - Options for converting byte arrays. - - - - - No options. - - - - - Hexadecimal encoding. - - - - - Base64 encoding. - - - - - Use dashes in between hex values. - - - - - Prefix hex number with 0x. - - - - - Converts a to and from a . - - - - - Converts the string to an object. - - The string to convert to an object. - The for the current record. - The for the member being created. - The object created from the string. - - - - Converts a to and from a . - - - - - Converts the string to an object. - - The string to convert to an object. - The for the current record. - The for the member being created. - The object created from the string. - - - - Converts a to and from a . - - - - - Converts the string to an object. - - The string to convert to an object. - The for the current record. - The for the member being created. - The object created from the string. - - - - Converts a to and from a . - - - - - Converts the string to an object. - - The string to convert to an object. - The for the current record. - The for the member being created. - The object created from the string. - - - - Converts a to and from a . - - - - - Converts the string to an object. - - The string to convert to an object. - The for the current record. - The for the member being created. - The object created from the string. - - - - Converts a to and from a . - - - - - Converts the string to an object. - - The string to convert to an object. - The for the current record. - The for the member being created. - The object created from the string. - - - - Converts an to and from a . - - - - - Converts the object to a string. - - The object to convert to a string. - The for the current record. - The for the member being written. - The string representation of the object. - - - - Converts the string to an object. - - The string to convert to an object. - The for the current record. - The for the member being created. - The object created from the string. - - - - Converts a to and from a . - - - - - Converts the string to an object. - - The string to convert to an object. - The for the current record. - The for the member being created. - The object created from the string. - - - - Converts an to and from a . - - - - - Creates a new for the given . - - The type of the Enum. - - - - Converts the string to an object. - - The string to convert to an object. - The for the current record. - The for the member being created. - The object created from the string. - - - - Throws an exception when used. This is here so that it's apparent - that there is no support for type coversion. A custom - converter will need to be created to have a field convert to and - from an IEnumerable. - - - - - Throws an exception. - - The string to convert to an object. - The for the current record. - The for the member being created. - The object created from the string. - - - - Throws an exception. - - The object to convert to a string. - The for the current record. - The for the member being written. - The string representation of the object. - - - - Converts a to and from a . - - - - - Converts the string to an object. - - The string to convert to an object. - The for the current record. - The for the member being created. - The object created from the string. - - - - Converts an to and from a . - - - - - Converts the object to a string. - - The object to convert to a string. - The for the current record. - The for the member being written. - The string representation of the object. - - - - Converts the string to an object. - - The string to convert to an object. - The for the current record. - The for the member being created. - The object created from the string. - - - - Converts an to and from a . - - - - - Converts the string to an object. - - The string to convert to an object. - The for the current record. - The for the member being created. - The object created from the string. - - - - Converts an to and from a . - - - - - Converts the object to a string. - - The object to convert to a string. - - - The string representation of the object. - - - - Converts the string to an object. - - The string to convert to an object. - The for the current record. - The for the member being created. - The object created from the string. - - - - Converts an to and from a . - - - - - Converts the string to an object. - - The string to convert to an object. - The for the current record. - The for the member being created. - The object created from the string. - - - - Converts a to and from a . - - - - - Converts the string to an object. - - The string to convert to an object. - The for the current record. - The for the member being created. - The object created from the string. - - - - Converts an to and from a . - - - - - Converts the string to an object. - - The string to convert to an object. - The for the current record. - The for the member being created. - The object created from the string. - - - - Converts an to and from a . - - - - - Converts the string to an object. - - The string to convert to an object. - The for the current record. - The for the member being created. - The object created from the string. - - - - Converts objects to and from strings. - - - - - Converts the object to a string. - - The object to convert to a string. - The for the current record. - The for the member being written. - The string representation of the object. - - - - Converts the string to an object. - - The string to convert to an object. - The for the current record. - The for the member being created. - The object created from the string. - - - - Converts a to and from a . - - - - - Gets the type of the nullable. - - - The type of the nullable. - - - - - Gets the underlying type of the nullable. - - - The underlying type. - - - - - Gets the type converter for the underlying type. - - - The type converter. - - - - - Creates a new for the given . - - The nullable type. - The type converter factory. - type is not a nullable type. - - - - Converts the string to an object. - - The string to convert to an object. - The for the current record. - The for the member being created. - The object created from the string. - - - - Converts the object to a string. - - The object to convert to a string. - - - The string representation of the object. - - - - Converts a to and from a . - - - - - Converts the string to an object. - - The string to convert to an object. - The for the current record. - The for the member being created. - The object created from the string. - - - - Converts a to and from a . - - - - - Converts the string to an object. - - The string to convert to an object. - The for the current record. - The for the member being created. - The object created from the string. - - - - Converts a to and from a . - - - - - Converts the string to an object. - - The string to convert to an object. - The for the current record. - The for the member being created. - The object created from the string. - - - - Converts a to and from a . - - - - - Converts the string to an object. - - The string to convert to an object. - The for the current record. - The for the member being created. - The object created from the string. - - - - Caches s for a given type. - - - - - Initializes the class. - - - - - Adds the for the given . - - The type the converter converts. - The type converter that converts the type. - - - - Adds the for the given . - - The type the converter converts. - The type converter that converts the type. - - - - Removes the for the given . - - The type to remove the converter for. - - - - Removes the for the given . - - The type to remove the converter for. - - - - Gets the converter for the given . - - The type to get the converter for. - The for the given . - - - - Gets the converter for the given . - - The type to get the converter for. - The for the given . - - - - Represents errors that occur while reading a CSV file. - - - - - The text used in ConvertFromString. - - - - - The value used in ConvertToString. - - - - - The type converter. - - - - - The member map data used in ConvertFromString and ConvertToString. - - - - - Initializes a new instance of the class. - - The type converter. - The member map data. - The text. - The reading context. - - - - Initializes a new instance of the class. - - The type converter. - The member map data. - The value. - The writing context. - - - - Initializes a new instance of the class - with a specified error message. - - The type converter. - The member map data. - The text. - The reading context. - The message that describes the error. - - - - Initializes a new instance of the class - with a specified error message. - - The type converter. - The member map data. - The value. - The writing context. - The message that describes the error. - - - - Initializes a new instance of the class - with a specified error message and a reference to the inner exception that - is the cause of this exception. - - The type converter. - The member map data. - The text. - The reading context. - The error message that explains the reason for the exception. - The exception that is the cause of the current exception, or a null reference (Nothing in Visual Basic) if no inner exception is specified. - - - - Initializes a new instance of the class - with a specified error message and a reference to the inner exception that - is the cause of this exception. - - The type converter. - The member map data. - The value. - The writing context. - The error message that explains the reason for the exception. - The exception that is the cause of the current exception, or a null reference (Nothing in Visual Basic) if no inner exception is specified. - - - - Options used when doing type conversion. - - - - - Gets or sets the culture info. - - - - - Gets or sets the date time style. - - - - - Gets or sets the time span style. - - - - - Gets or sets the number style. - - - - - Gets or sets the string format. - - - - - Gets the list of values that can be - used to represent a boolean of true. - - - - - Gets the list of values that can be - used to represent a boolean of false. - - - - - Gets the list of values that can be used to represent a null value. - - - - - Merges TypeConverterOptions by applying the values of sources in order on to each other. - The first object is the source object. - - The sources that will be applied. - The updated source object. - - - - Caches for a given type. - - - - - Adds the for the given . - - The type the options are for. - The options. - - - - Adds the for the given . - - The type the options are for. - The options. - - - - Removes the for the given type. - - The type to remove the options for. - - - - Removes the for the given type. - - The type to remove the options for. - - - - Get the for the given . - - The type the options are for. - The options for the given type. - - - - Get the for the given . - - The type the options are for. - The options for the given type. - - - - Converts a to and from a . - - - - - Converts the string to an object. - - The string to convert to an object. - The for the current record. - The for the member being created. - The object created from the string. - - - - Converts a to and from a . - - - - - Converts the string to an object. - - The string to convert to an object. - The for the current record. - The for the member being created. - The object created from the string. - - - - Converts a to and from a . - - - - - Converts the string to an object. - - The string to convert to an object. - The for the current record. - The for the member being created. - The object created from the string. - - - - Represents a user supplied validation failure. - - - - - Initializes a new instance of the class. - - The reading context. - - - - Initializes a new instance of the class - with a specified error message. - - The reading context. - The message that describes the error. - - - - Initializes a new instance of the class - with a specified error message and a reference to the inner exception that - is the cause of this exception. - - The reading context. - The error message that explains the reason for the exception. - The exception that is the cause of the current exception, or a null reference (Nothing in Visual Basic) if no inner exception is specified. - - - - Represents errors that occur while writing a CSV file. - - - - - Initializes a new instance of the class. - - The writing context. - - - - Initializes a new instance of the class - with a specified error message. - - The writing context. - The message that describes the error. - - - - Initializes a new instance of the class - with a specified error message and a reference to the inner exception that - is the cause of this exception. - - The writing context. - The error message that explains the reason for the exception. - The exception that is the cause of the current exception, or a null reference (Nothing in Visual Basic) if no inner exception is specified. - - - - CSV writing state. - - - - - Gets the type actions. - - - - - Gets the type converter options. - - - - - Gets or sets the reusable member map data. - - - - - Gets the writer configuration. - - - - - Gets the serializer configuration. - - - - - Gets the . - - - - - Gets a value indicating if the - should be left open when disposing. - - - - - Gets the current row. - - - - - Get the current record; - - - - - Gets a value indicating if the header has been written. - - - - - Gets a value indicating if a record has been written. - - - - - Initializes a new instance. - - The writer. - The configuration. - A value indicating if the TextWriter should be left open. - - - - Clears the specified caches. - - The caches to clear. - - - - Performs application-defined tasks associated with freeing, releasing, or resetting unmanaged resources. - - 2 - - - - Performs application-defined tasks associated with freeing, releasing, or resetting unmanaged resources. - - True if the instance needs to be disposed of. - - - diff --git a/packages/DirectXTexNet.1.0.0-rc3/.signature.p7s b/packages/DirectXTexNet.1.0.0-rc3/.signature.p7s deleted file mode 100644 index 5de931c7..00000000 Binary files a/packages/DirectXTexNet.1.0.0-rc3/.signature.p7s and /dev/null differ diff --git a/packages/DirectXTexNet.1.0.0-rc3/DirectXTexNet.1.0.0-rc3.nupkg b/packages/DirectXTexNet.1.0.0-rc3/DirectXTexNet.1.0.0-rc3.nupkg deleted file mode 100644 index 599e4409..00000000 Binary files a/packages/DirectXTexNet.1.0.0-rc3/DirectXTexNet.1.0.0-rc3.nupkg and /dev/null differ diff --git a/packages/DirectXTexNet.1.0.0-rc3/LICENSE b/packages/DirectXTexNet.1.0.0-rc3/LICENSE deleted file mode 100644 index 2ba6db38..00000000 --- a/packages/DirectXTexNet.1.0.0-rc3/LICENSE +++ /dev/null @@ -1,28 +0,0 @@ -MIT License - -New DirectXTexNet -Copyright (c) 2018 Dennis Gocke - -Original DirectXTexNet -Copyright (c) 2016 Simon Taylor - -DirectXTex -Copyright (c) 2018 Microsoft Corp - -Permission is hereby granted, free of charge, to any person obtaining a copy -of this software and associated documentation files (the "Software"), to deal -in the Software without restriction, including without limitation the rights -to use, copy, modify, merge, publish, distribute, sublicense, and/or sell -copies of the Software, and to permit persons to whom the Software is -furnished to do so, subject to the following conditions: - -The above copyright notice and this permission notice shall be included in all -copies or substantial portions of the Software. - -THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR -IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, -FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE -AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER -LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, -OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE -SOFTWARE. diff --git a/packages/DirectXTexNet.1.0.0-rc3/build/DirectXTexNet.targets b/packages/DirectXTexNet.1.0.0-rc3/build/DirectXTexNet.targets deleted file mode 100644 index b672b7eb..00000000 --- a/packages/DirectXTexNet.1.0.0-rc3/build/DirectXTexNet.targets +++ /dev/null @@ -1,9 +0,0 @@ - - - - - %(RecursiveDir)%(FileName)%(Extension) - PreserveNewest - - - diff --git a/packages/DirectXTexNet.1.0.0-rc3/build/x64/DirectXTexNetImpl.dll b/packages/DirectXTexNet.1.0.0-rc3/build/x64/DirectXTexNetImpl.dll deleted file mode 100644 index d2099496..00000000 Binary files a/packages/DirectXTexNet.1.0.0-rc3/build/x64/DirectXTexNetImpl.dll and /dev/null differ diff --git a/packages/DirectXTexNet.1.0.0-rc3/build/x86/DirectXTexNetImpl.dll b/packages/DirectXTexNet.1.0.0-rc3/build/x86/DirectXTexNetImpl.dll deleted file mode 100644 index 91822a1d..00000000 Binary files a/packages/DirectXTexNet.1.0.0-rc3/build/x86/DirectXTexNetImpl.dll and /dev/null differ diff --git a/packages/DirectXTexNet.1.0.0-rc3/lib/net40/DirectXTexNet.XML b/packages/DirectXTexNet.1.0.0-rc3/lib/net40/DirectXTexNet.XML deleted file mode 100644 index 7a58a982..00000000 --- a/packages/DirectXTexNet.1.0.0-rc3/lib/net40/DirectXTexNet.XML +++ /dev/null @@ -1,715 +0,0 @@ - - - - DirectXTexNet - - - - - Normal operation - - - - - Assume pitch is DWORD aligned instead of BYTE aligned - - - - - Assume pitch is 16-byte aligned instead of BYTE aligned - - - - - Assume pitch is 32-byte aligned instead of BYTE aligned - - - - - The ZMM - - - - - Assume pitch is 4096-byte aligned instead of BYTE aligned - - - - - BC formats with malformed mipchain blocks smaller than 4x4 - - - - - Override with a legacy 24 bits-per-pixel format size - - - - - Override with a legacy 16 bits-per-pixel format size - - - - - Override with a legacy 8 bits-per-pixel format size - - - - - Subset here matches D3D10_RESOURCE_MISC_FLAG and D3D11_RESOURCE_MISC_FLAG - - - - - Matches DDS_ALPHA_MODE, encoded in MISC_FLAGS2 - - - - - Assume pitch is DWORD aligned instead of BYTE aligned (used by some legacy DDS files) - - - - - Do not implicitly convert legacy formats that result in larger pixel sizes (24 bpp, 3:3:2, A8L8, A4L4, P8, A8P8) - - - - - Do not use work-around for long-standing D3DX DDS file format issue which reversed the 10:10:10:2 color order masks - - - - - Convert DXGI 1.1 BGR formats to DXGI_FORMAT_R8G8B8A8_UNORM to avoid use of optional WDDM 1.1 formats - - - - - Conversions avoid use of 565, 5551, and 4444 formats and instead expand to 8888 to avoid use of optional WDDM 1.2 formats - - - - - When loading legacy luminance formats expand replicating the color channels rather than leaving them packed (L8, L16, A8L8) - - - - - Some older DXTn DDS files incorrectly handle mipchain tails for blocks smaller than 4x4 - - - - - Always use the 'DX10' header extension for DDS writer (i.e. don't try to write DX9 compatible DDS files) - - - - - FORCE_DX10_EXT including miscFlags2 information (result may not be compatible with D3DX10 or D3DX11) - - - - - Loads DXGI 1.1 BGR formats as DXGI_FORMAT_R8G8B8A8_UNORM to avoid use of optional WDDM 1.1 formats - - - - - Loads DXGI 1.1 X2 10:10:10:2 format as DXGI_FORMAT_R10G10B10A2_UNORM - - - - - Loads 565, 5551, and 4444 formats as 8888 to avoid use of optional WDDM 1.2 formats - - - - - Loads 1-bit monochrome (black and white) as R1_UNORM rather than 8-bit grayscale - - - - - Loads all images in a multi-frame file, converting/resizing to match the first frame as needed, defaults to 0th frame otherwise - - - - - Ignores sRGB metadata if present in the file - - - - - Use ordered 4x4 dithering for any required conversions - - - - - Use error-diffusion dithering for any required conversions - - - - - Filtering mode to use for any required image resizing (only needed when loading arrays of differently sized images; defaults to Fant) - - - - - Filtering mode to use for any required image resizing (only needed when loading arrays of differently sized images; defaults to Fant) - - - - - Filtering mode to use for any required image resizing (only needed when loading arrays of differently sized images; defaults to Fant) - - - - - Filtering mode to use for any required image resizing (only needed when loading arrays of differently sized images; defaults to Fant) - Combination of Linear and Box filter - - - - - Wrap vs. Mirror vs. Clamp filtering options - - - - - Wrap vs. Mirror vs. Clamp filtering options - - - - - Wrap vs. Mirror vs. Clamp filtering options - - - - - Wrap vs. Mirror vs. Clamp filtering options - - - - - Wrap vs. Mirror vs. Clamp filtering options - - - - - Wrap vs. Mirror vs. Clamp filtering options - - - - - Wrap vs. Mirror vs. Clamp filtering options - - - - - Resize color and alpha channel independently - - - - - Enable *2 - 1 conversion cases for unorm to/from float and positive-only float formats - - - - - When converting RGB to R, defaults to using grayscale. These flags indicate copying a specific channel instead - When converting RGB to RG, defaults to copying RED | GREEN. These flags control which channels are selected instead. - - - - - When converting RGB to R, defaults to using grayscale. These flags indicate copying a specific channel instead - When converting RGB to RG, defaults to copying RED | GREEN. These flags control which channels are selected instead. - - - - - When converting RGB to R, defaults to using grayscale. These flags indicate copying a specific channel instead - When converting RGB to RG, defaults to copying RED | GREEN. These flags control which channels are selected instead. - - - - - Use ordered 4x4 dithering for any required conversions - - - - - Use error-diffusion dithering for any required conversions - - - - - Filtering mode to use for any required image resizing - - - - - Filtering mode to use for any required image resizing - - - - - Filtering mode to use for any required image resizing - - - - - Filtering mode to use for any required image resizing - - - - - Filtering mode to use for any required image resizing - Equiv to Box filtering for mipmap generation - - - - - Filtering mode to use for any required image resizing - - - - - sRGB to/from RGB for use in conversion operations - if the input format type is IsSRGB(), then SRGB_IN is on by default - if the output format type is IsSRGB(), then SRGB_OUT is on by default - - - - - Forces use of the non-WIC path when both are an option - - - - - Forces use of the WIC path even when logic would have picked a non-WIC path when both are an option - - - - - ignores sRGB colorspace conversions - - - - - converts from premultiplied alpha back to straight alpha - - - - - if the input format type is IsSRGB(), then SRGB_IN is on by default - if the output format type is IsSRGB(), then SRGB_OUT is on by default - - - - - Enables dithering RGB colors for BC1-3 compression - - - - - Enables dithering alpha for BC1-3 compression - - - - - Enables both RGB and alpha dithering for BC1-3 compression - - - - - Uniform color weighting for BC1-3 compression; by default uses perceptual weighting - - - - - Enables exhaustive search for BC7 compress for mode 0 and 2; by default skips trying these modes - - - - - Minimal modes (usually mode 6) for BC7 compression - - - - - if the input format type is IsSRGB(), then SRGB_IN is on by default - if the output format type is IsSRGB(), then SRGB_OUT is on by default - - - - - Compress is free to use multithreading to improve performance (by default it does not use multithreading) - - - - - Channel selection when evaluting color value for height - - - - - Channel selection when evaluting color value for height - - - - - Channel selection when evaluting color value for height - - - - - Channel selection when evaluting color value for height - - - - - Channel selection when evaluting color value for height - Luminance is a combination of red, green, and blue - - - - - Use mirror semantics for scanline references (defaults to wrap) - - - - - Use mirror semantics for scanline references (defaults to wrap) - - - - - Use mirror semantics for scanline references (defaults to wrap) - - - - - Inverts normal sign - - - - - Computes a crude occlusion term stored in the alpha channel - - - - - Indicates that image needs gamma correction before comparision - - - - - Indicates that image needs gamma correction before comparision - - - - - Ignore the channel when computing MSE - - - - - Ignore the channel when computing MSE - - - - - Ignore the channel when computing MSE - - - - - Ignore the channel when computing MSE - - - - - Indicates that image should be scaled and biased before comparison (i.e. UNORM -> SNORM) - - - - - Indicates that image should be scaled and biased before comparison (i.e. UNORM -> SNORM) - - - - - Windows Bitmap (.bmp) - - - - - Joint Photographic Experts Group (.jpg, .jpeg) - - - - - Portable Network Graphics (.png) - - - - - Tagged Image File Format (.tif, .tiff) - - - - - Graphics Interchange Format (.gif) - - - - - Windows Media Photo / HD Photo / JPEG XR (.hdp, .jxr, .wdp) - - - - - Windows Icon (.ico) - - - - - The delegate used for the EvaluateImage method. - - The pixels. This a row of Pixels with each pixel normally represented as RBGA in 4x32bit float (0.0-1.0). - The width. - The y/row index. - - - - The delegate used for the EvaluateImage method. - - - The out pixels to write to. This a row of Pixels with each pixel normally represented as RBGA in 4x32bit float - (0.0-1.0). - - The input pixels. This a row of Pixels with each pixel normally represented as RBGA in 4x32bit float (0.0-1.0). - The width. - The y/row index. - - - - This is an immutable class representing the native Image struct. - It also keeps a reference to a parent to prevent finalizing of the parent when the image is still used. - But it's still strongly encouraged to manually dispose ScratchImages. - - - - - This class represents the native TexMetadata struct. A managed class is used to simplify passing it by reference. - - - - - The height. Should be 1 for 1D textures. - - - - - The depth. Should be 1 for 1D or 2D textures. - - - - - The array size. For cubemap, this is a multiple of 6. - - - - - Computes the image index for the specified values. If the image index is out of range is returned. - - The mip. - The item. - The slice. - The image index. If the image index is out of range is returned. - - - - Whether this ScratchImage owns the pixel data; - - - - - Normally GetImage().pixels should be used instead, because this only returns a pointer to the pixel data if this image owns the pixel data. - - - - - This only returns a value if this image owns the pixel data. - - - - - Determines whether all pixels are opaque. This method is not supported by temporary scratch images. - - - - - Creates a new ScratchImage (deep copy). - - Index of the image to make a copy of. - if set to true and the height of the image is 1 a 1D Texture is created instead a 2D Texture. - The flags. - - - - Creates a new Array ScratchImage (deep copy). - - The start index. - The n images. - if set to true and the height of the image is 1 a 1D Texture is created instead a 2D Texture. - The flags. - - - - Creates a copy of the image but with empty mip maps (not part of original DirectXTex). - Can be used to generate the mip maps by other means (DirectXTex MipMap Generation is pretty slow). - - The levels. - The format. - The flags. - if set to true the mip map levels are zeroed out. - - - - Resize the image to width x height. Defaults to Fant filtering. Note for a complex resize, the result will always have mipLevels == 1. - - The width. - The height. - The filter. - The resized image. - - - - Converts the image from a planar format to an equivalent non-planar format. - - - - - Converts the image from a planar format to an equivalent non-planar format. - - - - - Generates the mip maps. - - Index of the image. - The filter. Defaults to Fant filtering which is equivalent to a box filter. - - Levels of '0' indicates a full mipchain, otherwise is generates that number of total levels (including the source base - image). - - if set to true and the height of the image is 1 a 1D Texture is created instead a 2D Texture. - - - - Generates the mip maps. - - The filter. Defaults to Fant filtering which is equivalent to a box filter. - - Levels of '0' indicates a full mipchain, otherwise is generates that number of total levels (including the source base - image). - - - - - Generates the mip maps. - - The start index. - The depth. - The filter. Defaults to Fant filtering which is equivalent to a box filter. - - Levels of '0' indicates a full mipchain, otherwise is generates that number of total levels (including the source base - image). - - - - - Generates the mip maps. - - The filter. Defaults to Fant filtering which is equivalent to a box filter. - - Levels of '0' indicates a full mipchain, otherwise is generates that number of total levels (including the source base - image). - - - - - Converts to/from a premultiplied alpha version of the texture. - - Index of the image. - The flags. - - - - Converts to/from a premultiplied alpha version of the texture. - - The flags. - - - - Compresses the specified source image. Note that threshold is only used by BC1. - - Index of the image. - The format. - The compress. - The threshold. Default 0.5 - - - - DirectCompute-based compression - - Index of the image. - The device. - The format. - The compress. - The alpha weight (is only used by BC7. 1.0 is the typical value to use). - - - - Compresses the specified source image. Note that threshold is only used by BC1. - - The format. - The compress. - The threshold. Default 0.5 - - - - DirectCompute-based compression - - The device. - The format. - The compress. - The alpha weight (is only used by BC7. 1.0 is the typical value to use). - - - - Computes the image index for the specified values. If the image index is out of range is returned. - The ScratchImage provide a ComputeImageIndex method as well, which should be used preferrably. - - The metadata. - The mip. - The item. - The slice. - - The image index. If the image index is out of range is returned. - - - - - Creates a temporary image collection (Not part of the original DirectXTex). This does not copy the data. Be sure to not dispose the original ScratchImages that were combined in this - collection. Alternatively the ownership of the original ScratchImage(s) can be passed to this instance. - - The images. - The metadata. - Optional objects this instance should take ownership of. - - - diff --git a/packages/DirectXTexNet.1.0.0-rc3/lib/net40/DirectXTexNet.dll b/packages/DirectXTexNet.1.0.0-rc3/lib/net40/DirectXTexNet.dll deleted file mode 100644 index d1a663fc..00000000 Binary files a/packages/DirectXTexNet.1.0.0-rc3/lib/net40/DirectXTexNet.dll and /dev/null differ diff --git a/packages/DockPanelSuite.3.0.6/.signature.p7s b/packages/DockPanelSuite.3.0.6/.signature.p7s deleted file mode 100644 index 591e4934..00000000 Binary files a/packages/DockPanelSuite.3.0.6/.signature.p7s and /dev/null differ diff --git a/packages/DockPanelSuite.3.0.6/DockPanelSuite.3.0.6.nupkg b/packages/DockPanelSuite.3.0.6/DockPanelSuite.3.0.6.nupkg deleted file mode 100644 index 80f17b11..00000000 Binary files a/packages/DockPanelSuite.3.0.6/DockPanelSuite.3.0.6.nupkg and /dev/null differ diff --git a/packages/DockPanelSuite.3.0.6/lib/net35-client/WeifenLuo.WinFormsUI.Docking.dll b/packages/DockPanelSuite.3.0.6/lib/net35-client/WeifenLuo.WinFormsUI.Docking.dll deleted file mode 100644 index e4b2787a..00000000 Binary files a/packages/DockPanelSuite.3.0.6/lib/net35-client/WeifenLuo.WinFormsUI.Docking.dll and /dev/null differ diff --git a/packages/DockPanelSuite.3.0.6/lib/net40/WeifenLuo.WinFormsUI.Docking.dll b/packages/DockPanelSuite.3.0.6/lib/net40/WeifenLuo.WinFormsUI.Docking.dll deleted file mode 100644 index dfe045e9..00000000 Binary files a/packages/DockPanelSuite.3.0.6/lib/net40/WeifenLuo.WinFormsUI.Docking.dll and /dev/null differ diff --git a/packages/DockPanelSuite.ThemeVS2015.3.0.6/.signature.p7s b/packages/DockPanelSuite.ThemeVS2015.3.0.6/.signature.p7s deleted file mode 100644 index 703a8b88..00000000 Binary files a/packages/DockPanelSuite.ThemeVS2015.3.0.6/.signature.p7s and /dev/null differ diff --git a/packages/DockPanelSuite.ThemeVS2015.3.0.6/DockPanelSuite.ThemeVS2015.3.0.6.nupkg b/packages/DockPanelSuite.ThemeVS2015.3.0.6/DockPanelSuite.ThemeVS2015.3.0.6.nupkg deleted file mode 100644 index c2b4c391..00000000 Binary files a/packages/DockPanelSuite.ThemeVS2015.3.0.6/DockPanelSuite.ThemeVS2015.3.0.6.nupkg and /dev/null differ diff --git a/packages/DockPanelSuite.ThemeVS2015.3.0.6/lib/net35-client/WeifenLuo.WinFormsUI.Docking.ThemeVS2015.dll b/packages/DockPanelSuite.ThemeVS2015.3.0.6/lib/net35-client/WeifenLuo.WinFormsUI.Docking.ThemeVS2015.dll deleted file mode 100644 index 0dbf5f40..00000000 Binary files a/packages/DockPanelSuite.ThemeVS2015.3.0.6/lib/net35-client/WeifenLuo.WinFormsUI.Docking.ThemeVS2015.dll and /dev/null differ diff --git a/packages/DockPanelSuite.ThemeVS2015.3.0.6/lib/net40/WeifenLuo.WinFormsUI.Docking.ThemeVS2015.dll b/packages/DockPanelSuite.ThemeVS2015.3.0.6/lib/net40/WeifenLuo.WinFormsUI.Docking.ThemeVS2015.dll deleted file mode 100644 index 041e1815..00000000 Binary files a/packages/DockPanelSuite.ThemeVS2015.3.0.6/lib/net40/WeifenLuo.WinFormsUI.Docking.ThemeVS2015.dll and /dev/null differ diff --git a/packages/IonKiwi.lz4.net.1.0.11/.signature.p7s b/packages/IonKiwi.lz4.net.1.0.11/.signature.p7s deleted file mode 100644 index 0ac240fb..00000000 Binary files a/packages/IonKiwi.lz4.net.1.0.11/.signature.p7s and /dev/null differ diff --git a/packages/IonKiwi.lz4.net.1.0.11/IonKiwi.lz4.net.1.0.11.nupkg b/packages/IonKiwi.lz4.net.1.0.11/IonKiwi.lz4.net.1.0.11.nupkg deleted file mode 100644 index 5ffd15b9..00000000 Binary files a/packages/IonKiwi.lz4.net.1.0.11/IonKiwi.lz4.net.1.0.11.nupkg and /dev/null differ diff --git a/packages/IonKiwi.lz4.net.1.0.11/lib/net35-client/lz4.AnyCPU.loader.dll b/packages/IonKiwi.lz4.net.1.0.11/lib/net35-client/lz4.AnyCPU.loader.dll deleted file mode 100644 index 2e87f3a5..00000000 Binary files a/packages/IonKiwi.lz4.net.1.0.11/lib/net35-client/lz4.AnyCPU.loader.dll and /dev/null differ diff --git a/packages/IonKiwi.lz4.net.1.0.11/lib/net40-client/lz4.AnyCPU.loader.dll b/packages/IonKiwi.lz4.net.1.0.11/lib/net40-client/lz4.AnyCPU.loader.dll deleted file mode 100644 index 9894995e..00000000 Binary files a/packages/IonKiwi.lz4.net.1.0.11/lib/net40-client/lz4.AnyCPU.loader.dll and /dev/null differ diff --git a/packages/IonKiwi.lz4.net.1.0.11/lib/net45/lz4.AnyCPU.loader.dll b/packages/IonKiwi.lz4.net.1.0.11/lib/net45/lz4.AnyCPU.loader.dll deleted file mode 100644 index 3379932d..00000000 Binary files a/packages/IonKiwi.lz4.net.1.0.11/lib/net45/lz4.AnyCPU.loader.dll and /dev/null differ diff --git a/packages/IonKiwi.lz4.net.1.0.11/lib/net46/lz4.AnyCPU.loader.dll b/packages/IonKiwi.lz4.net.1.0.11/lib/net46/lz4.AnyCPU.loader.dll deleted file mode 100644 index c538e84a..00000000 Binary files a/packages/IonKiwi.lz4.net.1.0.11/lib/net46/lz4.AnyCPU.loader.dll and /dev/null differ diff --git a/packages/IonKiwi.lz4.net.1.0.11/lib/net47/lz4.AnyCPU.loader.dll b/packages/IonKiwi.lz4.net.1.0.11/lib/net47/lz4.AnyCPU.loader.dll deleted file mode 100644 index b4863f6d..00000000 Binary files a/packages/IonKiwi.lz4.net.1.0.11/lib/net47/lz4.AnyCPU.loader.dll and /dev/null differ diff --git a/packages/IonKiwi.lz4.net.1.0.11/lib/net471/lz4.AnyCPU.loader.dll b/packages/IonKiwi.lz4.net.1.0.11/lib/net471/lz4.AnyCPU.loader.dll deleted file mode 100644 index ee3ac8ab..00000000 Binary files a/packages/IonKiwi.lz4.net.1.0.11/lib/net471/lz4.AnyCPU.loader.dll and /dev/null differ diff --git a/packages/IonKiwi.lz4.net.1.0.11/lib/net472/lz4.AnyCPU.loader.dll b/packages/IonKiwi.lz4.net.1.0.11/lib/net472/lz4.AnyCPU.loader.dll deleted file mode 100644 index 11467402..00000000 Binary files a/packages/IonKiwi.lz4.net.1.0.11/lib/net472/lz4.AnyCPU.loader.dll and /dev/null differ diff --git a/packages/IonKiwi.lz4.net.1.0.11/tools/_._ b/packages/IonKiwi.lz4.net.1.0.11/tools/_._ deleted file mode 100644 index e69de29b..00000000 diff --git a/packages/K4os.Compression.LZ4.1.1.1/.signature.p7s b/packages/K4os.Compression.LZ4.1.1.1/.signature.p7s deleted file mode 100644 index 1a9e2d90..00000000 Binary files a/packages/K4os.Compression.LZ4.1.1.1/.signature.p7s and /dev/null differ diff --git a/packages/K4os.Compression.LZ4.1.1.1/K4os.Compression.LZ4.1.1.1.nupkg b/packages/K4os.Compression.LZ4.1.1.1/K4os.Compression.LZ4.1.1.1.nupkg deleted file mode 100644 index 3ee08907..00000000 Binary files a/packages/K4os.Compression.LZ4.1.1.1/K4os.Compression.LZ4.1.1.1.nupkg and /dev/null differ diff --git a/packages/K4os.Compression.LZ4.1.1.1/lib/net46/K4os.Compression.LZ4.dll b/packages/K4os.Compression.LZ4.1.1.1/lib/net46/K4os.Compression.LZ4.dll deleted file mode 100644 index a3198315..00000000 Binary files a/packages/K4os.Compression.LZ4.1.1.1/lib/net46/K4os.Compression.LZ4.dll and /dev/null differ diff --git a/packages/K4os.Compression.LZ4.1.1.1/lib/net46/K4os.Compression.LZ4.xml b/packages/K4os.Compression.LZ4.1.1.1/lib/net46/K4os.Compression.LZ4.xml deleted file mode 100644 index 37b2f8eb..00000000 --- a/packages/K4os.Compression.LZ4.1.1.1/lib/net46/K4os.Compression.LZ4.xml +++ /dev/null @@ -1,771 +0,0 @@ - - - - K4os.Compression.LZ4 - - - - - Action performed by encoder using FlushAndEncode method. - - - - Nothing has happened, most likely loading 0 bytes. - - - Some bytes has been loaded into encoder. - - - Compression was not possible so bytes has been copied. - - - Compression succeeded. - - - - Interface of LZ4 decoder used by LZ4 streams. - - - - Block size. - - - Bytes already decoded and available to be read. - Always smaller than - - - - Decodes previously compressed block and caches decompressed block in decoder. - Returns number of bytes decoded. These bytes can be read with . - - Points to compressed block. - Length of compressed block. - Size of the block. Value 0 indicates default block size. - Number of decoded bytes. - - - - Inject already decompressed block and caches it in decoder. - Used with uncompressed-yet-chained blocks and pre-made dictionaries. - These bytes can be read with . - - Points to uncompressed block. - Length of uncompressed block. - Number of decoded bytes. - - - - Reads previously decoded bytes. Please note, should be - negative number, pointing to bytes before current head. - - Buffer to write to. - Offset in source buffer relatively to current head. - Please note, it should be negative value. - Number of bytes to read. - - - - Interface of LZ4 encoder used by LZ4 streams. - - - - Block size. - - - Number of bytes read for compression. - Always smaller than - - - Adds bytes to internal buffer. Increases - Source buffer. - Source buffer length. - Number of bytes topped up. If this function returns 0 it means that buffer - is full ( equals ) and - should be called to flush it. - - - - Encodes bytes in internal buffer (see: , ). - If is true then if encoded buffer is bigger than - source buffer source bytes are copied instead. In such case returned length is negative. - - Target buffer. - Target buffer length. - Indicates if copying is allowed. - Length of encoded buffer. Negative if bytes are just copied. - - - - LZ4 decoder used with independent blocks mode. Plase note, that it will fail - if input data has been compressed with chained blocks - ( and ) - - - - - - - - - - Creates new instance of block decoder. - Block size. Must be equal or greater to one used for compression. - - - - - - - - - - - - - - - - Independent block encoder. Produces larger files but uses less memory and - gives better performance. - - - - Creates new instance of - Compression level. - Block size. - - - - - - - - - LZ4 decoder handling dependent blocks. - - - Creates new instance of . - Block size. - Number of extra blocks. - - - - - - - - - - - - - - - - - - - - - - Static class with factory methods to create LZ4 decoders. - - - - Creates appropriate decoder for given parameters. - Dependent blocks. - Block size. - Number of extra blocks. - LZ4 decoder. - - - - Static class with factory method to create LZ4 encoders. - - - - Creates appropriate decoder for given parameters. - Dependent blocks. - Compression level. - Block size. - Number of extra blocks. - LZ4 encoder. - - - - Base class for LZ4 encoders. Provides basic functionality shared by - , , - and encoders. Do not used directly. - - - - Creates new instance of encoder. - Needs to be true if using dependent blocks. - Block size. - Number of extra blocks. - - - - - - - - - - - - - - - Encodes single block using appropriate algorithm. - Source buffer. - Source buffer length. - Target buffer. - Target buffer length. - Number of bytes actually written to target buffer. - - - Copies current dictionary. - Target buffer. - Dictionary length. - Dictionary length. - - - - - - - Functionality of encoders added on top of fixed interface. - - - - Tops encoder up with some data. - Encoder. - Buffer pointer, will be shifted after operation by the number of - bytes actually loaded. - Length of buffer. - true if buffer was topped up, false if no bytes were loaded. - - - Tops encoder up with some data. - Encoder. - Buffer. - Buffer offset. - Length of buffer. - Number of bytes actually loaded. - - - Tops encoder up with some data. - Encoder. - Buffer. - Buffer offset, will be increased after operation by the number - of bytes actually loaded. - Length of buffer. - true if buffer was topped up, false if no bytes were loaded. - - - Encodes all bytes currently stored in encoder into target buffer. - Encoder. - Target buffer. - Offset in target buffer. - Length of target buffer. - if true copying bytes is allowed. - Number of bytes encoder. If bytes were copied than this value is negative. - - - Encodes all bytes currently stored in encoder into target buffer. - Encoder. - Target buffer. - Offset in target buffer. Will be updated after operation. - Length of target buffer. - if true copying bytes is allowed. - Result of this action. Bytes can be Copied (), - Encoded () or nothing could have - happened (). - - - Encodes all bytes currently stored in encoder into target buffer. - Encoder. - Target buffer. Will be updated after operation. - Length of buffer. - if true copying bytes is allowed. - Result of this action. Bytes can be Copied (), - Encoded () or nothing could have - happened (). - - - Tops encoder and encodes content. - Encoder. - Source buffer (used to top up from). - Source buffer length. - Target buffer (used to encode into) - Target buffer length. - Forces encoding even if encoder is not full. - Allows to copy bytes if compression was not possible. - Number of bytes loaded (topped up) - Number if bytes encoded or copied. - Value is 0 if no encoding was done. - Action performed. - - - Tops encoder and encodes content. - Encoder. - Source buffer (used to top up from). - Offset within source buffer. - Source buffer length. - Target buffer (used to encode into) - Offset within target buffer. - Target buffer length. - Forces encoding even if encoder is not full. - Allows to copy bytes if compression was not possible. - Number of bytes loaded (topped up) - Number if bytes encoded or copied. - Value is 0 if no encoding was done. - Action performed. - - - Encoded remaining bytes in encoder. - Encoder. - Target buffer. - Target buffer length. - Allows to copy bytes if compression was not possible. - Number if bytes encoded or copied. - Value is 0 if no encoding was done. - Action performed. - - - Encoded remaining bytes in encoder. - Encoder. - Target buffer. - Offset within target buffer. - Target buffer length. - Allows to copy bytes if compression was not possible. - Number if bytes encoded or copied. - Value is 0 if no encoding was done. - Action performed. - - - Drains decoder by reading all bytes which are ready. - Decoder. - Target buffer. - Offset within target buffer. - Offset in decoder relatively to decoder's head. - Please note, it should be negative value. - Number of bytes. - - - Decodes data and immediately drains it into target buffer. - Decoder. - Source buffer (with compressed data, to be decoded). - Source buffer length. - Target buffer (to drained into). - Target buffer length. - Number of bytes actually decoded. - true decoder was drained, false otherwise. - - - Decodes data and immediately drains it into target buffer. - Decoder. - Source buffer (with compressed data, to be decoded). - Offset within source buffer. - Source buffer length. - Target buffer (to drained into). - Offset within target buffer. - Target buffer length. - Number of bytes actually decoded. - true decoder was drained, false otherwise. - - - - LZ4 encoder using dependent blocks with fast compression. - - - - Creates new instance of - Block size. - Number of extra blocks. - - - - - - - - - - - - - LZ4 encoder using dependent blocks with high compression. - - - - Creates new instance of - Compression level. - Block size. - Number of extra blocks. - - - - - - - - - - - - Utility class with memory related functions. - - - 1 KiB - - - 2 KiB - - - 4 KiB - - - 8 KiB - - - 16 KiB - - - 32 KiB - - - 64 KiB - - - 128 KiB - - - 256 KiB - - - 512 KiB - - - 1 MiB - - - 4 MiB - - - Rounds integer value up to nearest multiple of step. - A value. - A step. - Value rounded up. - - - - Copies memory block for to . - Even though it is called "copy" it actually behaves like "move" which - might be potential problem, although it shouldn't as I cannot think about - any situation when "copy" invalid behaviour (forward copy of overlapping blocks) - can be a desired. - - The target block address. - The source block address. - Length in bytes. - - - - Copies memory block for to . - It handle "move" semantic properly handling overlapping blocks properly. - - The target block address. - The source block address. - Length in bytes. - - - - Copies memory block for to - up to (around) . - It does not handle overlapping blocks and may copy up to 8 bytes more than expected. - - The target block address. - The source block address. - The limit (in target block). - - - Fill block of memory with zeroes. - Address. - Length. - - - Fills memory block with repeating pattern of a single byte. - Address. - A pattern. - Length. - - - - Copies memory block for to . - This is proper implementation of memcpy (with all weir behaviour for overlapping blocks). - It is slower than "Copy" but may be required if "Copy" causes problems. - - The target block address. - The source block address. - Length in bytes. - - - Copies exactly 8 bytes from source to target. - Target address. - Source address. - - - Copies exactly 16 bytes from source to target. - Target address. - Source address. - - - Copies exactly 18 bytes from source to target. - Target address. - Source address. - - - Allocated block of memory. It is NOT initialized with zeroes. - Size in bytes. - Pointer to allocated block. - - - Allocated block of memory and fills it with zeroes. - Size in bytes. - Pointer to allocated block. - - - - Free memory allocated previously with or - - - - - Reads exactly 1 byte from given address. - Address. - Byte at given address. - - - Reads exactly 2 bytes from given address. - Address. - 2 bytes at given address. - - - Reads exactly 4 bytes from given address. - Address. - 4 bytes at given address. - - - Reads exactly 8 bytes from given address. - Address. - 8 bytes at given address. - - - Writes exactly 1 byte to given address. - Address. - Value. - - - Writes exactly 2 bytes to given address. - Address. - Value. - - - Writes exactly 4 bytes to given address. - Address. - Value. - - - Writes exactly 8 bytes to given address. - Address. - Value. - - - - Skeleton for class with unmanaged resources. - Implements but also handles proper release in - case was not called. - - - - Determines if object was already disposed. - - - Throws exception is object has been disposed already. Convenience method. - Thrown if object is already disposed. - - - Method releasing unmanaged resources. - - - Method releasing managed resources. - - - - Disposed resources. - - true if dispose was explicitly called, - false if called from GC. - - - - - - Destructor. - - - - Static class exposing LZ4 block compression methods. - - - - Maximum size after compression. - Length of input buffer. - Maximum length after compression. - - - Compresses data from one buffer into another. - Input buffer. - Length of input buffer. - Output buffer. - Output buffer length. - Compression level. - Number of bytes written, or negative value if output buffer is too small. - - - Compresses data from one buffer into another. - Input buffer. - Output buffer. - Compression level. - Number of bytes written, or negative value if output buffer is too small. - - - Compresses data from one buffer into another. - Input buffer. - Input buffer offset. - Input buffer length. - Output buffer. - Output buffer offset. - Output buffer length. - Compression level. - Number of bytes written, or negative value if output buffer is too small. - - - Decompresses data from given buffer. - Input buffer. - Input buffer length. - Output buffer. - Output buffer length. - Number of bytes written, or negative value if output buffer is too small. - - - Decompresses data from given buffer. - Input buffer. - Output buffer. - Number of bytes written, or negative value if output buffer is too small. - - - Decompresses data from given buffer. - Input buffer. - Input buffer offset. - Input buffer length. - Output buffer. - Output buffer offset. - Output buffer length. - Number of bytes written, or negative value if output buffer is too small. - - - Compression level. - - - Fast compression. - - - High compression, level 3. - - - High compression, level 4. - - - High compression, level 5. - - - High compression, level 6. - - - High compression, level 7. - - - High compression, level 8. - - - High compression, level 9. - - - Optimal compression, level 10. - - - Optimal compression, level 11. - - - Maximum compression, level 12. - - - - Pickling support with LZ4 compression. - - - - Compresses input buffer into self-contained package. - Input buffer. - Compression level. - Output buffer. - - - Compresses input buffer into self-contained package. - Input buffer. - Input buffer offset. - Input buffer length. - Compression level. - Output buffer. - - - Compresses input buffer into self-contained package. - Input buffer. - Compression level. - Output buffer. - - - Compresses input buffer into self-contained package. - Input buffer. - Length of input data. - Compression level. - Output buffer. - - - Decompresses previously pickled buffer (see: . - Input buffer. - Output buffer. - - - Decompresses previously pickled buffer (see: . - Input buffer. - Input buffer offset. - Input buffer length. - Output buffer. - - - Decompresses previously pickled buffer (see: . - Input buffer. - Output buffer. - - - Decompresses previously pickled buffer (see: . - Input buffer. - Input buffer length. - Output buffer. - - - diff --git a/packages/K4os.Compression.LZ4.1.1.1/lib/netstandard1.6/K4os.Compression.LZ4.dll b/packages/K4os.Compression.LZ4.1.1.1/lib/netstandard1.6/K4os.Compression.LZ4.dll deleted file mode 100644 index 1d2fbc1e..00000000 Binary files a/packages/K4os.Compression.LZ4.1.1.1/lib/netstandard1.6/K4os.Compression.LZ4.dll and /dev/null differ diff --git a/packages/K4os.Compression.LZ4.1.1.1/lib/netstandard1.6/K4os.Compression.LZ4.xml b/packages/K4os.Compression.LZ4.1.1.1/lib/netstandard1.6/K4os.Compression.LZ4.xml deleted file mode 100644 index 37b2f8eb..00000000 --- a/packages/K4os.Compression.LZ4.1.1.1/lib/netstandard1.6/K4os.Compression.LZ4.xml +++ /dev/null @@ -1,771 +0,0 @@ - - - - K4os.Compression.LZ4 - - - - - Action performed by encoder using FlushAndEncode method. - - - - Nothing has happened, most likely loading 0 bytes. - - - Some bytes has been loaded into encoder. - - - Compression was not possible so bytes has been copied. - - - Compression succeeded. - - - - Interface of LZ4 decoder used by LZ4 streams. - - - - Block size. - - - Bytes already decoded and available to be read. - Always smaller than - - - - Decodes previously compressed block and caches decompressed block in decoder. - Returns number of bytes decoded. These bytes can be read with . - - Points to compressed block. - Length of compressed block. - Size of the block. Value 0 indicates default block size. - Number of decoded bytes. - - - - Inject already decompressed block and caches it in decoder. - Used with uncompressed-yet-chained blocks and pre-made dictionaries. - These bytes can be read with . - - Points to uncompressed block. - Length of uncompressed block. - Number of decoded bytes. - - - - Reads previously decoded bytes. Please note, should be - negative number, pointing to bytes before current head. - - Buffer to write to. - Offset in source buffer relatively to current head. - Please note, it should be negative value. - Number of bytes to read. - - - - Interface of LZ4 encoder used by LZ4 streams. - - - - Block size. - - - Number of bytes read for compression. - Always smaller than - - - Adds bytes to internal buffer. Increases - Source buffer. - Source buffer length. - Number of bytes topped up. If this function returns 0 it means that buffer - is full ( equals ) and - should be called to flush it. - - - - Encodes bytes in internal buffer (see: , ). - If is true then if encoded buffer is bigger than - source buffer source bytes are copied instead. In such case returned length is negative. - - Target buffer. - Target buffer length. - Indicates if copying is allowed. - Length of encoded buffer. Negative if bytes are just copied. - - - - LZ4 decoder used with independent blocks mode. Plase note, that it will fail - if input data has been compressed with chained blocks - ( and ) - - - - - - - - - - Creates new instance of block decoder. - Block size. Must be equal or greater to one used for compression. - - - - - - - - - - - - - - - - Independent block encoder. Produces larger files but uses less memory and - gives better performance. - - - - Creates new instance of - Compression level. - Block size. - - - - - - - - - LZ4 decoder handling dependent blocks. - - - Creates new instance of . - Block size. - Number of extra blocks. - - - - - - - - - - - - - - - - - - - - - - Static class with factory methods to create LZ4 decoders. - - - - Creates appropriate decoder for given parameters. - Dependent blocks. - Block size. - Number of extra blocks. - LZ4 decoder. - - - - Static class with factory method to create LZ4 encoders. - - - - Creates appropriate decoder for given parameters. - Dependent blocks. - Compression level. - Block size. - Number of extra blocks. - LZ4 encoder. - - - - Base class for LZ4 encoders. Provides basic functionality shared by - , , - and encoders. Do not used directly. - - - - Creates new instance of encoder. - Needs to be true if using dependent blocks. - Block size. - Number of extra blocks. - - - - - - - - - - - - - - - Encodes single block using appropriate algorithm. - Source buffer. - Source buffer length. - Target buffer. - Target buffer length. - Number of bytes actually written to target buffer. - - - Copies current dictionary. - Target buffer. - Dictionary length. - Dictionary length. - - - - - - - Functionality of encoders added on top of fixed interface. - - - - Tops encoder up with some data. - Encoder. - Buffer pointer, will be shifted after operation by the number of - bytes actually loaded. - Length of buffer. - true if buffer was topped up, false if no bytes were loaded. - - - Tops encoder up with some data. - Encoder. - Buffer. - Buffer offset. - Length of buffer. - Number of bytes actually loaded. - - - Tops encoder up with some data. - Encoder. - Buffer. - Buffer offset, will be increased after operation by the number - of bytes actually loaded. - Length of buffer. - true if buffer was topped up, false if no bytes were loaded. - - - Encodes all bytes currently stored in encoder into target buffer. - Encoder. - Target buffer. - Offset in target buffer. - Length of target buffer. - if true copying bytes is allowed. - Number of bytes encoder. If bytes were copied than this value is negative. - - - Encodes all bytes currently stored in encoder into target buffer. - Encoder. - Target buffer. - Offset in target buffer. Will be updated after operation. - Length of target buffer. - if true copying bytes is allowed. - Result of this action. Bytes can be Copied (), - Encoded () or nothing could have - happened (). - - - Encodes all bytes currently stored in encoder into target buffer. - Encoder. - Target buffer. Will be updated after operation. - Length of buffer. - if true copying bytes is allowed. - Result of this action. Bytes can be Copied (), - Encoded () or nothing could have - happened (). - - - Tops encoder and encodes content. - Encoder. - Source buffer (used to top up from). - Source buffer length. - Target buffer (used to encode into) - Target buffer length. - Forces encoding even if encoder is not full. - Allows to copy bytes if compression was not possible. - Number of bytes loaded (topped up) - Number if bytes encoded or copied. - Value is 0 if no encoding was done. - Action performed. - - - Tops encoder and encodes content. - Encoder. - Source buffer (used to top up from). - Offset within source buffer. - Source buffer length. - Target buffer (used to encode into) - Offset within target buffer. - Target buffer length. - Forces encoding even if encoder is not full. - Allows to copy bytes if compression was not possible. - Number of bytes loaded (topped up) - Number if bytes encoded or copied. - Value is 0 if no encoding was done. - Action performed. - - - Encoded remaining bytes in encoder. - Encoder. - Target buffer. - Target buffer length. - Allows to copy bytes if compression was not possible. - Number if bytes encoded or copied. - Value is 0 if no encoding was done. - Action performed. - - - Encoded remaining bytes in encoder. - Encoder. - Target buffer. - Offset within target buffer. - Target buffer length. - Allows to copy bytes if compression was not possible. - Number if bytes encoded or copied. - Value is 0 if no encoding was done. - Action performed. - - - Drains decoder by reading all bytes which are ready. - Decoder. - Target buffer. - Offset within target buffer. - Offset in decoder relatively to decoder's head. - Please note, it should be negative value. - Number of bytes. - - - Decodes data and immediately drains it into target buffer. - Decoder. - Source buffer (with compressed data, to be decoded). - Source buffer length. - Target buffer (to drained into). - Target buffer length. - Number of bytes actually decoded. - true decoder was drained, false otherwise. - - - Decodes data and immediately drains it into target buffer. - Decoder. - Source buffer (with compressed data, to be decoded). - Offset within source buffer. - Source buffer length. - Target buffer (to drained into). - Offset within target buffer. - Target buffer length. - Number of bytes actually decoded. - true decoder was drained, false otherwise. - - - - LZ4 encoder using dependent blocks with fast compression. - - - - Creates new instance of - Block size. - Number of extra blocks. - - - - - - - - - - - - - LZ4 encoder using dependent blocks with high compression. - - - - Creates new instance of - Compression level. - Block size. - Number of extra blocks. - - - - - - - - - - - - Utility class with memory related functions. - - - 1 KiB - - - 2 KiB - - - 4 KiB - - - 8 KiB - - - 16 KiB - - - 32 KiB - - - 64 KiB - - - 128 KiB - - - 256 KiB - - - 512 KiB - - - 1 MiB - - - 4 MiB - - - Rounds integer value up to nearest multiple of step. - A value. - A step. - Value rounded up. - - - - Copies memory block for to . - Even though it is called "copy" it actually behaves like "move" which - might be potential problem, although it shouldn't as I cannot think about - any situation when "copy" invalid behaviour (forward copy of overlapping blocks) - can be a desired. - - The target block address. - The source block address. - Length in bytes. - - - - Copies memory block for to . - It handle "move" semantic properly handling overlapping blocks properly. - - The target block address. - The source block address. - Length in bytes. - - - - Copies memory block for to - up to (around) . - It does not handle overlapping blocks and may copy up to 8 bytes more than expected. - - The target block address. - The source block address. - The limit (in target block). - - - Fill block of memory with zeroes. - Address. - Length. - - - Fills memory block with repeating pattern of a single byte. - Address. - A pattern. - Length. - - - - Copies memory block for to . - This is proper implementation of memcpy (with all weir behaviour for overlapping blocks). - It is slower than "Copy" but may be required if "Copy" causes problems. - - The target block address. - The source block address. - Length in bytes. - - - Copies exactly 8 bytes from source to target. - Target address. - Source address. - - - Copies exactly 16 bytes from source to target. - Target address. - Source address. - - - Copies exactly 18 bytes from source to target. - Target address. - Source address. - - - Allocated block of memory. It is NOT initialized with zeroes. - Size in bytes. - Pointer to allocated block. - - - Allocated block of memory and fills it with zeroes. - Size in bytes. - Pointer to allocated block. - - - - Free memory allocated previously with or - - - - - Reads exactly 1 byte from given address. - Address. - Byte at given address. - - - Reads exactly 2 bytes from given address. - Address. - 2 bytes at given address. - - - Reads exactly 4 bytes from given address. - Address. - 4 bytes at given address. - - - Reads exactly 8 bytes from given address. - Address. - 8 bytes at given address. - - - Writes exactly 1 byte to given address. - Address. - Value. - - - Writes exactly 2 bytes to given address. - Address. - Value. - - - Writes exactly 4 bytes to given address. - Address. - Value. - - - Writes exactly 8 bytes to given address. - Address. - Value. - - - - Skeleton for class with unmanaged resources. - Implements but also handles proper release in - case was not called. - - - - Determines if object was already disposed. - - - Throws exception is object has been disposed already. Convenience method. - Thrown if object is already disposed. - - - Method releasing unmanaged resources. - - - Method releasing managed resources. - - - - Disposed resources. - - true if dispose was explicitly called, - false if called from GC. - - - - - - Destructor. - - - - Static class exposing LZ4 block compression methods. - - - - Maximum size after compression. - Length of input buffer. - Maximum length after compression. - - - Compresses data from one buffer into another. - Input buffer. - Length of input buffer. - Output buffer. - Output buffer length. - Compression level. - Number of bytes written, or negative value if output buffer is too small. - - - Compresses data from one buffer into another. - Input buffer. - Output buffer. - Compression level. - Number of bytes written, or negative value if output buffer is too small. - - - Compresses data from one buffer into another. - Input buffer. - Input buffer offset. - Input buffer length. - Output buffer. - Output buffer offset. - Output buffer length. - Compression level. - Number of bytes written, or negative value if output buffer is too small. - - - Decompresses data from given buffer. - Input buffer. - Input buffer length. - Output buffer. - Output buffer length. - Number of bytes written, or negative value if output buffer is too small. - - - Decompresses data from given buffer. - Input buffer. - Output buffer. - Number of bytes written, or negative value if output buffer is too small. - - - Decompresses data from given buffer. - Input buffer. - Input buffer offset. - Input buffer length. - Output buffer. - Output buffer offset. - Output buffer length. - Number of bytes written, or negative value if output buffer is too small. - - - Compression level. - - - Fast compression. - - - High compression, level 3. - - - High compression, level 4. - - - High compression, level 5. - - - High compression, level 6. - - - High compression, level 7. - - - High compression, level 8. - - - High compression, level 9. - - - Optimal compression, level 10. - - - Optimal compression, level 11. - - - Maximum compression, level 12. - - - - Pickling support with LZ4 compression. - - - - Compresses input buffer into self-contained package. - Input buffer. - Compression level. - Output buffer. - - - Compresses input buffer into self-contained package. - Input buffer. - Input buffer offset. - Input buffer length. - Compression level. - Output buffer. - - - Compresses input buffer into self-contained package. - Input buffer. - Compression level. - Output buffer. - - - Compresses input buffer into self-contained package. - Input buffer. - Length of input data. - Compression level. - Output buffer. - - - Decompresses previously pickled buffer (see: . - Input buffer. - Output buffer. - - - Decompresses previously pickled buffer (see: . - Input buffer. - Input buffer offset. - Input buffer length. - Output buffer. - - - Decompresses previously pickled buffer (see: . - Input buffer. - Output buffer. - - - Decompresses previously pickled buffer (see: . - Input buffer. - Input buffer length. - Output buffer. - - - diff --git a/packages/K4os.Compression.LZ4.1.1.1/lib/netstandard2.0/K4os.Compression.LZ4.dll b/packages/K4os.Compression.LZ4.1.1.1/lib/netstandard2.0/K4os.Compression.LZ4.dll deleted file mode 100644 index a43bad2d..00000000 Binary files a/packages/K4os.Compression.LZ4.1.1.1/lib/netstandard2.0/K4os.Compression.LZ4.dll and /dev/null differ diff --git a/packages/K4os.Compression.LZ4.1.1.1/lib/netstandard2.0/K4os.Compression.LZ4.xml b/packages/K4os.Compression.LZ4.1.1.1/lib/netstandard2.0/K4os.Compression.LZ4.xml deleted file mode 100644 index 37b2f8eb..00000000 --- a/packages/K4os.Compression.LZ4.1.1.1/lib/netstandard2.0/K4os.Compression.LZ4.xml +++ /dev/null @@ -1,771 +0,0 @@ - - - - K4os.Compression.LZ4 - - - - - Action performed by encoder using FlushAndEncode method. - - - - Nothing has happened, most likely loading 0 bytes. - - - Some bytes has been loaded into encoder. - - - Compression was not possible so bytes has been copied. - - - Compression succeeded. - - - - Interface of LZ4 decoder used by LZ4 streams. - - - - Block size. - - - Bytes already decoded and available to be read. - Always smaller than - - - - Decodes previously compressed block and caches decompressed block in decoder. - Returns number of bytes decoded. These bytes can be read with . - - Points to compressed block. - Length of compressed block. - Size of the block. Value 0 indicates default block size. - Number of decoded bytes. - - - - Inject already decompressed block and caches it in decoder. - Used with uncompressed-yet-chained blocks and pre-made dictionaries. - These bytes can be read with . - - Points to uncompressed block. - Length of uncompressed block. - Number of decoded bytes. - - - - Reads previously decoded bytes. Please note, should be - negative number, pointing to bytes before current head. - - Buffer to write to. - Offset in source buffer relatively to current head. - Please note, it should be negative value. - Number of bytes to read. - - - - Interface of LZ4 encoder used by LZ4 streams. - - - - Block size. - - - Number of bytes read for compression. - Always smaller than - - - Adds bytes to internal buffer. Increases - Source buffer. - Source buffer length. - Number of bytes topped up. If this function returns 0 it means that buffer - is full ( equals ) and - should be called to flush it. - - - - Encodes bytes in internal buffer (see: , ). - If is true then if encoded buffer is bigger than - source buffer source bytes are copied instead. In such case returned length is negative. - - Target buffer. - Target buffer length. - Indicates if copying is allowed. - Length of encoded buffer. Negative if bytes are just copied. - - - - LZ4 decoder used with independent blocks mode. Plase note, that it will fail - if input data has been compressed with chained blocks - ( and ) - - - - - - - - - - Creates new instance of block decoder. - Block size. Must be equal or greater to one used for compression. - - - - - - - - - - - - - - - - Independent block encoder. Produces larger files but uses less memory and - gives better performance. - - - - Creates new instance of - Compression level. - Block size. - - - - - - - - - LZ4 decoder handling dependent blocks. - - - Creates new instance of . - Block size. - Number of extra blocks. - - - - - - - - - - - - - - - - - - - - - - Static class with factory methods to create LZ4 decoders. - - - - Creates appropriate decoder for given parameters. - Dependent blocks. - Block size. - Number of extra blocks. - LZ4 decoder. - - - - Static class with factory method to create LZ4 encoders. - - - - Creates appropriate decoder for given parameters. - Dependent blocks. - Compression level. - Block size. - Number of extra blocks. - LZ4 encoder. - - - - Base class for LZ4 encoders. Provides basic functionality shared by - , , - and encoders. Do not used directly. - - - - Creates new instance of encoder. - Needs to be true if using dependent blocks. - Block size. - Number of extra blocks. - - - - - - - - - - - - - - - Encodes single block using appropriate algorithm. - Source buffer. - Source buffer length. - Target buffer. - Target buffer length. - Number of bytes actually written to target buffer. - - - Copies current dictionary. - Target buffer. - Dictionary length. - Dictionary length. - - - - - - - Functionality of encoders added on top of fixed interface. - - - - Tops encoder up with some data. - Encoder. - Buffer pointer, will be shifted after operation by the number of - bytes actually loaded. - Length of buffer. - true if buffer was topped up, false if no bytes were loaded. - - - Tops encoder up with some data. - Encoder. - Buffer. - Buffer offset. - Length of buffer. - Number of bytes actually loaded. - - - Tops encoder up with some data. - Encoder. - Buffer. - Buffer offset, will be increased after operation by the number - of bytes actually loaded. - Length of buffer. - true if buffer was topped up, false if no bytes were loaded. - - - Encodes all bytes currently stored in encoder into target buffer. - Encoder. - Target buffer. - Offset in target buffer. - Length of target buffer. - if true copying bytes is allowed. - Number of bytes encoder. If bytes were copied than this value is negative. - - - Encodes all bytes currently stored in encoder into target buffer. - Encoder. - Target buffer. - Offset in target buffer. Will be updated after operation. - Length of target buffer. - if true copying bytes is allowed. - Result of this action. Bytes can be Copied (), - Encoded () or nothing could have - happened (). - - - Encodes all bytes currently stored in encoder into target buffer. - Encoder. - Target buffer. Will be updated after operation. - Length of buffer. - if true copying bytes is allowed. - Result of this action. Bytes can be Copied (), - Encoded () or nothing could have - happened (). - - - Tops encoder and encodes content. - Encoder. - Source buffer (used to top up from). - Source buffer length. - Target buffer (used to encode into) - Target buffer length. - Forces encoding even if encoder is not full. - Allows to copy bytes if compression was not possible. - Number of bytes loaded (topped up) - Number if bytes encoded or copied. - Value is 0 if no encoding was done. - Action performed. - - - Tops encoder and encodes content. - Encoder. - Source buffer (used to top up from). - Offset within source buffer. - Source buffer length. - Target buffer (used to encode into) - Offset within target buffer. - Target buffer length. - Forces encoding even if encoder is not full. - Allows to copy bytes if compression was not possible. - Number of bytes loaded (topped up) - Number if bytes encoded or copied. - Value is 0 if no encoding was done. - Action performed. - - - Encoded remaining bytes in encoder. - Encoder. - Target buffer. - Target buffer length. - Allows to copy bytes if compression was not possible. - Number if bytes encoded or copied. - Value is 0 if no encoding was done. - Action performed. - - - Encoded remaining bytes in encoder. - Encoder. - Target buffer. - Offset within target buffer. - Target buffer length. - Allows to copy bytes if compression was not possible. - Number if bytes encoded or copied. - Value is 0 if no encoding was done. - Action performed. - - - Drains decoder by reading all bytes which are ready. - Decoder. - Target buffer. - Offset within target buffer. - Offset in decoder relatively to decoder's head. - Please note, it should be negative value. - Number of bytes. - - - Decodes data and immediately drains it into target buffer. - Decoder. - Source buffer (with compressed data, to be decoded). - Source buffer length. - Target buffer (to drained into). - Target buffer length. - Number of bytes actually decoded. - true decoder was drained, false otherwise. - - - Decodes data and immediately drains it into target buffer. - Decoder. - Source buffer (with compressed data, to be decoded). - Offset within source buffer. - Source buffer length. - Target buffer (to drained into). - Offset within target buffer. - Target buffer length. - Number of bytes actually decoded. - true decoder was drained, false otherwise. - - - - LZ4 encoder using dependent blocks with fast compression. - - - - Creates new instance of - Block size. - Number of extra blocks. - - - - - - - - - - - - - LZ4 encoder using dependent blocks with high compression. - - - - Creates new instance of - Compression level. - Block size. - Number of extra blocks. - - - - - - - - - - - - Utility class with memory related functions. - - - 1 KiB - - - 2 KiB - - - 4 KiB - - - 8 KiB - - - 16 KiB - - - 32 KiB - - - 64 KiB - - - 128 KiB - - - 256 KiB - - - 512 KiB - - - 1 MiB - - - 4 MiB - - - Rounds integer value up to nearest multiple of step. - A value. - A step. - Value rounded up. - - - - Copies memory block for to . - Even though it is called "copy" it actually behaves like "move" which - might be potential problem, although it shouldn't as I cannot think about - any situation when "copy" invalid behaviour (forward copy of overlapping blocks) - can be a desired. - - The target block address. - The source block address. - Length in bytes. - - - - Copies memory block for to . - It handle "move" semantic properly handling overlapping blocks properly. - - The target block address. - The source block address. - Length in bytes. - - - - Copies memory block for to - up to (around) . - It does not handle overlapping blocks and may copy up to 8 bytes more than expected. - - The target block address. - The source block address. - The limit (in target block). - - - Fill block of memory with zeroes. - Address. - Length. - - - Fills memory block with repeating pattern of a single byte. - Address. - A pattern. - Length. - - - - Copies memory block for to . - This is proper implementation of memcpy (with all weir behaviour for overlapping blocks). - It is slower than "Copy" but may be required if "Copy" causes problems. - - The target block address. - The source block address. - Length in bytes. - - - Copies exactly 8 bytes from source to target. - Target address. - Source address. - - - Copies exactly 16 bytes from source to target. - Target address. - Source address. - - - Copies exactly 18 bytes from source to target. - Target address. - Source address. - - - Allocated block of memory. It is NOT initialized with zeroes. - Size in bytes. - Pointer to allocated block. - - - Allocated block of memory and fills it with zeroes. - Size in bytes. - Pointer to allocated block. - - - - Free memory allocated previously with or - - - - - Reads exactly 1 byte from given address. - Address. - Byte at given address. - - - Reads exactly 2 bytes from given address. - Address. - 2 bytes at given address. - - - Reads exactly 4 bytes from given address. - Address. - 4 bytes at given address. - - - Reads exactly 8 bytes from given address. - Address. - 8 bytes at given address. - - - Writes exactly 1 byte to given address. - Address. - Value. - - - Writes exactly 2 bytes to given address. - Address. - Value. - - - Writes exactly 4 bytes to given address. - Address. - Value. - - - Writes exactly 8 bytes to given address. - Address. - Value. - - - - Skeleton for class with unmanaged resources. - Implements but also handles proper release in - case was not called. - - - - Determines if object was already disposed. - - - Throws exception is object has been disposed already. Convenience method. - Thrown if object is already disposed. - - - Method releasing unmanaged resources. - - - Method releasing managed resources. - - - - Disposed resources. - - true if dispose was explicitly called, - false if called from GC. - - - - - - Destructor. - - - - Static class exposing LZ4 block compression methods. - - - - Maximum size after compression. - Length of input buffer. - Maximum length after compression. - - - Compresses data from one buffer into another. - Input buffer. - Length of input buffer. - Output buffer. - Output buffer length. - Compression level. - Number of bytes written, or negative value if output buffer is too small. - - - Compresses data from one buffer into another. - Input buffer. - Output buffer. - Compression level. - Number of bytes written, or negative value if output buffer is too small. - - - Compresses data from one buffer into another. - Input buffer. - Input buffer offset. - Input buffer length. - Output buffer. - Output buffer offset. - Output buffer length. - Compression level. - Number of bytes written, or negative value if output buffer is too small. - - - Decompresses data from given buffer. - Input buffer. - Input buffer length. - Output buffer. - Output buffer length. - Number of bytes written, or negative value if output buffer is too small. - - - Decompresses data from given buffer. - Input buffer. - Output buffer. - Number of bytes written, or negative value if output buffer is too small. - - - Decompresses data from given buffer. - Input buffer. - Input buffer offset. - Input buffer length. - Output buffer. - Output buffer offset. - Output buffer length. - Number of bytes written, or negative value if output buffer is too small. - - - Compression level. - - - Fast compression. - - - High compression, level 3. - - - High compression, level 4. - - - High compression, level 5. - - - High compression, level 6. - - - High compression, level 7. - - - High compression, level 8. - - - High compression, level 9. - - - Optimal compression, level 10. - - - Optimal compression, level 11. - - - Maximum compression, level 12. - - - - Pickling support with LZ4 compression. - - - - Compresses input buffer into self-contained package. - Input buffer. - Compression level. - Output buffer. - - - Compresses input buffer into self-contained package. - Input buffer. - Input buffer offset. - Input buffer length. - Compression level. - Output buffer. - - - Compresses input buffer into self-contained package. - Input buffer. - Compression level. - Output buffer. - - - Compresses input buffer into self-contained package. - Input buffer. - Length of input data. - Compression level. - Output buffer. - - - Decompresses previously pickled buffer (see: . - Input buffer. - Output buffer. - - - Decompresses previously pickled buffer (see: . - Input buffer. - Input buffer offset. - Input buffer length. - Output buffer. - - - Decompresses previously pickled buffer (see: . - Input buffer. - Output buffer. - - - Decompresses previously pickled buffer (see: . - Input buffer. - Input buffer length. - Output buffer. - - - diff --git a/packages/K4os.Compression.LZ4.Streams.1.1.1/.signature.p7s b/packages/K4os.Compression.LZ4.Streams.1.1.1/.signature.p7s deleted file mode 100644 index edf8d5dd..00000000 Binary files a/packages/K4os.Compression.LZ4.Streams.1.1.1/.signature.p7s and /dev/null differ diff --git a/packages/K4os.Compression.LZ4.Streams.1.1.1/K4os.Compression.LZ4.Streams.1.1.1.nupkg b/packages/K4os.Compression.LZ4.Streams.1.1.1/K4os.Compression.LZ4.Streams.1.1.1.nupkg deleted file mode 100644 index b17bbd26..00000000 Binary files a/packages/K4os.Compression.LZ4.Streams.1.1.1/K4os.Compression.LZ4.Streams.1.1.1.nupkg and /dev/null differ diff --git a/packages/K4os.Compression.LZ4.Streams.1.1.1/lib/net46/K4os.Compression.LZ4.Streams.dll b/packages/K4os.Compression.LZ4.Streams.1.1.1/lib/net46/K4os.Compression.LZ4.Streams.dll deleted file mode 100644 index 438de79f..00000000 Binary files a/packages/K4os.Compression.LZ4.Streams.1.1.1/lib/net46/K4os.Compression.LZ4.Streams.dll and /dev/null differ diff --git a/packages/K4os.Compression.LZ4.Streams.1.1.1/lib/net46/K4os.Compression.LZ4.Streams.xml b/packages/K4os.Compression.LZ4.Streams.1.1.1/lib/net46/K4os.Compression.LZ4.Streams.xml deleted file mode 100644 index 4e02583f..00000000 --- a/packages/K4os.Compression.LZ4.Streams.1.1.1/lib/net46/K4os.Compression.LZ4.Streams.xml +++ /dev/null @@ -1,296 +0,0 @@ - - - - K4os.Compression.LZ4.Streams - - - - - LZ4 Frame descriptor. - - - - Content length. Not always known. - - - Indicates if content checksum is provided. - - - Indicates if blocks are chained (dependent) or not (independent). - - - Indicates if block checksums are provided. - - - Dictionary id. May be null. - - - Block size. - - - - Decoder settings. - - - - Extra memory for decompression. - - - - LZ4 Decompression stream handling. - - - - Creates new instance . - Inner stream. - A function which will create appropriate decoder depending - on frame descriptor. - If true inner stream will not be closed after disposing. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Length of stream. Please note, this will only work if original LZ4 stream has - ContentLength field set in descriptor. Otherwise returned value will be -1. - - - - - Position within the stream. Position can be read, but cannot be set as LZ4 stream does - not have Seek capability. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - LZ4 encoder settings. - - - - - Content length. It is not enforced, it can be set to any value, but it will be - written to the stream so it can be used while decoding. If you don't know the length - just leave default value. - - - - - Indicates if blocks should be chained (dependent) or not (independent). Dependent blocks - (with chaining) provide better compression ratio but are a little but slower and take - more memory. - - - - - Block size. You can use any block size, but default values for LZ4 are 64k, 256k, 1m, - and 4m. 64k is good enough for dependent blocks, but for independent blocks bigger is - better. - - - - Indicates is content checksum is provided. Not implemented yet. - - - Indicates if block checksum is provided. Not implemented yet. - - - Dictionary id. Not implemented yet. - - - Compression level. - - - Extra memory (for the process, more is usually better). - - - - LZ4 compression stream. - - - - Creates new instance of . - Inner stream. - LZ4 Descriptor. - Function which will take descriptor and return - appropriate encoder. - Indicates if stream should be left - open after disposing. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Length of the stream and number of bytes written so far. - - - Read-only position in the stream. Trying to set it will throw - . - - - - - - - - - - - - - - - - - - - - - - - - - - - - LZ4 frame descriptor. - - - - Content length (if available). - - - Indicates if content checksum if present. - - - Indicates if blocks are chained. - - - Indicates if block checksums are present. - - - Dictionary id (or null). - - - Block size. - - - Creates new instance of . - Content length. - Content checksum flag. - Chaining flag. - Block checksum flag. - Dictionary id. - Block size. - - - - Utility class with factory methods to create LZ4 compression and decompression streams. - - - - Created compression stream on top of inner stream. - Inner stream. - Compression settings. - Leave inner stream open after disposing. - Compression stream. - - - Created compression stream on top of inner stream. - Inner stream. - Compression level. - Extra memory used for compression. - Leave inner stream open after disposing. - Compression stream. - - - Creates decompression stream on top of inner stream. - Inner stream. - Decompression settings. - Leave inner stream open after disposing. - Decompression stream. - - - Creates decompression stream on top of inner stream. - Inner stream. - Extra memory used for decompression. - Leave inner stream open after disposing. - Decompression stream. - - - diff --git a/packages/K4os.Compression.LZ4.Streams.1.1.1/lib/netstandard1.6/K4os.Compression.LZ4.Streams.dll b/packages/K4os.Compression.LZ4.Streams.1.1.1/lib/netstandard1.6/K4os.Compression.LZ4.Streams.dll deleted file mode 100644 index e5a98176..00000000 Binary files a/packages/K4os.Compression.LZ4.Streams.1.1.1/lib/netstandard1.6/K4os.Compression.LZ4.Streams.dll and /dev/null differ diff --git a/packages/K4os.Compression.LZ4.Streams.1.1.1/lib/netstandard1.6/K4os.Compression.LZ4.Streams.xml b/packages/K4os.Compression.LZ4.Streams.1.1.1/lib/netstandard1.6/K4os.Compression.LZ4.Streams.xml deleted file mode 100644 index 4e02583f..00000000 --- a/packages/K4os.Compression.LZ4.Streams.1.1.1/lib/netstandard1.6/K4os.Compression.LZ4.Streams.xml +++ /dev/null @@ -1,296 +0,0 @@ - - - - K4os.Compression.LZ4.Streams - - - - - LZ4 Frame descriptor. - - - - Content length. Not always known. - - - Indicates if content checksum is provided. - - - Indicates if blocks are chained (dependent) or not (independent). - - - Indicates if block checksums are provided. - - - Dictionary id. May be null. - - - Block size. - - - - Decoder settings. - - - - Extra memory for decompression. - - - - LZ4 Decompression stream handling. - - - - Creates new instance . - Inner stream. - A function which will create appropriate decoder depending - on frame descriptor. - If true inner stream will not be closed after disposing. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Length of stream. Please note, this will only work if original LZ4 stream has - ContentLength field set in descriptor. Otherwise returned value will be -1. - - - - - Position within the stream. Position can be read, but cannot be set as LZ4 stream does - not have Seek capability. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - LZ4 encoder settings. - - - - - Content length. It is not enforced, it can be set to any value, but it will be - written to the stream so it can be used while decoding. If you don't know the length - just leave default value. - - - - - Indicates if blocks should be chained (dependent) or not (independent). Dependent blocks - (with chaining) provide better compression ratio but are a little but slower and take - more memory. - - - - - Block size. You can use any block size, but default values for LZ4 are 64k, 256k, 1m, - and 4m. 64k is good enough for dependent blocks, but for independent blocks bigger is - better. - - - - Indicates is content checksum is provided. Not implemented yet. - - - Indicates if block checksum is provided. Not implemented yet. - - - Dictionary id. Not implemented yet. - - - Compression level. - - - Extra memory (for the process, more is usually better). - - - - LZ4 compression stream. - - - - Creates new instance of . - Inner stream. - LZ4 Descriptor. - Function which will take descriptor and return - appropriate encoder. - Indicates if stream should be left - open after disposing. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Length of the stream and number of bytes written so far. - - - Read-only position in the stream. Trying to set it will throw - . - - - - - - - - - - - - - - - - - - - - - - - - - - - - LZ4 frame descriptor. - - - - Content length (if available). - - - Indicates if content checksum if present. - - - Indicates if blocks are chained. - - - Indicates if block checksums are present. - - - Dictionary id (or null). - - - Block size. - - - Creates new instance of . - Content length. - Content checksum flag. - Chaining flag. - Block checksum flag. - Dictionary id. - Block size. - - - - Utility class with factory methods to create LZ4 compression and decompression streams. - - - - Created compression stream on top of inner stream. - Inner stream. - Compression settings. - Leave inner stream open after disposing. - Compression stream. - - - Created compression stream on top of inner stream. - Inner stream. - Compression level. - Extra memory used for compression. - Leave inner stream open after disposing. - Compression stream. - - - Creates decompression stream on top of inner stream. - Inner stream. - Decompression settings. - Leave inner stream open after disposing. - Decompression stream. - - - Creates decompression stream on top of inner stream. - Inner stream. - Extra memory used for decompression. - Leave inner stream open after disposing. - Decompression stream. - - - diff --git a/packages/K4os.Compression.LZ4.Streams.1.1.1/lib/netstandard2.0/K4os.Compression.LZ4.Streams.dll b/packages/K4os.Compression.LZ4.Streams.1.1.1/lib/netstandard2.0/K4os.Compression.LZ4.Streams.dll deleted file mode 100644 index 4d29015e..00000000 Binary files a/packages/K4os.Compression.LZ4.Streams.1.1.1/lib/netstandard2.0/K4os.Compression.LZ4.Streams.dll and /dev/null differ diff --git a/packages/K4os.Compression.LZ4.Streams.1.1.1/lib/netstandard2.0/K4os.Compression.LZ4.Streams.xml b/packages/K4os.Compression.LZ4.Streams.1.1.1/lib/netstandard2.0/K4os.Compression.LZ4.Streams.xml deleted file mode 100644 index 4e02583f..00000000 --- a/packages/K4os.Compression.LZ4.Streams.1.1.1/lib/netstandard2.0/K4os.Compression.LZ4.Streams.xml +++ /dev/null @@ -1,296 +0,0 @@ - - - - K4os.Compression.LZ4.Streams - - - - - LZ4 Frame descriptor. - - - - Content length. Not always known. - - - Indicates if content checksum is provided. - - - Indicates if blocks are chained (dependent) or not (independent). - - - Indicates if block checksums are provided. - - - Dictionary id. May be null. - - - Block size. - - - - Decoder settings. - - - - Extra memory for decompression. - - - - LZ4 Decompression stream handling. - - - - Creates new instance . - Inner stream. - A function which will create appropriate decoder depending - on frame descriptor. - If true inner stream will not be closed after disposing. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Length of stream. Please note, this will only work if original LZ4 stream has - ContentLength field set in descriptor. Otherwise returned value will be -1. - - - - - Position within the stream. Position can be read, but cannot be set as LZ4 stream does - not have Seek capability. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - LZ4 encoder settings. - - - - - Content length. It is not enforced, it can be set to any value, but it will be - written to the stream so it can be used while decoding. If you don't know the length - just leave default value. - - - - - Indicates if blocks should be chained (dependent) or not (independent). Dependent blocks - (with chaining) provide better compression ratio but are a little but slower and take - more memory. - - - - - Block size. You can use any block size, but default values for LZ4 are 64k, 256k, 1m, - and 4m. 64k is good enough for dependent blocks, but for independent blocks bigger is - better. - - - - Indicates is content checksum is provided. Not implemented yet. - - - Indicates if block checksum is provided. Not implemented yet. - - - Dictionary id. Not implemented yet. - - - Compression level. - - - Extra memory (for the process, more is usually better). - - - - LZ4 compression stream. - - - - Creates new instance of . - Inner stream. - LZ4 Descriptor. - Function which will take descriptor and return - appropriate encoder. - Indicates if stream should be left - open after disposing. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Length of the stream and number of bytes written so far. - - - Read-only position in the stream. Trying to set it will throw - . - - - - - - - - - - - - - - - - - - - - - - - - - - - - LZ4 frame descriptor. - - - - Content length (if available). - - - Indicates if content checksum if present. - - - Indicates if blocks are chained. - - - Indicates if block checksums are present. - - - Dictionary id (or null). - - - Block size. - - - Creates new instance of . - Content length. - Content checksum flag. - Chaining flag. - Block checksum flag. - Dictionary id. - Block size. - - - - Utility class with factory methods to create LZ4 compression and decompression streams. - - - - Created compression stream on top of inner stream. - Inner stream. - Compression settings. - Leave inner stream open after disposing. - Compression stream. - - - Created compression stream on top of inner stream. - Inner stream. - Compression level. - Extra memory used for compression. - Leave inner stream open after disposing. - Compression stream. - - - Creates decompression stream on top of inner stream. - Inner stream. - Decompression settings. - Leave inner stream open after disposing. - Decompression stream. - - - Creates decompression stream on top of inner stream. - Inner stream. - Extra memory used for decompression. - Leave inner stream open after disposing. - Decompression stream. - - - diff --git a/packages/K4os.Hash.xxHash.1.0.5/.signature.p7s b/packages/K4os.Hash.xxHash.1.0.5/.signature.p7s deleted file mode 100644 index ad69ee19..00000000 Binary files a/packages/K4os.Hash.xxHash.1.0.5/.signature.p7s and /dev/null differ diff --git a/packages/K4os.Hash.xxHash.1.0.5/K4os.Hash.xxHash.1.0.5.nupkg b/packages/K4os.Hash.xxHash.1.0.5/K4os.Hash.xxHash.1.0.5.nupkg deleted file mode 100644 index eca03532..00000000 Binary files a/packages/K4os.Hash.xxHash.1.0.5/K4os.Hash.xxHash.1.0.5.nupkg and /dev/null differ diff --git a/packages/K4os.Hash.xxHash.1.0.5/lib/net46/K4os.Hash.xxHash.dll b/packages/K4os.Hash.xxHash.1.0.5/lib/net46/K4os.Hash.xxHash.dll deleted file mode 100644 index 5a37340e..00000000 Binary files a/packages/K4os.Hash.xxHash.1.0.5/lib/net46/K4os.Hash.xxHash.dll and /dev/null differ diff --git a/packages/K4os.Hash.xxHash.1.0.5/lib/net46/K4os.Hash.xxHash.xml b/packages/K4os.Hash.xxHash.1.0.5/lib/net46/K4os.Hash.xxHash.xml deleted file mode 100644 index 2b841472..00000000 --- a/packages/K4os.Hash.xxHash.1.0.5/lib/net46/K4os.Hash.xxHash.xml +++ /dev/null @@ -1,163 +0,0 @@ - - - - K4os.Hash.xxHash - - - - - Adapter implementing - - - - - Creates new . - - Hash size (in bytes) - Reset function. - Update function. - Digest function. - - - - - - - - - - - - - - - - - - - Base class for both and . Do not use directly. - - - - Protected constructor to prevent instantiation. - - - - xxHash 32-bit. - - - - Hash of empty buffer. - - - Hash of provided buffer. - Buffer. - Length of buffer. - Digest. - - - Hash of provided buffer. - Buffer. - Digest. - - - Hash of provided buffer. - Buffer. - Starting offset. - Length of buffer. - Digest. - - - Creates xxHash instance. - - - Resets hash calculation. - - - Updates the has using given buffer. - Buffer. - Length of buffer. - - - Updates the has using given buffer. - Buffer. - - - Updates the has using given buffer. - Buffer. - Starting offset. - Length of buffer. - - - Hash so far. - Hash so far. - - - Hash so far, as byte array. - Hash so far. - - - Converts this class to - - - - - xxHash 64-bit. - - - - Hash of empty buffer. - - - Hash of provided buffer. - Buffer. - Length of buffer. - Digest. - - - Hash of provided buffer. - Buffer. - Digest. - - - Hash of provided buffer. - Buffer. - Starting offset. - Length of buffer. - Digest. - - - Creates xxHash instance. - - - Resets hash calculation. - - - Updates the has using given buffer. - Buffer. - Length of buffer. - - - Updates the has using given buffer. - Buffer. - - - Updates the has using given buffer. - Buffer. - Starting offset. - Length of buffer. - - - Hash so far. - Hash so far. - - - Hash so far, as byte array. - Hash so far. - - - Converts this class to - - - - diff --git a/packages/K4os.Hash.xxHash.1.0.5/lib/netstandard1.6/K4os.Hash.xxHash.dll b/packages/K4os.Hash.xxHash.1.0.5/lib/netstandard1.6/K4os.Hash.xxHash.dll deleted file mode 100644 index 8634e335..00000000 Binary files a/packages/K4os.Hash.xxHash.1.0.5/lib/netstandard1.6/K4os.Hash.xxHash.dll and /dev/null differ diff --git a/packages/K4os.Hash.xxHash.1.0.5/lib/netstandard1.6/K4os.Hash.xxHash.xml b/packages/K4os.Hash.xxHash.1.0.5/lib/netstandard1.6/K4os.Hash.xxHash.xml deleted file mode 100644 index 2b841472..00000000 --- a/packages/K4os.Hash.xxHash.1.0.5/lib/netstandard1.6/K4os.Hash.xxHash.xml +++ /dev/null @@ -1,163 +0,0 @@ - - - - K4os.Hash.xxHash - - - - - Adapter implementing - - - - - Creates new . - - Hash size (in bytes) - Reset function. - Update function. - Digest function. - - - - - - - - - - - - - - - - - - - Base class for both and . Do not use directly. - - - - Protected constructor to prevent instantiation. - - - - xxHash 32-bit. - - - - Hash of empty buffer. - - - Hash of provided buffer. - Buffer. - Length of buffer. - Digest. - - - Hash of provided buffer. - Buffer. - Digest. - - - Hash of provided buffer. - Buffer. - Starting offset. - Length of buffer. - Digest. - - - Creates xxHash instance. - - - Resets hash calculation. - - - Updates the has using given buffer. - Buffer. - Length of buffer. - - - Updates the has using given buffer. - Buffer. - - - Updates the has using given buffer. - Buffer. - Starting offset. - Length of buffer. - - - Hash so far. - Hash so far. - - - Hash so far, as byte array. - Hash so far. - - - Converts this class to - - - - - xxHash 64-bit. - - - - Hash of empty buffer. - - - Hash of provided buffer. - Buffer. - Length of buffer. - Digest. - - - Hash of provided buffer. - Buffer. - Digest. - - - Hash of provided buffer. - Buffer. - Starting offset. - Length of buffer. - Digest. - - - Creates xxHash instance. - - - Resets hash calculation. - - - Updates the has using given buffer. - Buffer. - Length of buffer. - - - Updates the has using given buffer. - Buffer. - - - Updates the has using given buffer. - Buffer. - Starting offset. - Length of buffer. - - - Hash so far. - Hash so far. - - - Hash so far, as byte array. - Hash so far. - - - Converts this class to - - - - diff --git a/packages/K4os.Hash.xxHash.1.0.5/lib/netstandard2.0/K4os.Hash.xxHash.dll b/packages/K4os.Hash.xxHash.1.0.5/lib/netstandard2.0/K4os.Hash.xxHash.dll deleted file mode 100644 index eb6cb62a..00000000 Binary files a/packages/K4os.Hash.xxHash.1.0.5/lib/netstandard2.0/K4os.Hash.xxHash.dll and /dev/null differ diff --git a/packages/K4os.Hash.xxHash.1.0.5/lib/netstandard2.0/K4os.Hash.xxHash.xml b/packages/K4os.Hash.xxHash.1.0.5/lib/netstandard2.0/K4os.Hash.xxHash.xml deleted file mode 100644 index 2b841472..00000000 --- a/packages/K4os.Hash.xxHash.1.0.5/lib/netstandard2.0/K4os.Hash.xxHash.xml +++ /dev/null @@ -1,163 +0,0 @@ - - - - K4os.Hash.xxHash - - - - - Adapter implementing - - - - - Creates new . - - Hash size (in bytes) - Reset function. - Update function. - Digest function. - - - - - - - - - - - - - - - - - - - Base class for both and . Do not use directly. - - - - Protected constructor to prevent instantiation. - - - - xxHash 32-bit. - - - - Hash of empty buffer. - - - Hash of provided buffer. - Buffer. - Length of buffer. - Digest. - - - Hash of provided buffer. - Buffer. - Digest. - - - Hash of provided buffer. - Buffer. - Starting offset. - Length of buffer. - Digest. - - - Creates xxHash instance. - - - Resets hash calculation. - - - Updates the has using given buffer. - Buffer. - Length of buffer. - - - Updates the has using given buffer. - Buffer. - - - Updates the has using given buffer. - Buffer. - Starting offset. - Length of buffer. - - - Hash so far. - Hash so far. - - - Hash so far, as byte array. - Hash so far. - - - Converts this class to - - - - - xxHash 64-bit. - - - - Hash of empty buffer. - - - Hash of provided buffer. - Buffer. - Length of buffer. - Digest. - - - Hash of provided buffer. - Buffer. - Digest. - - - Hash of provided buffer. - Buffer. - Starting offset. - Length of buffer. - Digest. - - - Creates xxHash instance. - - - Resets hash calculation. - - - Updates the has using given buffer. - Buffer. - Length of buffer. - - - Updates the has using given buffer. - Buffer. - - - Updates the has using given buffer. - Buffer. - Starting offset. - Length of buffer. - - - Hash so far. - Hash so far. - - - Hash so far, as byte array. - Hash so far. - - - Converts this class to - - - - diff --git a/packages/Rebex.Common.2.5.6930/.signature.p7s b/packages/Rebex.Common.2.5.6930/.signature.p7s deleted file mode 100644 index bd53add5..00000000 Binary files a/packages/Rebex.Common.2.5.6930/.signature.p7s and /dev/null differ diff --git a/packages/Rebex.Common.2.5.6930/Rebex.Common.2.5.6930.nupkg b/packages/Rebex.Common.2.5.6930/Rebex.Common.2.5.6930.nupkg deleted file mode 100644 index 786e8399..00000000 Binary files a/packages/Rebex.Common.2.5.6930/Rebex.Common.2.5.6930.nupkg and /dev/null differ diff --git a/packages/Rebex.Common.2.5.6930/lib/monoandroid40/Rebex.Common.dll b/packages/Rebex.Common.2.5.6930/lib/monoandroid40/Rebex.Common.dll deleted file mode 100644 index d116ff54..00000000 Binary files a/packages/Rebex.Common.2.5.6930/lib/monoandroid40/Rebex.Common.dll and /dev/null differ diff --git a/packages/Rebex.Common.2.5.6930/lib/monoandroid40/Rebex.Common.xml b/packages/Rebex.Common.2.5.6930/lib/monoandroid40/Rebex.Common.xml deleted file mode 100644 index f77f672d..00000000 --- a/packages/Rebex.Common.2.5.6930/lib/monoandroid40/Rebex.Common.xml +++ /dev/null @@ -1,8675 +0,0 @@ - - - Rebex.Common - - - - - Console-based log writer that writes log messages to the console. - - - - - Common base class for log writers. A derived class must override either the method or both Write methods. - - - - - Defines methods and properties all log writers must implement. - - - - - Write a message into the log. - - Message level. - Logging object type. - Logging object ID. - Logging area. - Message. - - - - Write a message and data block into the log. - - Message level. - Logging object type. - Logging object ID. - Logging area. - Message. - Data block. - Data offset. - Date length. - - - - Get or set the log level - only log messages with log level equal to or greater than the specified one. - - Log level. - - - - Creates a new instance of . - - - - - Closes the log writer. - - - - - Releases unmanaged and managed resources (depending on the scenario). - If is false, the method has been called from - the finalizer and should not reference other objects (therefore only unmanaged resources can be disposed). - - True indicates that the method has been called via IDisposable.Dispose. - False indicates that it has been called by the finalizer. - - - - Writes a message into the log. - - Message level. - Logging object type. - Logging object ID. - Logging area. - Message. - - - - Writes a message and data block into the log. - - Message level. - Logging object type. - Logging object ID. - Logging area. - Message. - Data block. - Data offset. - Date length. - - - - Appends the specified message text into a text-based log. This method is only called by method - and is only used by text-based loggers. - - Full message info. - - - - Disposes the object. - - - - - Gets or sets the log level - only log messages with log level equal to or greater than the specified one. - - Log level. - - - - Get a value indicating whether the log writer is closed. - - True when log writer is closed. False if log writer is opened and ready for writing. - Implementation in this base class returns false, as the close method actually does not close any resource. - - - - Creates a new instance of console log writer with a log level of Info. - - - - - Creates a new instance of console log writer with the specified log level. - - Log level. - - - - Writes a message into the log. - - Message level. - Logging object type. - Logging object ID. - Logging area. - Message. - - - - Writes a message and data block into the log. - - Message level. - Logging object type. - Logging object ID. - Logging area. - Message. - Data block. - Data offset. - Date length. - - - - Appends the specified message text into a text-based log. - - Full message info. - - - - Gets or sets a value that indicates whether to use console colors. - - - - - Various methods related to encoding (charset) used by Rebex components. - - - - - Gets a list of supported encoding names. - - List of encoding names. - - - - Returns the encoding associated with the specified code page name. - - Code page name. - Encoding. - - - - Returns the encoding associated with the specified code page. - - Code page. - Encoding. - - - - ASCII encoding. - - - - - Default encoding. - - - - - UTF-8 encoding. - - - - - File-based log writer that saves log messages into a text file. - - - - - Creates a new instance of file log writer based on the specified file and the default "Info" log level. - - Path to log file. - - - - Creates a new instance of file log writer based on the specified file and log level. - - Path to log file. - Log level. - - - - Dispose(bool disposing) executes in two distinct scenarios. - If disposing equals true, the method has been called directly - or indirectly by a user's code. Managed and unmanaged resources - can be disposed. - If disposing equals false, the method has been called by the - runtime from inside the finalizer and you should not reference - other objects. Only unmanaged resources can be disposed. - - If true, is called by IDisposable.Dispose. - Otherwise it is called by finalizer. - - - - Appends the specified message text into a text-based log. - - Full message info. - - - - Finalizer. Called by garbage collector during object destruction. - - - - - Path to the log file. - - - - - Get a value indicating whether the log writer is closed. - - True when logfile is closed. False if logfile is opened and ready for writing. - - - - Log level - specifies the levels of severity. - - - - - Be verbose - log everything. - - - - - Log all messages useful for debugging purposes. - - - - - Only log informative messages. - - - - - Only log errors. - - - - - The Off level designates a higher level than all the rest. - - - - - Define properties and methods for logging providers. - - - - - Gets a to use for logging. - - - - - Represents mode for interval boundaries. - - - - - Include interval boundary. - - - - - Exclude interval boundary. - - - - - Represents a file or directory item. - - - - - Gets the last modification time of the item. - - - - - Gets the last access time of the item. - - - - - Gets the creation time of the item. - - - - - Gets file length. - - - - - Gets the last modification time of the item. - - - - - Gets the last access time of the item. - - - - - Gets the creation time of the item. - - - - - Gets a value indicating whether the item is a file. - - True if the item is a file; false otherwise. - - - - Gets a value indicating whether the item is a directory. - - True if the archive item is directory; false otherwise. - - - - Gets a value indicating whether the item is a link. - - True if the archive item is a link; false otherwise. - - - - Gets the name of the file or directory. - - The name of the file or directory. - - - - Gets the path of the file or directory. - It can be relative or absolute path depending on the way of use. - - It contains a full path if returned by the GetItems method or a file/directory name only if returned by the GetList method. - The path of the file or directory. - - - - Currently executed operation. - - - - Uploading files. - - - Downloading files. - - - Deleting files. - - - Getting item list. - - - - Current traversal state of the . - - - - - Retrieving of the file system hierarchy was started. - - - - - Retrieving of the file system hierarchy was successfully completed. - - - - - Retrieving of the particular directory hierarchy was started. - - - - - Retrieving of the particular directory hierarchy was successfully completed. - - - - - Current transfer state of the . - - - - - Directory processing was started. - - - - - Processing of a file was started. - - - - - File was successfully transferred. - - - - - A file data block was processed. - - - - - The transfer action was successfully completed. - Triggered only with multi-file operations. (For single-file operations, only is triggered.) - - - - - Current delete state of the . - - - - - File processing was started. - - - - - File was successfully deleted. - - - - - Directory processing was started. - - - - - Directory was successfully deleted. - - - - - The delete action was successfully completed. - - - - - Detailed specification of a problem that occurred during a multi-file operation. - - - - - A target file with the same name already exists. - - - - - A symbolic link was detected. - - - - - Symbolic link is probably a part of an infinite loop in the file system hierarchy. - - - - - Cannot create target directory. - - - - - Cannot transfer file. - - - - - Cannot read from a directory. - - - - - Cannot find the file which was found while retrieving file system hierarchy earlier. - - - - - Name of the file is invalid on the target file system. - For example, backslash is a valid filename character on Unix FTP servers, but invalid in local Windows file system. - - - - - Name of the directory is invalid on the target file system. - For example, backslash is a valid directory name character on Unix FTP servers, but invalid in local Windows file system. - - - - - Cannot find the directory which was found while retrieving file system hierarchy earlier. - - - - - Cannot find the link which was found while retrieving file system hierarchy earlier. - - - - - Link is corrupted or its target cannot be found. - - - - - Currently processed item is neither a file nor a directory. - - - - - Operation was canceled. - - - - - Feature required to complete the operation is not supported. - - - - - Cannot delete the file. - - - - - Cannot delete the directory. - - - - - Cannot calculate checksum. - - - - - Specifies the reaction to resolve the current problem that occurred during a multi-file operation. - - - - - Cancel the whole operation. An exception with the value is thrown. - - - - - Cancel the whole operation. An exception is thrown. - - - - - Skip the current problematic item. - - - - - Retry the current operation again. - - - - - Overwrite target file with the same name. - - - - - Transfer the source file to a different name. - - - - - Resume target file. - - - - - Resolve the symbolic link. - - - - - Specifies the condition for overwriting a file. - - - - - No condition = always overwrite. - - - - - Overwrite if size differs. - - - - - Overwrite if the target file is older than the source file. - If working with remote servers, this condition is strongly discouraged - because modification dates are often misreported by FTP servers, - making this mode highly unreliable. - - - - - Overwrite if checksum differs. - Available for ZIP and FTP; only some FTP servers support checksums.
- You can check availability of this condition using method. -
-
- - - Provides data for the ProblemDetected event. - - - - - Initializes a new instance of the class (for internal use only). - - Event data. - - - - Determines whether the specified reaction is currently possible - use this to determine which reactions can be applied. - - Desired reaction. - True if the specified reaction is possible; false otherwise. - - - - Determines whether the specified overwrite condition is currently possible - use this to determine which overwrite conditions can be applied. - - Desired condition. - True if the specified condition is possible; false otherwise. - - - - Indicate to the sender that the problematic item should be skipped. - - - - - Indicate to the sender that the operation should be canceled. - - - - - Indicate to the sender that an exception should be raised. - - - - - Indicate to the sender that the operation on the current item should be retired. - - - - - Indicate to the sender that the current item should be resumed. - - - - - Indicate to the sender that the current link should be resolved. - - - - - Indicate to the sender that the current item should be renamed. - New name is generated from the current item according the pattern "filename[number].extension". - - - - - Indicate to the sender that the current item should be renamed. - - New name of the item or null (Nothing in Visual Basic) to use generated name according the pattern "filename[number].extension". - - - - Indicate to the sender that the current item should be overwritten. - - - - - Indicate to the sender that the current item should be overwritten if the specified condition is met. - - Condition for the overwrite. - - - - Gets the current transfer action. - - Current transfer action. - - - - Gets the exception which will be raised if chosen Reaction is . - - Exception. - - - - Gets the type of the error that classifies the problem. - - Problem type. - - - - Gets the path of the local file or directory that is currently processed. - - Local path. - - - - Gets the local file or directory that is currently processed or null (Nothing in Visual Basic) if not available. - - Local item. - - - - Gets the path of the remote file or directory that is currently processed. - - Remote path. - - - - Gets the remote file or directory that is currently processed or null (Nothing in Visual Basic) if not available. - - Remote item. - - - - Gets the currently selected reaction to the current problem. - - The operation to be performed as the next step of the multi-file operation execution. - - - - Gets the condition to apply for the Overwrite reaction. - If the chosen reaction is not Overwrite, this property is ignored. - - Overwrite condition. - - - - Gets the new name for the currently processed file or directory. - If the chosen reaction is not Rename, this property is ignored. - - New name. - - - - Gets a user state object. - - User state object. - - - - Provides data for the Traversing event. - - - - - Initializes a new instance of the class (for internal use only). - - Event data. - - - - Gets the current transfer action. - - Current transfer action. - - - - Gets the current traversing state of the current . - - Current traversing state of the current . - - - - Gets the file or directory which is currently processed. - - Currently processed item. - - - - Gets the current total number of files to be processed (traversed so far). - - Current total number of files to be processed (traversed so far). - - - - Gets the current total number of bytes to be processed (traversed so far). - - Current total number of bytes (traversed so far). - - - - Gets a user state object. - - User state object. - - - - Provides data for the TransferProgressChanged event. - - - - - Initializes a new instance of the class (for internal use only). - - Event data. - - - - Gets the current transfer action. - - Current transfer action. - - - - Gets the current transfer state of the current . - - Current transfer state of the current . - - - - Gets the file or directory which is currently processed. - - Currently processed item. - - - - Gets the target path of the file or directory which is currently processed. - - Target path. - - - - Gets the total number of bytes transferred during the transfer of the current file. - - The number of bytes transferred. - - - - Gets the total number of files to be transferred. - - Number of files. - - - - Gets the number of files that were already processed (either transferred or skipped). - - Number of files. - - - - Gets the number of files that were already successfully transferred. - - Number of files. - - - - Gets the total number of bytes to be transferred. - - Number of bytes. - - - - Gets the total number of bytes transferred. - - Number of bytes. - - - - Gets the number of bytes transferred during the current transfer since the last time the event was raised. - - The number of bytes transferred since the last time the event was raised. - - - - Gets the current transfer speed in bytes transferred per second (or 0 if not available). - - An estimate of the current speed in number of bytes per second. - Value of 0 indicates that this information is not available. - - - - Gets a number between 0 and 100 representing the percentage of completeness of the operation. - - Percentage value (0..100). - - - - Gets a number between 0 and 100 representing the percentage of completeness of the current file transfer. - - Percentage value (0..100). - - - - Provides data for the DeleteProgressChanged event. - - - - - Initializes a new instance of the class (for internal use only). - - Event data. - - - - Gets the current delete state of the current . - - Current delete state of the current . - - - - Gets the file or directory which is currently processed. - - Remote item. - - - - Gets the total number of files to be deleted. - - Number of files. - - - - Gets the number of files that were already processed (either deleted or skipped). - - Number of files. - - - - Gets the number of files that were already successfully deleted. - - Number of files. - - - - Gets a number between 0 and 100 representing the percentage of completeness of the operation. - - Percentage value (0..100). - - - - Specifies checksum algorithm. - - - - - SHA-1 checksum. - - - - - SHA-256 checksum. - - - - - SHA-384 checksum. - - - - - SHA-512 checksum. - - - - - MD5 checksum. - - - - - SHA-224 checksum. - - - - - Request CRC32 checksum. - - - - - Represents data checksum. - - - - - Returns checksum data. - - - - - - Creates an instance of an object that represents data checksum. - - Checksum algorithm used to compute the checksum. - Checksum data. - - - - Implicit conversion from to string. - - Checksum to convert to string. - Hex string representation of the checksum. - - - - Comparest the checksum with another object of the same type and returns a value indicating whether - the current instance precedes, follows or occurs in the same position in the sort order. - - Object to compare with this instance. - A value that indicates the relative order of checksums being compared. - - - - Returns a value indicating whether the specified object is equal to this checksum. - - Object to compare with this instance. - True if the two instances are same type and represent the same checksum. - - - - Returns the hash code for this checksum. - - - - - - Returns a hex string representation of this checksum. - - Hex string representation of this checksum. - - - - Returns checksum algorithm. - - - - - Returns a hex string representation of the checksum. - - - - - Specifies modes of the method. - - - - - Specifies whether the specified regular file matches the the . - - - - - Specifies whether the specified directory matches the the . - - - - - Specifies whether the specified directory should be traversed to retrieve another matches. - - - - - Set of inclusion and exclusion patterns. - It doesn't depend on the order how the inclusion and exclusion patterns are added into the . - - - - - Initializes a new instance of the class. - - - - - Initializes a new instance of the class. - - A path to be considered as a base path of the set. - - - - Initializes a new instance of the class. - - Directory separators to be used in all paths. - - - - Initializes a new instance of the class. - - A path to be considered as a base path of the set. - Directory separators to be used in all paths. - - - - Initializes the object. - - A path to be considered as a base path of the set. - A path or mask relative to a base path which define an initial inclusion pattern. - - - - Initializes the object. - - A path to be considered as a base path of the set. - A path or mask relative to a base path which define an initial inclusion pattern. - Specifies traversal mode of directories for the . - - - - Adds a path or mask into collection of inclusion patterns. The supported wildcards are '?' and '*' and '**'. - For detailed specification with examples see the documentation. - - A path or mask (relative to the base path) which define an inclusion pattern. - - - - Adds a path or mask into collection of inclusion patterns. The supported wildcards are '?' and '*' and '**'. - For detailed specification with examples see the documentation. - - A path or mask (relative to the base path) which define an inclusion pattern. - Specifies traversal mode of directories for the . - - '?' matches any single character.
- '*' matches any number of any characters except the directory separators.
- '**' matches any number of any characters (directory separators can be reduced e.g. "a\**\b" is equivalent to "a\**\**\b" which matches "a\x\y\z\b" and also "a\b" but not "ab").
- - - - - - - - - - - - - - -
data\file-???.txtMatches files within the "data" directory e.g. "data\file-007.txt", but not "data\file-7.txt".
data\*.txtMatches any ".txt" file within the "data" directory (only within the "data" directory, not in subdirectories) e.g. "data\file.txt", but not "data\a\b\c\file.txt".
data\**\*.txtMatches any ".txt" file anywhere within the "data" directory and its subdirectories e.g. "data\file.txt" and also "data\a\b\c\file.txt".
-
-
- - - Adds a path or mask into collection of exclusion patterns. The supported wildcards are '?' and '*' and '**'. - For detailed specification with examples see the documentation. - - A path or mask (relative to the base path) which define an exclusion pattern. - - - - Adds a path or mask into collection of exclusion patterns. The supported wildcards are '?' and '*' and '**'. - For detailed specification with examples see the documentation. - - A path or mask (relative to the base path) which define an exclusion pattern. - Specifies traversal mode of directories for the . - - '?' matches any single character.
- '*' matches any number of any characters except the directory separators.
- '**' matches any number of any characters (directory separators can be reduced e.g. "a\**\b" is equivalent to "a\**\**\b" which matches "a\x\y\z\b" and also "a\b" but not "ab").
- - - - - - - - - - - - - - -
data\file-???.txtMatches files within the "data" directory e.g. "data\file-007.txt", but not "data\file-7.txt".
data\*.txtMatches any ".txt" file within the "data" directory (only within the "data" directory, not in subdirectories) e.g. "data\file.txt", but not "data\a\b\c\file.txt".
data\**\*.txtMatches any ".txt" file anywhere within the "data" directory and its subdirectories e.g. "data\file.txt" and also "data\a\b\c\file.txt".
-
-
- - - Returns a value indicating whether the specified relative path matches the . - This method is intended to be overwritten by descendants. - In this case please note that for optimization issues when called with parameters equal to "." and - this method should return false if no inclusion pattern was specified; true otherwise. - - A relative path to a base path to be tested for a match. - Specifies how the should be treated for match. - True if the path matches the set; false otherwise. - - - - Gets a collection of local file system items (files and directories) which matches this . - Only items which matches no exclusion pattern and matches at leas one inclusion pattern are included into result collection. - It doesn't depend on the order how the inclusion and exclusion patterns were added into the .
- If you don't want to include empty directories into result collection, please set the to false. -
- A collection of local file system items which matches this . -
- - - Gets or sets the base path of the set. - - A path to be considered as a base path of the set. - - - - Gets or sets a value indicating whether the is case sensitive. - - True if the is case sensitive; false otherwise. - - - - Gets or sets a value indicating whether a consumer of the should include empty directories or not. - Also used in the method. - - True if empty directories should not be included; false otherwise. - - - - Gets or sets a value indicating whether a consumer of the should also include directories where the files are located. - Also used in the method. - Example: Ftp.GetItems("DIR/*.txt") - this property determines whether item "DIR" should be also included in output collection. - - True if directories where the files are located should be included; false otherwise. - - - - Gets or sets a value indicating whether a consumer of the should flatten the output. - Flatten means to don't persist directory structure. - For example if used to upload files "A/a.txt" and "B/b.txt" to the "/data" directory on a FTP server, - files "a.txt" and "b.txt" are uploaded directly into the "/data" directory - (directories "A" and "B" are not created in the "/data" directory). - - True if flatten the output; false otherwise. - - - - The exception that is thrown when an error occurs while using Rebex FileSystem. - - - - - Initializes a new instance of the class. - - - - - Initializes a new instance of the class. - - - - - Initializes a new instance of the class. - - - - - Represents a file system provider. - - This type is not intended to be used directly from your code. To implement custom file system providers, - add reference to the Rebex.FileSystem assembly and use one of the following base classes. - - - - Constructor. - - - - - Performs application-defined tasks associated with freeing, releasing, or resetting resources. - - 2 - - - - Derived classes must create a child file system with the root path equals to the . - - Root path of the child file system. - Child file system with the root path equals to the . - - - - Releases the resources used by the . - - true to release both managed and unmanaged resources; false to release only unmanaged resources. - - - - Configuration options for the . - - - - - Initializes new instance of the . - - - - - Gets or sets value indicating - whether the method is called for directories. - - Default value is false. - - - - - Gets or sets value indicating - whether the strict checks for is enabled. - - Default value is false. - - Enable strict checks only for debugging purposes. Do not use strict checks in production. - - - - - Gets or sets value indicating - whether the method is called for directories. - - Default value is false. - - - - - Gets or sets value indicating - whether the method is called for directories. - - Default value is false. - - - - - Gets or sets used for logging. - - Default value is null. - - - - - Gets or sets default used by the classes - inherited from the - and . - - - - - Represents basic type of the Rebex file system. - - - - - Read only Rebex file system. - - - - - Read-write Rebex file system. - - - - - Represents an attributes of the node. - - - - - Initializes a new instance of the - - of the node - - - Indicates whether the current object is equal to another object of the same type. - true if the current object is equal to the parameter; otherwise, false. - An object to compare with this object. - - - - - - - - - - Determines whether two specified have the same value. - - The first to compare, or null. - The second to compare, or null. - true if the value of left is the same as the value of right, otherwise false. - - - - Determines whether two specified have different values. - - The first to compare, or null. - The second to compare, or null. - true if the value of left is different from the value of right; otherwise false. - - - Returns a string that represents the current . - A string that represents the current . - 2 - - - - Gets the file atttributes of the node. - - - - - Gets a value indicating whether the .ReadOnly flag is set. - - true if the the .ReadOnly flag is set, otherwise false. - - - - Represents a content of a file. - - - - Performs application-defined tasks associated with freeing, releasing, or resetting resources. - 2 - - - - Method creates read only content from the given . - - Stream containing the content of the node. - New read only content. - - - - - - Method creates read/delayed write content from the given stream. - Use this method when following is desired/acceptable behavior: -
  • Underlying stream does not support immediate writing to the file.
  • When previously returned from this method is disposed - and underlying stream has been changed, then - the method method - in the is called.
- Stream containing the content of the node. - New read/delayed write content. - - -
- - - Method creates read/immediate write content from the given stream. Use this method when following is desired/acceptable behavior: -
  • Stream supports immediate writing to the file (e. g. ).
  • SaveContent method in ReadWriteFileSystemProvider is NEVER called. All data are written immediately using the suitable write methods.
- Stream containing the content of the node. - New read/immediate write content. - - -
- - - Returns with the content of the file. - - Stream with the content of the file. - - - - Gets a value indicating whether underlying stream of this instance is read only. - - true if the content is read only, otherwise false. - - - - Returns a value indicating whether this node's stream was closed forcefully. - Forceful close occurs if the stream is not gracefully closed by the consumer. - - - - - Represents read, write or read/write access to the file. - - This enumeration has a attribute that allows a bitwise combination of its member values. - - - - - Read access to the file. - - - - - Write access to the file. - - - - - Read and write access to the file. - - - - - Represents retrieval parameters. - - - - - Represents read access requirement. - - - - - Represents write access requirement. - - - - - Represents read and write access requirement. - - - - - Initializes a new instance of the - Required access type to the file. - - - - - - - - - - - - - Determines whether two specified have the same value. - - The first to compare, or null. - The second to compare, or null. - true if the value of left is the same as the value of right, otherwise false. - - - - Determines whether two specified have different values. - - The first to compare, or null. - The second to compare, or null. - true if the value of left is different from the value of right; otherwise false. - - - Returns a string that represents the current . - A string that represents the current . - 2 - - - - Gets required access type to the file. - - - - - Representats a file system path. - - - - - Used directory separator. - - - - - Name of the root directory. - - - - - Represents the empty . - - - - - Initializes a new instance of the . - - Examples of the valid path: - - / - - /dir1 - - /dir1/ - - /dir1/dir2 - - /dir1/dir2/ - - /dir1/dir2/file.txt - - path in the string format - Exception is thrown when the is malformed. - - - - Returns an array of characters not allowed in . - - - - - Gets an enumerator that iterates through the elements of this path. - - - - Indicates whether the current is equal to another . - true if the current object is equal to the parameter; otherwise, false. - An to compare with this . - - - - Returns a subpath that is a subsequence of the parts of this path. - Subpath starts with the first part (on the index 0) of this path - and ends with the part on the index . - Root path ('/') does not have any subpath. - For the with the path '/dir1/dir2/file.txt'; - - GetSubPath(0) returns '/dir1'. - - GetSubPath(1) returns '/dir1/dir2'. - - GetSubPath(2) returns 'dir1/dir2/file.txt'. - - GetSubPath(3) throws . - - Zero based index of the end part of the subpath. - A subpath that is a subsequence of the parts of this path. - - - Determines whether the specified is equal to the current . - true if the specified is equal to the current ; otherwise, false. - The object to compare with the current object. - 2 - - - - Creates new with added to the end of this . - - New part of the path. - New with the added to the end of this . - - - - Creates new with added to this . - - The new extension. - New with the added to this . - - - - Creates new based on this and with the new . - - The new extension. - New based on this and with the new . - - - - Creates new based on this and with the extension deleted. - - New based on this and with the extension deleted. - - - - Tests if this starts with the given . - - Given . - True if this starts with the given , otherwise false. - - - - Determines whether two specified have the same value. - - The first path to compare, or null. - The second path to compare, or null. - true if the value of left is the same as the value of right, otherwise false. - - - - Determines whether two specified have different values. - - The first path to compare, or null. - The second path to compare, or null. - true if the value of left is different from the value of right, otherwise false. - - - Returns a string that represents the current . - A string that represents the current . - 2 - - - - Convert the value of the to the string representation. - - The to cast to . - - - - Convert the value of to the instance of the . - - The path to convert to the . - Exception is thrown when the is malformed. - - - - Combines strings in the array into a . - - - New combined from the strings in the array. - - - - Indicates whether the specified is null or an instance of the . - - The to test. - true if the parameter is null or an instance of the ; - otherwise false. - - - - - - - Gets the name of the - or the . - - - - - Gets the name without an extension. - - - - - Indicates whether a path contains file name extension. - - True if path contains file name extension, otherwise false. - - - - Gets an enumerator that iterates through the elements of this path. - - - - - Gets the parent path, or path if this path does not have parent. - - - - - Gets the file name extension, or if this path does not have extension. - - - - - Returns true if this path equals to path, otherwise returns false. - - - - - Returns this as a . - - - - - Indicates if this instance is the root path ('/'). - - True if this instance is the root path, otherwise false. - - - - Returns an element of this path. - - Index of the element to return. - An element of this path. - - - - Gets the IEqualityComparer that is used to determine equality of . - - - - - Returns the number of elements in the path. - - The number of elements in the path. - - - - The exception that is thrown when an error occurs while creating new . - - - - - Initializes a new instance of the class - - - - - Initializes a new instance of the class - - - - - Initializes a new instance of the class - - - - - Holds the last access time, the last write time and the creation time of the node. All dates are expressed as UTC. - - Immutable type. - - - - Initializes a new instance of the . - - Creation time of the node (expressed as UTC). - Last access time of the node (expressed as UTC). - Last write time of the node (expressed as UTC). - - Missing or null parameters will have default value . - Time values with 'local' or 'unspecified' kind are converted to UTC automatically. - - - - - - - - Creates new instance with all properties equals to the current - instance properties except the property , which is set to value. - - New creation time (expressed as UTC). - New instance with all properties equals to the current - instance properties except the property , which is set to value. - - - - Creates new instance with all properties equals to the current - instance properties except the property , which is set to value. - - New last access time (expressed as UTC). - New instance with all properties equals to the current - instance properties except the property , which is set to value. - - - - - Creates new instance with all properties equals to the current - instance properties except the property , which is set to value. - - New last write time (expressed as UTC). - New instance with all properties equals to the current - instance properties except the property , which is set to value. - - - - - Indicates whether the specified is null or an NodeTimeInfo. - - The to test. - true if the parameter is null or an NodeTimeInfo ("CreationTime=LastAccessTime=LastWriteTime=DateTim.MinValue"), - otherwise false. - - - - Determines whether two specified have the same value. - - The first to compare, or null. - The second to compare, or null. - true if the value of left is the same as the value of right, otherwise false. - - - - Determines whether two specified have different values. - - The first to compare, or null. - The second to compare, or null. - true if the value of left is different from the value of right; otherwise false. - - - - - - - - - - - - - Represents the empty . - - - Empty has - == - and - == - and - == . - > - - - - Creation time of the node (expressed as UTC). - - - - - Last access time of the node (expressed as UTC). - - - - - Last write time of the node (expressed as UTC). - - - - - The type of the file system node. - - - - - Invalid value. - - - - - File node. - - - - - Directory node. - - - - - Link node (unused). - - - - - Specifies all node types, including File, Directory and Link. - - - - - Provides a container for a collection of objects. - - - - - Initializes a new instance of the class. - - - - - Validates whether the item is correct and can be added. - - Item to add. - - - - Gets an for the collection. - - An for the collection. - - - - Adds the elements of the specified collection to the end of the FileSystemItemCollection. - - The collection whose elements should be added to the end of the FileSystemItemCollection. - - - - Adds the specified item to the collection. - - The item to be added to the collection. - - - - Removes the specified item from the collection. - - The item to remove from the collection. - - True if item was successfully removed from the collection; false otherwise. - - - - - Removes the item with the specified path from the collection. - - The path of an item to remove from the collection. - - - - Removes the item at the specified index from the collection. - - The zero-based index of the item to remove. - - - - Removes all items from the collection. - - - - - Copies the range of elements from the collection to a one-dimensional - array, starting at the specified index of the target array. - - One-dimensional zero-based array that is the destination of the elements copied from the collection. - A zero-based index in the destination array at which copying begins. - - - - Determines whether the item is in the collection. - - The item to locate in the collection. - True if the item is located in the collection; false otherwise. - - - - Determines whether the item with the specified path is in the collection. - - The path to locate in the collection. - True if the item with the specified path is located in the collection; false otherwise. - - - - Gets the total size of files contained in the collection. - - The total size of files contained it the collection. - - - - Returns the paths of files in the collection that match the specified search pattern. - - The regular expression to match the paths or filenames against. - A array containing the paths or names of files in the specified directory that match the specified search pattern. - - The method works in two different modes (determined by property): - Filenames without path are searched and returned. This mode is used by default for collections returned by GetList method.Filenames with path are searched and returned. This mode is used by default for collection returned by GetItems method. - - - - Returns the names of files in the collection that match the specified search pattern. - - The search string to match the items against. - If tree, perform unix-like case-sensitive matching. - A array containing the names of files in the specified directory that match the specified search pattern. - -

The following wildcards are permitted in searchPattern:
* - Zero or more characters.
? - Exactly one character.
- Characters other than the wildcards represent themselves. - For example, the searchPattern string "*.txt" searches for all names/paths - ending with the ".txt". The searchPattern string "s*" searches for all - names/paths beginning with the letter "s". -

-

- The method works in two different modes (determined by property): - Filenames without path are searched and returned. This mode is used by default for collections returned by GetList method.Filenames with path are searched and returned. This mode is used by default for collection returned by GetItems method.

-
-
- - - Returns the names of files in the collection that match the specified search pattern. - - The search string to match the items against. - A array containing the names of files in the specified directory that match the specified search pattern. - -

The following wildcard specifiers are permitted in searchPattern:
* - Zero or more characters.
? - Exactly one character.
- Characters other than the wild card specifiers represent themselves. - For example, the searchPattern string "*t" searches for all names in path - ending with the letter "t". The searchPattern string "s*" searches for all - names in path beginning with the letter "s". -

-

- The method works in two different modes (determined by property): - Filenames without path are searched and returned. This mode is used by default for collections returned by GetList method.Filenames with path are searched and returned. This mode is used by default for collection returned by GetItems method.

-
-
- - - Sorts the items in the entire collection alphabetically. - - - - - Sorts the elements in the entire collection using the specified comparer. - - The implementation to use when comparing elements, or a null reference to sort alphabetically. - - - - Sorts the elements in a section of the collection using the specified comparer. - - The zero-based starting index of the range to sort. - The length of the range to sort. - The implementation to use when comparing elements, or a null reference to sort alphabetically. - - - - Gets an object that can be used to synchronize access to the collection. - - An object that can be used to synchronize access to the collection. - - - - Gets the number of elements contained in the collection. - - The number of elements contained in the collection. - - - - Gets the item at the specified index. - - A zero-based index of the item to get. - Item at the specified index. - - - - Gets the item of the specified path. - - The path of the item to get. - Item with the specified path, or null if not found. - - - - Gets or sets a value that indicates whether to use a Path or Name for pattern matching - and return values in the method. - - - - - List of possible compare types for the FileSystemItemComparer class. - - - - - Compare by . - - - - - Compare by . - - - - - Compare by creation date and time of the item. - - - - - Compare by last modification date and time of the item. - - - - - Compare by last access date and time of the item. - - - - - Compare by type of the item (directory/file/link). - - - - - Class used to compare objects. - - - - - Creates a new instance of FileSystemItemComparer with default sorting by file name and with ascending sort mode. - - - - - Creates a new instance of FileSystemItemComparer with specified comparer type and ascending sort mode. - - Type of the comparer. - - - - Creates a new instance of FileSystemItemComparer with specified comparer type and sort mode. - - Type of the comparer. - Sorting order. - - - - IComparer interface implementation. Compares two instances of . - - First object to compare. - Second object to compare. - Value greater than zero when x is greater then y, zero when they are equal, or less than zero when x is lesser than y. - - - - Specifies how a search pattern is treated (how to traverse a hierarchy of directories). - - - See Using TraversalMode blog post for samples. - - - - - Performs shallow search for files and directories; do recursive transfer of matching directories.
- Shallow search means that items are searched only in the first level of given directory.
- If the pattern matches a file, the file is processed.
- If the pattern matches a directory, all files and subdirectories are processed. -
-
- - - Performs shallow search for files and directories; do non-recursive transfer of matching directories.
- Shallow search means that items are searched only in the first level of given directory.
- If the pattern matches a file, the file is processed.
- If the pattern matches a directory, only the directory itself is processed (without any content = empty directory will be created). -
-
- - - Performs shallow search for files only. This is the same as mode, but only files are processed.
- Shallow search means that files are searched only in the first level of given directory. -
-
- - - Performs deep search for files only. This is like DOS xcopy deep file search.
- Deep search means that files are searched in the given directory and also in all its subdirectories.
- However, if this mode is used in GetItems method, returned collection will also contains directories where the files were found. -
- - This behavior is useful in situations where you need to prepare the containing directory before the file is processed. - To get only files, just use Linq like this: collection.Where(item => !item.IsDirectory) -
- - - Specifies the default action to perform when a target file already exists. - However, the default action can still be changed using the ProblemDetected event. - - - - - Existing files are to cause the whole multi-file transfer to be canceled and an exception to be raised. - - - - - Existing files are to be always skipped. - - - - - Existing files are to be always overwritten. - - - - - Existing files are to be overwritten if they are older than source files. - This is strongly discouraged because modification dates are often misreported by FTP and SFTP servers, making this mode highly unreliable. - We strongly recommend to use a different mode or develop a custom solution using the ProblemDetected event. - - - - - Existing files with different sizes are to be overwritten. - - - - - Existing files are to be resumed if they are smaller than source files. - - - - - Existing files are to be renamed according the pattern "filename[number].extension". - You can still change the generated name using the ProblemDetected event and the method. - - - - - Existing files with different checksum are to be overwritten.
- Works on FTP and ZIP only. ZIP uses CRC-32 always; FTP uses checksums provided by the server (some FTP servers support no checksums). -
-
- - - Specifies behavior on links and reparse points in multi-file operations. - - - - - Detected links are to be resolved and processed - however, this can still be changed by ProblemDetected handler. - - - - - Detected links are to be skipped - however, this can still be changed by ProblemDetected handler. - - - - - Detected links cause an exception to be thrown - however, this can still be changed by ProblemDetected handler. - - - - - Specifies link type. - - - - - Symbolic link (symlink). - - - - - Hard link. - - - - - Specifies the method of the transfer. - - - - - Items are copied. - - - - - Items are moved to the target destination (items are deleted in the source location). - - - - - Specifies the behaviour of the . - - - - - All items (files and directories) are moved to the target destination deleting them in the source location. - - - - - Only files are moved to the target destination. Directories remain (not deleted) in the source location. - - - - - Specifies which date/time to restore. - - - - - Restore no date/time. - - - - - Restore CreationTime. - - - - - Restore LastWriteTime. - - - - - Restore LastAccessTime. - - - - - Restore all date and times. - - - - - Represents a file or directory on the local file system. - - - - - Initializes a new instance of the class. - - Path to a file or directory on the local file system. - - - - Gets the last modification time of the item. - - - - - Sets the last modification time of the item. - - The last modification time. - - - - Gets the last access time of the item. - - - - - Sets the last access time of the item. - - The last access time. - - - - Gets the creation time of the item. - - - - - Sets the creation time of the item. - - The creation time. - - - - Returns the full path of the item. - - The full path of the item. - - - - Deletes the local item. - - - - - Gets the list of file items in a directory represented by this object. - Fails if this object is not a directory. - - - This is only valid for directories. - - List of file items. - - - - Gets the list of directory items in a directory represented by this object. - Fails if this object is not a directory. - - - This is only valid for directories. - - List of directory items. - - - - Computes the CRC32 (Cyclic Redundancy Check) value of the file. - - - This is only valid for files. - - - CRC32 checksum value. - - - - - Calculates the checksum for the specified file. - - Path to the file. - Desired checksum algorithm. - Checksum of the specified file. - - - - Calculates the checksum of the specified part of the specified file. - - Path to the file. - Desired checksum algorithm. - The offset in the local file at which to start processing. - The maximum number of bytes to process. - /// Checksum of the specified file. - - - Gets a value indicating whether the file or directory exists. - - True if the file or directory exists; false otherwise. - - - - Gets file length. - - - - - Gets a value indicating whether the item is a file. - - True if the item is a file; false otherwise. - - - - Gets a value indicating whether the item is a directory. - - True if the archive item is directory; false otherwise. - - - - Gets a value indicating whether the item is a link. - - True if the archive item is a link; false otherwise. - - - - Gets the name of the file or directory. - - The name of the file or directory. - - - - Gets the relative path of the file or directory. - - The relative path of the file or directory. - - - - Gets the full path of the file or directory. - - The full path of the file or directory. - - - - Gets item attributes. - - - - - Provides a container for a collection of objects. - - - - - Initializes a new instance of the class. - - - - - Validates whether the item is correct and can be added. - - Item to add. - - - - Adds the item to the collection. - - The item to be added to the collection. - - - - Adds the item to the collection. - - The item to be added to the collection. - - - - Adds the elements of the specified collection to the end of the LocalItemCollection. - - The collection whose elements should be added to the end of the FtpItemCollection. - - - - Adds the elements of the specified collection to the end of the LocalItemCollection. - - The collection whose elements should be added to the end of the FtpItemCollection. - - - - Determines whether the item is in the collection. - - The item to locate in the collection. - True if the item is located in the collection; false otherwise. - - - - Determines whether the item is in the collection. - - The item to locate in the collection. - True if the item is located in the collection; false otherwise. - - - - Determines whether the item with the specified path is in the colleciton. - - The path to locate in the collection. - True if the item with the specified path is located in the collection; false otherwise. - - - - Copies the range of elements from the collection to a one-dimensional - array, starting at the specified index of the target array. - - One-dimensional zero-based array that is the destination of the elements copied from the collection. - A zero-based index in the destination array at which copying begins. - - - - Removes the specified item from the collection. - - The item to remove from the collection. - - True if item was successfully removed from the collection; false otherwise. - - - - - Removes the specified item from the collection. - - The item to remove from the collection. - - True if item was successfully removed from the collection; false otherwise. - - - - - Gets an for the collection. - - An for the collection. - - - - Gets the item at the specified index. - - A zero-based index of the item to get. - Item at the specified index. - - - - Gets the item of the specified path. - - The path of the item to get. - Item with the specified path, or null if not found. - - - - License key infrastructure for trial versions of Rebex components. - - - - - Gets or sets the license key. - - License key. - - - - Gets collection of license keys. - - - - - Class for chained comparison of objects. - - - - - Creates a new instance of MultiComparer. - - An array of comparers to use. - - - - IComparer interface implementation. Compares two instances of provided objects. - - The first object to compare. - The second object to compare. - - A signed integer that indicates the result of of x and y comparison. - Value Less than zero means x is less than y. Zero x equals y. Greater than zero x is greater than y. - - - - - SSPI data representation. - - - Only supported on Windows platforms. - - - - Native. - - - - SSPI requirements flag. - - - Only supported on Windows platforms. - - - - - Wrapper class for SSPI authentication. - - - Only supported on Windows platforms. - - - - - Creates a new SSPI session. - - Authentication package. - Data representation. - Target name. - Requirements. - User name. - Password. - User domain - - Only supported on Windows platforms. - - - - - Disposes the SSPI session. - - - - - Get next SSPI message. - - Challenge. - Receives a value indicating whether the SSPI has finished. - Next SSPI message. - - Only supported on Windows platforms. - - - - - The hash algorithm used to compute the hash for hash signing - and verification methods. - - - - - Unsupported hash algorithm. - - - - - MD5. - - - - - SHA1. - - - - - MD5SHA1. - - - - - SHA-256. - - - - - SHA-384. - - - - - SHA-512. - - - - - MD4. - - - - - The key algorithm for the certificate. - - - - - Unsupported key algorithm. - - - - - RSA. - - - - - DSA. - - - - - Elliptic Curve DSA. - - - - - ED25519. - - - - - Intended key usage. - - - - Digital signature. - - - Non-repudiation. - - - Key encipherment. - - - Data encipherment. - - - Key agreement. - - - Certificate signing. - - - CRL signing. - - - Key encipherment only. - - - Key decipherment only. - - - - Key set options. - - - - Imported keys are marked as exportable. - - - The user is to be notified through a dialog box or other method when certain attempts to use this key are made. - - - Private keys are stored under the local computer and not under the current user. - - - Private keys are stored under the current user and not under the local computer even if the PFX BLOB specifies that they should go into the local computer. - - - Private keys are persisted on disk when importing a certificate - - - Always load the key into CNG key storage provider. Only supported on Windows Vista or higher. - - - Load the key into CNG key storage provider if possible. Only supported on Windows Vista or higher. - - - - Specifies certificate file format. - - - - Binary DER encoded X.509 certificate. - - - Base-64 encoded DER X.509 certificate. - - - P12/PFX certificate with private key. - - - - Represents an X509 v3 certificate. - - - - - Loads a certificate from an array. - - An array containing DER encoded certificate data. - - - - Loads a DER encoded certificate from the specified file. - - Path to a file. - A certificate. - - - - Loads a DER encoded certificate from the specified stream. - - Stream to load a certificate from. - A certificate. - - - - Loads a DER encoded certificate and a private key (in PKCS #8, PuTTY or SSLeay format) from the specified files. - - Path to a certificate file. - Path to the private key file. - Private key password. - A certificate. - - - - Loads a DER encoded certificate and a private key (in PKCS #8, PuTTY or SSLeay format) from the specified streams. - - Stream with the certificate. - Stream with the private key. - Private key password. - A certificate. - - - - Associates the supplied private key with the certificate to perform operations that need a private key. - - An instance of RSA, DSA, RSACryptoServiceProvider or DSACryptoServiceProvider. - - - - Associates the supplied private key with the certificate to perform operations that need a private key. - - The private key. - - - - Associates the supplied private key with the certificate to perform operations that need a private key. - - The private key. - - - - Associates the supplied private key with the certificate to perform operations that need a private key. - - An instance of RSA, DSA, RSACryptoServiceProvider or DSACryptoServiceProvider. - Specifies whether to permanently bind the certificate to the specified CSP. - - - - Associates the supplied private key with the certificate to perform operations that need a private key. - - The private key. - Specifies whether to permanently bind the certificate to the specified CSP. - - - - Associates the supplied private key with the certificate to perform operations that need a private key. - - The private key. - Specifies whether to permanently bind the certificate to the specified CSP. - - - - Loads a certificate with a private key from a PKCS#12 (PFX) file. - - Path to a file. - Encryption password. - A certificate with private key. - - - - Loads a certificate with a private key from a PKCS#12 (PFX) array. - - An array containing DER encoded PKCS#12 data. - Encryption password. - A certificate with private key. - - - - Loads a certificate with a private key from a PKCS#12 (PFX) file. - - Path to a file. - Encryption password. - Key set options. - A certificate with private key. - - - - Loads a certificate with a private key from a PKCS#12 (PFX) array. - - An array containing DER encoded PKCS#12 data. - Encryption password. - Key set options. - A certificate with private key. - - - - Saves the certificate to the supplied file in DER format. - - Path to the file to save the certificate to. If the file exists, it is overwritten. - - - - Saves the certificate to the supplied stream in DER format. - - Stream to save the certificate to. - - - - Saves the certificate to the supplied file in specified format. - - Path to the file to save the certificate to. If the file exists, it is overwritten. - Certificate format. - - - - Saves the certificate to the supplied stream in specified format. - - Stream to save the certificate to. - Certificate format. - - - - Saves the certificate to the supplied file in specified format. - - Path to the file to save the certificate to. If the file exists, it is overwritten. - Certificate format. - Password (only used by PFX/P12 format). - On .NET Compact Framework, this is only supported in Windows CE 5.0 or later. - - - - Saves the certificate to the supplied stream in specified format. - - Stream to save the certificate to. - Certificate format. - Password (only used by PFX/P12 format). - On .NET Compact Framework, this is only supported in Windows CE 5.0 or later. - - - - Saves the certificate's private key to the supplied file. - - Path to the file to save the certificate to. If the file exists, it is overwritten. - Private key password. - Private key file format. - If set to true, the cryptographic provider should not display any user interface (UI) when exporting private key parameters. - - - - Saves the certificate's private key to the supplied stream. - - Stream to save the private key to. - Private key password. - Private key file format. - If set to true, the cryptographic provider should not display any user interface (UI) when exporting private key parameters. - - - - Creates a new instance of based on the specified certificate or . - - An instance of or . - - - - Converts an or to a . - - An instance of or . - A . - - - - Converts a to (or ). - - An instance of . - An . - - - - Returns the hash algorithm used to create the signature of this certificate. - - Hash algorithm. - - - - Returns the collection of CRL distribution points. - - Collection of CRL distribution points, or null if not available. - - - - Returns the DN of the certification authority that issued the X.509v3 certificate. - - DN of the certification authority that issued the X.509 certificate. - - - - Returns the name of the certification authority that issued the X.509v3 certificate. - - The name of the certification authority that issued the X.509 certificate. - - - - Returns DN of the principal to which the certificate was issued. - - DN of the principal to which the certificate was issued. - - - - Returns the name of the principal to which the certificate was issued. - - The name of the principal to which the certificate was issued. - - - - Returns the public key for the X.509v3 certificate. - - The public key for the X.509v3 certificate. - - - - Returns the key algorithm parameters for the X.509v3 certificate. - - The key algorithm parameters for the X.509v3 certificate. - - - - Returns the public key info for the X.509v3 certificate. - - The public key info for the X.509v3 certificate. - - - - Returns the certificate's subject key identifier (SKI). - - Subject key identifier. - - - - Returns the certificate's issuer key identifier (AKI). - - Issuer (authority) key identifier. - - - - Returns the certificate's common name, if available. - - Common name; or null if not available. - - - - Returns the list of certificate's common names. - - The list of common names. - - - - Returns the list of certificate's e-mail addresses. - - The list of addresses. - - - - Returns the serial number of the X.509v3 certificate. - - The serial number of the X.509 certificate as an array of bytes. - - - - Returns the expiration date of this X.509v3 certificate (in local time). - - The expiration date for this X.509 certificate. - The expiration date is the date after which the X.509 certificate is no longer considered valid. - - - - Returns the effective date of this X.509v3 certificate (in local time). - - The effective date for this X.509 certificate. - The effective date is the date after which the X.509 certificate is considered valid. - - - - Returns the hash value for the X.509v3 certificate as an array of bytes. - - The hash value for the X.509 certificate. - - - - Returns the raw data for the entire X.509v3 certificate. - - The raw data for the entire X.509v3 certificate. - - - - Checks whether a certificate is time valid. - - true if valid, false if not valid. - - - - Returns the intended key usage value. - - Intended key usage. - - - - This method is deprecated, use instead. - - An array of intended key usage identifiers. - - - - Returns an array of enhanced key usage identifiers. - - An array of enhanced key usage identifiers, or null if the certificate is valid for all uses. - - - - Returns the DSA parameters of certificate's public key. - - The DSA parameters of certificate's public key. - - - - Returns the RSA parameters of certificate's public key. - - The RSA parameters of certificate's public key. - - - - Returns the RSA parameters of certificate's public or private key. - - True if private key parameters are to be exported as well. - If set to true, the cryptographic provider should not display any user interface (UI) when exporting private key parameters. - The RSA parameters of certificate's public or private key. - - - - Returns the DSA parameters of certificate's public or private key. - True if private key parameters are to be exported as well.If set to true, the cryptographic provider should not display any user interface (UI) when exporting private key parameters. - The DSA parameters of certificate's public or private key. - - - - Checks whether a private key for this certificate is available. - - True if available, false if not available. - - - - Returns the size of the key in bits. - - Size of the key in bits. - - - - Verifies the specified signature data by comparing it to the signature computed for the specified hash value. - - The hash value of the signed data. - A hash algorithm used to create the hash value. - The signature for the specified hash value. - True if the signature verifies as valid; otherwise, false. - - - - Verifies the specified signature data by comparing it to the signature computed for the specified message. - - The message. - The signature for the specified message. - True if the signature verifies as valid; otherwise, false. - - - - Verifies the specified signature data by comparing it to the signature computed for the specified message. - - The message. - The signature for the specified message. - Signature parameters. - True if the signature verifies as valid; otherwise, false. - - - - Computes the signature for the specified hash value by encrypting it with the private key. - - The hash value of the data to be signed. - A hash algorithm used to create the hash value. - If set to true, the cryptographic should not display any user interface (UI). - The signature for the specified hash value. - -

- The private key for a certificate must be available for this method to succeed. -

-

- If silent operation is requested and the CSP must display UI to operate, this method will fail. -

-
-
- - - Computes the signature for the specified message by encrypting it with the private key. - - The message to be signed. - The signature for the specified message. - -

- The private key for a certificate must be available for this method to succeed. -

-
-
- - - Computes the signature for the specified message by encrypting it with the private key. - - The message to be signed. - Signature parameters. - The signature for the specified message. - -

- The private key for a certificate must be available for this method to succeed. -

-
-
- - - Encrypts data. - - Data to be encrypted. - Encrypted data. - - - - Decrypts data. - - Data to be decrypted. - If set to true, the cryptographic provider should not display any user interface (UI). - Decrypted data. - - If silent operation is requested and the cryptographic provider needs to display a UI to operate, this method will fail. - - - - - Verifies the validity of the certificate. - - Validation result. - - - - Verifies the validity of the certificate, including its compliance with the specified criteria. - - Validation options (not supported by CertificateChainEngine.Native engine on Xamarin.iOS and Xamarin.Android). - Validation result. - - - - Verifies the validity of the certificate, including its compliance with the specified criteria. - - The name of the server. - Validation options (not supported by CertificateChainEngine.Native engine on Xamarin.iOS and Xamarin.Android). - Validation result. - - - - Verifies the validity of the certificate, including its compliance with the specified criteria, - using the specified chain engine. - - The name of the server. - Validation options (not supported by CertificateChainEngine.Native engine on Xamarin.iOS and Xamarin.Android). - Certificate chain engine. - Validation result. - - - - Validates the specified certificate revocation list (issued by this certificate). - - Certificate revocation list to validate. - The date in which the validation takes effect; specify null (Nothing in VB.NET) to skip time validation check. - Status of the validation result. If the CRL is valid, the return value is 0. - - - - Disposes the object and releases resources. - - - Calling this method ensures that all resources are freed. - - - - - Gets the certificates extensions collection. - - Extensions collection. - - - - Returns the key algorithm for this certificate. - - The key algorithm for this certificate. - - - - Gets the thumbprint of the certificate. - - Certificate's thumbprint. - - - - Gets or sets the friendly name associated with the certificate. - - Friendly name associated with the certificate. - Not available in .NET CF. - - - - Gets or sets a custom object associated with this particular instance of . This value is not persisted. - - - - - A chain engine (name space and cache) to be used to build and validate certificate chains. - - - - - The chain engine of the current user. - - - - - The chain engine of the local machine. - - - - - Android / iOS native security policy. - - - - - Use current certificate engine if set; otherwise use engine (platform-specific). - - - - - Represents a chain of certificates. - - - A chain starts by the end certificate and each following certificate - must directly certify the one preceding it. - The last certificate in the list is a self-signed root certificate, and - may be optionally omitted under the assumption it must be known in any case. - - - - - Gets an for the collection. - - An for the collection. - - - - Adds a certificate to the end of the chain. - This certificate represents authority for the previous certificate in the chain - (Leaf certificate is at the beginning of the chain, Root certificate is at the end of the chain). - - The certificate to be added to the chain. - The position of the certificate in the chain. - - - - Creates an empty certificate chain. - - - - - Creates a certificate chain from an array of certificates. - - An array of certificates. - - - - Loads a certificate with a private key from a PKCS#12 (PFX) file. - - Path to a file. - Encryption password. - A certificate with private key. - - - - Loads a certificate with a private key from a PKCS#12 (PFX) array. - - An array containing DER encoded PKCS#12 data. - Encryption password. - A certificate with private key. - - - - Loads a certificate with a private key from a PKCS#12 (PFX) file. - - Path to a file. - Encryption password. - Key set options. - A certificate with private key. - - - - Loads a certificate with a private key from a PKCS #12 (.p12/.pfx) array. - - An array containing DER encoded PKCS #12 data. - Encryption password. - Key set options. - A certificate with private key. - - - - Loads from the specified PKCS #7 (.p7b) file. - - Path to the file. - Instance of , never null. - The PKCS #7 file can be saved using method. - - - - Loads a PKCS #7 (.p7b) encoded from the specified file. - - Stream to load a from. - Instance of , never null. - The PKCS #7 stream can be saved using method. - - - - Verifies the specified signature data by comparing it to the signature computed for the specified hash value. - - The hash value of the signed data. - A hash algorithm used to create the hash value. - The RSA signature for the specified hash value. - true if the signature verifies as valid; otherwise, false. - The hash algorithm parameter is ignored with managed RSA. - - - - Builds a certificate chain for a specified certificate. - - End certificate. - The chain for an end certificate. - - This function builds a certificate chain context starting from an end - certificate and going back, if possible, to a trusted root certificate. - - - - - Builds a certificate chain for a specified certificate. - - End certificate. - Certificate chain engine. - The chain for an end certificate. - - This function builds a certificate chain context starting from an end - certificate and going back, if possible, to a trusted root certificate. - - - - - Builds a certificate chain for a specified certificate. - - End certificate. - Additional store to search in addition to system stores. - The chain for an end certificate. - - This function builds a certificate chain context starting from an end - certificate and going back, if possible, to a trusted root certificate. - - - - - Builds a certificate chain for a specified certificate. - - End certificate. - Certificate chain engine. - Additional store to search in addition to system stores. - The chain for an end certificate. - - This function builds a certificate chain context starting from an end - certificate and going back, if possible, to a trusted root certificate. - - - - - Verifies the validity of the certificate chain. - - Validation result. - - - - Verifies the validity of the certificate chain, including its compliance with the specified criteria. - - Validation options (not supported by CertificateChainEngine.Native engine on Xamarin.iOS and Xamarin.Android). - Validation result. - - - - Verifies the validity of the certificate chain, including its compliance with the specified criteria. - - The name of the server. - Validation options (not supported by CertificateChainEngine.Native engine on Xamarin.iOS and Xamarin.Android). - Validation result. - - - - Verifies the validity of the certificate chain, including its compliance with the specified criteria, - using the specified chain engine. - - The name of the server. - Validation options (not supported by CertificateChainEngine.Native engine on Xamarin.iOS and Xamarin.Android). - Certificate chain engine. - Validation result. - - - - Saves the certificate chain to the specified path as a .P7B (PKCS #7) file. - - Path to save the certificate chain file to. - - - - Saves the certificate chain to the specified stream in .P7B (PKCS #7) format. - - Stream to write the certificate chain to. - - - - Loads a chain of Base-64-encoded X509 certificates from the specified file. - - Path to a file with the certificate chain. - A certificate chain. - - - - Gets the default certificate chain engine (platform-specific). - - - - - Gets the number of certificates in the chain. - - The number of certificates in the chain. - - - - Gets or sets the certificate at the specified position. - - The certificate at the specified position - The certificate at the specified position. - - - - Gets the certificate of the root certification authority, if available. - - Root CA certificate if available; null otherwise. - - - - Gets the first certificate in the chain, if not empty. - - Leaf certificate; null if the chain is empty. - - - - Represents a collection of X509 v3 certificates. - - - - - A base class for various collections of cryptographic objects. - - - - - A base class for various collections of cryptographic objects. - - - - - Gets an for the . - - An for the collection. - - - - Copies the range of elements from the to a compatible one-dimensional - , starting at the specified index of the target array. - - One-dimensional zero-based array that is the destination of the elements copied from . - A zero-based index in the destination array at which copying begins. - - - - Gets the number of items in the . - - The number of items in collection. - - - - Gets a value indicating whether access to the is synchronized. - - - - - Gets an object that can be used to synchronize access to the . - - - - - Adds an item to the collection. - - Item to add. - - - - Removes all elements from the collection. - - - - - Determines whether the collection contains the specified item. - - Item. - True if the collection contains the item; false if it does not. - - - - Returns a position of the specified item within the collection, or -1 if not found. - - Item to find. - Zero-based position of the item; or -1 if not found. - - - - Copies the range of elements from the collection to a compatible one-dimensional - array, starting at the specified index of the target array. - - One-dimensional zero-based array that is the destination of the elements copied from the collection. - A zero-based index in the destination array at which copying begins. - - - - Removes an item from the collection. - - An item to remove. - True if the item was removed; false if not removed. - - - - Removes an item at the specified position from the collection. - - An index of an item to remove. - - - - Adds an item to the collection at the specified position. - - Position at which to insert the item. - Item to add. - - - - Returns an enumerator that iterates through the collection. - - Enumerator. - - - - Returns a value indicating whether the collection is read-only. - - - - - Gets or sets an instance of an item at the specified index. - - The zero-based index of the item to get or set. - An item. - - - - Creates a new instance of . - - - - - Represents a certificate engine. - - - - - Initializes new instance of the class. - - - - - Validates given certificate chain using specified validation parameters. - - Certificate chain to validate. - Validation parameters. - Result of the validation. - - - - Builds a certificate chain from the specified certificate. - - A certificate to build the chain from. - The built certificate chain. - - - - Builds a certificate chain from the specified certificate. - - A certificate to build the chain from. - An extra store to search for intermediate and root CA certificates. - The built certificate chain. - - - - Gets the current certificate engine. - - The current certificate engine; null reference (Nothing in VB.NET) if no engine was set. - - - - Sets the current certificate engine. - - An engine to be used. - - - - Gets or sets the LogWriter used by this object. - - Log writer. - - - - Gets the default certificate engine which is used if no custom engine is set as current engine. - - - - - Certificate validation parameters for 's method. - - - - - Creates a new instance of . - - - - - Gets or sets validation options. - - - - - The exception that is thrown when a certificate-related error occurs. - - - - - Initializes a new instance of the Exception class - with a specified error message. - - The error message that explains the reason for the exception. - - - - Initializes a new instance of the Exception class - with a specified error message and a reference to the - inner exception that is the cause of this exception. - - The error message that explains the reason for the exception. - The exception that is the cause of the current exception. - - - - Represents a collection of X509 v3 certificate extensions. - - - - - Creates a certificate extension collection from an ASN.1 block. - - ASN.1 block. - - - - Gets the first with the specified object identifier. - - The object identifier, either friendly name or dotted string format. - A certificate extension, or null if not found. - - - - Represents an X509 v3 certificate extension. - - - - - Creates a new instance of . - - Extension object identifier. - Specifies whether the extension is critical. - Extension data. - - - - Create extended (enhanced) key usage extension (2.5.29.37). - - Specifies whether this extension is considered critical (not-critical extensions may be ignored by servers that don't support them). - Key usage OIDs. - An extension object. - - - - Creates a key usage extension (2.5.29.15). - - Key usage flags. - An extension object. - - - - Gets the object identifier that identifies the extension. - - The object identifier. - - - - Gets a value indicating whether the extension is critical. - - True if critical; false otherwise. - - - - Gets the extension value. - - An array of bytes in ASN.1 format. - - - - Options for methods. - - - - - No filter. - - - - - Only find certificates that have a private key. - - - - - Only find certificates that are time valid. - - - - - Only find certificates that can be used for client authentication. - - - - - Only find certificates that can be used for server authentication. - - - - - When searching by certificate issuer, include known subordinate CAs in the search as well. - - - - - The type of search for method. - - - - - Certificates whose subject key identifier (SKI) matches the specified value. - - - - - Specifies the location of the certificate store. - - - - None. - - - The store located at HKEY_CURRENT_USER\Software\Microsoft\SystemCertificates. - - - The store located at HKEY_LOCAL_MACHINE\Software\Microsoft\SystemCertificates. - - - The store located at HKEY_LOCAL_MACHINE\Software\Microsoft\Cryptography\Services\<ServiceName>>\SystemCertificates. - - - The store located at HKEY_LOCAL_MACHINE\Software\Microsoft\Cryptography\Services\<ServiceName>\SystemCertificates. - - - The store located at HKEY_USERS\<UserName>\Software\Microsoft\SystemCertificates. - - - The store located at HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates. - - - The store located at HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\SystemCertificates. - - - The store located at HKEY_LOCAL_MACHINE\Software\Microsoft\EnterpriseCertificates. - - - - Specifies the name of the certificate store. - - - - None. - - - Other users. - - - Third-party certificate authorities. - - - Intermediate certificate authorities. - - - Revoked certificates. - - - Personal certificates. - - - Trusted root certificate authorities. - - - Directly trusted people and resources. - - - Directly trusted publishers. - - - - Represents a certificate store. - - - - - Opens a system certificate store of the specified name a the specified location. - - The store name. - Specifies the location of the certificate store. - - Some example system stores are:
- "CA" - Certification authority certificates.
- "My" - A certificate store that holds certificates with associated private keys.
- "Root" - Root certificates.
- "SPC" - Software publisher certificate.
- "Trust"
- "Disallowed"
-
- - - Opens a system certificate store of the specified name a the specified location. - - The store name value. - Specifies the location of the certificate store. - - - - Opens a system certificate store of the specified name. - - The store name. - - Some example system stores are:
- "CA" - Certification authority certificates.
- "My" - A certificate store that holds certificates with associated private keys.
- "Root" - Root certificates.
- "SPC" - Software publisher certificate.
- "Trust"
- "Disallowed"
-
- - - Opens a system certificate store of the specified name. - - The store name value. - - - - Creates a temporary memory-based certificate store - and populates it with certificates from the specified collection. - - The certificate collection. - - - - Determines whether the specified certificate store exists. - - The store name. - Specifies the location of the certificate store. - True if the store exists; false otherwise. - - - - Determines whether the specified certificate store exists. - - The store name value. - Specifies the location of the certificate store. - True if the store exists; false otherwise. - - - - Determines whether the specified certificate store exists. - - The store name. - True if the store exists; false otherwise. - - - - Determines whether the specified certificate store exists. - - The store name value. - True if the store exists; false otherwise. - - - - Adds a certificate to this certificate store. - - Certificate to be added. - - On Windows, the certificate is added even if the same certificate is already present in the store. - If this is undesirable, use instead. - - - - - Adds a certificate to this certificate store. - - Certificate to be added. - - - - Removes a certificate from this certificate store. - - Certificate to be removed. - - - - Returns all certificates matching the specified criteria. - - Specifies the type of search being made. - A byte array whose meaning is defined by 'findType'. - Options. - An array of certificates. - - - - Returns all certificates issued by the specified issuer (or its subordinate issuer) and corresponding to the specified options. - - Issuer DN. - Options. - An array of certificates. - - - - Returns all certificates with the specified serial number issued by the specified issuer (or its subordinate issuer) - and corresponding to the specified options. - - Issuer DN. - Certificate serial number. - Options. - An array of certificates. - - - - Returns all certificates issued by one of specified issuers (or their subordinate issuer) and corresponding to the specified options. - - An array of issuers' DNs. - Options. - An array of certificates. - - - - Returns all certificates issued by one of specified issuers (or their subordinate issuer) and corresponding to the specified options. - - An array of issuers' DNs. - Certificate serial number. - Options. - An array of certificates. - - - - Returns all certificates matching the specified certificate and options. - - Certificate to find. - Options. - An array of certificates. - - - - Returns all certificates corresponding to the specified options. - - Options. - An array of certificates. - - - - Returns all certificates corresponding to the specified e-mail address. - - E-mail address. - An array of certificates. - - - - Returns all certificates corresponding to the specified e-mail address and options. - - E-mail address. - Options. - An array of certificates. - - - - Disposes the object and releases resources. - - - Calling this method ensures that all resources are freed. - - - - - Finalizer called by garbage collector. - - - - - Represents a distinguished name. - - - - - Creates an instance of distinguished name from an ASN.1 block. - - ASN.1 block. - - - - Creates an instance of distinguished name from a DN string. - - DN string. - - - - Returns the DN's common name, if available. - - Common name; or null if not available. - - - - Returns the list of DN's e-mail addresses. - - The list of addresses. - - - - Determines whether the specified object is equal to the current object. - - Object to compare with the current object. - True if equal; false if not equal. - - - - Servers as a hash function for a particular type. Suitable for use in hashing algorithms and hash tables. - - Hash code. - - - - Converts a distinguished name into a byte array. - - Byte array. - - - - Returns a string representation of the object. - - A DN string. - - - - Converts string DN to its BER-encoded representation. - - String DN. - BER-encoded DN. - - - - Converts BER-encoded representation of DB to its string representation. - - BER-encoded DN. - String DN. - - - - Represents a collection of CRL distribution points. - - - - - Creates a new instance of . - - - - - A CRL distribution point. - - - - - Create a new instance of a CRL distribution point that represents the specified URL. - - CRL URL. - - - - Gets distribution point URL, if available. - - Distribution point URL, or null if not available. - - - - Certificate validation method options. (Not supported by CertificateChainEngine.Native engine on Xamarin.iOS and Xamarin.Android). - - - - - No options specified. - - - - - Ignore an invalid time (such as expiration). - - - - - Ignore an invalid certificate trust list time. - - - - - Ignore an invalid time nesting. - - - - - Ignore all invalid time checks (such as expiration, nesting, CRL or CTL times). - - - - - Ignore invalid basic constraints. - - - - - Allow unknown certification authority. - - - - - Ignore wrong usage of the certificate. - - - - - Ignore invalid policy. - - - - - Ignore an unknown revocation status of the end certificate. - - Not supported in builds for .NET CF. - - - - Ignore an unknown revocation status of the certificate trust list signer. - - Not supported in builds for .NET CF. - - - - Ignore an unknown revocation status of the CA certificate. - - Not supported in builds for .NET CF. - - - - Ignore an unknown revocation status of a root certificate. - - Not supported in builds for .NET CF. - - - - Ignore all unknown revocation statuses. - - - - - Not supported. - - Not supported in builds for .NET CF. - - - - Not supported. - - Not supported in builds for .NET CF. - - - - Only use local cache, do not access the network. - - Not supported in builds for .NET CF. - - - - Ignore invalid common name. - - - - - Skip certificate revocation check. - - - - - Ignore invalid chain. - - - - - Certificate validation status. - - - - - This certificate or one of the certificates in the certificate chain is not time valid. - - - - - Certificates in the chain are not properly time nested. - - - - - Trust for this certificate or one of the certificates in the certificate chain has been revoked. - - - - - The certificate or one of the certificates in the certificate chain does not have a valid signature. - - - - - The certificate or certificate chain is not valid for its proposed usage. - - - - - The certificate or certificate chain is based on an untrusted root. - - - - - The revocation status of the certificate or one of the certificates in the certificate chain is unknown. - - - - - One of the certificates in the chain was issued by a certification authority that the original certificate had certified. - - - - - One of the certificates has an invalid extension. - - - - - The certificate or one of the certificates in the certificate chain has - a policy constraints extension, and one of the issued certificates has - a disallowed policy mapping extension or does not have a required issuance - policies extension. - - - - - The certificate or one of the certificates in the certificate chain has - a basic constraints extension and either the certificate cannot be used - to issue other certificates or the chain path length has been exceeded. - - - - - The certificate or one of the certificates in the certificate chain has - an invalid name constraints extension. - - - - - The certificate or one of the certificates in the certificate chain has a name constraints extension containing unsupported fields. - - - - - The certificate or one of the certificates in the certificate chain has a name constraints extension and a name constraint is missing for one of the name choices in the end certificate. - - - - - The certificate or one of the certificates in the certificate chain has a name constraints extension and there is not a permitted name constraint for one of the name choices in the end certificate. - - - - - The certificate or one of the certificates in the certificate chain has a name constraints extension and one of the name choices in the end certificate is explicitly excluded. - - - - - The certificate chain is not complete. - - - - - A CTL used to create this chain was not time valid. - - - - - A CTL used to create this chain did not have a valid signature. - - - - - A CTL used to create this chain is not valid for this usage. - - - - - The revocation status of the certificate or one of the certificates in the certificate chain is either off-line or stale. - - - - - The end certificate does not have any resultant issuance policies, and one of the issuing CA certificates has a policy constraints extension requiring it. - - - - - The certificate chain contains a certificate with unsupported signature hash algorithm (usually SHA-2) or unsupported key algorithm (usually ECDSA). - - - - - Unknown error. - - - - - A path length constraint in the certification chain has been violated. - - - - - A certificate contains an unknown extension that is marked critical. - - - - - A certificate chain is invalid, - such as an certificate's Issuer not matching the CA's Subject or - an certificate's AKI not matching the CA's SKI. - - - - - The certificate's CN name does not match the passed value. - - - - - The certificate was explicitly marked as untrusted by the user or CA. - - - - - A certificate or CRL is malformed. - - - - - There might be more errors apart from those reported. - - - - - Certificate uses algorithm which is not considered secure on this platform. - - - - - Certificate is not trusted. - - - - - Represents the result of certificate chain validation. - - - - - Initialize instance of the . - - A validation status (use zero for success). - - - - Gets the status mask. - - Status mask. - - - - Gets the certificate chain validity status. - - True if valid, false if not valid. - - - - Gets the native error code returned by the validation function (this property returns always zero). - - The error code returned by the validation function. - - - - Gets the native error code returned by the validation function or zero if the native error code is not available. - - The error code returned by the validation function. - - - - Specifies asymmetric algorithm. - - - - - RSA. - - - - - DSA. - - - - - Diffie-Hellman. - - - - - Elliptic Curve Digital Signature Algorithm (.NET >= 4.0 or through a plugin). - - - - - Elliptic Curve Diffie-Hellman algorithm (.NET >= 4.0 or through a plugin). - - - - - Twisted Edwards Curve DSA algorithm such as ED25519 (supported through a plugin). - - - - - Specifies key blob format. - - - - - ECPrivateKey (defined by RFC 5915). - - - - - Raw public key data. - - - - - Raw private key data. - - - - - A platform-independent asymmetric algorithm object. - - - - - Register custom asymmetric key algorithm. - - Factory function that accepts algorithm name and returns algorithm. - - - - Creates an instance of . - - - - - Frees the resources used by this object. - - - - - Creates an instance of from the specified asymmetric algorithm object. - - Asymmetric algorithm object. - True if the created object owns the asymmetric algorithm object. - An instance of . - - - - Exports a public key to the specified private key info object. - - Public key info object. - - - - Exports a private key to the specified private key info object. - - Private key info object. - - - - Imports a key from the specified public key info object. - - Public key info object. - - - - Imports a key from the specified private key info object. - - Private key info object. - - - - Imports a key from the specified RSA parameters. - - RSA key parameters. - - - - Imports a key from the specified DSA parameters. - - DSA key parameters. - - - - Imports a key from the specified Diffie-Hellman parameters. - - Diffie-Hellman key parameters. - - - - Imports a private key for the specified algorithm/curve. Only some algorithms/curves are supported. - - Key algorithm. - Key algorithm curve. - Key data. - Key format. - - - - Returns a value indicating whether the specified algorithm is supported. - - Asymmetric algorithm. - Curve name or OID (if needed). - Key size (specify 0 to indicate default key size). - True if supported; false if not supported. - - - - Generates Diffie-Hellman parameters corresponding to the specified key size. - - Key size. - Diffie-Hellman parameters. - - - - Generates a private key for the specified asymmetric algorithm with of the specified key size. - - Key algorithm. - Key size. Specify 0 to use default key size. - - - - Generates a private key for the specified asymmetric algorithm based on the specified curve. - - Key algorithm. - Curve name or OID. - - - - Computes the signature for the specified hash value. - - The hash value of the data to be signed. - A hash algorithm used to create the hash value. - The signature for the specified hash value. - -

- The private key must be available for this method to succeed. -

-
-
- - - Computes the signature for the specified message (using default parameters). - - Message to be signed. - Signature for the specified message. - -

- The private key must be available for this method to succeed. -

-
-
- - - Computes the signature for the specified message. - - Message to be signed. - Signature parameters. - Signature for the specified message. - -

- The private key must be available for this method to succeed. -

-
-
- - - Verifies the specified signature. - - The hash value of the signed data. - A hash algorithm used to create the hash value. - The signature for the specified hash value. - True if the signature verifies as valid; otherwise, false. - - - - Verifies the specified signature (using default parameters). - - Signed message. - The signature for the specified message. - True if the signature verifies as valid; otherwise, false. - - - - Verifies the specified signature. - - Signed message. - The signature for the specified message. - Signature parameters. - True if the signature verifies as valid; otherwise, false. - - - - Encrypts data. - - Data to be encrypted. - Encrypted data. - - - - Encrypts data. - - Data to be encrypted. - Encryption parameters. - Encrypted data. - - - - Decrypts data. - - Data to be decrypted. - Decrypted data. - - If silent operation is requested and the CSP must display UI to operate, this method will fail. - - - - - Decrypts data. - - Data to be decrypted. - Encryption parameters. - Decrypted data. - - - - Gets key material deriver. Only supported by Diffie-Hellman-like algorithms. - - Other side's public key in raw form. - Key material deriver. - - - - Gets the current key size. - - - - - Gets the current key algorithm. - - - - - Gets a value indicating whether this instance only contains the public key. - - - - - Provides various cryptography-related helper methods. - - - - - Creates an instance of default random number generator. - - - - - - Returns an array of bytes with a cryptographically strong random sequence of values. - - Array length. - Array filled with random data. - - - - Fills specified array of bytes with a cryptographically strong random sequence of values. - - Array to fill random data with. - - - - Decodes a signature from a PKCS #7 form. - - Signature. - Key algorithm. - Decoded signature. - - - - Encodes a signature to a PKCS #7 form. - - Signature. - Key algorithm. - Encoded signature. - - - - Sets internal option. - - Instance. - Name. - Value. - - - - Gets internal option. - - Instance. - Name. - Value. - - - - Returns a value indicating whether the cryptographic engine is available. - - - - - Forces RijndaelManaged to be used even when AesCryptoServiceProvider is available. - - True if RijndaelManaged is to be used instead of AesCryptoServiceProvider; false otherwise. - - - - Enables or disables an option that specifies whether only FIPS 140-2 compliant cryptographic algorithm providers are to be used. - - True if only FIPS 140-2 compliant algorithms are to be used; false to allow all supported algorithms. - - In .NET 2.0 and higher, this option reflects the Windows OS settings unless explicitly set to a different value. - - - - - Implements Diffie-Hellman key agreement protocol (also called exponential key agreement). - - - This algorithm was developed by Diffie and Hellman in 1976. It allows two users - to exchange a secret key over an insecure medium without any prior secrets. - - - - - Initializes a new instance of DiffieHellman. - - - You cannot create an instance of an abstract class. - Create an instance of class instead. - - - - - Returns the public key. - - The public key. - - - - Calculates the shared secret key from the other side's public key. - - Other side's public key. - The shared secret key. - - - - Imports the specified . - - The Diffie-Hellman parameters. - - - - Exports the . - - true to include private parameter; otherwise, false. - The Diffie-Hellman parameters. - - - - Returns Oakley generator value. - - Oakley generator. - - - - Returns Oakley group 2. - - Oakley group 2. - - - - Returns Oakley group 14. - - Oakley group 14. - - - - Implementation of Diffie-Hellman algorithm (wrapper around Android cryptographic API). - - - - - Creates an instance of using the default key size of 1024. - - - - - Creates an instance of using the specified key size. - - Key size. - - - - Returns the public key. - - The public key. - - - - Imports the specified . - - The Diffie-Hellman parameters. - - - - Exports the . - - true to include private parameter; otherwise, false. - The Diffie-Hellman parameters. - - - - Creates and returns an XML string representation of the current object. - - true to include private parameters; otherwise, false. - An XML string encoding of the current object. - - - - When overridden in a derived class, reconstructs a DiffieHellmanManaged object from an XML string. - - The XML string to use to reconstruct the DiffieHellmanManaged object. - - - - Releases the unmanaged resources and optionally releases the managed resources. - - true to release both managed and unmanaged resources; false to release only unmanaged resources. - - - - Gets the name of the key exchange algorithm available with this implementation of DiffieHellman. - - The name of the key exchange algorithm. - - - - Gets the name of the signature algorithm available with this implementation of DiffieHellman. - - The name of the signature algorithm. - DiffieHellman does not support signatures. This property will throw an exception. - - - - Managed implementation of Diffie-Hellman algorithm. - - - - - Initializes a new instance of the DiffieHellmanManaged class. - - - - - Initializes a new instance of the DiffieHellmanManaged class - with a specified key size. - - The size of the key to use in bits. - - - - Creates and returns an XML string representation of the current object. - - true to include private parameters; otherwise, false. - An XML string encoding of the current object. - - - - When overridden in a derived class, reconstructs a DiffieHellmanManaged object from an XML string. - - The XML string to use to reconstruct the DiffieHellmanManaged object. - - - - Returns the public key. - - The public key. - - - - Imports the specified . - - The Diffie-Hellman parameters. - - - - Exports the . - - true to include private parameter; otherwise, false. - The Diffie-Hellman parameters. - - - - Releases the unmanaged resources and optionally releases the managed resources. - - true to release both managed and unmanaged resources; false to release only unmanaged resources. - - - - Gets the name of the signature algorithm available with this implementation of DiffieHellman. - - The name of the signature algorithm. - DiffieHellman does not support signatures. This property will throw an exception. - - - - Gets the name of the key exchange algorithm available with this implementation of DiffieHellman. - - The name of the key exchange algorithm. - - - - Contains the parameters for Diffie-Hellman algorithm. - - - - - The prime modulus used for the operation. - - - - - The generator used for the operation. - - - - - The private key for the operation. - - - - - The public key for the operation. - - - - - Managed implementation of DSA signature algorithm. - - -

- The purpose of this class is to make it possible to verify - signatures without the need to use CryptoAPI, which is not available - in some scenarios. -

-

- Even though it is possible to generate DSA keys and sign data using - this class, but this process has not been optimized for speed and is - very slow. -

-
-
- - - Initializes a new instance of the DSAManaged class with the key size of 1024. - - - - - Initializes a new instance of the DSAManaged class with the specified key size. - - The size of the key to use in bits. - - - - Initializes a new instance of the DSAManaged class with the specified key size and seed. - - The size of the key to use in bits. - The initial seed to use for key generation. - - - - Creates and returns an XML string representation of the current object. - - true to include private parameters; otherwise, false. - An XML string encoding of the current object. - - - - When overridden in a derived class, reconstructs a DSAManaged object from an XML string. - - The XML string to use to reconstruct the DSAManaged object. - - - - Exports the . - - true to include private parameters; otherwise, false. - The DSA parameters. - - - - Imports the specified . - - The DSA parameters. - - - - Creates the DSA signature for the specified data. - - The SHA1 hash of data to be signed. - The DSA signature for the specified hash value. - - DSA signature is a pair of numbers r and s. - This method always returns an array of 40 bytes. - Bytes 0..19 contain the value of r, bytes 20..39 contain the value of s. - - - - - Verifies the DSA signature for the specified data. - - The SHA1 hash of signed data to be verified. - The signature to be verified for rgbData. - true if the signature verifies as valid; otherwise, false. - - DSA signature is a pair of numbers r and s. - The rgbSignature parameter must be 40 bytes long. - Bytes 0..19 must contain the value of r, bytes 20..39 must contain the value of s. - - - - - Computes the signature for the specified hash value by signing - it with the private key. - - The SHA1 hash of data to be signed. - The DSA signature for the specified hash value. - - - - Verifies the specified signature data by comparing it to the signature computed for the specified hash value. - - The hash value of the signed data. - The signature data to be verified. - true if the signature verifies as valid; otherwise, false. - - - - Computes the hash value of the specified byte array using the specified hash algorithm, and signs the resulting hash value. - - The input data for which to compute the hash. - The hash algorithm to use to create the hash value. - The DSA signature for the specified data. - - - - Verifies the specified signature data by comparing it to the signature computed for the specified data. - - The signed data. - The hash algorithm used to create the hash value of the data. - The signature data to be verified. - true if the signature verifies as valid; otherwise, false. - - - - Releases the unmanaged resources and optionally releases the managed resources. - - true to release both managed and unmanaged resources; false to release only unmanaged resources. - - - - Gets the name of the signature algorithm available with this implementation of DSA. - - The name of the signature algorithm. - - - - Gets the name of the key exchange algorithm available with this implementation of DSA. - - The name of the key exchange algorithm. - - - - Encryption schemes. - - - - - Default padding scheme (depends on key algorithm). - - - - - RSAES-PKCS1-v1_5 (RFC 3447). - - - - - RSAES-OAEP (RFC 3447). - - - - - Encryption parameters. - - - - - Initialize new instance of the . - - - - - Encryption scheme. - - - - - Hashing algorithm for padding generation. - - - - - Optional input parameter for . - - - - - If set to true (default), the cryptographic provider should not display any user interface (UI) when working with private keys. - Only used for decryption operations. - - - If silent operation is requested and the cryptographic provider needs to display a UI to operate, the requested method will fail. - - - - - Represents a hash transform. - - - - - Computes the hash value for the specified region of the input byte array. - - The input to compute the hash code for. - The offset into the input byte array from which to begin using data. - The number of bytes in the input byte array to use as data. - - - - Gets the value of the computed hash code. - - The computed hash value. - - - - Resets the transform. - - - - - Represents the size, in bits, of the computed hash code. - - - - - Specifies hash algorithm. - - - - - SHA-1. - - - - - SHA-256. - - - - - SHA-384. - - - - - SHA-512. - - - - - MD4. - - - - - MD5. - - - - - Specifies hash algorithm key mode. - - - - - No keyed hash. - - - - - HMAC. - - - - - Represents a hash algorithm. - - - - - Gets the current key. - - The current key. - - - - Sets the current key to the specified value. - - Key to be set. - - - - Creates an instance of for the specified algorithm. - - Algorithm. - - - - Gets a value indicating whether the specified algorithm is supported. - - Algorithm. - True if supported; false if not supported. - - - - Creates a hash transform object for this algorithm based on the currently set parameters. - - Hash transform object. - - - - Creates a hash transform object for this algorithm based on the currently set parameters. - - Hash transform object. - - - - Computes the hash value for the specified data. - - Input data. - Hash value. - - - - Computes the hash value for the specified data. - - Input data. - Input offset. - Input length. - Hash value. - - - - Computes the hash value for the specified data using the specified algorithm. - - Hash algorithm. - Input data. - Hash value. - - - - Computes the hash value for the specified data using the specified algorithm. - - Hash algorithm. - Input data. - Input offset. - Input length. - Hash value. - - - - Disposes the object. - - - - - Gets algorithm ID. - - - - - Gets the size of the computed hash code (in bits). - - - - - Gets or sets the algorithm's key mode. - - - - - Computes a Hash-based Message Authentication Code (HMAC) - for the input data using the specified hash function. - - - HMAC is defined by RFC 2104 and look like this: - alg(K XOR opad + alg(K XOR ipad + text))
- where alg is the base hash algorithm,
- K is an n byte key,
- ipad is the byte 0x36 repeated 64 times (or 128 times),
- opad is the byte 0x5c repeated 64 times (or 128 times),
- and text is the data being protected.
-
- - - Initializes a new instance of the HMAC class with the specified hash algorithm and key data. - - A type of hash algorithm to use. - The secret key for HMAC encryption. - - - - Initializes a new instance of the HMAC class with the specified hash algorithm and a randomly generated key. - - A type of hash algorithm to use. Must be a subclass of HashAlgorithm. - - - - Initializes an instance of HMAC. - - - - - Routes data written to the object into the hash algorithm for computing the HMAC. - - The input data. - The offset into the byte array from which to begin using data. - The number of bytes in the array to use as data. - - - - Returns the computed Hash-based Message Authentication Code (HMAC) after all data has been written to the object. - - The computed HMAC. - - - - Releases the unmanaged resources used by the HMAC and optionally releases the managed resources. - - true to release both managed and unmanaged resources; false to release only unmanaged resources. - - - - Gets or sets the key to be used in the hash algorithm. - - The key to be used in the hash algorithm. - - - - Key derivation options. - - - - - Key derivation parameters. - - - - - Gets or sets key derivation function ("HASH" or "HMAC"). - - - - - Hashing algorithm. - - - - - HMAC key. - - - - - Data to append to shared secret when hashing. - - - - - Data to prepend to shared secret when hashing. - - - - - Key material deriver. - - - - - Derives key material. - - Parameters that specify how to derive the key material.. - Key material. - - - - Finalizer. Called by garbage collector during object destruction. - - - - - Disposes the deriver object. - - - - - Represents the base class from which all implementations of the ArcFour algorithm must derive. - - - - - Initializes a new instance of ArcFour. - - - You cannot create an instance of an abstract class. - Create an instance of class instead. - - - - - Generates a random initialization vector (IV) to be used for the algorithm. - - ArcFour is a stream cipher, it does not use IV. - - - - Generates a random key to be used for the algorithm. - - Use this method to generate a random key when none is specified. - - - - Gets or sets the block size of the cryptographic operation in bits. - - The block size. - ArcFour is a stream cipher, blocks can be of any size. - - - - Gets or sets the initialization vector (IV) for the symmetric algorithm. - - Initialization vector. - ArcFour is a stream cipher, it does not use IV. - - - - Gets or sets the mode for operation of the symmetric algorithm. - - The mode for operation. - ArcFour is a stream cipher, the only mode supported is CipherMode.OFB. - - - - Gets or sets the padding mode used in the symmetric algorithm. - - The padding mode. - ArcFour is a stream cipher, no padding is done. - - - - The managed version of the ArcFour algorithm. - - - - - Initializes a new instance of ArcFourManaged class. - - - - - Creates a symmetric ArcFour decryptor object with the specified Key and initialization vector (IV). - - The secret key to be used for the symmetric algorithm. - The IV. Not used by ArcFour. - A symmetric ArcFour decryptor object. - - - - Creates a symmetric ArcFour encryptor object with the specified Key and initialization vector (IV). - - The secret key to be used for the symmetric algorithm. - The IV. Not used by ArcFour. - A symmetric ArcFour encryptor object. - - - - The managed version of the algorithm defined by RFC 2268. - - - - - Initializes a new instance of class. - - - - - Generates a random initialization vector (IV) to be used for the algorithm. - - Use this method to generate a random initialization vector (IV) when none is specified. - - - - Generates a random key to be used for the algorithm. - - Use this method to generate a random key when none is specified. - - - - Creates a RC2 encryptor object with the specified key. - - The secret key to be used for the symmetric algorithm. - The initialization vector for - . - A RC2 encryptor object. - - - - Creates a RC2 decryptor object with the specified key. - - The secret key to be used for the symmetric algorithm. - The initialization vector for . - A RC2 decryptor object. - - - - Gets or sets the mode for operation of the symmetric algorithm. - - The mode for operation of the symmetric algorithm. - - - - Gets or sets the padding mode used in the symmetric algorithm. - - The padding mode used in the symmetric algorithm. - - - - Represents the base class from which all implementations of Bruce Schneier's Blowfish algorithm must derive. - - - - - Initializes a new instance of Blowfish. - - - You cannot create an instance of an abstract class. - Create an instance of class instead. - - - - - The managed version of the Blowfish algorithm. - - - - - Initializes a new instance of class. - - - - - Generates a random initialization vector (IV) to be used for the algorithm. - - Use this method to generate a random initialization vector (IV) when none is specified. - - - - Generates a random key to be used for the algorithm. - - Use this method to generate a random key when none is specified. - - - - Creates a Blowfish encryptor object with the specified key. - - The secret key to be used for the symmetric algorithm. - The initialization vector for - . - A Blowfish encryptor object. - - - - Creates a Blowfish decryptor object with the specified key. - - The secret key to be used for the symmetric algorithm. - The initialization vector for - . - A Blowfish decryptor object. - - - - Gets or sets the mode for operation of the symmetric algorithm. - - The mode for operation of the symmetric algorithm. - - - - Gets or sets the padding mode used in the symmetric algorithm. - - The padding mode used in the symmetric algorithm. - - - - Computes the combined MD5/SHA1 hash for the input data. - - - The resulting hash value is 36 bytes long. - Bytes 0..15 contain the MD5 hash and bytes 16..35 contain the SHA1 hash. - - - - - Initializes a new instance of the MD5SHA1 class. - - - - - Initializes an instance of MD5SHA1. - - - - - Routes data written to the object into MD5 and SHA1 hash algorithms for computing the hash. - - The array of data bytes. - The offset into the byte array from which to begin using data. - The number of bytes in the array to use as data. - - - - Returns the computed MD5SHA1 hash as an array of bytes after all data has been written to the object. - - The computed hash value. - - - - Releases the unmanaged resources used by the MD5SHA1 and optionally releases the managed resources. - - true to release both managed and unmanaged resources; false to release only unmanaged resources. - - - - Returns the underlying instance of the MD5 object that is used to compute the MD5 part of the combined hash. - - - - - Returns the underlying instance of the SHA1 object that is used to compute the SHA1 part of the combined hash. - - - - - Represents the base class from which all implementations of Bruce Schneier's Twofish algorithm must derive. - - - - - Initializes a new instance of Twofish. - - - You cannot create an instance of an abstract class. - Create an instance of class instead. - - - - - The managed version of the Twofish algorithm. - - - - - Initializes a new instance of class. - - - - - Generates a random initialization vector (IV) to be used for the algorithm. - - Use this method to generate a random initialization vector (IV) when none is specified. - - - - Generates a random key to be used for the algorithm. - - Use this method to generate a random key when none is specified. - - - - Creates a Twofish encryptor object with the specified key. - - The secret key to be used for the symmetric algorithm. - The initialization vector for - . - A Twofish encryptor object. - - - - Creates a Twofish decryptor object with the specified key. - - The secret key to be used for the symmetric algorithm. - The initialization vector for - . - A Twofish decryptor object. - - - - Gets or sets the mode for operation of the symmetric algorithm. - - The mode for operation of the symmetric algorithm. - - - - Gets or sets the padding mode used in the symmetric algorithm. - - The padding mode used in the symmetric algorithm. - - - - Managed implementation of MD5 algorithm. - - - - - Initializes a new instance. - - - - - Initializes an instance of MD5. - - - - - Updates the MD5 hash code. - - The array of data bytes. - The zero based offset into the byte array from which to begin using data. - The number of bytes in the array to use as data. - - - - Returns the computed MD5 hash as an array of bytes. - - The computed MD5 hash value. - - - - Managed implementation of MD4 algorithm. - - - - - Initializes a new instance. - - - - - Initializes an instance of MD4. - - - - - Updates the MD4 hash code. - - The array of data bytes. - The zero based offset into the byte array from which to begin using data. - The number of bytes in the array to use as data. - - - - Returns the computed MD4 hash as an array of bytes. - - The computed MD4 hash value. - - - - Represents a cryptographic object identifier. - - - - - Initializes a new instance of the class using the specified object. - - The object identifier information to use to create the new object identifier. - - - - Initializes a new instance of the class using the specified OID dotted number string. - - An object identifier in dotted number format. - - - - Converts a OID to an . - - An object identifier in dotted number format. - An . - - - - Parses an OID from an ASN.1 encoded byte array. - - Byte array. - OID. - - - - Gets an ASN.1 encoded byte array representaion of this OID. - - Byte array. - - - - Gets an ASN.1 encoded byte array representaion of this OID. - - True if DER-formatting is to be used. - Byte array. - - - - Returns a string in dotted number format that represents the current . - - A string representation of the current Oid. - - - - Gets the dotted number representation of the object identifier. - - - - - PKCS #12 key derivation algorithm. - - - - - ID value for key material. - - - - - ID value for IV material. - - - - - ID value for MAC material. - - - - Resets the state of the operation. - - - Returns a pseudo-random key from a password, salt and iteration count. - A byte array filled with pseudo-random key bytes. - The number of pseudo-random key bytes to generate. - - - - Managed implementation of RSA algorithm. - -

- The purpose of this class is to make it possible to verify - signatures and encrypt data without the need to use CryptoAPI, which - is not available in some scenarios. -

-

- Even though it is possible to generate RSA keys and sign data using - this class, it is not recommended because the generated keys are not - being checked to ensure they are strong primes. -

-
- - - Initializes a new instance of the RSAManaged class with the key size of 1024. - - - - - Initializes a new instance of the RSAManaged class with the specified key size. - - The size of the key to use in bits. - - - - Exports the . - - true to include private parameters; otherwise, false. - The RSA parameters. - - - - Imports the specified . - - The RSA parameters. - - - - Decrypts data with the RSA algorithm. - - The data to be decrypted. - The decrypted data. - No processing of raw data is performed. - - - - Encrypts data with the RSA algorithm. - - The data to be encrypted. - The encrypted data. - No processing of raw data is performed. - - - - Decrypts data with the RSA algorithm. - - The data to be decrypted. - The decrypted data. - Uses PKCS#1 v1.5 padding. - - - - Encrypts data with the RSA algorithm. - - The data to be encrypted. - The encrypted data. - Uses PKCS#1 v1.5 padding. - - - - Verifies the specified signature data by comparing it to the signature computed for the specified hash value. - - RSA algorithm. - The hash value of the signed data. - A hash algorithm used to create the hash value. - The signature data to be verified. - true if the signature verifies as valid; otherwise, false. - - - - Verifies the specified signature data by comparing it to the signature computed for the specified hash value. - - The hash value of the signed data. - A hash algorithm used to create the hash value. - The signature data to be verified. - true if the signature verifies as valid; otherwise, false. - - - - Computes the signature for the specified hash value by signing - it with the private key. - - RSA algorithm. - The hash of data to be signed. - A hash algorithm used to create the hash value. - The RSA signature for the specified hash value. - - - - Computes the signature for the specified hash value by signing - it with the private key. - - The hash of data to be signed. - A hash algorithm used to create the hash value. - The RSA signature for the specified hash value. - - - - Releases the unmanaged resources and optionally releases the managed resources. - - true to release both managed and unmanaged resources; false to release only unmanaged resources. - - - - Gets the name of the signature algorithm available with this implementation of RSA. - - The name of the signature algorithm. - - - - Gets the name of the key exchange algorithm available with this implementation of RSA. - - The name of the key exchange algorithm. - - - - Signature format. - - - - - Raw signature data. - - - - - DER-encoded ASN.1 form of the signature formatted according to Cryptographic Message Syntax (PKCS #7). - - - - - Signature padding scheme. - - - - - Default padding scheme (depends on key algorithm). - - - - - PKCS #1 padding scheme (RSASSA-PKCS1-v1_5 defined by RFC 3447). - - - - - Probabilistic Signature Scheme (PSS) padding scheme (RSASSA-PSS defined by RFC 3447). - - - - - Signature parameters. - - - - - Creates a new instance of . - - - - - Hashing algorithm. - - - - - Signature format. - - - - - Signature padding scheme. - - - - - Salt length in bytes (only used for ). - - - - - If set to true (default), the cryptographic provider should not display any user interface (UI) when working with private keys. - Only used for signing operations. - - - If silent operation is requested and the cryptographic provider needs to display a UI to operate, the requested method will fail. - - - - - Specifies symmetric algorithm. - - - - - AES. - - - - - 3DES. - - - - - Twofish. - - - - - DES. - - - - - RC2. - - - - - An algorithm compatible with RC4. - - - - - Blowfish. - - - - - Represents a symmetric cipher algorithm. - - - - - Gets the current initialization vector. - - Initialization vector. - - - - Gets the current key. - - Key. - - - - Derives a key (of length) using the specified generator. - - Generator algorithm. - - - - Derives an initialization vector (of length) using the specified generator. - - Generator algorithm. - - - - Generates a random key (of length). - - - - - Generates a initialization vector (of length). - - - - - Sets the current key to the specified value and changes the accordingly. - - Key. Cannot be null. - - - - Sets the current initialization vector to the specified value. - - Initialization vector. - - - - Creates an encryptor object for this algorithm based on the currently set parameters. - - Encryptor object. - - - - Creates a decryptor object for this algorithm based on the currently set parameters. - - Decryptor object. - - - - Creates a symmetric algorithm object for this algorithm based on the currently set parameters. - - Symmetric algorithm object. - - - - Disposes the object. - - - - - Creates an instance of for the specified algorithm. - - Algorithm. - - - - Gets a value indicating whether the specified algorithm is supported. - - Algorithm. - True if supported; false if not supported. - - - - Gets algorithm ID. - - - - - Gets or sets the desired block size in bits. - - - - - Gets or sets the desired key size in bits. - - - - - Gets or sets the desired effective key size in bits. - - - - - Gets or sets the desired block cipher padding mode. - - - - - Gets or sets the desired block cipher mode. - - - - - The AlgorithmIdentifier class defines an algorithm used for a cryptographic operation. - - - - - Creates an instance of the class - with the specified algorithm identifier. - - An object identifier for the algorithm. - - - - Creates an instance of the class with - the specified algorithm identifier and parameters. - - An object identifier for the algorithm. - ASN.1 DER encoded parameters. - - - - Gets the object identifier for the algorithm. - - On that represents the algorithm. - - - - Gets the algorithm parameters. - - The algorithm parameters. - - - - A collection of values associated with a . - - - - - Copies the range of elements from the to a compatible one-dimensional - array, starting at the specified index of the target array. - - One-dimensional zero-based array that is the destination of the elements copied from . - A zero-based index in the destination array at which copying begins. - - - - Gets the value at the specified index. - - An array of bytes in ASN.1 format. - - - - A cryptographic attribute that contains a type and a collection of associated values. - - - - - Initializes an instance of a . - - The object identifier that identifies the attribute type. - Parameters in ASN.1 format, in a form of one or more byte arrays. - - - - Initializes an instance of a . - - The object identifier that identifies the attribute type. - Parameters in ASN.1 format. - Not supported in .NET 1.0, use instead. - - - - Gets the object identifier that identifies the attribute type. - - The object identifier. - - - - Gets the collection of values associated with the attribute. - - A . - - - - A collection of objects. - - - - - Gets or sets the at the specified index. - - The zero-based index of the to get or set. - A cryptographic attribute. - - - - Gets the first with the specified object identifier. - - The object identifier, either friendly name or dotted string format. - A cryptographic attribute if found, or null if not found. - - - - Contains string representations of common extended usage OIDs. - - - - Any purpose. - - - TLS Web server authentication. - - - TLS Web client authentication. - - - Code signing. - - - E-mail protection. - - - Timestamping. - - - OCSPstamping. - - - - A utility class that features a certificate issuer functionality. This can be used as a base of simple custom certification authority. - - - - - Issues a certificate signed by the specified certification authority using the specified signature hash algorithm. - - Certification authority certificate to issue and sign the certificate. - Certificate info. - Certificate public key. - A new certificate. - - - - Issues a self-signed certificate, signed using the specified algorithm. Also passes back the private key info. - - Certificate info. - Certificate private key. - A new certificate. - - - - Issues a certificate signed by the specified certification authority using the specified signature hash algorithm. - - Certification authority certificate to issue and sign the certificate. - Signature hash algorithm. - Certificate revocation list info. - A collection of objects. - A new certificate. - - - - Contains information describing the certificate for the .Issue method. - - - - - Creates an instance of class. - - - - - Gets the certificate serial number. - - Serial number. - - - - Sets the certificate serial number. - - Serial number. - - - - Sets the certificate serial number. - - Serial number. - - - - Gets the extended certificate usage. - - Extended certificate usage. - - - - Sets the extended certificate usage. - - Extended certificate usage. - - - - Sets alternative hostnames. - - Alternative hostnames. - - - - Sets alternative hostnames. - - Alternative hostnames. - - - - Gets or sets the certificate subject. - - Certificate subject. - - - - Gets or sets the basic certificate usage. - - Basic certificate usage. - - - - Gets or sets the certificate effective date. - - Certificate effective date. - - - - Gets or sets the certificate expiration date. - - Certificate expiration date. - - - - Gets the certificate extensions collection. - - Certificate extensions collection. - - - - Gets the CRL distribution points collection. - - CRL distribution points collection. - - - - Gets or sets the certificate owner's e-mail address. - - E-mail address. - - - - Gets or sets the hash algorithm to be used to create the signature of the certificate. - - The hash algorithm to be used to create the signature of the certificate. - - - - Contains information describing the certificate for the .IssueRevocationList method. - - - - - Creates an instance of class. - - - - - Gets or sets the datetime of this CRL update. - - Datetime of this CRL update. - - - - Gets or sets the datetime of the next CRL update. - - Datetime of the next CRL update. - - - - A SPKAC certificate request. This is used by Mozilla, Opera and other browsers except Internet Explorer. - For Internet Explorer, use . - - - - - Creates a SPKAC request from an ASN.1 block. - - ASN.1 block. - - - - Validates the SPKAC request's signature. - - Challenge string. - True if valid; false if not valid. - - - - Gets the SPKAC request's public key info. This includes the key itself. - - Public key info. - - - - PKCS #10 certification request. This is the standard certificate format. - It is used (for example) by Internet Explorer's XEnroll control, but non-IE browsers generally use instead. - - - - - Creates a new PKCS #10 request for the specified subject and public key. - - Request subject. - Request public key. - - - - Parses a PKCS #10 request from an ASN.1 block. - - ASN.1 block. - - - - Validates the PKCS #10 request's signature. - - True if valid; false if not valid. - - - - Validates the PKCS #10 request's signature. - - Subject - in practice, this is used in place of a challenge string. - True if valid; false if not valid. - - - - Signs the certification request using a private key corresponding to the request's public key. - - An instance of . - Hash algorithm to use for the signature. - - - - Signs the certification request using a private key corresponding to the request's public key. - - An instance of representing the private key. - Hash algorithm to use for the signature. - - - - Signs the certification request using a private key corresponding to the request's public key. - - An instance of asymmetric algorithm such as RSACryptoServiceProvider, DSACryptoServiceProvider, RSAManaged or DSAManaged. - Hash algorithm to use for the signature. - - - - Gets list of alternative hostnames. - - List of alternative hostnames. - - - - Gets ASN.1 encoded form of this object. - - Array of bytes. - - - - Gets the PKCS #10 request's public key info. This includes the key itself. - - Public key info. - - - - Gets the PKCS #10 request's subject. - - Request subject. - - - - Gets the PKCS #10 request's attributes. - - Request attributes. - - - - Gets the PKCS #10 request's certificate extension collection (represented by 1.2.840.113549.1.9.14 attribute in collection). - - - - - Specifies the reason for inclusion in the certificate revocation list. - - - - Unspecified. - - - Key was compromised. - - - CA was compromised. - - - Affiliation changed. - - - Certificate was superseded. - - - Operation was ceased. - - - Certificate hold. - - - Remove from CRL. - - - - The certificate revocation list. - - - - - Base class for various PKCS objects. - - - - - Loads a CMS/PKCS #7 signed or enveloped message from a stream. - Returns an instance of for signed message, for enveloped message, or null for - methods and properties. - - A stream from which to load the message. - Gets or sets the to be used to find certificates corresponding to a . - A value indicating whether cryptographic providers are permitted to display a user interface. - An instance of , or null. - - - - Creates a certificate revocation list from an ASN.1 block. - - ASN.1 block. - - - - Loads a certificate revocation list from given stream. - - Stream to load the certificate revocation list from. - - - - Converts a certificate revocation list into a byte array. - - Byte array. - - - - Returns the certificate revocation list hash. - - CRL hash. - - - - Returns the certificate revocation list signature. - - CRL signature. - - - - Returns distribution point URL from issuing distribution point extension, if both present. Otherwise returns null. - - Distribution point URL. - - - - Checks whether the certificate revocation list contains the specified certificate. - Also makes sure that the CRL is suitable for the certificate. - - Certificate to check. - Revocation check result. - - Please note that this method does not check the validity of the CRL itself. - Call on the issuer certificate - to perform this check. - - - - - Gets the DN of the issuer of this certificate revocation list. - - DN of the issuer of this certificate revocation list. - - - - Gets the datetime of this CRL update. - - Datetime of this CRL update. - - - - Gets the datetime of the next CRL update. - - Datetime of the next CRL update. - - - - Gets the CRL number if appropriate extension is present. - - CRL number or null (Nothing in VB.NET) if not specified. - - - - Gets the collection of CRL's extensions. - - Extensions collection. - - - - Gets the collection of revoked certificates. - - Revoked certificate collection. - - - - Returns the key algorithm used to sign this certificate revocation list. - - The key algorithm. - - - - Returns the hash algorithm used to create the signed hash value. - - Hash algorithm. - - - - Collection of information about revoked certificates. A part of . - - - - - Creates a new instance of . - - - - - Information about revoked certificate. - - - - - Creates a new instance of revoked certificate based on the supplied data. - - Serial number. - Revocation date. - Revocation reason. - - - - Creates a new instance of revoked certificate based on the supplied data. - - Serial number. - Revocation date. - Revocation reason. - - - - Gets the certificate's serial number. - - Serial number. - - - - Returns revocation reason of the revoked certificate. - - If the revocation reason extension is present, returns the reason from that extension; otherwise returns . - - - - Gets the revocation date. - - Revocation date. - - - - Gets the collection of revoked certificate info's extensions. - - Extensions collection. - - - - Represents revocation check outcome. - - - - - The issuer of the certificate does not match the issuer of the CRL. - - - - - This CRL is not supposed to be used to check the status of this certificate (try the next CRL). - - - - - The certificate has not been revoked according to this CRL. - - - - - The certificate has been revoked. - - - - - Represents the result of certificate revocation check. - - - - - Gets revocation check outcome. - - - - - Gets the revocation date. - - Revocation date. - - - - Gets revocation reason of the revoked certificate. - - If the revocation reason extension is present, returns the reason from that extension; otherwise returns null (Nothing in VB.NET). - - - - Certificate revocation list status. - - - - - The CRL is valid (make sure to check the issuer certificate for validity as well). - - - - - The CRL has expired or is not valid yet. - - - - - The CRL has not been issued by the specified issuer. - - - - - The CRL contains an unsupported critical extension. - - - - - The CRL update time is outside the issuer certificate's time validity range. - - - - - The CRL issuer is not intended to issue CRLs. - - - - - The CRL signature is not valid. - - - - - Malformed structure of the CRL or its extensions. - - - - - Collection of certificate revocation lists. - - - - - The class represents the CMS/PKCS #7 ContentInfo data structure. - It encapsulates the content of or messages. - - - - - Initializes a new instance of using the specified array of bytes - as content and an object identifier "data" as content type. - - The message content. - - - - Initializes a new instance of using the specified array of bytes - as content and the specified object identifier as content type. - - The message content type. - The message content. - - - - Gets the content of the CMS/PKCS #7 message. - - An array of bytes that represent the content data. - - - - Copies the content of the CMS/PKCS #7 message into the supplied stream. - - Stream into which the content will be written. - - - - Gets the object identifier of the CMS/PKCS #7 message content type. - - - - - Gets the content of the CMS/PKCS #7 message. - - An array of bytes that represent the content data. - - Please note that the array is a copy of the content. - If you modify it, the actual content will not change. - - - - - Represents a CMS/PKCS #7 encrypted data. - - - - - Tries acquiring a private key unless it is already available. - - True if the key has been acquired, false otherwise. - - - - Gets the symmetric key used to encrypt the message, - or null if it cannot be retrieved. - - The symmetric key used to encrypt the message, or null. - - - - Gets the symmetric algorithm used to encrypt or decrypt the content, - or null if it cannot be retrieved. - - The . - - - - Encrypts the contents of the CMS/PKCS #7 message. - - - - - Decrypts the contents of the CMS/PKCS #7 message. - - For a successful decryption, a symmetric key must be available. - - - - Decodes an encoded CMS/PKCS #7 encrypted message from raw data. - Upon successful decoding, information can be retrieved using - methods and properties. - - Arrays of bytes representing a CMS/PKCS #7 message. - - - - Encodes the object into CMS/PKCS #7 message data. - - Array of bytes representing a CMS/PKCS #7 message. - - - - Determines whether the specified content info ASN.1 sequence is an enveloped data sequence. - - Sequence data. - Offset. - Count. - True if yes; false if not. - - - - Loads a CMS/PKCS #7 encrypted message from a stream. - Upon successful decoding, information can be retrieved using - methods and properties. - - A stream from which to load the message. - - - - Saves into a stream. - - A stream to which to save the message. - - - - Creates a copy of this object. - - A new object. - - - - Creates an instance of class. - It must be initialized using or methods before - any other methods and properties can be accessed. - - - - - Creates an instance of class using the specified content - information as the inner content. - - The inner content of the encrypted message. - - - - Creates an instance of class using the specified content - information and encryption algorithm. - - The inner content of the encrypted message. - Encryption algorithm identifier (see remarks). Can be null for 3DES. - - Currently, 3DES ("1.2.840.113549.3.7"), - AES ("2.16.840.1.101.3.4.1.2" for 128-bit, "2.16.840.1.101.3.4.1.22" for 192-bit and "2.16.840.1.101.3.4.1.42" for 256-bit), - DES ("1.3.14.3.2.7") and RC2 ("1.2.840.113549.3.2") algorithms are supported. - - - - - Creates an instance of class using the specified content - information and encryption algorithm. - - The inner content of the encrypted message. - Encryption algorithm identifier (see remarks). Can be null for 3DES. - The effective key length in bits (only used by RC2 algorithm). - - Currently, 3DES ("1.2.840.113549.3.7"), - AES ("2.16.840.1.101.3.4.1.2" for 128-bit, "2.16.840.1.101.3.4.1.22" for 192-bit and "2.16.840.1.101.3.4.1.42" for 256-bit), - DES ("1.3.14.3.2.7") and RC2 ("1.2.840.113549.3.2") algorithms are supported. - - - - - Gets or sets the to be used to find certificates - corresponding to a . - - The certificate finder. - - - - Gets or sets a value indicating whether cryptographic providers - are allowed to display any user interface (UI) when working with private keys. - - A value indicating whether a cryptographic provider can display a UI. - - - - Gets a value indicating whether the content is encrypted. - - A value indicating whether the content is encrypted. - - - - Gets the collection of unprotected (unencrypted) attributes associated with this CMS/PKCS #7 message. - - Unprotected attribute collection. - - - - Gets the collection of certificates that are embedded in the message. - - Collection of certificates - - - - Gets the collection of certificate revocation lists (CRLs) that are embedded in the message. - - Collection of CRLs - - - - Gets the collection of recipients associated with this CMS/PKCS #7 message. - - A collection of recipients. - - - - Gets the inner content information for this CMS/PKCS #7 message. - It contains the content type identifier and content data. - - The inner content. - - This method returns the encrypted content for parsed messages - and unencrypted content for newly created messages. To encrypt or decrypt - the content, use and methods. - - - - - Gets the identifier of the algorithm used to encrypt the content. - - An object. - - - - Returns a value indicating whether the private key to decrypt the symmetric key - and encrypted content is available. - - True if the private key is available, false if it isn't. - - - - Defines the interface that certificate finder classes must implement. - - - - - Finds a certificate corresponding to the specified subject identifier. - - Identifier of the subject certificate. - A certificate store containing the certificates that were included with the message. - Certificate chain if found, or null (Nothing in Visual Basic). - - - - Provides a set of common certificate finders. - - - - - Certificate finder. - - CertificateChain array. - A new instance of ICertificateFinder. - - - - Default certificate finder. - - - Searches for certificates in the current user's "My", - "Trusted people" and "Other people" stores. - - - - - Specifies private key file format. - - - - Base64-encoded PKCS #8 format. - - - PuTTY PPKv2 format. - - - OpenSSH/OpenSSL SSLeay format. - - - Raw PKCS #8 format. - - - New OpenSSH format with bcrypt key expansion (Base64-encoded keys with "BEGIN OPENSSH PRIVATE KEY" header). - - - - Represents a private key. - - - - - Creates a new instance of . Use the method to load a private key. - - - - - Creates a new instance of based on the specified RSA parameters. - - RSA parameters including private keys. - - - - Creates a new instance of based on the specified DSA parameters. - - DSA parameters including private keys. - - - - Generates a private key using the specified algorithm and default key size. - - Key algorithm. - An instance of . - - - - Generates a private key using the specified algorithm and key size. - - Key algorithm. - Key size. Specify 0 to use default key size. - An instance of . - - - - Gets the raw form of the private key. - - Array of bytes. - - - - Gets the raw form of the private key. - - Array of bytes. - - - - Gets a public key corresponding to the private key. - - An instance of . - - - - Gets the DSA parameters for a DSA key. May only be used for DSA private keys. - - DSA paramaters. - - - - Gets the RSA parameters for a RSA key. May only be used for RSA private keys. - - RSA paramaters. - - - - Gets ASN.1 encoded form of this object. - - Array of bytes. - - - - Saves the private key into the supplied stream in the specified format. - - A stream to which to save the private key. - Password to encrypted the private key, or null if no encryption desired. - Private key file format. - - - - Saves the private key into the supplied stream in the specified format. - - A file to which to save the public key. - Password to encrypted the private key, or null if no encryption desired. - Private key file format. - - - - Saves the private key into the supplied stream in Base64-encoded PKCS #8 format. - - A stream to which to save the private key. - Password to encrypted the private key, or null if no encryption desired. - Encryption algorithm identifier. Ignored if password is null. - - Currently, 3DES ("1.2.840.113549.3.7"), DES ("1.3.14.3.2.7") and RC2 ("1.2.840.113549.3.2") algorithms are supported. - - - - - Loads a PKCS #8, PuTTY or SSLeay (OpenSSL/OpenSSH) format private key from a stream. - Upon successful decoding, information can be retrieved using - methods and properties. - - A stream from which to load the private key. - Password used to encrypted the private key, or null if no password needed. - - - - Loads a PKCS #8, PuTTY or SSLeay (OpenSSL/OpenSSH) format private key from a stream. - Upon successful decoding, information can be retrieved using - methods and properties. - - A file from which to load the private key. - Password used to encrypted the private key, or null if no password needed. - - - - Gets the key algorithm identifier. - - Key algorithm identifier. - - - - Gets or ets the key comment. The comment is used while saving in some formats. - - Key comment. - - - - Represents a public key. - - - - - Creates a new instance of . Use the method to load a public key. - - - - - Creates a new instance of based on the specified RSA parameters. - - RSA parameters. - - - - Creates a new instance of based on the specified DSA parameters. - - DSA parameters. - - - - Gets the raw form of the public key. - - Array of bytes. - - - - Gets the raw form of the public key. - - Array of bytes. - - - - Gets ASN.1 encoded form of this object. - - Array of bytes. - - - - Gets the DSA parameters for a DSA public key. May only be used for DSA public keys. - - DSA paramaters. - - - - Gets the RSA parameters for a RSA public key. May only be used for RSA public keys. - - RSA paramaters. - - - - Returns the size of the key in bits. - - Size of the key in bits. - - - - Returns the key algorithm. - - Key algorithm. - - - - Saves the public key into the supplied stream in Base64-encoded PKCS #8 format. - - A stream to which to save the public key. - - - - Saves the public key into the supplied stream in Base64-encoded PKCS #8 format. - - A file to which to save the public key. - - - - Loads a PKCS #8 public key from a stream. - Upon successful decoding, information can be retrieved using - methods and properties. - - A stream from which to load the public key. - - - - Loads a PKCS #8 public key from a file. - Upon successful decoding, information can be retrieved using - methods and properties. - - A file from which to load the public key. - - - - Gets the key algorithm identifier. - - Key algorithm identifier. - - - - Represents a CMS/PKCS #7 encrypted message recipient. - This class is inherited by and classes. - - - - - Gets signature parameters (if available). - - Signature parameters. - - - - Gets the identifier of the recipient. - - Identifier of the recipient. - - - - Gets the identifier of the algorithm used to encrypt the symmetric key. - - An object. - - - - Gets the encrypted key for the recipient. - - Encrypted key. - - - - Gets the certificate associated with the recipient, or null if not available. - - The recipient's certificate, or null. - - - - Gets the certificate chain associated with the recipient, or null if not available. - - The recipient's certificate chain, or null. - - - - Defines key transport recipient information, typically using the RSA algorithm to - encrypt the shared symmetric key to transport. - - - - - Creates a new instance of that defines the - key transport recipient information for the owner of the specified RSA certificate. - Use to specify RSAES-OAEP parameters. - - The recipient's certificate. - - - - Creates a new instance of that defines the - key transport recipient information for the owner of the specified RSA certificate. - Use to specify RSAES-OAEP parameters. - - The recipient's certificate. - Subject identifier type - only IssuerAndSerialNumber and SubjectKeyIdentifier values are accepted. - - - - Creates a new instance of that defines the - key transport recipient information for the owner of the specified RSA certificate. - - The recipient's certificate. - Encryption parameters (to specify RSAES-OAEP parameters). Can be null (for PKCS #1). - - - - Creates a new instance of that defines the - key transport recipient information for the owner of the specified RSA certificate. - - The recipient's certificate. - Subject identifier type - only IssuerAndSerialNumber and SubjectKeyIdentifier values are accepted. - Encryption parameters (to specify RSAES-OAEP parameters). Can be null (for PKCS #1). - - - - Gets signature parameters (if available). - - Signature parameters. - - - - Gets the identifier of the recipient. - - Identifier of the recipient. - - - - Gets the identifier of the algorithm used to encrypt the symmetric key. - - An object. - - - - Gets the encrypted key for the recipient. - - Encrypted key. - - - - Gets the certificate associated with the recipient, or null if not available. - - The recipient's certificate, or null. - - - - Gets the certificate chain associated with the recipient, or null if not available. - - The recipient's certificate chain, or null. - - - - Defines key agreement algorithm recipient information. The key itself is not transported - the two - parties that will be using a symmetric key both take part in its generation. Please note that - this method is not yet fully supported by Rebex Security library. - - - - - Gets the identifier of the key originator. - - Identifier of the key originator. - - - - Gets the identifier of the recipient. - - Identifier of the recipient. - - - - Gets the identifier of the algorithm used to encrypt the symmetric key. - - An object. - - - - Gets the encrypted key for the recipient. - - Encrypted key. - - - - Gets the certificate associated with the recipient, or null if not available. - - The recipient's certificate, or null. - - - - Gets the certificate chain associated with the recipient, or null if not available. - - The recipient's certificate chain, or null. - - - - A collection of objects. - - - - - Creates an empty and read-only instance of . - - - - - Represents a CMS/PKCS #7 signed data. - - - - - Creates a signatures for all signers that do not have one yet. - - - - - Creates a signatures for all signers that do not have one yet. - - Signature options. - - - - Validates all digital signatures on this CMS/PKCS #7 signed message - and validates all the signers' certificates. - - Validation result. - - - - Validates all digital signatures on this CMS/PKCS #7 signed message. - Optionally, signers' certificates are validated, and the specified validation - options are taken into account. - - Specifies whether to only verify the signatures, skipping the certificate validation. - Signature and certificate validation options. - Validation result. - - - - Validates all digital signatures on this CMS/PKCS #7 signed message. - Optionally, signers' certificates are validated, and the specified validation - options are taken into account. - - Specifies whether to only verify the signatures, skipping the certificate validation. - Signature and certificate validation options. - Certificate chain engine. - Validation result. - - - - Decodes an encoded CMS/PKCS #7 signed message from raw data. - Upon successful decoding, information can be retrieved using - methods and properties. - - Array of bytes representing a CMS/PKCS #7 message. - - - - Encodes the object into CMS/PKCS #7 message data. - - Array of bytes representing a CMS/PKCS #7 message. - - - - Determines whether the specified content info ASN.1 sequence is a signed data sequence. - - Sequence data. - Offset. - Count. - True if yes; false if not. - - - - Loads a CMS/PKCS #7 signed message from a stream. - Upon successful decoding, information can be retrieved using - methods and properties. - - A stream from which to load the message. - - - - Saves into a stream. - - A stream to which to save the message. - - - - Creates a copy of this object. - - A new object. - - - - Creates an instance of class. - - - - - Creates an instance of class using the specified content - information as the inner content. - - The inner content of the signed message. - - - - Creates an instance of class using the specified content - information as the inner content. - - The inner content of the signed message. - - Specifies whether the signature is detached. - If detached, the actual content is not included within the signed message. - - - - - Specifies what parts of the certificate chain should be included in the signed data. - - Certificate include option. - - - - Gets or sets the to be used to find certificates - corresponding to a . - - The certificate finder. - - - - Gets or sets a value indicating whether cryptographic providers - are allowed to display any user interface (UI) when working with private keys. - - A value indicating whether cryptographic providers can display a UI. - - In case of signing, the actual behavior is determined by the combination of this value and the value of - passed to associated objects. - Cryptographic providers are only permitted to display a UI if both Silent properties are set to true. - - - - - Gets the collection of certificates that are embedded in the message. - - Collection of certificates - - - - Gets the collection of certificate revocation lists (CRLs) that are embedded in the message. - - Collection of CRLs - - - - Gets the collection of signers associated with this CMS/PKCS #7 message. - - A collection of signers. - - - - Gets or sets the inner content information for this CMS/PKCS #7 message. - It contains the content type identifier and content data. - - The inner content. - - - - Gets or sets a value indicating whether the actual content is detached from the message. - - True if the content is detached; False if the content is embedded within the message. - - - - Specifies what parts of the certificate chain should be included in the message. - - - - Leave the existing certificate in the collection. - - - The certificate chain is not included. - - - The certificate chain is included, except for the root certificate. - - - Only the end certificate is included. - - - The certificate chain, including the root certificate, is included. - - - - Represents a CMS/PKCS #7 message signer. - - - - - Gets a value that identifies the digest algorithm. - - Digest algorithm. - - - - Gets signature parameters (if available). - - Signature parameters. - - - - Validates the signer's digital signature and validates the certificate. - - Validation result. - - - - Validates the signer's digital signatures. - Optionally, signers' certificates are validated, and the specified validation - options are taken into account. - - Specifies whether to only verify the signatures, skipping the certificate validation. - Signature and certificate validation options. - Validation result. - - - - Validates the signer's digital signatures. - Optionally, signers' certificates are validated, and the specified validation - options are taken into account. - - Specifies whether to only verify the signatures, skipping the certificate validation. - Signature and certificate validation options. - Certificate chain engine. - Validation result. - - - - Creates a signatures for the signer. - - - - - Creates a signature for the signer. - - Signature options. - - - - Creates a new instance of that defines - a signer corresponding to the specified certificate. An associated private - key for the certificate must be available. - Use to specify RSASSA-PSS parameters. - - The signer's certificate. - - - - Creates a new instance of that defines - a signer corresponding to the specified certificate. An associated private - key for the certificate must be available. - Use to specify RSASSA-PSS parameters. - - The signer's certificate. - Subject identifier type - only IssuerAndSerialNumber and SubjectKeyIdentifier values are accepted. - - - - Creates a new instance of that defines - a signer corresponding to the specified certificate. An associated private - key for the certificate must be available. - Use to specify RSASSA-PSS parameters. - - The signer's certificate. - Subject identifier type - only IssuerAndSerialNumber and SubjectKeyIdentifier values are accepted. - Digest algorithm. - - - - Creates a new instance of that defines - a signer corresponding to the specified certificate. An associated private - key for the certificate must be available. - - The signer's certificate. - Signature parameters (to specify RSASSA-PSS parameters). Can be null (for PKCS #1). - - - - Creates a new instance of that defines - a signer corresponding to the specified certificate using the - specified subject identifier type. An associated private - key for the certificate must be available. - - The signer's certificate. - Signature parameters (to specify RSASSA-PSS parameters). Can be null (for PKCS #1). - Subject identifier type - only IssuerAndSerialNumber and SubjectKeyIdentifier values are accepted. - - - - Gets the identifier of the signer. - - Identifier of the signer. - - - - Gets the identifier of the digest algorithm. - - An object. - - - - Gets the identifier of the signature algorithm. - - An object. - - - - Gets the signature, or null if it is not available yet. - - The signature. - - - - Gets the collection of signed attributes associated with this CMS/PKCS #7 message. - - Signed attribute collection. - - - - Gets the collection of unsigned attributes associated with this CMS/PKCS #7 message. - - Unsigned attribute collection. - - - - Gets the certificate associated with the signer, or null if not available. - - The signer's certificate, or null. - - - - Gets the certificate chain associated with the signer, or null if not available. - - The signer's certificate chain, or null. - - - - Gets the signing time, or 1970-01-01 if not available. - - Singing time. - - - - Gets the preferred subject identifier for key encryption. - - The preferred subject identifier. - - - - Gets the collection of S/MIME capabilities the signer supports. - - Collection of supported S/MIME capabilities. - - - - A collection of objects. - - - - - Creates an empty and read-only instance of . - - - - - Options for and methods. - - - - Don't include any signed attributes in the signature. Not recommended. - - - Don't include key Microsoft extensions in the signature attributes. - - - Don't include S/MIME capabilities extensions in the signature attributes. - - - Skip certificate usage check. - - - - Signature validation status. - - - - Certificate is not valid. - - - Certificate is not available. - - - A digest algorithm is not supported. - - - A signature algorithm is not supported. - - - A signature is invalid. - - - Invalid key usage. The certificate usage doesn't include message signing. - - - Content type mismatch. - - - - Represents the result of signature validation. - - - - - Gets the status mask. - - Status mask. - - - - Gets the certificate validation status mask. - - Certificate validation status mask. - - - - Gets the certificate chain validity status. - - True if valid, false if not valid. - - - - Represents an S/MIME capability. - - - - - Initializes an instance of a with no parameters. - - The object identifier that identifies the S//MIME capability. - - - - Initializes an instance of a . - - The object identifier that identifies the S//MIME capability. - Capability parameters in ASN.1 format. - - - - Gets the object identifier that identifies the S/MIME capability. - - The object identifier. - - - - Gets the S/MIME capability parameters. - - An array of bytes in ASN.1 format. - - - - A collection of objects. - - - - - Gets or sets the at the specified index. - - The zero-based index of the to get or set. - An S/MIME capability. - - - - Gets the first with the specified object identifier. - - The object identifier, either friendly name or dotted string format. - An S/MIME capability if found, or null if not found. - - - - Defines the type of subject identifier that identifies a subject and a certificate. - - - - - The type of subject identifier is unknown. - - - - - The subject is identified by the certificate issuer and serial number. - - - - - The subject is identified by the hash of the subject's public key. The hash algorithm used is determined by the signature algorithm suite in the subject's certificate. - - - - - The subject is identified by the subject's public key. - - - - - The class identifies a subject, either by certificate issuer - and serial number, by the subject key identifier or by a public key. - - - - - Gets the type of the subject identifier. - - The type of the subject identifier. - - - - Gets the of the certificate issuer if - this subject identifier is identified by the issuer name and serial number. - Otherwise, this property will return null. - - Certificate issuer. - - - - Gets the serial number of the certificate if - this subject identifier is identified by the issuer name and serial number. - Otherwise, this property will return null. - - Certificate serial number. - - - - Gets the subject key identifier of the certificate if - this subject identifier is identified by the subject key identifier. - Otherwise, this property will return null. - - Certificate subject key identifier. - - - - Gets the public algorithm of the certificate if - this subject identifier is identified by the public key. - Otherwise, this property will return null. - - Certificate public key algorithm. - - - - Gets the public of the certificate if - this subject identifier is identified by the public key. - Otherwise, this property will return null. - - Certificate public key. - - - - Represents sorting order. - - - - - Ascending sort order. - - - - - Descending sort order. - - - - - Log writer acting as a container that writes log messages to all inner writers. - - - - - Creates a new instance of a tee log writer over given set of individual . - - A non-empty collection of log writers. - - - - Creates a new instance of a tee log writer over given set of individual . - - A non-empty array of log writers. - - - - Write a message into all inner writers. - - Message level. - Logging object type. - Logging object ID. - Logging area. - Message. - - - - Write a message and data block into all inner writers. - - Message level. - Logging object type. - Logging object ID. - Logging area. - Message. - Data block. - Data offset. - Date length. - - - - Implements the interface method IDisposable.Dispose - Use this method to explicitly release all resources hold by the inner writers. - - - - - A cumulative log level.
- When getting, it returns the minimum level of inner writers' levels.
- When setting, the value is propagated to all inner writers. -
- Log level. -
- - - Specifies granularity for time comparisons. - - - - - Time is taken as is. - - - Useful when working with NTFS file system. - - - - - The smallest time unit is one second (milliseconds are ignored). - E.g. 11:33:55.999 is rounded to 11:33:55.000. - - - Useful when working with some UNIX FTP or SFTP servers. - - - - - The smallest time unit is two-second. So odd seconds are rounded to lower even value (milliseconds are ignored). - E.g. 11:33:55.999 is rounded to 11:33:54.000. - - - Useful when working with FAT file system (.NET CF, MS-DOS). - - - - - The smallest time unit is one day (time component is ignored). - E.g. 2012-12-12 11:33:55.999 is rounded to 2012-12-12 00:00:00.000. - - - Useful when working with some UNIX FTP or SFTP servers. - - - - Creates an instance of class. - - - Creates an instance of class. - - - Creates an instance of class. - - - Creates an instance of class. - - - Creates an instance of class. - - - Creates an instance of class. - -
-
\ No newline at end of file diff --git a/packages/Rebex.Common.2.5.6930/lib/net20/Rebex.Common.dll b/packages/Rebex.Common.2.5.6930/lib/net20/Rebex.Common.dll deleted file mode 100644 index ad3f00e9..00000000 Binary files a/packages/Rebex.Common.2.5.6930/lib/net20/Rebex.Common.dll and /dev/null differ diff --git a/packages/Rebex.Common.2.5.6930/lib/net20/Rebex.Common.xml b/packages/Rebex.Common.2.5.6930/lib/net20/Rebex.Common.xml deleted file mode 100644 index adb60dae..00000000 --- a/packages/Rebex.Common.2.5.6930/lib/net20/Rebex.Common.xml +++ /dev/null @@ -1,8465 +0,0 @@ - - - Rebex.Common - - - - - Console-based log writer that writes log messages to the console. - - - - - Common base class for log writers. A derived class must override either the method or both Write methods. - - - - - Defines methods and properties all log writers must implement. - - - - - Write a message into the log. - - Message level. - Logging object type. - Logging object ID. - Logging area. - Message. - - - - Write a message and data block into the log. - - Message level. - Logging object type. - Logging object ID. - Logging area. - Message. - Data block. - Data offset. - Date length. - - - - Get or set the log level - only log messages with log level equal to or greater than the specified one. - - Log level. - - - - Creates a new instance of . - - - - - Closes the log writer. - - - - - Releases unmanaged and managed resources (depending on the scenario). - If is false, the method has been called from - the finalizer and should not reference other objects (therefore only unmanaged resources can be disposed). - - True indicates that the method has been called via IDisposable.Dispose. - False indicates that it has been called by the finalizer. - - - - Writes a message into the log. - - Message level. - Logging object type. - Logging object ID. - Logging area. - Message. - - - - Writes a message and data block into the log. - - Message level. - Logging object type. - Logging object ID. - Logging area. - Message. - Data block. - Data offset. - Date length. - - - - Appends the specified message text into a text-based log. This method is only called by method - and is only used by text-based loggers. - - Full message info. - - - - Disposes the object. - - - - - Gets or sets the log level - only log messages with log level equal to or greater than the specified one. - - Log level. - - - - Get a value indicating whether the log writer is closed. - - True when log writer is closed. False if log writer is opened and ready for writing. - Implementation in this base class returns false, as the close method actually does not close any resource. - - - - Creates a new instance of console log writer with a log level of Info. - - - - - Creates a new instance of console log writer with the specified log level. - - Log level. - - - - Writes a message into the log. - - Message level. - Logging object type. - Logging object ID. - Logging area. - Message. - - - - Writes a message and data block into the log. - - Message level. - Logging object type. - Logging object ID. - Logging area. - Message. - Data block. - Data offset. - Date length. - - - - Appends the specified message text into a text-based log. - - Full message info. - - - - Gets or sets a value that indicates whether to use console colors. - - - - - Various methods related to encoding (charset) used by Rebex components. - - - - - Gets a list of supported encoding names. - - List of encoding names. - - - - Returns the encoding associated with the specified code page name. - - Code page name. - Encoding. - - - - Returns the encoding associated with the specified code page. - - Code page. - Encoding. - - - - ASCII encoding. - - - - - Default encoding. - - - - - UTF-8 encoding. - - - - - File-based log writer that saves log messages into a text file. - - - - - Creates a new instance of file log writer based on the specified file and the default "Info" log level. - - Path to log file. - - - - Creates a new instance of file log writer based on the specified file and log level. - - Path to log file. - Log level. - - - - Dispose(bool disposing) executes in two distinct scenarios. - If disposing equals true, the method has been called directly - or indirectly by a user's code. Managed and unmanaged resources - can be disposed. - If disposing equals false, the method has been called by the - runtime from inside the finalizer and you should not reference - other objects. Only unmanaged resources can be disposed. - - If true, is called by IDisposable.Dispose. - Otherwise it is called by finalizer. - - - - Appends the specified message text into a text-based log. - - Full message info. - - - - Finalizer. Called by garbage collector during object destruction. - - - - - Path to the log file. - - - - - Path to the log file. - - - - - Get a value indicating whether the log writer is closed. - - True when logfile is closed. False if logfile is opened and ready for writing. - - - - Log level - specifies the levels of severity. - - - - - Be verbose - log everything. - - - - - Log all messages useful for debugging purposes. - - - - - Only log informative messages. - - - - - Only log errors. - - - - - The Off level designates a higher level than all the rest. - - - - - Define properties and methods for logging providers. - - - - - Gets a to use for logging. - - - - - Represents mode for interval boundaries. - - - - - Include interval boundary. - - - - - Exclude interval boundary. - - - - - Represents a file or directory item. - - - - - Gets the last modification time of the item. - - - - - Gets the last access time of the item. - - - - - Gets the creation time of the item. - - - - - Gets file length. - - - - - Gets the last modification time of the item. - - - - - Gets the last access time of the item. - - - - - Gets the creation time of the item. - - - - - Gets a value indicating whether the item is a file. - - True if the item is a file; false otherwise. - - - - Gets a value indicating whether the item is a directory. - - True if the archive item is directory; false otherwise. - - - - Gets a value indicating whether the item is a link. - - True if the archive item is a link; false otherwise. - - - - Gets the name of the file or directory. - - The name of the file or directory. - - - - Gets the path of the file or directory. - It can be relative or absolute path depending on the way of use. - - It contains a full path if returned by the GetItems method or a file/directory name only if returned by the GetList method. - The path of the file or directory. - - - - Currently executed operation. - - - - Uploading files. - - - Downloading files. - - - Deleting files. - - - Getting item list. - - - - Current traversal state of the . - - - - - Retrieving of the file system hierarchy was started. - - - - - Retrieving of the file system hierarchy was successfully completed. - - - - - Retrieving of the particular directory hierarchy was started. - - - - - Retrieving of the particular directory hierarchy was successfully completed. - - - - - Current transfer state of the . - - - - - Directory processing was started. - - - - - Processing of a file was started. - - - - - File was successfully transferred. - - - - - A file data block was processed. - - - - - The transfer action was successfully completed. - Triggered only with multi-file operations. (For single-file operations, only is triggered.) - - - - - Current delete state of the . - - - - - File processing was started. - - - - - File was successfully deleted. - - - - - Directory processing was started. - - - - - Directory was successfully deleted. - - - - - The delete action was successfully completed. - - - - - Detailed specification of a problem that occurred during a multi-file operation. - - - - - A target file with the same name already exists. - - - - - A symbolic link was detected. - - - - - Symbolic link is probably a part of an infinite loop in the file system hierarchy. - - - - - Cannot create target directory. - - - - - Cannot transfer file. - - - - - Cannot read from a directory. - - - - - Cannot find the file which was found while retrieving file system hierarchy earlier. - - - - - Name of the file is invalid on the target file system. - For example, backslash is a valid filename character on Unix FTP servers, but invalid in local Windows file system. - - - - - Name of the directory is invalid on the target file system. - For example, backslash is a valid directory name character on Unix FTP servers, but invalid in local Windows file system. - - - - - Cannot find the directory which was found while retrieving file system hierarchy earlier. - - - - - Cannot find the link which was found while retrieving file system hierarchy earlier. - - - - - Link is corrupted or its target cannot be found. - - - - - Currently processed item is neither a file nor a directory. - - - - - Operation was canceled. - - - - - Feature required to complete the operation is not supported. - - - - - Cannot delete the file. - - - - - Cannot delete the directory. - - - - - Cannot calculate checksum. - - - - - Specifies the reaction to resolve the current problem that occurred during a multi-file operation. - - - - - Cancel the whole operation. An exception with the value is thrown. - - - - - Cancel the whole operation. An exception is thrown. - - - - - Skip the current problematic item. - - - - - Retry the current operation again. - - - - - Overwrite target file with the same name. - - - - - Transfer the source file to a different name. - - - - - Resume target file. - - - - - Resolve the symbolic link. - - - - - Specifies the condition for overwriting a file. - - - - - No condition = always overwrite. - - - - - Overwrite if size differs. - - - - - Overwrite if the target file is older than the source file. - If working with remote servers, this condition is strongly discouraged - because modification dates are often misreported by FTP servers, - making this mode highly unreliable. - - - - - Overwrite if checksum differs. - Available for ZIP and FTP; only some FTP servers support checksums.
- You can check availability of this condition using method. -
-
- - - Provides data for the ProblemDetected event. - - - - - Initializes a new instance of the class (for internal use only). - - Event data. - - - - Determines whether the specified reaction is currently possible - use this to determine which reactions can be applied. - - Desired reaction. - True if the specified reaction is possible; false otherwise. - - - - Determines whether the specified overwrite condition is currently possible - use this to determine which overwrite conditions can be applied. - - Desired condition. - True if the specified condition is possible; false otherwise. - - - - Indicate to the sender that the problematic item should be skipped. - - - - - Indicate to the sender that the operation should be canceled. - - - - - Indicate to the sender that an exception should be raised. - - - - - Indicate to the sender that the operation on the current item should be retired. - - - - - Indicate to the sender that the current item should be resumed. - - - - - Indicate to the sender that the current link should be resolved. - - - - - Indicate to the sender that the current item should be renamed. - New name is generated from the current item according the pattern "filename[number].extension". - - - - - Indicate to the sender that the current item should be renamed. - - New name of the item or null (Nothing in Visual Basic) to use generated name according the pattern "filename[number].extension". - - - - Indicate to the sender that the current item should be overwritten. - - - - - Indicate to the sender that the current item should be overwritten if the specified condition is met. - - Condition for the overwrite. - - - - Gets the current transfer action. - - Current transfer action. - - - - Gets the exception which will be raised if chosen Reaction is . - - Exception. - - - - Gets the type of the error that classifies the problem. - - Problem type. - - - - Gets the path of the local file or directory that is currently processed. - - Local path. - - - - Gets the local file or directory that is currently processed or null (Nothing in Visual Basic) if not available. - - Local item. - - - - Gets the path of the remote file or directory that is currently processed. - - Remote path. - - - - Gets the remote file or directory that is currently processed or null (Nothing in Visual Basic) if not available. - - Remote item. - - - - Gets the currently selected reaction to the current problem. - - The operation to be performed as the next step of the multi-file operation execution. - - - - Gets the condition to apply for the Overwrite reaction. - If the chosen reaction is not Overwrite, this property is ignored. - - Overwrite condition. - - - - Gets the new name for the currently processed file or directory. - If the chosen reaction is not Rename, this property is ignored. - - New name. - - - - Gets a user state object. - - User state object. - - - - Provides data for the Traversing event. - - - - - Initializes a new instance of the class (for internal use only). - - Event data. - - - - Gets the current transfer action. - - Current transfer action. - - - - Gets the current traversing state of the current . - - Current traversing state of the current . - - - - Gets the file or directory which is currently processed. - - Currently processed item. - - - - Gets the current total number of files to be processed (traversed so far). - - Current total number of files to be processed (traversed so far). - - - - Gets the current total number of bytes to be processed (traversed so far). - - Current total number of bytes (traversed so far). - - - - Gets a user state object. - - User state object. - - - - Provides data for the TransferProgressChanged event. - - - - - Initializes a new instance of the class (for internal use only). - - Event data. - - - - Gets the current transfer action. - - Current transfer action. - - - - Gets the current transfer state of the current . - - Current transfer state of the current . - - - - Gets the file or directory which is currently processed. - - Currently processed item. - - - - Gets the target path of the file or directory which is currently processed. - - Target path. - - - - Gets the total number of bytes transferred during the transfer of the current file. - - The number of bytes transferred. - - - - Gets the total number of files to be transferred. - - Number of files. - - - - Gets the number of files that were already processed (either transferred or skipped). - - Number of files. - - - - Gets the number of files that were already successfully transferred. - - Number of files. - - - - Gets the total number of bytes to be transferred. - - Number of bytes. - - - - Gets the total number of bytes transferred. - - Number of bytes. - - - - Gets the number of bytes transferred during the current transfer since the last time the event was raised. - - The number of bytes transferred since the last time the event was raised. - - - - Gets the current transfer speed in bytes transferred per second (or 0 if not available). - - An estimate of the current speed in number of bytes per second. - Value of 0 indicates that this information is not available. - - - - Gets a number between 0 and 100 representing the percentage of completeness of the operation. - - Percentage value (0..100). - - - - Gets a number between 0 and 100 representing the percentage of completeness of the current file transfer. - - Percentage value (0..100). - - - - Provides data for the DeleteProgressChanged event. - - - - - Initializes a new instance of the class (for internal use only). - - Event data. - - - - Gets the current delete state of the current . - - Current delete state of the current . - - - - Gets the file or directory which is currently processed. - - Remote item. - - - - Gets the total number of files to be deleted. - - Number of files. - - - - Gets the number of files that were already processed (either deleted or skipped). - - Number of files. - - - - Gets the number of files that were already successfully deleted. - - Number of files. - - - - Gets a number between 0 and 100 representing the percentage of completeness of the operation. - - Percentage value (0..100). - - - - Specifies checksum algorithm. - - - - - SHA-1 checksum. - - - - - SHA-256 checksum. - - - - - SHA-384 checksum. - - - - - SHA-512 checksum. - - - - - MD5 checksum. - - - - - SHA-224 checksum. - - - - - Request CRC32 checksum. - - - - - Represents data checksum. - - - - - Returns checksum data. - - - - - - Creates an instance of an object that represents data checksum. - - Checksum algorithm used to compute the checksum. - Checksum data. - - - - Implicit conversion from to string. - - Checksum to convert to string. - Hex string representation of the checksum. - - - - Comparest the checksum with another object of the same type and returns a value indicating whether - the current instance precedes, follows or occurs in the same position in the sort order. - - Object to compare with this instance. - A value that indicates the relative order of checksums being compared. - - - - Returns a value indicating whether the specified object is equal to this checksum. - - Object to compare with this instance. - True if the two instances are same type and represent the same checksum. - - - - Returns the hash code for this checksum. - - - - - - Returns a hex string representation of this checksum. - - Hex string representation of this checksum. - - - - Returns checksum algorithm. - - - - - Returns a hex string representation of the checksum. - - - - - Specifies modes of the method. - - - - - Specifies whether the specified regular file matches the the . - - - - - Specifies whether the specified directory matches the the . - - - - - Specifies whether the specified directory should be traversed to retrieve another matches. - - - - - Set of inclusion and exclusion patterns. - It doesn't depend on the order how the inclusion and exclusion patterns are added into the . - - - - - Initializes a new instance of the class. - - - - - Initializes a new instance of the class. - - A path to be considered as a base path of the set. - - - - Initializes a new instance of the class. - - Directory separators to be used in all paths. - - - - Initializes a new instance of the class. - - A path to be considered as a base path of the set. - Directory separators to be used in all paths. - - - - Initializes the object. - - A path to be considered as a base path of the set. - A path or mask relative to a base path which define an initial inclusion pattern. - - - - Initializes the object. - - A path to be considered as a base path of the set. - A path or mask relative to a base path which define an initial inclusion pattern. - Specifies traversal mode of directories for the . - - - - Adds a path or mask into collection of inclusion patterns. The supported wildcards are '?' and '*' and '**'. - For detailed specification with examples see the documentation. - - A path or mask (relative to the base path) which define an inclusion pattern. - - - - Adds a path or mask into collection of inclusion patterns. The supported wildcards are '?' and '*' and '**'. - For detailed specification with examples see the documentation. - - A path or mask (relative to the base path) which define an inclusion pattern. - Specifies traversal mode of directories for the . - - '?' matches any single character.
- '*' matches any number of any characters except the directory separators.
- '**' matches any number of any characters (directory separators can be reduced e.g. "a\**\b" is equivalent to "a\**\**\b" which matches "a\x\y\z\b" and also "a\b" but not "ab").
- - - - - - - - - - - - - - -
data\file-???.txtMatches files within the "data" directory e.g. "data\file-007.txt", but not "data\file-7.txt".
data\*.txtMatches any ".txt" file within the "data" directory (only within the "data" directory, not in subdirectories) e.g. "data\file.txt", but not "data\a\b\c\file.txt".
data\**\*.txtMatches any ".txt" file anywhere within the "data" directory and its subdirectories e.g. "data\file.txt" and also "data\a\b\c\file.txt".
-
-
- - - Adds a path or mask into collection of exclusion patterns. The supported wildcards are '?' and '*' and '**'. - For detailed specification with examples see the documentation. - - A path or mask (relative to the base path) which define an exclusion pattern. - - - - Adds a path or mask into collection of exclusion patterns. The supported wildcards are '?' and '*' and '**'. - For detailed specification with examples see the documentation. - - A path or mask (relative to the base path) which define an exclusion pattern. - Specifies traversal mode of directories for the . - - '?' matches any single character.
- '*' matches any number of any characters except the directory separators.
- '**' matches any number of any characters (directory separators can be reduced e.g. "a\**\b" is equivalent to "a\**\**\b" which matches "a\x\y\z\b" and also "a\b" but not "ab").
- - - - - - - - - - - - - - -
data\file-???.txtMatches files within the "data" directory e.g. "data\file-007.txt", but not "data\file-7.txt".
data\*.txtMatches any ".txt" file within the "data" directory (only within the "data" directory, not in subdirectories) e.g. "data\file.txt", but not "data\a\b\c\file.txt".
data\**\*.txtMatches any ".txt" file anywhere within the "data" directory and its subdirectories e.g. "data\file.txt" and also "data\a\b\c\file.txt".
-
-
- - - Returns a value indicating whether the specified relative path matches the . - This method is intended to be overwritten by descendants. - In this case please note that for optimization issues when called with parameters equal to "." and - this method should return false if no inclusion pattern was specified; true otherwise. - - A relative path to a base path to be tested for a match. - Specifies how the should be treated for match. - True if the path matches the set; false otherwise. - - - - Gets a collection of local file system items (files and directories) which matches this . - Only items which matches no exclusion pattern and matches at leas one inclusion pattern are included into result collection. - It doesn't depend on the order how the inclusion and exclusion patterns were added into the .
- If you don't want to include empty directories into result collection, please set the to false. -
- A collection of local file system items which matches this . -
- - - Gets or sets the base path of the set. - - A path to be considered as a base path of the set. - - - - Gets or sets a value indicating whether the is case sensitive. - - True if the is case sensitive; false otherwise. - - - - Gets or sets a value indicating whether a consumer of the should include empty directories or not. - Also used in the method. - - True if empty directories should not be included; false otherwise. - - - - Gets or sets a value indicating whether a consumer of the should also include directories where the files are located. - Also used in the method. - Example: Ftp.GetItems("DIR/*.txt") - this property determines whether item "DIR" should be also included in output collection. - - True if directories where the files are located should be included; false otherwise. - - - - Gets or sets a value indicating whether a consumer of the should flatten the output. - Flatten means to don't persist directory structure. - For example if used to upload files "A/a.txt" and "B/b.txt" to the "/data" directory on a FTP server, - files "a.txt" and "b.txt" are uploaded directly into the "/data" directory - (directories "A" and "B" are not created in the "/data" directory). - - True if flatten the output; false otherwise. - - - - Represents basic type of the Rebex file system. - - - - - Read only Rebex file system. - - - - - Read-write Rebex file system. - - - - - Represents read, write or read/write access to the file. - - This enumeration has a attribute that allows a bitwise combination of its member values. - - - - - Read access to the file. - - - - - Write access to the file. - - - - - Read and write access to the file. - - - - - Represents retrieval parameters. - - - - - Represents read access requirement. - - - - - Represents write access requirement. - - - - - Represents read and write access requirement. - - - - - Initializes a new instance of the - Required access type to the file. - - - - - - - - - - - - - Determines whether two specified have the same value. - - The first to compare, or null. - The second to compare, or null. - true if the value of left is the same as the value of right, otherwise false. - - - - Determines whether two specified have different values. - - The first to compare, or null. - The second to compare, or null. - true if the value of left is different from the value of right; otherwise false. - - - Returns a string that represents the current . - A string that represents the current . - 2 - - - - Gets required access type to the file. - - - - - Provides a container for a collection of objects. - - - - - Initializes a new instance of the class. - - - - - Validates whether the item is correct and can be added. - - Item to add. - - - - Gets an for the collection. - - An for the collection. - - - - Adds the elements of the specified collection to the end of the FileSystemItemCollection. - - The collection whose elements should be added to the end of the FileSystemItemCollection. - - - - Adds the specified item to the collection. - - The item to be added to the collection. - - - - Removes the specified item from the collection. - - The item to remove from the collection. - - True if item was successfully removed from the collection; false otherwise. - - - - - Removes the item with the specified path from the collection. - - The path of an item to remove from the collection. - - - - Removes the item at the specified index from the collection. - - The zero-based index of the item to remove. - - - - Removes all items from the collection. - - - - - Copies the range of elements from the collection to a one-dimensional - array, starting at the specified index of the target array. - - One-dimensional zero-based array that is the destination of the elements copied from the collection. - A zero-based index in the destination array at which copying begins. - - - - Determines whether the item is in the collection. - - The item to locate in the collection. - True if the item is located in the collection; false otherwise. - - - - Determines whether the item with the specified path is in the collection. - - The path to locate in the collection. - True if the item with the specified path is located in the collection; false otherwise. - - - - Gets the total size of files contained in the collection. - - The total size of files contained it the collection. - - - - Returns the paths of files in the collection that match the specified search pattern. - - The regular expression to match the paths or filenames against. - A array containing the paths or names of files in the specified directory that match the specified search pattern. - - The method works in two different modes (determined by property): - Filenames without path are searched and returned. This mode is used by default for collections returned by GetList method.Filenames with path are searched and returned. This mode is used by default for collection returned by GetItems method. - - - - Returns the names of files in the collection that match the specified search pattern. - - The search string to match the items against. - If tree, perform unix-like case-sensitive matching. - A array containing the names of files in the specified directory that match the specified search pattern. - -

The following wildcards are permitted in searchPattern:
* - Zero or more characters.
? - Exactly one character.
- Characters other than the wildcards represent themselves. - For example, the searchPattern string "*.txt" searches for all names/paths - ending with the ".txt". The searchPattern string "s*" searches for all - names/paths beginning with the letter "s". -

-

- The method works in two different modes (determined by property): - Filenames without path are searched and returned. This mode is used by default for collections returned by GetList method.Filenames with path are searched and returned. This mode is used by default for collection returned by GetItems method.

-
-
- - - Returns the names of files in the collection that match the specified search pattern. - - The search string to match the items against. - A array containing the names of files in the specified directory that match the specified search pattern. - -

The following wildcard specifiers are permitted in searchPattern:
* - Zero or more characters.
? - Exactly one character.
- Characters other than the wild card specifiers represent themselves. - For example, the searchPattern string "*t" searches for all names in path - ending with the letter "t". The searchPattern string "s*" searches for all - names in path beginning with the letter "s". -

-

- The method works in two different modes (determined by property): - Filenames without path are searched and returned. This mode is used by default for collections returned by GetList method.Filenames with path are searched and returned. This mode is used by default for collection returned by GetItems method.

-
-
- - - Sorts the items in the entire collection alphabetically. - - - - - Sorts the elements in the entire collection using the specified comparer. - - The implementation to use when comparing elements, or a null reference to sort alphabetically. - - - - Sorts the elements in a section of the collection using the specified comparer. - - The zero-based starting index of the range to sort. - The length of the range to sort. - The implementation to use when comparing elements, or a null reference to sort alphabetically. - - - - Gets an object that can be used to synchronize access to the collection. - - An object that can be used to synchronize access to the collection. - - - - Gets the number of elements contained in the collection. - - The number of elements contained in the collection. - - - - Gets the item at the specified index. - - A zero-based index of the item to get. - Item at the specified index. - - - - Gets the item of the specified path. - - The path of the item to get. - Item with the specified path, or null if not found. - - - - Gets or sets a value that indicates whether to use a Path or Name for pattern matching - and return values in the method. - - - - - List of possible compare types for the FileSystemItemComparer class. - - - - - Compare by . - - - - - Compare by . - - - - - Compare by creation date and time of the item. - - - - - Compare by last modification date and time of the item. - - - - - Compare by last access date and time of the item. - - - - - Compare by type of the item (directory/file/link). - - - - - Class used to compare objects. - - - - - Creates a new instance of FileSystemItemComparer with default sorting by file name and with ascending sort mode. - - - - - Creates a new instance of FileSystemItemComparer with specified comparer type and ascending sort mode. - - Type of the comparer. - - - - Creates a new instance of FileSystemItemComparer with specified comparer type and sort mode. - - Type of the comparer. - Sorting order. - - - - IComparer interface implementation. Compares two instances of . - - First object to compare. - Second object to compare. - Value greater than zero when x is greater then y, zero when they are equal, or less than zero when x is lesser than y. - - - - Specifies how a search pattern is treated (how to traverse a hierarchy of directories). - - - See Using TraversalMode blog post for samples. - - - - - Performs shallow search for files and directories; do recursive transfer of matching directories.
- Shallow search means that items are searched only in the first level of given directory.
- If the pattern matches a file, the file is processed.
- If the pattern matches a directory, all files and subdirectories are processed. -
-
- - - Performs shallow search for files and directories; do non-recursive transfer of matching directories.
- Shallow search means that items are searched only in the first level of given directory.
- If the pattern matches a file, the file is processed.
- If the pattern matches a directory, only the directory itself is processed (without any content = empty directory will be created). -
-
- - - Performs shallow search for files only. This is the same as mode, but only files are processed.
- Shallow search means that files are searched only in the first level of given directory. -
-
- - - Performs deep search for files only. This is like DOS xcopy deep file search.
- Deep search means that files are searched in the given directory and also in all its subdirectories.
- However, if this mode is used in GetItems method, returned collection will also contains directories where the files were found. -
- - This behavior is useful in situations where you need to prepare the containing directory before the file is processed. - To get only files, just use Linq like this: collection.Where(item => !item.IsDirectory) -
- - - Specifies the default action to perform when a target file already exists. - However, the default action can still be changed using the ProblemDetected event. - - - - - Existing files are to cause the whole multi-file transfer to be canceled and an exception to be raised. - - - - - Existing files are to be always skipped. - - - - - Existing files are to be always overwritten. - - - - - Existing files are to be overwritten if they are older than source files. - This is strongly discouraged because modification dates are often misreported by FTP and SFTP servers, making this mode highly unreliable. - We strongly recommend to use a different mode or develop a custom solution using the ProblemDetected event. - - - - - Existing files with different sizes are to be overwritten. - - - - - Existing files are to be resumed if they are smaller than source files. - - - - - Existing files are to be renamed according the pattern "filename[number].extension". - You can still change the generated name using the ProblemDetected event and the method. - - - - - Existing files with different checksum are to be overwritten.
- Works on FTP and ZIP only. ZIP uses CRC-32 always; FTP uses checksums provided by the server (some FTP servers support no checksums). -
-
- - - Specifies behavior on links and reparse points in multi-file operations. - - - - - Detected links are to be resolved and processed - however, this can still be changed by ProblemDetected handler. - - - - - Detected links are to be skipped - however, this can still be changed by ProblemDetected handler. - - - - - Detected links cause an exception to be thrown - however, this can still be changed by ProblemDetected handler. - - - - - Specifies link type. - - - - - Symbolic link (symlink). - - - - - Hard link. - - - - - Specifies the method of the transfer. - - - - - Items are copied. - - - - - Items are moved to the target destination (items are deleted in the source location). - - - - - Specifies the behaviour of the . - - - - - All items (files and directories) are moved to the target destination deleting them in the source location. - - - - - Only files are moved to the target destination. Directories remain (not deleted) in the source location. - - - - - Specifies which date/time to restore. - - - - - Restore no date/time. - - - - - Restore CreationTime. - - - - - Restore LastWriteTime. - - - - - Restore LastAccessTime. - - - - - Restore all date and times. - - - - - Represents a file or directory on the local file system. - - - - - Initializes a new instance of the class. - - Path to a file or directory on the local file system. - - - - Gets the last modification time of the item. - - - - - Sets the last modification time of the item. - - The last modification time. - - - - Gets the last access time of the item. - - - - - Sets the last access time of the item. - - The last access time. - - - - Gets the creation time of the item. - - - - - Sets the creation time of the item. - - The creation time. - - - - Returns the full path of the item. - - The full path of the item. - - - - Deletes the local item. - - - - - Gets the list of file items in a directory represented by this object. - Fails if this object is not a directory. - - - This is only valid for directories. - - List of file items. - - - - Gets the list of directory items in a directory represented by this object. - Fails if this object is not a directory. - - - This is only valid for directories. - - List of directory items. - - - - Computes the CRC32 (Cyclic Redundancy Check) value of the file. - - - This is only valid for files. - - - CRC32 checksum value. - - - - - Calculates the checksum for the specified file. - - Path to the file. - Desired checksum algorithm. - Checksum of the specified file. - - - - Calculates the checksum of the specified part of the specified file. - - Path to the file. - Desired checksum algorithm. - The offset in the local file at which to start processing. - The maximum number of bytes to process. - /// Checksum of the specified file. - - - Gets a value indicating whether the file or directory exists. - - True if the file or directory exists; false otherwise. - - - - Gets file length. - - - - - Gets a value indicating whether the item is a file. - - True if the item is a file; false otherwise. - - - - Gets a value indicating whether the item is a directory. - - True if the archive item is directory; false otherwise. - - - - Gets a value indicating whether the item is a link. - - True if the archive item is a link; false otherwise. - - - - Gets the name of the file or directory. - - The name of the file or directory. - - - - Gets the relative path of the file or directory. - - The relative path of the file or directory. - - - - Gets the full path of the file or directory. - - The full path of the file or directory. - - - - Gets item attributes. - - - - - Provides a container for a collection of objects. - - - - - Initializes a new instance of the class. - - - - - Validates whether the item is correct and can be added. - - Item to add. - - - - Adds the item to the collection. - - The item to be added to the collection. - - - - Adds the item to the collection. - - The item to be added to the collection. - - - - Adds the elements of the specified collection to the end of the LocalItemCollection. - - The collection whose elements should be added to the end of the FtpItemCollection. - - - - Determines whether the item is in the collection. - - The item to locate in the collection. - True if the item is located in the collection; false otherwise. - - - - Determines whether the item is in the collection. - - The item to locate in the collection. - True if the item is located in the collection; false otherwise. - - - - Determines whether the item with the specified path is in the colleciton. - - The path to locate in the collection. - True if the item with the specified path is located in the collection; false otherwise. - - - - Copies the range of elements from the collection to a one-dimensional - array, starting at the specified index of the target array. - - One-dimensional zero-based array that is the destination of the elements copied from the collection. - A zero-based index in the destination array at which copying begins. - - - - Removes the specified item from the collection. - - The item to remove from the collection. - - True if item was successfully removed from the collection; false otherwise. - - - - - Removes the specified item from the collection. - - The item to remove from the collection. - - True if item was successfully removed from the collection; false otherwise. - - - - - Gets an for the collection. - - An for the collection. - - - - Gets the item at the specified index. - - A zero-based index of the item to get. - Item at the specified index. - - - - Gets the item of the specified path. - - The path of the item to get. - Item with the specified path, or null if not found. - - - - License key infrastructure for trial versions of Rebex components. - - - - - Gets or sets the license key. - - License key. - - - - Gets collection of license keys. - - - - - Class for chained comparison of objects. - - - - - Creates a new instance of MultiComparer. - - An array of comparers to use. - - - - IComparer interface implementation. Compares two instances of provided objects. - - The first object to compare. - The second object to compare. - - A signed integer that indicates the result of of x and y comparison. - Value Less than zero means x is less than y. Zero x equals y. Greater than zero x is greater than y. - - - - - SSPI data representation. - - - Only supported on Windows platforms. - - - - Native. - - - Network. - - - - SSPI requirements flag. - - - Only supported on Windows platforms. - - - - The server can use the context to authenticate to other servers as the client. Must be used with MutualAuthentication flag. - - - Mutual authentication. - - - Confidentiality. - - - Connection. - - - Integrity. - - - - SSPI credential usage. - - - Only supported on Windows platforms. - - - - - Inbound. - - - - - Outbound. - - - - - SSPI credential use. - - - Only supported on Windows platforms. - - - - - Inbound. - - - - - Outbound. - - - - - Represents an SSPI error. - - - Only supported on Windows platforms. - - - - - Wrapper class for SSPI authentication. - - - Only supported on Windows platforms. - - - - - Creates a new SSPI session. - - Authentication package. - Data representation. - Target name. - Requirements. - User name. - Password. - User domain - - Only supported on Windows platforms. - - - - - Creates a new SSPI session. - - Authentication package. - Credential use. - Data representation. - Target name. - Requirements. - User name. - Password. - User domain - - Only supported on Windows platforms. - - - - - Creates a new SSPI session. - - Authentication package. - Credential usage. - Data representation. - Target name. - Requirements. - User name. - Password. - User domain - - Only supported on Windows platforms. - - - - - Disposes the SSPI session. - - - - - Get next SSPI message. - - Challenge. - Receives a value indicating whether the SSPI has finished. - Next SSPI message. - - Only supported on Windows platforms. - - - - - Verifies an SSPI signature. - - Message. - Signature. - True if valid, false otherwise. - - Only supported on Windows platforms. - - - - - Creates an SSPI signature. - - Challenge. - Signature. - - Only supported on Windows platforms. - - - - - Unwraps (decrypts) the SSPI message. - - Challenge. - QOP - Unwrapped (decrypted) message. - - Only supported on Windows platforms. - - - - - Wraps (encrypts) SSPI message. - - Response. - QOP. - Receives a value indicating whether the SSPI has finished. - Wrapped (encrypted) message. - - Only supported on Windows platforms. - - - - - The hash algorithm used to compute the hash for hash signing - and verification methods. - - - - - Unsupported hash algorithm. - - - - - MD5. - - - - - SHA1. - - - - - MD5SHA1. - - - - - GOST R 34.11-94. Not supported. - - - - - SHA-256. - - - - - SHA-384. - - - - - SHA-512. - - - - - MD4. - - - - - The key algorithm for the certificate. - - - - - Unsupported key algorithm. - - - - - RSA. - - - - - DSA. - - - - - GOST R 34.10-2001. Not supported. - - - - - Elliptic Curve DSA. - - - - - ED25519. - - - - - Intended key usage. - - - - Digital signature. - - - Non-repudiation. - - - Key encipherment. - - - Data encipherment. - - - Key agreement. - - - Certificate signing. - - - CRL signing. - - - Key encipherment only. - - - Key decipherment only. - - - - Key set options. - - - - Imported keys are marked as exportable. - - - The user is to be notified through a dialog box or other method when certain attempts to use this key are made. - - - Private keys are stored under the local computer and not under the current user. - - - Private keys are stored under the current user and not under the local computer even if the PFX BLOB specifies that they should go into the local computer. - - - Private keys are persisted on disk when importing a certificate - - - Always load the key into CNG key storage provider. Only supported on Windows Vista or higher. - - - Load the key into CNG key storage provider if possible. Only supported on Windows Vista or higher. - - - - Specifies certificate file format. - - - - Binary DER encoded X.509 certificate. - - - Base-64 encoded DER X.509 certificate. - - - P12/PFX certificate with private key. - - - - Represents an X509 v3 certificate. - - - - - Loads a certificate from an array. - - An array containing DER encoded certificate data. - - - - Loads a DER encoded certificate from the specified file. - - Path to a file. - A certificate. - - - - Loads a DER encoded certificate from the specified stream. - - Stream to load a certificate from. - A certificate. - - - - Loads a DER encoded certificate and a private key (in PKCS #8, PuTTY or SSLeay format) from the specified files. - - Path to a certificate file. - Path to the private key file. - Private key password. - A certificate. - - - - Loads a DER encoded certificate and a private key (in PKCS #8, PuTTY or SSLeay format) from the specified streams. - - Stream with the certificate. - Stream with the private key. - Private key password. - A certificate. - - - - Associates the supplied private key with the certificate to perform operations that need a private key. - - An instance of RSA, DSA, RSACryptoServiceProvider or DSACryptoServiceProvider. - - - - Associates the supplied private key with the certificate to perform operations that need a private key. - - The private key. - - - - Associates the supplied private key with the certificate to perform operations that need a private key. - - The private key. - - - - Associates the supplied private key with the certificate to perform operations that need a private key. - - An instance of RSA, DSA, RSACryptoServiceProvider or DSACryptoServiceProvider. - Specifies whether to permanently bind the certificate to the specified CSP. - - - - Associates the supplied private key with the certificate to perform operations that need a private key. - - The private key. - Specifies whether to permanently bind the certificate to the specified CSP. - - - - Associates the supplied private key with the certificate to perform operations that need a private key. - - The private key. - Specifies whether to permanently bind the certificate to the specified CSP. - - - - Loads a certificate with a private key from a PKCS#12 (PFX) file. - - Path to a file. - Encryption password. - A certificate with private key. - - - - Loads a certificate with a private key from a PKCS#12 (PFX) array. - - An array containing DER encoded PKCS#12 data. - Encryption password. - A certificate with private key. - - - - Loads a certificate with a private key from a PKCS#12 (PFX) file. - - Path to a file. - Encryption password. - Key set options. - A certificate with private key. - - - - Loads a certificate with a private key from a PKCS#12 (PFX) array. - - An array containing DER encoded PKCS#12 data. - Encryption password. - Key set options. - A certificate with private key. - - - - Saves the certificate to the supplied file in DER format. - - Path to the file to save the certificate to. If the file exists, it is overwritten. - - - - Saves the certificate to the supplied stream in DER format. - - Stream to save the certificate to. - - - - Saves the certificate to the supplied file in specified format. - - Path to the file to save the certificate to. If the file exists, it is overwritten. - Certificate format. - - - - Saves the certificate to the supplied stream in specified format. - - Stream to save the certificate to. - Certificate format. - - - - Saves the certificate to the supplied file in specified format. - - Path to the file to save the certificate to. If the file exists, it is overwritten. - Certificate format. - Password (only used by PFX/P12 format). - On .NET Compact Framework, this is only supported in Windows CE 5.0 or later. - - - - Saves the certificate to the supplied stream in specified format. - - Stream to save the certificate to. - Certificate format. - Password (only used by PFX/P12 format). - On .NET Compact Framework, this is only supported in Windows CE 5.0 or later. - - - - Saves the certificate's private key to the supplied file. - - Path to the file to save the certificate to. If the file exists, it is overwritten. - Private key password. - Private key file format. - If set to true, the cryptographic provider should not display any user interface (UI) when exporting private key parameters. - - - - Saves the certificate's private key to the supplied stream. - - Stream to save the private key to. - Private key password. - Private key file format. - If set to true, the cryptographic provider should not display any user interface (UI) when exporting private key parameters. - - - - Creates a new instance of based on the specified context. - - A pointer to the certificate context. - -

- Only supported on Windows platforms. -

-
-
- - - Creates a new instance of based on the specified certificate or . - - An instance of or . - - - - Converts an or to a . - - An instance of or . - A . - - - - Converts a to (or ). - - An instance of . - An . - - - - Returns the hash algorithm used to create the signature of this certificate. - - Hash algorithm. - - - - Returns the collection of CRL distribution points. - - Collection of CRL distribution points, or null if not available. - - - - Returns the DN of the certification authority that issued the X.509v3 certificate. - - DN of the certification authority that issued the X.509 certificate. - - - - Returns the name of the certification authority that issued the X.509v3 certificate. - - The name of the certification authority that issued the X.509 certificate. - - - - Returns DN of the principal to which the certificate was issued. - - DN of the principal to which the certificate was issued. - - - - Returns the name of the principal to which the certificate was issued. - - The name of the principal to which the certificate was issued. - - - - Returns the public key for the X.509v3 certificate. - - The public key for the X.509v3 certificate. - - - - Returns the key algorithm parameters for the X.509v3 certificate. - - The key algorithm parameters for the X.509v3 certificate. - - - - Returns the public key info for the X.509v3 certificate. - - The public key info for the X.509v3 certificate. - - - - Returns the certificate's subject key identifier (SKI). - - Subject key identifier. - - - - Returns the certificate's issuer key identifier (AKI). - - Issuer (authority) key identifier. - - - - Returns the certificate's common name, if available. - - Common name; or null if not available. - - - - Returns the list of certificate's common names. - - The list of common names. - - - - Returns the list of certificate's e-mail addresses. - - The list of addresses. - - - - Returns the serial number of the X.509v3 certificate. - - The serial number of the X.509 certificate as an array of bytes. - - - - Returns the expiration date of this X.509v3 certificate (in local time). - - The expiration date for this X.509 certificate. - The expiration date is the date after which the X.509 certificate is no longer considered valid. - - - - Returns the effective date of this X.509v3 certificate (in local time). - - The effective date for this X.509 certificate. - The effective date is the date after which the X.509 certificate is considered valid. - - - - Returns the hash value for the X.509v3 certificate as an array of bytes. - - The hash value for the X.509 certificate. - - - - Returns the raw data for the entire X.509v3 certificate. - - The raw data for the entire X.509v3 certificate. - - - - Checks whether a certificate is time valid. - - true if valid, false if not valid. - - - - Returns the intended key usage value. - - Intended key usage. - - - - This method is deprecated, use instead. - - An array of intended key usage identifiers. - - - - Returns an array of enhanced key usage identifiers. - - An array of enhanced key usage identifiers, or null if the certificate is valid for all uses. - - - - Returns the DSA parameters of certificate's public key. - - The DSA parameters of certificate's public key. - - - - Returns the RSA parameters of certificate's public key. - - The RSA parameters of certificate's public key. - - - - Returns the RSA parameters of certificate's public or private key. - - True if private key parameters are to be exported as well. - If set to true, the cryptographic provider should not display any user interface (UI) when exporting private key parameters. - The RSA parameters of certificate's public or private key. - - - - Returns the DSA parameters of certificate's public or private key. - True if private key parameters are to be exported as well.If set to true, the cryptographic provider should not display any user interface (UI) when exporting private key parameters. - The DSA parameters of certificate's public or private key. - - - - Checks whether a private key for this certificate is available. - - True if available, false if not available. - - - - Returns the size of the key in bits. - - Size of the key in bits. - - - - Verifies the specified signature data by comparing it to the signature computed for the specified hash value. - - The hash value of the signed data. - A hash algorithm used to create the hash value. - The signature for the specified hash value. - True if the signature verifies as valid; otherwise, false. - - - - Verifies the specified signature data by comparing it to the signature computed for the specified message. - - The message. - The signature for the specified message. - True if the signature verifies as valid; otherwise, false. - - - - Verifies the specified signature data by comparing it to the signature computed for the specified message. - - The message. - The signature for the specified message. - Signature parameters. - True if the signature verifies as valid; otherwise, false. - - - - Computes the signature for the specified hash value by encrypting it with the private key. - - The hash value of the data to be signed. - A hash algorithm used to create the hash value. - If set to true, the cryptographic should not display any user interface (UI). - The signature for the specified hash value. - -

- The private key for a certificate must be available for this method to succeed. -

-

- If silent operation is requested and the CSP must display UI to operate, this method will fail. -

-
-
- - - Computes the signature for the specified message by encrypting it with the private key. - - The message to be signed. - The signature for the specified message. - -

- The private key for a certificate must be available for this method to succeed. -

-
-
- - - Computes the signature for the specified message by encrypting it with the private key. - - The message to be signed. - Signature parameters. - The signature for the specified message. - -

- The private key for a certificate must be available for this method to succeed. -

-
-
- - - Encrypts data. - - Data to be encrypted. - Encrypted data. - - - - Decrypts data. - - Data to be decrypted. - If set to true, the cryptographic provider should not display any user interface (UI). - Decrypted data. - - If silent operation is requested and the cryptographic provider needs to display a UI to operate, this method will fail. - - - - - Verifies the validity of the certificate. - - Validation result. - - - - Verifies the validity of the certificate, including its compliance with the specified criteria. - - Validation options (not supported by CertificateChainEngine.Native engine on Xamarin.iOS and Xamarin.Android). - Validation result. - - - - Verifies the validity of the certificate, including its compliance with the specified criteria. - - The name of the server. - Validation options (not supported by CertificateChainEngine.Native engine on Xamarin.iOS and Xamarin.Android). - Validation result. - - - - Verifies the validity of the certificate, including its compliance with the specified criteria, - using the specified chain engine. - - The name of the server. - Validation options (not supported by CertificateChainEngine.Native engine on Xamarin.iOS and Xamarin.Android). - Certificate chain engine. - Validation result. - - - - Validates the specified certificate revocation list (issued by this certificate). - - Certificate revocation list to validate. - The date in which the validation takes effect; specify null (Nothing in VB.NET) to skip time validation check. - Status of the validation result. If the CRL is valid, the return value is 0. - - - - Disposes the object and releases resources. - - - Calling this method ensures that all resources are freed. - - - - - Finalizer. - - - - - Gets a handle of the certificate. - - A handle of the certificate. - -

- Only supported on Windows platforms. -

-
-
- - - Gets the certificates extensions collection. - - Extensions collection. - - - - Returns the key algorithm for this certificate. - - The key algorithm for this certificate. - - - - Gets the thumbprint of the certificate. - - Certificate's thumbprint. - - - - Gets or sets the friendly name associated with the certificate. - - Friendly name associated with the certificate. - Not available in .NET CF. - - - - Gets or sets a custom object associated with this particular instance of . This value is not persisted. - - - - - A chain engine (name space and cache) to be used to build and validate certificate chains. - - - - - The chain engine of the current user. - - - - - The chain engine of the local machine. - - - - - Use current certificate engine if set; otherwise use engine (platform-specific). - - - - - Represents a chain of certificates. - - - A chain starts by the end certificate and each following certificate - must directly certify the one preceding it. - The last certificate in the list is a self-signed root certificate, and - may be optionally omitted under the assumption it must be known in any case. - - - - - Gets an for the collection. - - An for the collection. - - - - Adds a certificate to the end of the chain. - This certificate represents authority for the previous certificate in the chain - (Leaf certificate is at the beginning of the chain, Root certificate is at the end of the chain). - - The certificate to be added to the chain. - The position of the certificate in the chain. - - - - Creates an empty certificate chain. - - - - - Creates a certificate chain from an array of certificates. - - An array of certificates. - - - - Loads a certificate with a private key from a PKCS#12 (PFX) file. - - Path to a file. - Encryption password. - A certificate with private key. - - - - Loads a certificate with a private key from a PKCS#12 (PFX) array. - - An array containing DER encoded PKCS#12 data. - Encryption password. - A certificate with private key. - - - - Loads a certificate with a private key from a PKCS#12 (PFX) file. - - Path to a file. - Encryption password. - Key set options. - A certificate with private key. - - - - Loads a certificate with a private key from a PKCS #12 (.p12/.pfx) array. - - An array containing DER encoded PKCS #12 data. - Encryption password. - Key set options. - A certificate with private key. - - - - Loads from the specified PKCS #7 (.p7b) file. - - Path to the file. - Instance of , never null. - The PKCS #7 file can be saved using method. - - - - Loads a PKCS #7 (.p7b) encoded from the specified file. - - Stream to load a from. - Instance of , never null. - The PKCS #7 stream can be saved using method. - - - - Verifies the specified signature data by comparing it to the signature computed for the specified hash value. - - The hash value of the signed data. - A hash algorithm used to create the hash value. - The RSA signature for the specified hash value. - true if the signature verifies as valid; otherwise, false. - The hash algorithm parameter is ignored with managed RSA. - - - - Builds a certificate chain for a specified certificate. - - End certificate. - The chain for an end certificate. - - This function builds a certificate chain context starting from an end - certificate and going back, if possible, to a trusted root certificate. - - - - - Builds a certificate chain for a specified certificate. - - End certificate. - Certificate chain engine. - The chain for an end certificate. - - This function builds a certificate chain context starting from an end - certificate and going back, if possible, to a trusted root certificate. - - - - - Builds a certificate chain for a specified certificate. - - End certificate. - Additional store to search in addition to system stores. - The chain for an end certificate. - - This function builds a certificate chain context starting from an end - certificate and going back, if possible, to a trusted root certificate. - - - - - Builds a certificate chain for a specified certificate. - - End certificate. - Certificate chain engine. - Additional store to search in addition to system stores. - The chain for an end certificate. - - This function builds a certificate chain context starting from an end - certificate and going back, if possible, to a trusted root certificate. - - - - - Verifies the validity of the certificate chain. - - Validation result. - - - - Verifies the validity of the certificate chain, including its compliance with the specified criteria. - - Validation options (not supported by CertificateChainEngine.Native engine on Xamarin.iOS and Xamarin.Android). - Validation result. - - - - Verifies the validity of the certificate chain, including its compliance with the specified criteria. - - The name of the server. - Validation options (not supported by CertificateChainEngine.Native engine on Xamarin.iOS and Xamarin.Android). - Validation result. - - - - Verifies the validity of the certificate chain, including its compliance with the specified criteria, - using the specified chain engine. - - The name of the server. - Validation options (not supported by CertificateChainEngine.Native engine on Xamarin.iOS and Xamarin.Android). - Certificate chain engine. - Validation result. - - - - Saves the certificate chain to the specified path as a .P7B (PKCS #7) file. - - Path to save the certificate chain file to. - - - - Saves the certificate chain to the specified stream in .P7B (PKCS #7) format. - - Stream to write the certificate chain to. - - - - Loads a chain of Base-64-encoded X509 certificates from the specified file. - - Path to a file with the certificate chain. - A certificate chain. - - - - Gets the default certificate chain engine (platform-specific). - - - - - Gets the number of certificates in the chain. - - The number of certificates in the chain. - - - - Gets or sets the certificate at the specified position. - - The certificate at the specified position - The certificate at the specified position. - - - - Gets the certificate of the root certification authority, if available. - - Root CA certificate if available; null otherwise. - - - - Gets the first certificate in the chain, if not empty. - - Leaf certificate; null if the chain is empty. - - - - Represents a collection of X509 v3 certificates. - - - - - A base class for various collections of cryptographic objects. - - - - - A base class for various collections of cryptographic objects. - - - - - Gets an for the . - - An for the collection. - - - - Copies the range of elements from the to a compatible one-dimensional - , starting at the specified index of the target array. - - One-dimensional zero-based array that is the destination of the elements copied from . - A zero-based index in the destination array at which copying begins. - - - - Gets the number of items in the . - - The number of items in collection. - - - - Gets a value indicating whether access to the is synchronized. - - - - - Gets an object that can be used to synchronize access to the . - - - - - Adds an item to the collection. - - Item to add. - - - - Removes all elements from the collection. - - - - - Determines whether the collection contains the specified item. - - Item. - True if the collection contains the item; false if it does not. - - - - Returns a position of the specified item within the collection, or -1 if not found. - - Item to find. - Zero-based position of the item; or -1 if not found. - - - - Copies the range of elements from the collection to a compatible one-dimensional - array, starting at the specified index of the target array. - - One-dimensional zero-based array that is the destination of the elements copied from the collection. - A zero-based index in the destination array at which copying begins. - - - - Removes an item from the collection. - - An item to remove. - True if the item was removed; false if not removed. - - - - Removes an item at the specified position from the collection. - - An index of an item to remove. - - - - Adds an item to the collection at the specified position. - - Position at which to insert the item. - Item to add. - - - - Returns an enumerator that iterates through the collection. - - Enumerator. - - - - Returns a value indicating whether the collection is read-only. - - - - - Gets or sets an instance of an item at the specified index. - - The zero-based index of the item to get or set. - An item. - - - - Creates a new instance of . - - - - - Represents a certificate engine. - - - - - Initializes new instance of the class. - - - - - Validates given certificate chain using specified validation parameters. - - Certificate chain to validate. - Validation parameters. - Result of the validation. - - - - Builds a certificate chain from the specified certificate. - - A certificate to build the chain from. - The built certificate chain. - - - - Builds a certificate chain from the specified certificate. - - A certificate to build the chain from. - An extra store to search for intermediate and root CA certificates. - The built certificate chain. - - - - Gets the current certificate engine. - - The current certificate engine; null reference (Nothing in VB.NET) if no engine was set. - - - - Sets the current certificate engine. - - An engine to be used. - - - - Gets or sets the LogWriter used by this object. - - Log writer. - - - - Gets the default certificate engine which is used if no custom engine is set as current engine. - - - - - Certificate validation parameters for 's method. - - - - - Creates a new instance of . - - - - - Gets or sets validation options. - - - - - The exception that is thrown when a certificate-related error occurs. - - - - - Initializes a new instance of the class with serialized data. - - The object that holds the serialized object data. - The contextual information about the source or destination. - - - - Initializes a new instance of the Exception class - with a specified error message. - - The error message that explains the reason for the exception. - - - - Initializes a new instance of the Exception class - with a specified error message and a reference to the - inner exception that is the cause of this exception. - - The error message that explains the reason for the exception. - The exception that is the cause of the current exception. - - - - Represents a collection of X509 v3 certificate extensions. - - - - - Creates a certificate extension collection from an ASN.1 block. - - ASN.1 block. - - - - Gets the first with the specified object identifier. - - The object identifier, either friendly name or dotted string format. - A certificate extension, or null if not found. - - - - Represents an X509 v3 certificate extension. - - - - - Creates a new instance of . - - Extension object identifier. - Specifies whether the extension is critical. - Extension data. - - - - Create extended (enhanced) key usage extension (2.5.29.37). - - Specifies whether this extension is considered critical (not-critical extensions may be ignored by servers that don't support them). - Key usage OIDs. - An extension object. - - - - Creates a key usage extension (2.5.29.15). - - Key usage flags. - An extension object. - - - - Gets the object identifier that identifies the extension. - - The object identifier. - - - - Gets a value indicating whether the extension is critical. - - True if critical; false otherwise. - - - - Gets the extension value. - - An array of bytes in ASN.1 format. - - - - Options for methods. - - - - - No filter. - - - - - Only find certificates that have a private key. - - - - - Only find certificates that are time valid. - - - - - Only find certificates that can be used for client authentication. - - - - - Only find certificates that can be used for server authentication. - - - - - When searching by certificate issuer, include known subordinate CAs in the search as well. - - - - - The type of search for method. - - - - - Certificates whose subject key identifier (SKI) matches the specified value. - - - - - Specifies the location of the certificate store. - - - - None. - - - The store located at HKEY_CURRENT_USER\Software\Microsoft\SystemCertificates. - - - The store located at HKEY_LOCAL_MACHINE\Software\Microsoft\SystemCertificates. - - - The store located at HKEY_LOCAL_MACHINE\Software\Microsoft\Cryptography\Services\<ServiceName>>\SystemCertificates. - - - The store located at HKEY_LOCAL_MACHINE\Software\Microsoft\Cryptography\Services\<ServiceName>\SystemCertificates. - - - The store located at HKEY_USERS\<UserName>\Software\Microsoft\SystemCertificates. - - - The store located at HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates. - - - The store located at HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\SystemCertificates. - - - The store located at HKEY_LOCAL_MACHINE\Software\Microsoft\EnterpriseCertificates. - - - - Specifies the name of the certificate store. - - - - None. - - - Other users. - - - Third-party certificate authorities. - - - Intermediate certificate authorities. - - - Revoked certificates. - - - Personal certificates. - - - Trusted root certificate authorities. - - - Directly trusted people and resources. - - - Directly trusted publishers. - - - - Represents a certificate store. - - - - - Opens a system certificate store of the specified name a the specified location. - - The store name. - Specifies the location of the certificate store. - - Some example system stores are:
- "CA" - Certification authority certificates.
- "My" - A certificate store that holds certificates with associated private keys.
- "Root" - Root certificates.
- "SPC" - Software publisher certificate.
- "Trust"
- "Disallowed"
-
- - - Opens a system certificate store of the specified name a the specified location. - - The store name value. - Specifies the location of the certificate store. - - - - Opens a system certificate store of the specified name. - - The store name. - - Some example system stores are:
- "CA" - Certification authority certificates.
- "My" - A certificate store that holds certificates with associated private keys.
- "Root" - Root certificates.
- "SPC" - Software publisher certificate.
- "Trust"
- "Disallowed"
-
- - - Opens a system certificate store of the specified name. - - The store name value. - - - - Creates a temporary memory-based certificate store - and populates it with certificates from the specified collection. - - The certificate collection. - - - - Determines whether the specified certificate store exists. - - The store name. - Specifies the location of the certificate store. - True if the store exists; false otherwise. - - - - Determines whether the specified certificate store exists. - - The store name value. - Specifies the location of the certificate store. - True if the store exists; false otherwise. - - - - Determines whether the specified certificate store exists. - - The store name. - True if the store exists; false otherwise. - - - - Determines whether the specified certificate store exists. - - The store name value. - True if the store exists; false otherwise. - - - - Adds a certificate to this certificate store. - - Certificate to be added. - - On Windows, the certificate is added even if the same certificate is already present in the store. - If this is undesirable, use instead. - - - - - Adds a certificate to this certificate store. - - Certificate to be added. - - - - Removes a certificate from this certificate store. - - Certificate to be removed. - - - - Returns all certificates matching the specified criteria. - - Specifies the type of search being made. - A byte array whose meaning is defined by 'findType'. - Options. - An array of certificates. - - - - Returns all certificates issued by the specified issuer (or its subordinate issuer) and corresponding to the specified options. - - Issuer DN. - Options. - An array of certificates. - - - - Returns all certificates with the specified serial number issued by the specified issuer (or its subordinate issuer) - and corresponding to the specified options. - - Issuer DN. - Certificate serial number. - Options. - An array of certificates. - - - - Returns all certificates issued by one of specified issuers (or their subordinate issuer) and corresponding to the specified options. - - An array of issuers' DNs. - Options. - An array of certificates. - - - - Returns all certificates issued by one of specified issuers (or their subordinate issuer) and corresponding to the specified options. - - An array of issuers' DNs. - Certificate serial number. - Options. - An array of certificates. - - - - Returns all certificates matching the specified certificate and options. - - Certificate to find. - Options. - An array of certificates. - - - - Returns all certificates corresponding to the specified options. - - Options. - An array of certificates. - - - - Returns all certificates corresponding to the specified e-mail address. - - E-mail address. - An array of certificates. - - - - Returns all certificates corresponding to the specified e-mail address and options. - - E-mail address. - Options. - An array of certificates. - - - - Disposes the object and releases resources. - - - Calling this method ensures that all resources are freed. - - - - - Finalizer called by garbage collector. - - - - - Gets a handle of the certificate store. - - A handle of the certificate store. - -

- Only supported on Windows platforms. -

-
-
- - - Represents a distinguished name. - - - - - Creates an instance of distinguished name from an ASN.1 block. - - ASN.1 block. - - - - Creates an instance of distinguished name from a DN string. - - DN string. - - - - Returns the DN's common name, if available. - - Common name; or null if not available. - - - - Returns the list of DN's e-mail addresses. - - The list of addresses. - - - - Determines whether the specified object is equal to the current object. - - Object to compare with the current object. - True if equal; false if not equal. - - - - Servers as a hash function for a particular type. Suitable for use in hashing algorithms and hash tables. - - Hash code. - - - - Converts a distinguished name into a byte array. - - Byte array. - - - - Returns a string representation of the object. - - A DN string. - - - - Converts string DN to its BER-encoded representation. - - String DN. - BER-encoded DN. - - - - Converts BER-encoded representation of DB to its string representation. - - BER-encoded DN. - String DN. - - - - Represents a collection of CRL distribution points. - - - - - Creates a new instance of . - - - - - A CRL distribution point. - - - - - Create a new instance of a CRL distribution point that represents the specified URL. - - CRL URL. - - - - Gets distribution point URL, if available. - - Distribution point URL, or null if not available. - - - - Certificate validation method options. (Not supported by CertificateChainEngine.Native engine on Xamarin.iOS and Xamarin.Android). - - - - - No options specified. - - - - - Ignore an invalid time (such as expiration). - - - - - Ignore an invalid certificate trust list time. - - - - - Ignore an invalid time nesting. - - - - - Ignore all invalid time checks (such as expiration, nesting, CRL or CTL times). - - - - - Ignore invalid basic constraints. - - - - - Allow unknown certification authority. - - - - - Ignore wrong usage of the certificate. - - - - - Ignore invalid policy. - - - - - Ignore an unknown revocation status of the end certificate. - - Not supported in builds for .NET CF. - - - - Ignore an unknown revocation status of the certificate trust list signer. - - Not supported in builds for .NET CF. - - - - Ignore an unknown revocation status of the CA certificate. - - Not supported in builds for .NET CF. - - - - Ignore an unknown revocation status of a root certificate. - - Not supported in builds for .NET CF. - - - - Ignore all unknown revocation statuses. - - - - - Not supported. - - Not supported in builds for .NET CF. - - - - Not supported. - - Not supported in builds for .NET CF. - - - - Only use local cache, do not access the network. - - Not supported in builds for .NET CF. - - - - Ignore invalid common name. - - - - - Skip certificate revocation check. - - - - - Ignore invalid chain. - - - - - Certificate validation status. - - - - - This certificate or one of the certificates in the certificate chain is not time valid. - - - - - Certificates in the chain are not properly time nested. - - - - - Trust for this certificate or one of the certificates in the certificate chain has been revoked. - - - - - The certificate or one of the certificates in the certificate chain does not have a valid signature. - - - - - The certificate or certificate chain is not valid for its proposed usage. - - - - - The certificate or certificate chain is based on an untrusted root. - - - - - The revocation status of the certificate or one of the certificates in the certificate chain is unknown. - - - - - One of the certificates in the chain was issued by a certification authority that the original certificate had certified. - - - - - One of the certificates has an invalid extension. - - - - - The certificate or one of the certificates in the certificate chain has - a policy constraints extension, and one of the issued certificates has - a disallowed policy mapping extension or does not have a required issuance - policies extension. - - - - - The certificate or one of the certificates in the certificate chain has - a basic constraints extension and either the certificate cannot be used - to issue other certificates or the chain path length has been exceeded. - - - - - The certificate or one of the certificates in the certificate chain has - an invalid name constraints extension. - - - - - The certificate or one of the certificates in the certificate chain has a name constraints extension containing unsupported fields. - - - - - The certificate or one of the certificates in the certificate chain has a name constraints extension and a name constraint is missing for one of the name choices in the end certificate. - - - - - The certificate or one of the certificates in the certificate chain has a name constraints extension and there is not a permitted name constraint for one of the name choices in the end certificate. - - - - - The certificate or one of the certificates in the certificate chain has a name constraints extension and one of the name choices in the end certificate is explicitly excluded. - - - - - The certificate chain is not complete. - - - - - A CTL used to create this chain was not time valid. - - - - - A CTL used to create this chain did not have a valid signature. - - - - - A CTL used to create this chain is not valid for this usage. - - - - - The revocation status of the certificate or one of the certificates in the certificate chain is either off-line or stale. - - - - - The end certificate does not have any resultant issuance policies, and one of the issuing CA certificates has a policy constraints extension requiring it. - - - - - The certificate chain contains a certificate with unsupported signature hash algorithm (usually SHA-2) or unsupported key algorithm (usually ECDSA). - - - - - Unknown error. - - - - - A path length constraint in the certification chain has been violated. - - - - - A certificate contains an unknown extension that is marked critical. - - - - - A certificate chain is invalid, - such as an certificate's Issuer not matching the CA's Subject or - an certificate's AKI not matching the CA's SKI. - - - - - A certificate chain could not be built to a trusted root authority. - - Not supported in builds for .NET CF. - - - - The certificate's CN name does not match the passed value. - - - - - A certification chain processed correctly, but one of the CA certificates - is not trusted by the policy provider. - - Not supported in builds for .NET CF. - - - - The certificate was explicitly marked as untrusted by the user or CA. - - - - - A certificate or CRL is malformed. - - - - - There might be more errors apart from those reported. - - - - - Certificate uses algorithm which is not considered secure on this platform. - - - - - Certificate is not trusted. - - - - - Represents the result of certificate chain validation. - - - - - Initialize instance of the . - - A validation status (use zero for success). - - - - Gets the status mask. - - Status mask. - - - - Gets the certificate chain validity status. - - True if valid, false if not valid. - - - - Gets the native error code returned by the validation function (this property returns always zero). - - The error code returned by the validation function. - - - - Gets the native error code returned by the validation function or zero if the native error code is not available. - - The error code returned by the validation function. - - - - Specifies asymmetric algorithm. - - - - - RSA. - - - - - DSA. - - - - - Diffie-Hellman. - - - - - Elliptic Curve Digital Signature Algorithm (.NET >= 4.0 or through a plugin). - - - - - Elliptic Curve Diffie-Hellman algorithm (.NET >= 4.0 or through a plugin). - - - - - Twisted Edwards Curve DSA algorithm such as ED25519 (supported through a plugin). - - - - - Specifies key blob format. - - - - - ECPrivateKey (defined by RFC 5915). - - - - - Raw public key data. - - - - - Raw private key data. - - - - - Factory method for external algorithm plugins. - - - - - A platform-independent asymmetric algorithm object. - - - - - Register custom asymmetric key algorithm. - - Factory function that accepts algorithm name and returns algorithm. - - - - Gets CSP parameters if the instance of represents a key stored in a Windows Cryptographic Service Provider. - - CSP parameters if available; null if not available. - - - - Creates an instance of . - - - - - Frees the resources used by this object. - - - - - Creates an instance of from the specified asymmetric algorithm object. - - Asymmetric algorithm object. - True if the created object owns the asymmetric algorithm object. - An instance of . - - - - Exports a public key to the specified private key info object. - - Public key info object. - - - - Exports a private key to the specified private key info object. - - Private key info object. - - - - Imports a key from the specified public key info object. - - Public key info object. - - - - Imports a key from the specified private key info object. - - Private key info object. - - - - Imports a key from the specified RSA parameters. - - RSA key parameters. - - - - Imports a key from the specified DSA parameters. - - DSA key parameters. - - - - Imports a key from the specified Diffie-Hellman parameters. - - Diffie-Hellman key parameters. - - - - Imports a private key for the specified algorithm/curve. Only some algorithms/curves are supported. - - Key algorithm. - Key algorithm curve. - Key data. - Key format. - - - - Returns a value indicating whether the specified algorithm is supported. - - Asymmetric algorithm. - Curve name or OID (if needed). - Key size (specify 0 to indicate default key size). - True if supported; false if not supported. - - - - Generates Diffie-Hellman parameters corresponding to the specified key size. - - Key size. - Diffie-Hellman parameters. - - - - Generates a private key for the specified asymmetric algorithm with of the specified key size. - - Key algorithm. - Key size. Specify 0 to use default key size. - - - - Generates a private key for the specified asymmetric algorithm based on the specified curve. - - Key algorithm. - Curve name or OID. - - - - Computes the signature for the specified hash value. - - The hash value of the data to be signed. - A hash algorithm used to create the hash value. - The signature for the specified hash value. - -

- The private key must be available for this method to succeed. -

-
-
- - - Computes the signature for the specified message (using default parameters). - - Message to be signed. - Signature for the specified message. - -

- The private key must be available for this method to succeed. -

-
-
- - - Computes the signature for the specified message. - - Message to be signed. - Signature parameters. - Signature for the specified message. - -

- The private key must be available for this method to succeed. -

-
-
- - - Verifies the specified signature. - - The hash value of the signed data. - A hash algorithm used to create the hash value. - The signature for the specified hash value. - True if the signature verifies as valid; otherwise, false. - - - - Verifies the specified signature (using default parameters). - - Signed message. - The signature for the specified message. - True if the signature verifies as valid; otherwise, false. - - - - Verifies the specified signature. - - Signed message. - The signature for the specified message. - Signature parameters. - True if the signature verifies as valid; otherwise, false. - - - - Encrypts data. - - Data to be encrypted. - Encrypted data. - - - - Encrypts data. - - Data to be encrypted. - Encryption parameters. - Encrypted data. - - - - Decrypts data. - - Data to be decrypted. - Decrypted data. - - If silent operation is requested and the CSP must display UI to operate, this method will fail. - - - - - Decrypts data. - - Data to be decrypted. - Encryption parameters. - Decrypted data. - - - - Gets key material deriver. Only supported by Diffie-Hellman-like algorithms. - - Other side's public key in raw form. - Key material deriver. - - - - Gets the current key size. - - - - - Gets the current key algorithm. - - - - - Gets a value indicating whether this instance only contains the public key. - - - - - Key material deriver. - - - - - Derives key material. - - Parameters that specify how to derive the key material.. - Key material. - - - - Finalizer. Called by garbage collector during object destruction. - - - - - Disposes the deriver object. - - - - - Provides various cryptography-related helper methods. - - - - - Creates an instance of default random number generator. - - - - - - Returns an array of bytes with a cryptographically strong random sequence of values. - - Array length. - Array filled with random data. - - - - Fills specified array of bytes with a cryptographically strong random sequence of values. - - Array to fill random data with. - - - - Decodes a signature from a PKCS #7 form. - - Signature. - Key algorithm. - Decoded signature. - - - - Encodes a signature to a PKCS #7 form. - - Signature. - Key algorithm. - Encoded signature. - - - - Sets internal option. - - Instance. - Name. - Value. - - - - Gets internal option. - - Instance. - Name. - Value. - - - - Forces RijndaelManaged to be used even when AesCryptoServiceProvider is available. - - True if RijndaelManaged is to be used instead of AesCryptoServiceProvider; false otherwise. - - - - Enables or disables an option that specifies whether only FIPS 140-2 compliant cryptographic algorithm providers are to be used. - - True if only FIPS 140-2 compliant algorithms are to be used; false to allow all supported algorithms. - - In .NET 2.0 and higher, this option reflects the Windows OS settings unless explicitly set to a different value. - - - - - Implements Diffie-Hellman key agreement protocol (also called exponential key agreement). - - - This algorithm was developed by Diffie and Hellman in 1976. It allows two users - to exchange a secret key over an insecure medium without any prior secrets. - - - - - Initializes a new instance of DiffieHellman. - - - You cannot create an instance of an abstract class. - Create an instance of class instead. - - - - - Returns the public key. - - The public key. - - - - Calculates the shared secret key from the other side's public key. - - Other side's public key. - The shared secret key. - - - - Imports the specified . - - The Diffie-Hellman parameters. - - - - Exports the . - - true to include private parameter; otherwise, false. - The Diffie-Hellman parameters. - - - - Returns Oakley generator value. - - Oakley generator. - - - - Returns Oakley group 2. - - Oakley group 2. - - - - Returns Oakley group 14. - - Oakley group 14. - - - - Wrapper around Diffie-Hellman CSP. - - - - - Creates an instance of using the default key size of 1024. - - - - - Creates an instance of using the specified key size. - - Key size. - - - - Returns the public key. - - The public key. - - - - Imports the specified . - - The Diffie-Hellman parameters. - - - - Exports the . - - true to include private parameter; otherwise, false. - The Diffie-Hellman parameters. - - - - Creates and returns an XML string representation of the current object. - - true to include private parameters; otherwise, false. - An XML string encoding of the current object. - - - - When overridden in a derived class, reconstructs a DiffieHellmanManaged object from an XML string. - - The XML string to use to reconstruct the DiffieHellmanManaged object. - - - - Releases the unmanaged resources and optionally releases the managed resources. - - true to release both managed and unmanaged resources; false to release only unmanaged resources. - - - - Gets the name of the signature algorithm available with this implementation of DiffieHellman. - - The name of the signature algorithm. - DiffieHellman does not support signatures. This property will throw an exception. - - - - Gets the name of the key exchange algorithm available with this implementation of DiffieHellman. - - The name of the key exchange algorithm. - - - - Managed implementation of Diffie-Hellman algorithm. - - - - - Initializes a new instance of the DiffieHellmanManaged class. - - - - - Initializes a new instance of the DiffieHellmanManaged class - with a specified key size. - - The size of the key to use in bits. - - - - Creates and returns an XML string representation of the current object. - - true to include private parameters; otherwise, false. - An XML string encoding of the current object. - - - - When overridden in a derived class, reconstructs a DiffieHellmanManaged object from an XML string. - - The XML string to use to reconstruct the DiffieHellmanManaged object. - - - - Returns the public key. - - The public key. - - - - Imports the specified . - - The Diffie-Hellman parameters. - - - - Exports the . - - true to include private parameter; otherwise, false. - The Diffie-Hellman parameters. - - - - Releases the unmanaged resources and optionally releases the managed resources. - - true to release both managed and unmanaged resources; false to release only unmanaged resources. - - - - Gets the name of the signature algorithm available with this implementation of DiffieHellman. - - The name of the signature algorithm. - DiffieHellman does not support signatures. This property will throw an exception. - - - - Gets the name of the key exchange algorithm available with this implementation of DiffieHellman. - - The name of the key exchange algorithm. - - - - Contains the parameters for Diffie-Hellman algorithm. - - - - - The prime modulus used for the operation. - - - - - The generator used for the operation. - - - - - The private key for the operation. - - - - - The public key for the operation. - - - - - Managed implementation of DSA signature algorithm. - - -

- The purpose of this class is to make it possible to verify - signatures without the need to use CryptoAPI, which is not available - in some scenarios. -

-

- Even though it is possible to generate DSA keys and sign data using - this class, but this process has not been optimized for speed and is - very slow. -

-
-
- - - Initializes a new instance of the DSAManaged class with the key size of 1024. - - - - - Initializes a new instance of the DSAManaged class with the specified key size. - - The size of the key to use in bits. - - - - Initializes a new instance of the DSAManaged class with the specified key size and seed. - - The size of the key to use in bits. - The initial seed to use for key generation. - - - - Creates and returns an XML string representation of the current object. - - true to include private parameters; otherwise, false. - An XML string encoding of the current object. - - - - When overridden in a derived class, reconstructs a DSAManaged object from an XML string. - - The XML string to use to reconstruct the DSAManaged object. - - - - Encodes the signature in raw format (40 bytes) using the DER encoding of DssSigValue. - - Raw signature. - DER encoded signature - - - - Decodes the DER encoding of DssSigValue to raw format (40 bytes). - - DER encoded signature. - Raw signature - - - - Exports the . - - true to include private parameters; otherwise, false. - The DSA parameters. - - - - Imports the specified . - - The DSA parameters. - - - - Creates the DSA signature for the specified data. - - The SHA1 hash of data to be signed. - The DSA signature for the specified hash value. - - DSA signature is a pair of numbers r and s. - This method always returns an array of 40 bytes. - Bytes 0..19 contain the value of r, bytes 20..39 contain the value of s. - - - - - Verifies the DSA signature for the specified data. - - The SHA1 hash of signed data to be verified. - The signature to be verified for rgbData. - true if the signature verifies as valid; otherwise, false. - - DSA signature is a pair of numbers r and s. - The rgbSignature parameter must be 40 bytes long. - Bytes 0..19 must contain the value of r, bytes 20..39 must contain the value of s. - - - - - Computes the signature for the specified hash value by signing - it with the private key. - - The SHA1 hash of data to be signed. - The DSA signature for the specified hash value. - - - - Verifies the specified signature data by comparing it to the signature computed for the specified hash value. - - The hash value of the signed data. - The signature data to be verified. - true if the signature verifies as valid; otherwise, false. - - - - Computes the hash value of the specified byte array using the specified hash algorithm, and signs the resulting hash value. - - The input data for which to compute the hash. - The hash algorithm to use to create the hash value. - The DSA signature for the specified data. - - - - Verifies the specified signature data by comparing it to the signature computed for the specified data. - - The signed data. - The hash algorithm used to create the hash value of the data. - The signature data to be verified. - true if the signature verifies as valid; otherwise, false. - - - - Releases the unmanaged resources and optionally releases the managed resources. - - true to release both managed and unmanaged resources; false to release only unmanaged resources. - - - - Gets the name of the signature algorithm available with this implementation of DSA. - - The name of the signature algorithm. - - - - Gets the name of the key exchange algorithm available with this implementation of DSA. - - The name of the key exchange algorithm. - - - - Encryption schemes. - - - - - Default padding scheme (depends on key algorithm). - - - - - RSAES-PKCS1-v1_5 (RFC 3447). - - - - - RSAES-OAEP (RFC 3447). - - - - - Encryption parameters. - - - - - Initialize new instance of the . - - - - - Encryption scheme. - - - - - Hashing algorithm for padding generation. - - - - - Optional input parameter for . - - - - - If set to true (default), the cryptographic provider should not display any user interface (UI) when working with private keys. - Only used for decryption operations. - - - If silent operation is requested and the cryptographic provider needs to display a UI to operate, the requested method will fail. - - - - - Represents a hash transform. - - - - - Computes the hash value for the specified region of the input byte array. - - The input to compute the hash code for. - The offset into the input byte array from which to begin using data. - The number of bytes in the input byte array to use as data. - - - - Gets the value of the computed hash code. - - The computed hash value. - - - - Resets the transform. - - - - - Represents the size, in bits, of the computed hash code. - - - - - Specifies hash algorithm. - - - - - SHA-1. - - - - - SHA-256. - - - - - SHA-384. - - - - - SHA-512. - - - - - MD4. - - - - - MD5. - - - - - Specifies hash algorithm key mode. - - - - - No keyed hash. - - - - - HMAC. - - - - - Represents a hash algorithm. - - - - - Gets the current key. - - The current key. - - - - Sets the current key to the specified value. - - Key to be set. - - - - Creates an instance of for the specified algorithm. - - Algorithm. - - - - Gets a value indicating whether the specified algorithm is supported. - - Algorithm. - True if supported; false if not supported. - - - - Creates a hash transform object for this algorithm based on the currently set parameters. - - Hash transform object. - - - - Creates a hash transform object for this algorithm based on the currently set parameters. - - Hash transform object. - - - - Computes the hash value for the specified data. - - Input data. - Hash value. - - - - Computes the hash value for the specified data. - - Input data. - Input offset. - Input length. - Hash value. - - - - Computes the hash value for the specified data using the specified algorithm. - - Hash algorithm. - Input data. - Hash value. - - - - Computes the hash value for the specified data using the specified algorithm. - - Hash algorithm. - Input data. - Input offset. - Input length. - Hash value. - - - - Disposes the object. - - - - - Gets algorithm ID. - - - - - Gets the size of the computed hash code (in bits). - - - - - Gets or sets the algorithm's key mode. - - - - - Computes a Hash-based Message Authentication Code (HMAC) - for the input data using the specified hash function. - - - HMAC is defined by RFC 2104 and look like this: - alg(K XOR opad + alg(K XOR ipad + text))
- where alg is the base hash algorithm,
- K is an n byte key,
- ipad is the byte 0x36 repeated 64 times (or 128 times),
- opad is the byte 0x5c repeated 64 times (or 128 times),
- and text is the data being protected.
-
- - - Initializes a new instance of the HMAC class with the specified hash algorithm and key data. - - A type of hash algorithm to use. Must be a subclass of HashAlgorithm. - The secret key for HMAC encryption. - - - - Initializes a new instance of the HMAC class with the specified hash algorithm and key data. - - A type of hash algorithm to use. - The secret key for HMAC encryption. - - - - Initializes a new instance of the HMAC class with the specified hash algorithm and a randomly generated key. - - A type of hash algorithm to use. Must be a subclass of HashAlgorithm. - - - - Initializes a new instance of the HMAC class with the specified hash algorithm and a randomly generated key. - - A type of hash algorithm to use. Must be a subclass of HashAlgorithm. - - - - Initializes an instance of HMAC. - - - - - Routes data written to the object into the hash algorithm for computing the HMAC. - - The input data. - The offset into the byte array from which to begin using data. - The number of bytes in the array to use as data. - - - - Returns the computed Hash-based Message Authentication Code (HMAC) after all data has been written to the object. - - The computed HMAC. - - - - Releases the unmanaged resources used by the HMAC and optionally releases the managed resources. - - true to release both managed and unmanaged resources; false to release only unmanaged resources. - - - - Gets or sets the key to be used in the hash algorithm. - - The key to be used in the hash algorithm. - - - - Key derivation options. - - - - - Key derivation parameters. - - - - - Gets or sets key derivation function ("HASH" or "HMAC"). - - - - - Hashing algorithm. - - - - - HMAC key. - - - - - Data to append to shared secret when hashing. - - - - - Data to prepend to shared secret when hashing. - - - - - Represents the base class from which all implementations of the ArcFour algorithm must derive. - - - - - Initializes a new instance of ArcFour. - - - You cannot create an instance of an abstract class. - Create an instance of class instead. - - - - - Generates a random initialization vector (IV) to be used for the algorithm. - - ArcFour is a stream cipher, it does not use IV. - - - - Generates a random key to be used for the algorithm. - - Use this method to generate a random key when none is specified. - - - - Creates a cryptographic object to perform the ArcFour algorithm. - - A cryptographic object to perform the ArcFour algorithm. - - - - Gets or sets the block size of the cryptographic operation in bits. - - The block size. - ArcFour is a stream cipher, blocks can be of any size. - - - - Gets or sets the initialization vector (IV) for the symmetric algorithm. - - Initialization vector. - ArcFour is a stream cipher, it does not use IV. - - - - Gets or sets the mode for operation of the symmetric algorithm. - - The mode for operation. - ArcFour is a stream cipher, the only mode supported is CipherMode.OFB. - - - - Gets or sets the padding mode used in the symmetric algorithm. - - The padding mode. - ArcFour is a stream cipher, no padding is done. - - - - The managed version of the ArcFour algorithm. - - - - - Initializes a new instance of ArcFourManaged class. - - - - - Creates a symmetric ArcFour decryptor object with the specified Key and initialization vector (IV). - - The secret key to be used for the symmetric algorithm. - The IV. Not used by ArcFour. - A symmetric ArcFour decryptor object. - - - - Creates a symmetric ArcFour encryptor object with the specified Key and initialization vector (IV). - - The secret key to be used for the symmetric algorithm. - The IV. Not used by ArcFour. - A symmetric ArcFour encryptor object. - - - - The managed version of the algorithm defined by RFC 2268. - - - - - Initializes a new instance of class. - - - - - Generates a random initialization vector (IV) to be used for the algorithm. - - Use this method to generate a random initialization vector (IV) when none is specified. - - - - Generates a random key to be used for the algorithm. - - Use this method to generate a random key when none is specified. - - - - Creates a RC2 encryptor object with the specified key. - - The secret key to be used for the symmetric algorithm. - The initialization vector for - . - A RC2 encryptor object. - - - - Creates a RC2 decryptor object with the specified key. - - The secret key to be used for the symmetric algorithm. - The initialization vector for . - A RC2 decryptor object. - - - - Gets or sets the mode for operation of the symmetric algorithm. - - The mode for operation of the symmetric algorithm. - - - - Gets or sets the padding mode used in the symmetric algorithm. - - The padding mode used in the symmetric algorithm. - - - - Represents the base class from which all implementations of Bruce Schneier's Blowfish algorithm must derive. - - - - - Initializes a new instance of Blowfish. - - - You cannot create an instance of an abstract class. - Create an instance of class instead. - - - - - Creates a cryptographic object to perform the Schneier's Blowfish algorithm. - - A cryptographic object to perform the Schneier's Blowfish algorithm. - - - - The managed version of the Blowfish algorithm. - - - - - Initializes a new instance of class. - - - - - Generates a random initialization vector (IV) to be used for the algorithm. - - Use this method to generate a random initialization vector (IV) when none is specified. - - - - Generates a random key to be used for the algorithm. - - Use this method to generate a random key when none is specified. - - - - Creates a Blowfish encryptor object with the specified key. - - The secret key to be used for the symmetric algorithm. - The initialization vector for - . - A Blowfish encryptor object. - - - - Creates a Blowfish decryptor object with the specified key. - - The secret key to be used for the symmetric algorithm. - The initialization vector for - . - A Blowfish decryptor object. - - - - Gets or sets the mode for operation of the symmetric algorithm. - - The mode for operation of the symmetric algorithm. - - - - Gets or sets the padding mode used in the symmetric algorithm. - - The padding mode used in the symmetric algorithm. - - - - Computes the combined MD5/SHA1 hash for the input data. - - - The resulting hash value is 36 bytes long. - Bytes 0..15 contain the MD5 hash and bytes 16..35 contain the SHA1 hash. - - - - - Initializes a new instance of the MD5SHA1 class. - - - - - Creates an instance of the MD5SHA1 hash algorithm. - - A new instance of the MD5SHA1 hash algorithm. - - - - Initializes an instance of MD5SHA1. - - - - - Routes data written to the object into MD5 and SHA1 hash algorithms for computing the hash. - - The array of data bytes. - The offset into the byte array from which to begin using data. - The number of bytes in the array to use as data. - - - - Returns the computed MD5SHA1 hash as an array of bytes after all data has been written to the object. - - The computed hash value. - - - - Releases the unmanaged resources used by the MD5SHA1 and optionally releases the managed resources. - - true to release both managed and unmanaged resources; false to release only unmanaged resources. - - - - Returns the underlying instance of the MD5 object that is used to compute the MD5 part of the combined hash. - - - - - Returns the underlying instance of the SHA1 object that is used to compute the SHA1 part of the combined hash. - - - - - Represents the base class from which all implementations of Bruce Schneier's Twofish algorithm must derive. - - - - - Initializes a new instance of Twofish. - - - You cannot create an instance of an abstract class. - Create an instance of class instead. - - - - - Creates a cryptographic object to perform the Schneier's Twofish algorithm. - - A cryptographic object to perform the Schneier's Twofish algorithm. - - - - The managed version of the Twofish algorithm. - - - - - Initializes a new instance of class. - - - - - Generates a random initialization vector (IV) to be used for the algorithm. - - Use this method to generate a random initialization vector (IV) when none is specified. - - - - Generates a random key to be used for the algorithm. - - Use this method to generate a random key when none is specified. - - - - Creates a Twofish encryptor object with the specified key. - - The secret key to be used for the symmetric algorithm. - The initialization vector for - . - A Twofish encryptor object. - - - - Creates a Twofish decryptor object with the specified key. - - The secret key to be used for the symmetric algorithm. - The initialization vector for - . - A Twofish decryptor object. - - - - Gets or sets the mode for operation of the symmetric algorithm. - - The mode for operation of the symmetric algorithm. - - - - Gets or sets the padding mode used in the symmetric algorithm. - - The padding mode used in the symmetric algorithm. - - - - Managed implementation of MD5 algorithm. - - - - - Initializes a new instance. - - - - - Initializes an instance of MD5. - - - - - Updates the MD5 hash code. - - The array of data bytes. - The zero based offset into the byte array from which to begin using data. - The number of bytes in the array to use as data. - - - - Returns the computed MD5 hash as an array of bytes. - - The computed MD5 hash value. - - - - Managed implementation of MD4 algorithm. - - - - - Initializes a new instance. - - - - - Initializes an instance of MD4. - - - - - Updates the MD4 hash code. - - The array of data bytes. - The zero based offset into the byte array from which to begin using data. - The number of bytes in the array to use as data. - - - - Returns the computed MD4 hash as an array of bytes. - - The computed MD4 hash value. - - - - Represents a cryptographic object identifier. - - - - - Initializes a new instance of the class using the specified object. - - The object identifier information to use to create the new object identifier. - - - - Initializes a new instance of the class using the specified OID dotted number string. - - An object identifier in dotted number format. - - - - Converts a OID to an . - - An object identifier in dotted number format. - An . - - - - Parses an OID from an ASN.1 encoded byte array. - - Byte array. - OID. - - - - Gets an ASN.1 encoded byte array representaion of this OID. - - Byte array. - - - - Gets an ASN.1 encoded byte array representaion of this OID. - - True if DER-formatting is to be used. - Byte array. - - - - Returns a string in dotted number format that represents the current . - - A string representation of the current Oid. - - - - Gets the dotted number representation of the object identifier. - - - - - PKCS #12 key derivation algorithm. - - - - - ID value for key material. - - - - - ID value for IV material. - - - - - ID value for MAC material. - - - - - Initializes a new instance of PKCS #12 key derivation algorithm. - - Hash algorithm. - Password. - Salt value. - Number of iterations. - ID value. - - - Resets the state of the operation. - - - Returns a pseudo-random key from a password, salt and iteration count. - A byte array filled with pseudo-random key bytes. - The number of pseudo-random key bytes to generate. - - - - Managed implementation of RSA algorithm. - -

- The purpose of this class is to make it possible to verify - signatures and encrypt data without the need to use CryptoAPI, which - is not available in some scenarios. -

-

- Even though it is possible to generate RSA keys and sign data using - this class, it is not recommended because the generated keys are not - being checked to ensure they are strong primes. -

-
- - - Initializes a new instance of the RSAManaged class with the key size of 1024. - - - - - Initializes a new instance of the RSAManaged class with the specified key size. - - The size of the key to use in bits. - - - - Exports the . - - true to include private parameters; otherwise, false. - The RSA parameters. - - - - Imports the specified . - - The RSA parameters. - - - - Decrypts data with the RSA algorithm. - - The data to be decrypted. - The decrypted data. - No processing of raw data is performed. - - - - Encrypts data with the RSA algorithm. - - The data to be encrypted. - The encrypted data. - No processing of raw data is performed. - - - - Decrypts data with the RSA algorithm. - - The data to be decrypted. - The decrypted data. - Uses PKCS#1 v1.5 padding. - - - - Encrypts data with the RSA algorithm. - - The data to be encrypted. - The encrypted data. - Uses PKCS#1 v1.5 padding. - - - - Verifies the specified signature data by comparing it to the signature computed for the specified hash value. - - The hash value of the signed data. - The signature data to be verified. - true if the signature verifies as valid; otherwise, false. - - - - Verifies the specified signature data by comparing it to the signature computed for the specified hash value. - - RSA algorithm. - The hash value of the signed data. - A hash algorithm used to create the hash value. - The signature data to be verified. - true if the signature verifies as valid; otherwise, false. - - - - Verifies the specified signature data by comparing it to the signature computed for the specified hash value. - - The hash value of the signed data. - A hash algorithm used to create the hash value. - The signature data to be verified. - true if the signature verifies as valid; otherwise, false. - - - - Computes the signature for the specified hash value by signing - it with the private key. - - The hash of data to be signed. - The RSA signature for the specified hash value. - - - - Computes the signature for the specified hash value by signing - it with the private key. - - RSA algorithm. - The hash of data to be signed. - A hash algorithm used to create the hash value. - The RSA signature for the specified hash value. - - - - Computes the signature for the specified hash value by signing - it with the private key. - - The hash of data to be signed. - A hash algorithm used to create the hash value. - The RSA signature for the specified hash value. - - - - Verifies the specified signature data by comparing it to the signature computed for the specified data. - - The data that was signed. - The hash algorithm used to create the hash value of the data. - The signature data to be verified. - true if the signature verifies as valid; otherwise, false. - - - - Computes the hash value of the specified byte array using the specified hash algorithm, and signs the resulting hash value. - - The input data for which to compute the hash. - The hash algorithm to use to create the hash value. - The RSA signature for the specified data. - - - - Releases the unmanaged resources and optionally releases the managed resources. - - true to release both managed and unmanaged resources; false to release only unmanaged resources. - - - - Gets the name of the signature algorithm available with this implementation of RSA. - - The name of the signature algorithm. - - - - Gets the name of the key exchange algorithm available with this implementation of RSA. - - The name of the key exchange algorithm. - - - - Signature format. - - - - - Raw signature data. - - - - - DER-encoded ASN.1 form of the signature formatted according to Cryptographic Message Syntax (PKCS #7). - - - - - Signature padding scheme. - - - - - Default padding scheme (depends on key algorithm). - - - - - PKCS #1 padding scheme (RSASSA-PKCS1-v1_5 defined by RFC 3447). - - - - - Probabilistic Signature Scheme (PSS) padding scheme (RSASSA-PSS defined by RFC 3447). - - - - - Signature parameters. - - - - - Creates a new instance of . - - - - - Hashing algorithm. - - - - - Signature format. - - - - - Signature padding scheme. - - - - - Salt length in bytes (only used for ). - - - - - If set to true (default), the cryptographic provider should not display any user interface (UI) when working with private keys. - Only used for signing operations. - - - If silent operation is requested and the cryptographic provider needs to display a UI to operate, the requested method will fail. - - - - - Specifies symmetric algorithm. - - - - - AES. - - - - - 3DES. - - - - - Twofish. - - - - - DES. - - - - - RC2. - - - - - An algorithm compatible with RC4. - - - - - Blowfish. - - - - - Represents a symmetric cipher algorithm. - - - - - Gets the current initialization vector. - - Initialization vector. - - - - Gets the current key. - - Key. - - - - Derives a key (of length) using the specified generator. - - Generator algorithm. - - - - Derives an initialization vector (of length) using the specified generator. - - Generator algorithm. - - - - Generates a random key (of length). - - - - - Generates a initialization vector (of length). - - - - - Sets the current key to the specified value and changes the accordingly. - - Key. Cannot be null. - - - - Sets the current initialization vector to the specified value. - - Initialization vector. - - - - Creates an encryptor object for this algorithm based on the currently set parameters. - - Encryptor object. - - - - Creates a decryptor object for this algorithm based on the currently set parameters. - - Decryptor object. - - - - Creates a symmetric algorithm object for this algorithm based on the currently set parameters. - - Symmetric algorithm object. - - - - Disposes the object. - - - - - Creates an instance of for the specified algorithm. - - Algorithm. - - - - Gets a value indicating whether the specified algorithm is supported. - - Algorithm. - True if supported; false if not supported. - - - - Gets algorithm ID. - - - - - Gets or sets the desired block size in bits. - - - - - Gets or sets the desired key size in bits. - - - - - Gets or sets the desired effective key size in bits. - - - - - Gets or sets the desired block cipher padding mode. - - - - - Gets or sets the desired block cipher mode. - - - - - The AlgorithmIdentifier class defines an algorithm used for a cryptographic operation. - - - - - Creates an instance of the class - with the specified algorithm identifier. - - An object identifier for the algorithm. - - - - Creates an instance of the class with - the specified algorithm identifier and parameters. - - An object identifier for the algorithm. - ASN.1 DER encoded parameters. - - - - Gets the object identifier for the algorithm. - - On that represents the algorithm. - - - - Gets the algorithm parameters. - - The algorithm parameters. - - - - A collection of values associated with a . - - - - - Copies the range of elements from the to a compatible one-dimensional - array, starting at the specified index of the target array. - - One-dimensional zero-based array that is the destination of the elements copied from . - A zero-based index in the destination array at which copying begins. - - - - Gets the value at the specified index. - - An array of bytes in ASN.1 format. - - - - A cryptographic attribute that contains a type and a collection of associated values. - - - - - Initializes an instance of a . - - The object identifier that identifies the attribute type. - Parameters in ASN.1 format, in a form of one or more byte arrays. - - - - Initializes an instance of a . - - The object identifier that identifies the attribute type. - Parameters in ASN.1 format. - Not supported in .NET 1.0, use instead. - - - - Gets the object identifier that identifies the attribute type. - - The object identifier. - - - - Gets the collection of values associated with the attribute. - - A . - - - - A collection of objects. - - - - - Gets or sets the at the specified index. - - The zero-based index of the to get or set. - A cryptographic attribute. - - - - Gets the first with the specified object identifier. - - The object identifier, either friendly name or dotted string format. - A cryptographic attribute if found, or null if not found. - - - - Contains string representations of common extended usage OIDs. - - - - Any purpose. - - - TLS Web server authentication. - - - TLS Web client authentication. - - - Code signing. - - - E-mail protection. - - - Timestamping. - - - OCSPstamping. - - - - A utility class that features a certificate issuer functionality. This can be used as a base of simple custom certification authority. - - - - - Issues a certificate signed by the specified certification authority using the specified signature hash algorithm. - - Certification authority certificate to issue and sign the certificate. - Certificate info. - Certificate public key. - A new certificate. - - - - Issues a self-signed certificate, signed using the specified algorithm. Also passes back the private key info. - - Certificate info. - Certificate private key. - A new certificate. - - - - Issues a certificate signed by the specified certification authority using the specified signature hash algorithm. - - Certification authority certificate to issue and sign the certificate. - Signature hash algorithm. - Certificate public key. - Certificate info. - A new certificate. - - - - Issues a self-signed certificate, signed using the specified algorithm. Also passes back the private key info. - - Signature algorithm. - Key size. - Signature hash algorithm. - Certificate info. - This will contain the on return. - A new certificate. - - - - Issues a certificate signed by the specified certification authority using the specified signature hash algorithm. - - Certification authority certificate to issue and sign the certificate. - Signature hash algorithm. - Certificate revocation list info. - A collection of objects. - A new certificate. - - - - Contains information describing the certificate for the .Issue method. - - - - - Creates an instance of class. - - - - - Gets the certificate serial number. - - Serial number. - - - - Sets the certificate serial number. - - Serial number. - - - - Sets the certificate serial number. - - Serial number. - - - - Gets the extended certificate usage. - - Extended certificate usage. - - - - Sets the extended certificate usage. - - Extended certificate usage. - - - - Sets alternative hostnames. - - Alternative hostnames. - - - - Sets alternative hostnames. - - Alternative hostnames. - - - - Gets or sets the certificate subject. - - Certificate subject. - - - - Gets or sets the basic certificate usage. - - Basic certificate usage. - - - - Gets or sets the certificate effective date. - - Certificate effective date. - - - - Gets or sets the certificate expiration date. - - Certificate expiration date. - - - - Gets the certificate extensions collection. - - Certificate extensions collection. - - - - Gets the CRL distribution points collection. - - CRL distribution points collection. - - - - Gets or sets the certificate owner's e-mail address. - - E-mail address. - - - - Gets or sets the hash algorithm to be used to create the signature of the certificate. - - The hash algorithm to be used to create the signature of the certificate. - - - - Contains information describing the certificate for the .IssueRevocationList method. - - - - - Creates an instance of class. - - - - - Gets or sets the datetime of this CRL update. - - Datetime of this CRL update. - - - - Gets or sets the datetime of the next CRL update. - - Datetime of the next CRL update. - - - - A SPKAC certificate request. This is used by Mozilla, Opera and other browsers except Internet Explorer. - For Internet Explorer, use . - - - - - Creates a SPKAC request from an ASN.1 block. - - ASN.1 block. - - - - Validates the SPKAC request's signature. - - Challenge string. - True if valid; false if not valid. - - - - Gets the SPKAC request's public key info. This includes the key itself. - - Public key info. - - - - Gets the SPKAC request's public key info. This includes the key itself. - - Public key info. - - - - PKCS #10 certification request. This is the standard certificate format. - It is used (for example) by Internet Explorer's XEnroll control, but non-IE browsers generally use instead. - - - - - Creates a new PKCS #10 request for the specified subject and public key. - - Request subject. - Request public key. - - - - Parses a PKCS #10 request from an ASN.1 block. - - ASN.1 block. - - - - Validates the PKCS #10 request's signature. - - True if valid; false if not valid. - - - - Validates the PKCS #10 request's signature. - - Subject - in practice, this is used in place of a challenge string. - True if valid; false if not valid. - - - - Signs the certification request using a private key corresponding to the request's public key. - - An instance of . - Hash algorithm to use for the signature. - - - - Signs the certification request using a private key corresponding to the request's public key. - - An instance of representing the private key. - Hash algorithm to use for the signature. - - - - Signs the certification request using a private key corresponding to the request's public key. - - An instance of asymmetric algorithm such as RSACryptoServiceProvider, DSACryptoServiceProvider, RSAManaged or DSAManaged. - Hash algorithm to use for the signature. - - - - Gets list of alternative hostnames. - - List of alternative hostnames. - - - - Gets ASN.1 encoded form of this object. - - Array of bytes. - - - - Gets the PKCS #10 request's public key info. This includes the key itself. - - Public key info. - - - - Gets the PKCS #10 request's public key info. This includes the key itself. - - Public key info. - - - - Gets the PKCS #10 request's subject. - - Request subject. - - - - Gets the PKCS #10 request's attributes. - - Request attributes. - - - - Gets the PKCS #10 request's certificate extension collection (represented by 1.2.840.113549.1.9.14 attribute in collection). - - - - - Specifies the reason for inclusion in the certificate revocation list. - - - - Unspecified. - - - Key was compromised. - - - CA was compromised. - - - Affiliation changed. - - - Certificate was superseded. - - - Operation was ceased. - - - Certificate hold. - - - Remove from CRL. - - - - The certificate revocation list. - - - - - Base class for various PKCS objects. - - - - - Loads a CMS/PKCS #7 signed or enveloped message from a stream. - Returns an instance of for signed message, for enveloped message, or null for - methods and properties. - - A stream from which to load the message. - Gets or sets the to be used to find certificates corresponding to a . - A value indicating whether cryptographic providers are permitted to display a user interface. - An instance of , or null. - - - - Initializes a new instance of the class with serialized data. - - The object that holds the serialized object data. - The contextual information about the source or destination. - - - - Creates a certificate revocation list from an ASN.1 block. - - ASN.1 block. - - - - Loads a certificate revocation list from given stream. - - Stream to load the certificate revocation list from. - - - - Converts a certificate revocation list into a byte array. - - Byte array. - - - - Returns the certificate revocation list hash. - - CRL hash. - - - - Returns the certificate revocation list signature. - - CRL signature. - - - - Returns distribution point URL from issuing distribution point extension, if both present. Otherwise returns null. - - Distribution point URL. - - - - Checks whether the certificate revocation list contains the specified certificate. - Also makes sure that the CRL is suitable for the certificate. - - Certificate to check. - Revocation check result. - - Please note that this method does not check the validity of the CRL itself. - Call on the issuer certificate - to perform this check. - - - - - Gets the DN of the issuer of this certificate revocation list. - - DN of the issuer of this certificate revocation list. - - - - Gets the datetime of this CRL update. - - Datetime of this CRL update. - - - - Gets the datetime of the next CRL update. - - Datetime of the next CRL update. - - - - Gets the CRL number if appropriate extension is present. - - CRL number or null (Nothing in VB.NET) if not specified. - - - - Gets the collection of CRL's extensions. - - Extensions collection. - - - - Gets the collection of revoked certificates. - - Revoked certificate collection. - - - - Returns the key algorithm used to sign this certificate revocation list. - - The key algorithm. - - - - Returns the hash algorithm used to create the signed hash value. - - Hash algorithm. - - - - Collection of information about revoked certificates. A part of . - - - - - Creates a new instance of . - - - - - Information about revoked certificate. - - - - - Creates a new instance of revoked certificate based on the supplied data. - - Serial number. - Revocation date. - Revocation reason. - - - - Creates a new instance of revoked certificate based on the supplied data. - - Serial number. - Revocation date. - Revocation reason. - - - - Gets the certificate's serial number. - - Serial number. - - - - Returns revocation reason of the revoked certificate. - - If the revocation reason extension is present, returns the reason from that extension; otherwise returns . - - - - Gets the revocation date. - - Revocation date. - - - - Gets the collection of revoked certificate info's extensions. - - Extensions collection. - - - - Represents revocation check outcome. - - - - - The issuer of the certificate does not match the issuer of the CRL. - - - - - This CRL is not supposed to be used to check the status of this certificate (try the next CRL). - - - - - The certificate has not been revoked according to this CRL. - - - - - The certificate has been revoked. - - - - - Represents the result of certificate revocation check. - - - - - Gets revocation check outcome. - - - - - Gets the revocation date. - - Revocation date. - - - - Gets revocation reason of the revoked certificate. - - If the revocation reason extension is present, returns the reason from that extension; otherwise returns null (Nothing in VB.NET). - - - - Certificate revocation list status. - - - - - The CRL is valid (make sure to check the issuer certificate for validity as well). - - - - - The CRL has expired or is not valid yet. - - - - - The CRL has not been issued by the specified issuer. - - - - - The CRL contains an unsupported critical extension. - - - - - The CRL update time is outside the issuer certificate's time validity range. - - - - - The CRL issuer is not intended to issue CRLs. - - - - - The CRL signature is not valid. - - - - - Malformed structure of the CRL or its extensions. - - - - - Collection of certificate revocation lists. - - - - - The class represents the CMS/PKCS #7 ContentInfo data structure. - It encapsulates the content of or messages. - - - - - Initializes a new instance of using the specified array of bytes - as content and an object identifier "data" as content type. - - The message content. - - - - Initializes a new instance of using the specified array of bytes - as content and the specified object identifier as content type. - - The message content type. - The message content. - - - - Gets the content of the CMS/PKCS #7 message. - - An array of bytes that represent the content data. - - - - Copies the content of the CMS/PKCS #7 message into the supplied stream. - - Stream into which the content will be written. - - - - Gets the object identifier of the CMS/PKCS #7 message content type. - - - - - Gets the content of the CMS/PKCS #7 message. - - An array of bytes that represent the content data. - - Please note that the array is a copy of the content. - If you modify it, the actual content will not change. - - - - - Represents a CMS/PKCS #7 encrypted data. - - - - - Tries acquiring a private key unless it is already available. - - True if the key has been acquired, false otherwise. - - - - Gets the symmetric key used to encrypt the message, - or null if it cannot be retrieved. - - The symmetric key used to encrypt the message, or null. - - - - Gets the symmetric algorithm used to encrypt or decrypt the content, - or null if it cannot be retrieved. - - The . - - - - Encrypts the contents of the CMS/PKCS #7 message. - - - - - Decrypts the contents of the CMS/PKCS #7 message. - - For a successful decryption, a symmetric key must be available. - - - - Decodes an encoded CMS/PKCS #7 encrypted message from raw data. - Upon successful decoding, information can be retrieved using - methods and properties. - - Arrays of bytes representing a CMS/PKCS #7 message. - - - - Encodes the object into CMS/PKCS #7 message data. - - Array of bytes representing a CMS/PKCS #7 message. - - - - Determines whether the specified content info ASN.1 sequence is an enveloped data sequence. - - Sequence data. - Offset. - Count. - True if yes; false if not. - - - - Loads a CMS/PKCS #7 encrypted message from a stream. - Upon successful decoding, information can be retrieved using - methods and properties. - - A stream from which to load the message. - - - - Saves into a stream. - - A stream to which to save the message. - - - - Creates a copy of this object. - - A new object. - - - - Creates an instance of class. - It must be initialized using or methods before - any other methods and properties can be accessed. - - - - - Creates an instance of class using the specified content - information as the inner content. - - The inner content of the encrypted message. - - - - Creates an instance of class using the specified content - information and encryption algorithm. - - The inner content of the encrypted message. - Encryption algorithm identifier (see remarks). Can be null for 3DES. - - Currently, 3DES ("1.2.840.113549.3.7"), - AES ("2.16.840.1.101.3.4.1.2" for 128-bit, "2.16.840.1.101.3.4.1.22" for 192-bit and "2.16.840.1.101.3.4.1.42" for 256-bit), - DES ("1.3.14.3.2.7") and RC2 ("1.2.840.113549.3.2") algorithms are supported. - - - - - Creates an instance of class using the specified content - information and encryption algorithm. - - The inner content of the encrypted message. - Encryption algorithm identifier (see remarks). Can be null for 3DES. - The effective key length in bits (only used by RC2 algorithm). - - Currently, 3DES ("1.2.840.113549.3.7"), - AES ("2.16.840.1.101.3.4.1.2" for 128-bit, "2.16.840.1.101.3.4.1.22" for 192-bit and "2.16.840.1.101.3.4.1.42" for 256-bit), - DES ("1.3.14.3.2.7") and RC2 ("1.2.840.113549.3.2") algorithms are supported. - - - - - Gets or sets the to be used to find certificates - corresponding to a . - - The certificate finder. - - - - Gets or sets a value indicating whether cryptographic providers - are allowed to display any user interface (UI) when working with private keys. - - A value indicating whether a cryptographic provider can display a UI. - - - - Gets a value indicating whether the content is encrypted. - - A value indicating whether the content is encrypted. - - - - Gets the collection of unprotected (unencrypted) attributes associated with this CMS/PKCS #7 message. - - Unprotected attribute collection. - - - - Gets the collection of certificates that are embedded in the message. - - Collection of certificates - - - - Gets the collection of certificate revocation lists (CRLs) that are embedded in the message. - - Collection of CRLs - - - - Gets the collection of recipients associated with this CMS/PKCS #7 message. - - A collection of recipients. - - - - Gets the inner content information for this CMS/PKCS #7 message. - It contains the content type identifier and content data. - - The inner content. - - This method returns the encrypted content for parsed messages - and unencrypted content for newly created messages. To encrypt or decrypt - the content, use and methods. - - - - - Gets the identifier of the algorithm used to encrypt the content. - - An object. - - - - Returns a value indicating whether the private key to decrypt the symmetric key - and encrypted content is available. - - True if the private key is available, false if it isn't. - - - - Defines the interface that certificate finder classes must implement. - - - - - Finds a certificate corresponding to the specified subject identifier. - - Identifier of the subject certificate. - A certificate store containing the certificates that were included with the message. - Certificate chain if found, or null (Nothing in Visual Basic). - - - - Provides a set of common certificate finders. - - - - - Certificate finder. - - CertificateChain array. - A new instance of ICertificateFinder. - - - - Default certificate finder. - - - Searches for certificates in the current user's "My", - "Trusted people" and "Other people" stores. - - - - - Specifies private key file format. - - - - Base64-encoded PKCS #8 format. - - - PuTTY PPKv2 format. - - - OpenSSH/OpenSSL SSLeay format. - - - Raw PKCS #8 format. - - - New OpenSSH format with bcrypt key expansion (Base64-encoded keys with "BEGIN OPENSSH PRIVATE KEY" header). - - - - Represents a private key. - - - - - Creates a new instance of . Use the method to load a private key. - - - - - Creates a new instance of based on the specified RSA parameters. - - RSA parameters including private keys. - - - - Creates a new instance of based on the specified DSA parameters. - - DSA parameters including private keys. - - - - Generates a private key using the specified algorithm and default key size. - - Key algorithm. - An instance of . - - - - Generates a private key using the specified algorithm and key size. - - Key algorithm. - Key size. Specify 0 to use default key size. - An instance of . - - - - Gets the raw form of the private key. - - Array of bytes. - - - - Gets the raw form of the private key. - - Array of bytes. - - - - Gets a public key corresponding to the private key. - - An instance of . - - - - Gets the DSA parameters for a DSA key. May only be used for DSA private keys. - - DSA paramaters. - - - - Gets the RSA parameters for a RSA key. May only be used for RSA private keys. - - RSA paramaters. - - - - Gets ASN.1 encoded form of this object. - - Array of bytes. - - - - Saves the private key into the supplied stream in the specified format. - - A stream to which to save the private key. - Password to encrypted the private key, or null if no encryption desired. - Private key file format. - - - - Saves the private key into the supplied stream in the specified format. - - A file to which to save the public key. - Password to encrypted the private key, or null if no encryption desired. - Private key file format. - - - - Saves the private key into the supplied stream in Base64-encoded PKCS #8 format. - - A stream to which to save the private key. - Password to encrypted the private key, or null if no encryption desired. - Encryption algorithm identifier. Ignored if password is null. - - Currently, 3DES ("1.2.840.113549.3.7"), DES ("1.3.14.3.2.7") and RC2 ("1.2.840.113549.3.2") algorithms are supported. - - - - - Loads a PKCS #8, PuTTY or SSLeay (OpenSSL/OpenSSH) format private key from a stream. - Upon successful decoding, information can be retrieved using - methods and properties. - - A stream from which to load the private key. - Password used to encrypted the private key, or null if no password needed. - - - - Loads a PKCS #8, PuTTY or SSLeay (OpenSSL/OpenSSH) format private key from a stream. - Upon successful decoding, information can be retrieved using - methods and properties. - - A file from which to load the private key. - Password used to encrypted the private key, or null if no password needed. - - - - Gets the key algorithm identifier. - - Key algorithm identifier. - - - - Gets or ets the key comment. The comment is used while saving in some formats. - - Key comment. - - - - Represents a public key. - - - - - Creates a new instance of . Use the method to load a public key. - - - - - Creates a new instance of based on the specified RSA parameters. - - RSA parameters. - - - - Creates a new instance of based on the specified DSA parameters. - - DSA parameters. - - - - Gets the raw form of the public key. - - Array of bytes. - - - - Gets the raw form of the public key. - - Array of bytes. - - - - Gets ASN.1 encoded form of this object. - - Array of bytes. - - - - Gets the DSA parameters for a DSA public key. May only be used for DSA public keys. - - DSA paramaters. - - - - Gets the RSA parameters for a RSA public key. May only be used for RSA public keys. - - RSA paramaters. - - - - Returns the size of the key in bits. - - Size of the key in bits. - - - - Returns the key algorithm. - - Key algorithm. - - - - Saves the public key into the supplied stream in Base64-encoded PKCS #8 format. - - A stream to which to save the public key. - - - - Saves the public key into the supplied stream in Base64-encoded PKCS #8 format. - - A file to which to save the public key. - - - - Loads a PKCS #8 public key from a stream. - Upon successful decoding, information can be retrieved using - methods and properties. - - A stream from which to load the public key. - - - - Loads a PKCS #8 public key from a file. - Upon successful decoding, information can be retrieved using - methods and properties. - - A file from which to load the public key. - - - - Initializes a new instance of the class with serialized data. - - The object that holds the serialized object data. - The contextual information about the source or destination. - - - - Gets the key algorithm identifier. - - Key algorithm identifier. - - - - Represents a CMS/PKCS #7 encrypted message recipient. - This class is inherited by and classes. - - - - - Gets signature parameters (if available). - - Signature parameters. - - - - Gets the identifier of the recipient. - - Identifier of the recipient. - - - - Gets the identifier of the algorithm used to encrypt the symmetric key. - - An object. - - - - Gets the encrypted key for the recipient. - - Encrypted key. - - - - Gets the certificate associated with the recipient, or null if not available. - - The recipient's certificate, or null. - - - - Gets the certificate chain associated with the recipient, or null if not available. - - The recipient's certificate chain, or null. - - - - Defines key transport recipient information, typically using the RSA algorithm to - encrypt the shared symmetric key to transport. - - - - - Creates a new instance of that defines the - key transport recipient information for the owner of the specified RSA certificate. - Use to specify RSAES-OAEP parameters. - - The recipient's certificate. - - - - Creates a new instance of that defines the - key transport recipient information for the owner of the specified RSA certificate. - Use to specify RSAES-OAEP parameters. - - The recipient's certificate. - Subject identifier type - only IssuerAndSerialNumber and SubjectKeyIdentifier values are accepted. - - - - Creates a new instance of that defines the - key transport recipient information for the owner of the specified RSA certificate. - - The recipient's certificate. - Encryption parameters (to specify RSAES-OAEP parameters). Can be null (for PKCS #1). - - - - Creates a new instance of that defines the - key transport recipient information for the owner of the specified RSA certificate. - - The recipient's certificate. - Subject identifier type - only IssuerAndSerialNumber and SubjectKeyIdentifier values are accepted. - Encryption parameters (to specify RSAES-OAEP parameters). Can be null (for PKCS #1). - - - - Gets signature parameters (if available). - - Signature parameters. - - - - Gets the identifier of the recipient. - - Identifier of the recipient. - - - - Gets the identifier of the algorithm used to encrypt the symmetric key. - - An object. - - - - Gets the encrypted key for the recipient. - - Encrypted key. - - - - Gets the certificate associated with the recipient, or null if not available. - - The recipient's certificate, or null. - - - - Gets the certificate chain associated with the recipient, or null if not available. - - The recipient's certificate chain, or null. - - - - Defines key agreement algorithm recipient information. The key itself is not transported - the two - parties that will be using a symmetric key both take part in its generation. Please note that - this method is not yet fully supported by Rebex Security library. - - - - - Gets the identifier of the key originator. - - Identifier of the key originator. - - - - Gets the identifier of the recipient. - - Identifier of the recipient. - - - - Gets the identifier of the algorithm used to encrypt the symmetric key. - - An object. - - - - Gets the encrypted key for the recipient. - - Encrypted key. - - - - Gets the certificate associated with the recipient, or null if not available. - - The recipient's certificate, or null. - - - - Gets the certificate chain associated with the recipient, or null if not available. - - The recipient's certificate chain, or null. - - - - A collection of objects. - - - - - Creates an empty and read-only instance of . - - - - - Represents a CMS/PKCS #7 signed data. - - - - - Creates a signatures for all signers that do not have one yet. - - - - - Creates a signatures for all signers that do not have one yet. - - Signature options. - - - - Validates all digital signatures on this CMS/PKCS #7 signed message - and validates all the signers' certificates. - - Validation result. - - - - Validates all digital signatures on this CMS/PKCS #7 signed message. - Optionally, signers' certificates are validated, and the specified validation - options are taken into account. - - Specifies whether to only verify the signatures, skipping the certificate validation. - Signature and certificate validation options. - Validation result. - - - - Validates all digital signatures on this CMS/PKCS #7 signed message. - Optionally, signers' certificates are validated, and the specified validation - options are taken into account. - - Specifies whether to only verify the signatures, skipping the certificate validation. - Signature and certificate validation options. - Certificate chain engine. - Validation result. - - - - Decodes an encoded CMS/PKCS #7 signed message from raw data. - Upon successful decoding, information can be retrieved using - methods and properties. - - Array of bytes representing a CMS/PKCS #7 message. - - - - Encodes the object into CMS/PKCS #7 message data. - - Array of bytes representing a CMS/PKCS #7 message. - - - - Determines whether the specified content info ASN.1 sequence is a signed data sequence. - - Sequence data. - Offset. - Count. - True if yes; false if not. - - - - Loads a CMS/PKCS #7 signed message from a stream. - Upon successful decoding, information can be retrieved using - methods and properties. - - A stream from which to load the message. - - - - Saves into a stream. - - A stream to which to save the message. - - - - Creates a copy of this object. - - A new object. - - - - Creates an instance of class. - - - - - Creates an instance of class using the specified content - information as the inner content. - - The inner content of the signed message. - - - - Creates an instance of class using the specified content - information as the inner content. - - The inner content of the signed message. - - Specifies whether the signature is detached. - If detached, the actual content is not included within the signed message. - - - - - Specifies what parts of the certificate chain should be included in the signed data. - - Certificate include option. - - - - Gets or sets the to be used to find certificates - corresponding to a . - - The certificate finder. - - - - Gets or sets a value indicating whether cryptographic providers - are allowed to display any user interface (UI) when working with private keys. - - A value indicating whether cryptographic providers can display a UI. - - In case of signing, the actual behavior is determined by the combination of this value and the value of - passed to associated objects. - Cryptographic providers are only permitted to display a UI if both Silent properties are set to true. - - - - - Gets the collection of certificates that are embedded in the message. - - Collection of certificates - - - - Gets the collection of certificate revocation lists (CRLs) that are embedded in the message. - - Collection of CRLs - - - - Gets the collection of signers associated with this CMS/PKCS #7 message. - - A collection of signers. - - - - Gets or sets the inner content information for this CMS/PKCS #7 message. - It contains the content type identifier and content data. - - The inner content. - - - - Gets or sets a value indicating whether the actual content is detached from the message. - - True if the content is detached; False if the content is embedded within the message. - - - - Specifies what parts of the certificate chain should be included in the message. - - - - Leave the existing certificate in the collection. - - - The certificate chain is not included. - - - The certificate chain is included, except for the root certificate. - - - Only the end certificate is included. - - - The certificate chain, including the root certificate, is included. - - - - Represents a CMS/PKCS #7 message signer. - - - - - Gets a value that identifies the digest algorithm. - - Digest algorithm. - - - - Gets signature parameters (if available). - - Signature parameters. - - - - Validates the signer's digital signature and validates the certificate. - - Validation result. - - - - Validates the signer's digital signatures. - Optionally, signers' certificates are validated, and the specified validation - options are taken into account. - - Specifies whether to only verify the signatures, skipping the certificate validation. - Signature and certificate validation options. - Validation result. - - - - Validates the signer's digital signatures. - Optionally, signers' certificates are validated, and the specified validation - options are taken into account. - - Specifies whether to only verify the signatures, skipping the certificate validation. - Signature and certificate validation options. - Certificate chain engine. - Validation result. - - - - Creates a signatures for the signer. - - - - - Creates a signature for the signer. - - Signature options. - - - - Creates a new instance of that defines - a signer corresponding to the specified certificate. An associated private - key for the certificate must be available. - Use to specify RSASSA-PSS parameters. - - The signer's certificate. - - - - Creates a new instance of that defines - a signer corresponding to the specified certificate. An associated private - key for the certificate must be available. - Use to specify RSASSA-PSS parameters. - - The signer's certificate. - Subject identifier type - only IssuerAndSerialNumber and SubjectKeyIdentifier values are accepted. - - - - Creates a new instance of that defines - a signer corresponding to the specified certificate. An associated private - key for the certificate must be available. - Use to specify RSASSA-PSS parameters. - - The signer's certificate. - Subject identifier type - only IssuerAndSerialNumber and SubjectKeyIdentifier values are accepted. - Digest algorithm. - - - - Creates a new instance of that defines - a signer corresponding to the specified certificate. An associated private - key for the certificate must be available. - - The signer's certificate. - Signature parameters (to specify RSASSA-PSS parameters). Can be null (for PKCS #1). - - - - Creates a new instance of that defines - a signer corresponding to the specified certificate using the - specified subject identifier type. An associated private - key for the certificate must be available. - - The signer's certificate. - Signature parameters (to specify RSASSA-PSS parameters). Can be null (for PKCS #1). - Subject identifier type - only IssuerAndSerialNumber and SubjectKeyIdentifier values are accepted. - - - - Gets the identifier of the signer. - - Identifier of the signer. - - - - Gets the identifier of the digest algorithm. - - An object. - - - - Gets the identifier of the signature algorithm. - - An object. - - - - Gets the signature, or null if it is not available yet. - - The signature. - - - - Gets the collection of signed attributes associated with this CMS/PKCS #7 message. - - Signed attribute collection. - - - - Gets the collection of unsigned attributes associated with this CMS/PKCS #7 message. - - Unsigned attribute collection. - - - - Gets the certificate associated with the signer, or null if not available. - - The signer's certificate, or null. - - - - Gets the certificate chain associated with the signer, or null if not available. - - The signer's certificate chain, or null. - - - - Gets the signing time, or 1970-01-01 if not available. - - Singing time. - - - - Gets the preferred subject identifier for key encryption. - - The preferred subject identifier. - - - - Gets the collection of S/MIME capabilities the signer supports. - - Collection of supported S/MIME capabilities. - - - - A collection of objects. - - - - - Creates an empty and read-only instance of . - - - - - Options for and methods. - - - - Don't include any signed attributes in the signature. Not recommended. - - - Don't include key Microsoft extensions in the signature attributes. - - - Don't include S/MIME capabilities extensions in the signature attributes. - - - Skip certificate usage check. - - - - Signature validation status. - - - - Certificate is not valid. - - - Certificate is not available. - - - A digest algorithm is not supported. - - - A signature algorithm is not supported. - - - A signature is invalid. - - - Invalid key usage. The certificate usage doesn't include message signing. - - - Content type mismatch. - - - - Represents the result of signature validation. - - - - - Gets the status mask. - - Status mask. - - - - Gets the certificate validation status mask. - - Certificate validation status mask. - - - - Gets the certificate chain validity status. - - True if valid, false if not valid. - - - - Represents an S/MIME capability. - - - - - Initializes an instance of a with no parameters. - - The object identifier that identifies the S//MIME capability. - - - - Initializes an instance of a . - - The object identifier that identifies the S//MIME capability. - Capability parameters in ASN.1 format. - - - - Gets the object identifier that identifies the S/MIME capability. - - The object identifier. - - - - Gets the S/MIME capability parameters. - - An array of bytes in ASN.1 format. - - - - A collection of objects. - - - - - Gets or sets the at the specified index. - - The zero-based index of the to get or set. - An S/MIME capability. - - - - Gets the first with the specified object identifier. - - The object identifier, either friendly name or dotted string format. - An S/MIME capability if found, or null if not found. - - - - Defines the type of subject identifier that identifies a subject and a certificate. - - - - - The type of subject identifier is unknown. - - - - - The subject is identified by the certificate issuer and serial number. - - - - - The subject is identified by the hash of the subject's public key. The hash algorithm used is determined by the signature algorithm suite in the subject's certificate. - - - - - The subject is identified by the subject's public key. - - - - - The class identifies a subject, either by certificate issuer - and serial number, by the subject key identifier or by a public key. - - - - - Gets the type of the subject identifier. - - The type of the subject identifier. - - - - Gets the of the certificate issuer if - this subject identifier is identified by the issuer name and serial number. - Otherwise, this property will return null. - - Certificate issuer. - - - - Gets the serial number of the certificate if - this subject identifier is identified by the issuer name and serial number. - Otherwise, this property will return null. - - Certificate serial number. - - - - Gets the subject key identifier of the certificate if - this subject identifier is identified by the subject key identifier. - Otherwise, this property will return null. - - Certificate subject key identifier. - - - - Gets the public algorithm of the certificate if - this subject identifier is identified by the public key. - Otherwise, this property will return null. - - Certificate public key algorithm. - - - - Gets the public of the certificate if - this subject identifier is identified by the public key. - Otherwise, this property will return null. - - Certificate public key. - - - - Represents a public key. - - - - - Creates a new instance of . Use the method to load a public key. - - - - - Creates a new instance of based on the specified RSA parameters. - - RSA parameters. - - - - Creates a new instance of based on the specified DSA parameters. - - DSA parameters. - - - - Represents sorting order. - - - - - Ascending sort order. - - - - - Descending sort order. - - - - - Log writer acting as a container that writes log messages to all inner writers. - - - - - Creates a new instance of a tee log writer over given set of individual . - - A non-empty collection of log writers. - - - - Creates a new instance of a tee log writer over given set of individual . - - A non-empty array of log writers. - - - - Write a message into all inner writers. - - Message level. - Logging object type. - Logging object ID. - Logging area. - Message. - - - - Write a message and data block into all inner writers. - - Message level. - Logging object type. - Logging object ID. - Logging area. - Message. - Data block. - Data offset. - Date length. - - - - Implements the interface method IDisposable.Dispose - Use this method to explicitly release all resources hold by the inner writers. - - - - - A cumulative log level.
- When getting, it returns the minimum level of inner writers' levels.
- When setting, the value is propagated to all inner writers. -
- Log level. -
- - - Specifies granularity for time comparisons. - - - - - Time is taken as is. - - - Useful when working with NTFS file system. - - - - - The smallest time unit is one second (milliseconds are ignored). - E.g. 11:33:55.999 is rounded to 11:33:55.000. - - - Useful when working with some UNIX FTP or SFTP servers. - - - - - The smallest time unit is two-second. So odd seconds are rounded to lower even value (milliseconds are ignored). - E.g. 11:33:55.999 is rounded to 11:33:54.000. - - - Useful when working with FAT file system (.NET CF, MS-DOS). - - - - - The smallest time unit is one day (time component is ignored). - E.g. 2012-12-12 11:33:55.999 is rounded to 2012-12-12 00:00:00.000. - - - Useful when working with some UNIX FTP or SFTP servers. - - - - - Trace-based log writer that writes log messages to all trace listeners. - - - For general information about NET trace, see for instance - Microsoft's trace listeners. - - - - - Creates a new instance of trace log writer based on the default "Info" log level. - - - - - Creates a new instance of trace log writer based on the specified log level. - - Log level. - - - - Clean up any resources being used. - - true if managed resources should be disposed; otherwise, false. - - - - Appends the specified message text to the trace listeners log. This method is only called by method - and is only used by text-based loggers. - - Full message info. - - - - Get a value indicating whether the log writer is closed. - - True when log writer is closed. False if log writer is opened and ready for writing. - - - Creates an instance of class. - - - Creates an instance of class. - - - Creates an instance of class. - - - Creates an instance of class. - - - Creates an instance of class. - -
-
\ No newline at end of file diff --git a/packages/Rebex.Common.2.5.6930/lib/net40/Rebex.Common.dll b/packages/Rebex.Common.2.5.6930/lib/net40/Rebex.Common.dll deleted file mode 100644 index fa7c2576..00000000 Binary files a/packages/Rebex.Common.2.5.6930/lib/net40/Rebex.Common.dll and /dev/null differ diff --git a/packages/Rebex.Common.2.5.6930/lib/net40/Rebex.Common.xml b/packages/Rebex.Common.2.5.6930/lib/net40/Rebex.Common.xml deleted file mode 100644 index a0cbcaa0..00000000 --- a/packages/Rebex.Common.2.5.6930/lib/net40/Rebex.Common.xml +++ /dev/null @@ -1,9077 +0,0 @@ - - - Rebex.Common - - - - - Console-based log writer that writes log messages to the console. - - - - - Common base class for log writers. A derived class must override either the method or both Write methods. - - - - - Defines methods and properties all log writers must implement. - - - - - Write a message into the log. - - Message level. - Logging object type. - Logging object ID. - Logging area. - Message. - - - - Write a message and data block into the log. - - Message level. - Logging object type. - Logging object ID. - Logging area. - Message. - Data block. - Data offset. - Date length. - - - - Get or set the log level - only log messages with log level equal to or greater than the specified one. - - Log level. - - - - Creates a new instance of . - - - - - Closes the log writer. - - - - - Releases unmanaged and managed resources (depending on the scenario). - If is false, the method has been called from - the finalizer and should not reference other objects (therefore only unmanaged resources can be disposed). - - True indicates that the method has been called via IDisposable.Dispose. - False indicates that it has been called by the finalizer. - - - - Writes a message into the log. - - Message level. - Logging object type. - Logging object ID. - Logging area. - Message. - - - - Writes a message and data block into the log. - - Message level. - Logging object type. - Logging object ID. - Logging area. - Message. - Data block. - Data offset. - Date length. - - - - Appends the specified message text into a text-based log. This method is only called by method - and is only used by text-based loggers. - - Full message info. - - - - Disposes the object. - - - - - Gets or sets the log level - only log messages with log level equal to or greater than the specified one. - - Log level. - - - - Get a value indicating whether the log writer is closed. - - True when log writer is closed. False if log writer is opened and ready for writing. - Implementation in this base class returns false, as the close method actually does not close any resource. - - - - Creates a new instance of console log writer with a log level of Info. - - - - - Creates a new instance of console log writer with the specified log level. - - Log level. - - - - Writes a message into the log. - - Message level. - Logging object type. - Logging object ID. - Logging area. - Message. - - - - Writes a message and data block into the log. - - Message level. - Logging object type. - Logging object ID. - Logging area. - Message. - Data block. - Data offset. - Date length. - - - - Appends the specified message text into a text-based log. - - Full message info. - - - - Gets or sets a value that indicates whether to use console colors. - - - - - Various methods related to encoding (charset) used by Rebex components. - - - - - Gets a list of supported encoding names. - - List of encoding names. - - - - Returns the encoding associated with the specified code page name. - - Code page name. - Encoding. - - - - Returns the encoding associated with the specified code page. - - Code page. - Encoding. - - - - ASCII encoding. - - - - - Default encoding. - - - - - UTF-8 encoding. - - - - - File-based log writer that saves log messages into a text file. - - - - - Creates a new instance of file log writer based on the specified file and the default "Info" log level. - - Path to log file. - - - - Creates a new instance of file log writer based on the specified file and log level. - - Path to log file. - Log level. - - - - Dispose(bool disposing) executes in two distinct scenarios. - If disposing equals true, the method has been called directly - or indirectly by a user's code. Managed and unmanaged resources - can be disposed. - If disposing equals false, the method has been called by the - runtime from inside the finalizer and you should not reference - other objects. Only unmanaged resources can be disposed. - - If true, is called by IDisposable.Dispose. - Otherwise it is called by finalizer. - - - - Appends the specified message text into a text-based log. - - Full message info. - - - - Finalizer. Called by garbage collector during object destruction. - - - - - Path to the log file. - - - - - Path to the log file. - - - - - Get a value indicating whether the log writer is closed. - - True when logfile is closed. False if logfile is opened and ready for writing. - - - - Log level - specifies the levels of severity. - - - - - Be verbose - log everything. - - - - - Log all messages useful for debugging purposes. - - - - - Only log informative messages. - - - - - Only log errors. - - - - - The Off level designates a higher level than all the rest. - - - - - Define properties and methods for logging providers. - - - - - Gets a to use for logging. - - - - - Represents mode for interval boundaries. - - - - - Include interval boundary. - - - - - Exclude interval boundary. - - - - - Represents a file or directory item. - - - - - Gets the last modification time of the item. - - - - - Gets the last access time of the item. - - - - - Gets the creation time of the item. - - - - - Gets file length. - - - - - Gets the last modification time of the item. - - - - - Gets the last access time of the item. - - - - - Gets the creation time of the item. - - - - - Gets a value indicating whether the item is a file. - - True if the item is a file; false otherwise. - - - - Gets a value indicating whether the item is a directory. - - True if the archive item is directory; false otherwise. - - - - Gets a value indicating whether the item is a link. - - True if the archive item is a link; false otherwise. - - - - Gets the name of the file or directory. - - The name of the file or directory. - - - - Gets the path of the file or directory. - It can be relative or absolute path depending on the way of use. - - It contains a full path if returned by the GetItems method or a file/directory name only if returned by the GetList method. - The path of the file or directory. - - - - Currently executed operation. - - - - Uploading files. - - - Downloading files. - - - Deleting files. - - - Getting item list. - - - - Current traversal state of the . - - - - - Retrieving of the file system hierarchy was started. - - - - - Retrieving of the file system hierarchy was successfully completed. - - - - - Retrieving of the particular directory hierarchy was started. - - - - - Retrieving of the particular directory hierarchy was successfully completed. - - - - - Current transfer state of the . - - - - - Directory processing was started. - - - - - Processing of a file was started. - - - - - File was successfully transferred. - - - - - A file data block was processed. - - - - - The transfer action was successfully completed. - Triggered only with multi-file operations. (For single-file operations, only is triggered.) - - - - - Current delete state of the . - - - - - File processing was started. - - - - - File was successfully deleted. - - - - - Directory processing was started. - - - - - Directory was successfully deleted. - - - - - The delete action was successfully completed. - - - - - Detailed specification of a problem that occurred during a multi-file operation. - - - - - A target file with the same name already exists. - - - - - A symbolic link was detected. - - - - - Symbolic link is probably a part of an infinite loop in the file system hierarchy. - - - - - Cannot create target directory. - - - - - Cannot transfer file. - - - - - Cannot read from a directory. - - - - - Cannot find the file which was found while retrieving file system hierarchy earlier. - - - - - Name of the file is invalid on the target file system. - For example, backslash is a valid filename character on Unix FTP servers, but invalid in local Windows file system. - - - - - Name of the directory is invalid on the target file system. - For example, backslash is a valid directory name character on Unix FTP servers, but invalid in local Windows file system. - - - - - Cannot find the directory which was found while retrieving file system hierarchy earlier. - - - - - Cannot find the link which was found while retrieving file system hierarchy earlier. - - - - - Link is corrupted or its target cannot be found. - - - - - Currently processed item is neither a file nor a directory. - - - - - Operation was canceled. - - - - - Feature required to complete the operation is not supported. - - - - - Cannot delete the file. - - - - - Cannot delete the directory. - - - - - Cannot calculate checksum. - - - - - Specifies the reaction to resolve the current problem that occurred during a multi-file operation. - - - - - Cancel the whole operation. An exception with the value is thrown. - - - - - Cancel the whole operation. An exception is thrown. - - - - - Skip the current problematic item. - - - - - Retry the current operation again. - - - - - Overwrite target file with the same name. - - - - - Transfer the source file to a different name. - - - - - Resume target file. - - - - - Resolve the symbolic link. - - - - - Specifies the condition for overwriting a file. - - - - - No condition = always overwrite. - - - - - Overwrite if size differs. - - - - - Overwrite if the target file is older than the source file. - If working with remote servers, this condition is strongly discouraged - because modification dates are often misreported by FTP servers, - making this mode highly unreliable. - - - - - Overwrite if checksum differs. - Available for ZIP and FTP; only some FTP servers support checksums.
- You can check availability of this condition using method. -
-
- - - Provides data for the ProblemDetected event. - - - - - Initializes a new instance of the class (for internal use only). - - Event data. - - - - Determines whether the specified reaction is currently possible - use this to determine which reactions can be applied. - - Desired reaction. - True if the specified reaction is possible; false otherwise. - - - - Determines whether the specified overwrite condition is currently possible - use this to determine which overwrite conditions can be applied. - - Desired condition. - True if the specified condition is possible; false otherwise. - - - - Indicate to the sender that the problematic item should be skipped. - - - - - Indicate to the sender that the operation should be canceled. - - - - - Indicate to the sender that an exception should be raised. - - - - - Indicate to the sender that the operation on the current item should be retired. - - - - - Indicate to the sender that the current item should be resumed. - - - - - Indicate to the sender that the current link should be resolved. - - - - - Indicate to the sender that the current item should be renamed. - New name is generated from the current item according the pattern "filename[number].extension". - - - - - Indicate to the sender that the current item should be renamed. - - New name of the item or null (Nothing in Visual Basic) to use generated name according the pattern "filename[number].extension". - - - - Indicate to the sender that the current item should be overwritten. - - - - - Indicate to the sender that the current item should be overwritten if the specified condition is met. - - Condition for the overwrite. - - - - Gets the current transfer action. - - Current transfer action. - - - - Gets the exception which will be raised if chosen Reaction is . - - Exception. - - - - Gets the type of the error that classifies the problem. - - Problem type. - - - - Gets the path of the local file or directory that is currently processed. - - Local path. - - - - Gets the local file or directory that is currently processed or null (Nothing in Visual Basic) if not available. - - Local item. - - - - Gets the path of the remote file or directory that is currently processed. - - Remote path. - - - - Gets the remote file or directory that is currently processed or null (Nothing in Visual Basic) if not available. - - Remote item. - - - - Gets the currently selected reaction to the current problem. - - The operation to be performed as the next step of the multi-file operation execution. - - - - Gets the condition to apply for the Overwrite reaction. - If the chosen reaction is not Overwrite, this property is ignored. - - Overwrite condition. - - - - Gets the new name for the currently processed file or directory. - If the chosen reaction is not Rename, this property is ignored. - - New name. - - - - Gets a user state object. - - User state object. - - - - Provides data for the Traversing event. - - - - - Initializes a new instance of the class (for internal use only). - - Event data. - - - - Gets the current transfer action. - - Current transfer action. - - - - Gets the current traversing state of the current . - - Current traversing state of the current . - - - - Gets the file or directory which is currently processed. - - Currently processed item. - - - - Gets the current total number of files to be processed (traversed so far). - - Current total number of files to be processed (traversed so far). - - - - Gets the current total number of bytes to be processed (traversed so far). - - Current total number of bytes (traversed so far). - - - - Gets a user state object. - - User state object. - - - - Provides data for the TransferProgressChanged event. - - - - - Initializes a new instance of the class (for internal use only). - - Event data. - - - - Gets the current transfer action. - - Current transfer action. - - - - Gets the current transfer state of the current . - - Current transfer state of the current . - - - - Gets the file or directory which is currently processed. - - Currently processed item. - - - - Gets the target path of the file or directory which is currently processed. - - Target path. - - - - Gets the total number of bytes transferred during the transfer of the current file. - - The number of bytes transferred. - - - - Gets the total number of files to be transferred. - - Number of files. - - - - Gets the number of files that were already processed (either transferred or skipped). - - Number of files. - - - - Gets the number of files that were already successfully transferred. - - Number of files. - - - - Gets the total number of bytes to be transferred. - - Number of bytes. - - - - Gets the total number of bytes transferred. - - Number of bytes. - - - - Gets the number of bytes transferred during the current transfer since the last time the event was raised. - - The number of bytes transferred since the last time the event was raised. - - - - Gets the current transfer speed in bytes transferred per second (or 0 if not available). - - An estimate of the current speed in number of bytes per second. - Value of 0 indicates that this information is not available. - - - - Gets a number between 0 and 100 representing the percentage of completeness of the operation. - - Percentage value (0..100). - - - - Gets a number between 0 and 100 representing the percentage of completeness of the current file transfer. - - Percentage value (0..100). - - - - Provides data for the DeleteProgressChanged event. - - - - - Initializes a new instance of the class (for internal use only). - - Event data. - - - - Gets the current delete state of the current . - - Current delete state of the current . - - - - Gets the file or directory which is currently processed. - - Remote item. - - - - Gets the total number of files to be deleted. - - Number of files. - - - - Gets the number of files that were already processed (either deleted or skipped). - - Number of files. - - - - Gets the number of files that were already successfully deleted. - - Number of files. - - - - Gets a number between 0 and 100 representing the percentage of completeness of the operation. - - Percentage value (0..100). - - - - Specifies checksum algorithm. - - - - - SHA-1 checksum. - - - - - SHA-256 checksum. - - - - - SHA-384 checksum. - - - - - SHA-512 checksum. - - - - - MD5 checksum. - - - - - SHA-224 checksum. - - - - - Request CRC32 checksum. - - - - - Represents data checksum. - - - - - Returns checksum data. - - - - - - Creates an instance of an object that represents data checksum. - - Checksum algorithm used to compute the checksum. - Checksum data. - - - - Implicit conversion from to string. - - Checksum to convert to string. - Hex string representation of the checksum. - - - - Comparest the checksum with another object of the same type and returns a value indicating whether - the current instance precedes, follows or occurs in the same position in the sort order. - - Object to compare with this instance. - A value that indicates the relative order of checksums being compared. - - - - Returns a value indicating whether the specified object is equal to this checksum. - - Object to compare with this instance. - True if the two instances are same type and represent the same checksum. - - - - Returns the hash code for this checksum. - - - - - - Returns a hex string representation of this checksum. - - Hex string representation of this checksum. - - - - Returns checksum algorithm. - - - - - Returns a hex string representation of the checksum. - - - - - Specifies modes of the method. - - - - - Specifies whether the specified regular file matches the the . - - - - - Specifies whether the specified directory matches the the . - - - - - Specifies whether the specified directory should be traversed to retrieve another matches. - - - - - Set of inclusion and exclusion patterns. - It doesn't depend on the order how the inclusion and exclusion patterns are added into the . - - - - - Initializes a new instance of the class. - - - - - Initializes a new instance of the class. - - A path to be considered as a base path of the set. - - - - Initializes a new instance of the class. - - Directory separators to be used in all paths. - - - - Initializes a new instance of the class. - - A path to be considered as a base path of the set. - Directory separators to be used in all paths. - - - - Initializes the object. - - A path to be considered as a base path of the set. - A path or mask relative to a base path which define an initial inclusion pattern. - - - - Initializes the object. - - A path to be considered as a base path of the set. - A path or mask relative to a base path which define an initial inclusion pattern. - Specifies traversal mode of directories for the . - - - - Adds a path or mask into collection of inclusion patterns. The supported wildcards are '?' and '*' and '**'. - For detailed specification with examples see the documentation. - - A path or mask (relative to the base path) which define an inclusion pattern. - - - - Adds a path or mask into collection of inclusion patterns. The supported wildcards are '?' and '*' and '**'. - For detailed specification with examples see the documentation. - - A path or mask (relative to the base path) which define an inclusion pattern. - Specifies traversal mode of directories for the . - - '?' matches any single character.
- '*' matches any number of any characters except the directory separators.
- '**' matches any number of any characters (directory separators can be reduced e.g. "a\**\b" is equivalent to "a\**\**\b" which matches "a\x\y\z\b" and also "a\b" but not "ab").
- - - - - - - - - - - - - - -
data\file-???.txtMatches files within the "data" directory e.g. "data\file-007.txt", but not "data\file-7.txt".
data\*.txtMatches any ".txt" file within the "data" directory (only within the "data" directory, not in subdirectories) e.g. "data\file.txt", but not "data\a\b\c\file.txt".
data\**\*.txtMatches any ".txt" file anywhere within the "data" directory and its subdirectories e.g. "data\file.txt" and also "data\a\b\c\file.txt".
-
-
- - - Adds a path or mask into collection of exclusion patterns. The supported wildcards are '?' and '*' and '**'. - For detailed specification with examples see the documentation. - - A path or mask (relative to the base path) which define an exclusion pattern. - - - - Adds a path or mask into collection of exclusion patterns. The supported wildcards are '?' and '*' and '**'. - For detailed specification with examples see the documentation. - - A path or mask (relative to the base path) which define an exclusion pattern. - Specifies traversal mode of directories for the . - - '?' matches any single character.
- '*' matches any number of any characters except the directory separators.
- '**' matches any number of any characters (directory separators can be reduced e.g. "a\**\b" is equivalent to "a\**\**\b" which matches "a\x\y\z\b" and also "a\b" but not "ab").
- - - - - - - - - - - - - - -
data\file-???.txtMatches files within the "data" directory e.g. "data\file-007.txt", but not "data\file-7.txt".
data\*.txtMatches any ".txt" file within the "data" directory (only within the "data" directory, not in subdirectories) e.g. "data\file.txt", but not "data\a\b\c\file.txt".
data\**\*.txtMatches any ".txt" file anywhere within the "data" directory and its subdirectories e.g. "data\file.txt" and also "data\a\b\c\file.txt".
-
-
- - - Returns a value indicating whether the specified relative path matches the . - This method is intended to be overwritten by descendants. - In this case please note that for optimization issues when called with parameters equal to "." and - this method should return false if no inclusion pattern was specified; true otherwise. - - A relative path to a base path to be tested for a match. - Specifies how the should be treated for match. - True if the path matches the set; false otherwise. - - - - Gets a collection of local file system items (files and directories) which matches this . - Only items which matches no exclusion pattern and matches at leas one inclusion pattern are included into result collection. - It doesn't depend on the order how the inclusion and exclusion patterns were added into the .
- If you don't want to include empty directories into result collection, please set the to false. -
- A collection of local file system items which matches this . -
- - - Gets or sets the base path of the set. - - A path to be considered as a base path of the set. - - - - Gets or sets a value indicating whether the is case sensitive. - - True if the is case sensitive; false otherwise. - - - - Gets or sets a value indicating whether a consumer of the should include empty directories or not. - Also used in the method. - - True if empty directories should not be included; false otherwise. - - - - Gets or sets a value indicating whether a consumer of the should also include directories where the files are located. - Also used in the method. - Example: Ftp.GetItems("DIR/*.txt") - this property determines whether item "DIR" should be also included in output collection. - - True if directories where the files are located should be included; false otherwise. - - - - Gets or sets a value indicating whether a consumer of the should flatten the output. - Flatten means to don't persist directory structure. - For example if used to upload files "A/a.txt" and "B/b.txt" to the "/data" directory on a FTP server, - files "a.txt" and "b.txt" are uploaded directly into the "/data" directory - (directories "A" and "B" are not created in the "/data" directory). - - True if flatten the output; false otherwise. - - - - The exception that is thrown when an error occurs while using Rebex FileSystem. - - - - - Initializes a new instance of the class. - - - - - Initializes a new instance of the class. - - - - - Initializes a new instance of the class. - - - - - Initializes a new instance of the class. - - - - - Represents a file system provider. - - This type is not intended to be used directly from your code. To implement custom file system providers, - add reference to the Rebex.FileSystem assembly and use one of the following base classes. - - - - Constructor. - - - - - Performs application-defined tasks associated with freeing, releasing, or resetting resources. - - 2 - - - - Derived classes must create a child file system with the root path equals to the . - - Root path of the child file system. - Child file system with the root path equals to the . - - - - Releases the resources used by the . - - true to release both managed and unmanaged resources; false to release only unmanaged resources. - - - - Configuration options for the . - - - - - Initializes new instance of the . - - - - - Gets or sets value indicating - whether the method is called for directories. - - Default value is false. - - - - - Gets or sets value indicating - whether the strict checks for is enabled. - - Default value is false. - - Enable strict checks only for debugging purposes. Do not use strict checks in production. - - - - - Gets or sets value indicating - whether the method is called for directories. - - Default value is false. - - - - - Gets or sets value indicating - whether the method is called for directories. - - Default value is false. - - - - - Gets or sets used for logging. - - Default value is null. - - - - - Gets or sets default used by the classes - inherited from the - and . - - - - - Represents basic type of the Rebex file system. - - - - - Read only Rebex file system. - - - - - Read-write Rebex file system. - - - - - Represents an attributes of the node. - - - - - Initializes a new instance of the - - of the node - - - Indicates whether the current object is equal to another object of the same type. - true if the current object is equal to the parameter; otherwise, false. - An object to compare with this object. - - - - - - - - - - Determines whether two specified have the same value. - - The first to compare, or null. - The second to compare, or null. - true if the value of left is the same as the value of right, otherwise false. - - - - Determines whether two specified have different values. - - The first to compare, or null. - The second to compare, or null. - true if the value of left is different from the value of right; otherwise false. - - - Returns a string that represents the current . - A string that represents the current . - 2 - - - - Gets the file atttributes of the node. - - - - - Gets a value indicating whether the .ReadOnly flag is set. - - true if the the .ReadOnly flag is set, otherwise false. - - - - Represents a content of a file. - - - - Performs application-defined tasks associated with freeing, releasing, or resetting resources. - 2 - - - - Method creates read only content from the given . - - Stream containing the content of the node. - New read only content. - - - - - - Method creates read/delayed write content from the given stream. - Use this method when following is desired/acceptable behavior: -
  • Underlying stream does not support immediate writing to the file.
  • When previously returned from this method is disposed - and underlying stream has been changed, then - the method method - in the is called.
- Stream containing the content of the node. - New read/delayed write content. - - -
- - - Method creates read/immediate write content from the given stream. Use this method when following is desired/acceptable behavior: -
  • Stream supports immediate writing to the file (e. g. ).
  • SaveContent method in ReadWriteFileSystemProvider is NEVER called. All data are written immediately using the suitable write methods.
- Stream containing the content of the node. - New read/immediate write content. - - -
- - - Returns with the content of the file. - - Stream with the content of the file. - - - - Gets a value indicating whether underlying stream of this instance is read only. - - true if the content is read only, otherwise false. - - - - Returns a value indicating whether this node's stream was closed forcefully. - Forceful close occurs if the stream is not gracefully closed by the consumer. - - - - - Represents read, write or read/write access to the file. - - This enumeration has a attribute that allows a bitwise combination of its member values. - - - - - Read access to the file. - - - - - Write access to the file. - - - - - Read and write access to the file. - - - - - Represents retrieval parameters. - - - - - Represents read access requirement. - - - - - Represents write access requirement. - - - - - Represents read and write access requirement. - - - - - Initializes a new instance of the - Required access type to the file. - - - - - - - - - - - - - Determines whether two specified have the same value. - - The first to compare, or null. - The second to compare, or null. - true if the value of left is the same as the value of right, otherwise false. - - - - Determines whether two specified have different values. - - The first to compare, or null. - The second to compare, or null. - true if the value of left is different from the value of right; otherwise false. - - - Returns a string that represents the current . - A string that represents the current . - 2 - - - - Gets required access type to the file. - - - - - Representats a file system path. - - - - - Used directory separator. - - - - - Name of the root directory. - - - - - Represents the empty . - - - - - Initializes a new instance of the . - - Examples of the valid path: - - / - - /dir1 - - /dir1/ - - /dir1/dir2 - - /dir1/dir2/ - - /dir1/dir2/file.txt - - path in the string format - Exception is thrown when the is malformed. - - - - Returns an array of characters not allowed in . - - - - - Gets an enumerator that iterates through the elements of this path. - - - - Indicates whether the current is equal to another . - true if the current object is equal to the parameter; otherwise, false. - An to compare with this . - - - - Returns a subpath that is a subsequence of the parts of this path. - Subpath starts with the first part (on the index 0) of this path - and ends with the part on the index . - Root path ('/') does not have any subpath. - For the with the path '/dir1/dir2/file.txt'; - - GetSubPath(0) returns '/dir1'. - - GetSubPath(1) returns '/dir1/dir2'. - - GetSubPath(2) returns 'dir1/dir2/file.txt'. - - GetSubPath(3) throws . - - Zero based index of the end part of the subpath. - A subpath that is a subsequence of the parts of this path. - - - Determines whether the specified is equal to the current . - true if the specified is equal to the current ; otherwise, false. - The object to compare with the current object. - 2 - - - - Creates new with added to the end of this . - - New part of the path. - New with the added to the end of this . - - - - Creates new with added to this . - - The new extension. - New with the added to this . - - - - Creates new based on this and with the new . - - The new extension. - New based on this and with the new . - - - - Creates new based on this and with the extension deleted. - - New based on this and with the extension deleted. - - - - Tests if this starts with the given . - - Given . - True if this starts with the given , otherwise false. - - - - Determines whether two specified have the same value. - - The first path to compare, or null. - The second path to compare, or null. - true if the value of left is the same as the value of right, otherwise false. - - - - Determines whether two specified have different values. - - The first path to compare, or null. - The second path to compare, or null. - true if the value of left is different from the value of right, otherwise false. - - - Returns a string that represents the current . - A string that represents the current . - 2 - - - - Convert the value of the to the string representation. - - The to cast to . - - - - Convert the value of to the instance of the . - - The path to convert to the . - Exception is thrown when the is malformed. - - - - Combines strings in the array into a . - - - New combined from the strings in the array. - - - - Indicates whether the specified is null or an instance of the . - - The to test. - true if the parameter is null or an instance of the ; - otherwise false. - - - - - - - Gets the name of the - or the . - - - - - Gets the name without an extension. - - - - - Indicates whether a path contains file name extension. - - True if path contains file name extension, otherwise false. - - - - Gets an enumerator that iterates through the elements of this path. - - - - - Gets the parent path, or path if this path does not have parent. - - - - - Gets the file name extension, or if this path does not have extension. - - - - - Returns true if this path equals to path, otherwise returns false. - - - - - Returns this as a . - - - - - Indicates if this instance is the root path ('/'). - - True if this instance is the root path, otherwise false. - - - - Returns an element of this path. - - Index of the element to return. - An element of this path. - - - - Gets the IEqualityComparer that is used to determine equality of . - - - - - Returns the number of elements in the path. - - The number of elements in the path. - - - - The exception that is thrown when an error occurs while creating new . - - - - - Initializes a new instance of the class - - - - - Initializes a new instance of the class - - - - - Initializes a new instance of the class - - - - - Initializes a new instance of the class - - - - - Holds the last access time, the last write time and the creation time of the node. All dates are expressed as UTC. - - Immutable type. - - - - Initializes a new instance of the . - - Creation time of the node (expressed as UTC). - Last access time of the node (expressed as UTC). - Last write time of the node (expressed as UTC). - - Missing or null parameters will have default value . - Time values with 'local' or 'unspecified' kind are converted to UTC automatically. - - - - - - - - Creates new instance with all properties equals to the current - instance properties except the property , which is set to value. - - New creation time (expressed as UTC). - New instance with all properties equals to the current - instance properties except the property , which is set to value. - - - - Creates new instance with all properties equals to the current - instance properties except the property , which is set to value. - - New last access time (expressed as UTC). - New instance with all properties equals to the current - instance properties except the property , which is set to value. - - - - - Creates new instance with all properties equals to the current - instance properties except the property , which is set to value. - - New last write time (expressed as UTC). - New instance with all properties equals to the current - instance properties except the property , which is set to value. - - - - - Indicates whether the specified is null or an NodeTimeInfo. - - The to test. - true if the parameter is null or an NodeTimeInfo ("CreationTime=LastAccessTime=LastWriteTime=DateTim.MinValue"), - otherwise false. - - - - Determines whether two specified have the same value. - - The first to compare, or null. - The second to compare, or null. - true if the value of left is the same as the value of right, otherwise false. - - - - Determines whether two specified have different values. - - The first to compare, or null. - The second to compare, or null. - true if the value of left is different from the value of right; otherwise false. - - - - - - - - - - - - - Represents the empty . - - - Empty has - == - and - == - and - == . - > - - - - Creation time of the node (expressed as UTC). - - - - - Last access time of the node (expressed as UTC). - - - - - Last write time of the node (expressed as UTC). - - - - - The type of the file system node. - - - - - Invalid value. - - - - - File node. - - - - - Directory node. - - - - - Link node (unused). - - - - - Specifies all node types, including File, Directory and Link. - - - - - Provides a container for a collection of objects. - - - - - Initializes a new instance of the class. - - - - - Validates whether the item is correct and can be added. - - Item to add. - - - - Gets an for the collection. - - An for the collection. - - - - Adds the elements of the specified collection to the end of the FileSystemItemCollection. - - The collection whose elements should be added to the end of the FileSystemItemCollection. - - - - Adds the specified item to the collection. - - The item to be added to the collection. - - - - Removes the specified item from the collection. - - The item to remove from the collection. - - True if item was successfully removed from the collection; false otherwise. - - - - - Removes the item with the specified path from the collection. - - The path of an item to remove from the collection. - - - - Removes the item at the specified index from the collection. - - The zero-based index of the item to remove. - - - - Removes all items from the collection. - - - - - Copies the range of elements from the collection to a one-dimensional - array, starting at the specified index of the target array. - - One-dimensional zero-based array that is the destination of the elements copied from the collection. - A zero-based index in the destination array at which copying begins. - - - - Determines whether the item is in the collection. - - The item to locate in the collection. - True if the item is located in the collection; false otherwise. - - - - Determines whether the item with the specified path is in the collection. - - The path to locate in the collection. - True if the item with the specified path is located in the collection; false otherwise. - - - - Gets the total size of files contained in the collection. - - The total size of files contained it the collection. - - - - Returns the paths of files in the collection that match the specified search pattern. - - The regular expression to match the paths or filenames against. - A array containing the paths or names of files in the specified directory that match the specified search pattern. - - The method works in two different modes (determined by property): - Filenames without path are searched and returned. This mode is used by default for collections returned by GetList method.Filenames with path are searched and returned. This mode is used by default for collection returned by GetItems method. - - - - Returns the names of files in the collection that match the specified search pattern. - - The search string to match the items against. - If tree, perform unix-like case-sensitive matching. - A array containing the names of files in the specified directory that match the specified search pattern. - -

The following wildcards are permitted in searchPattern:
* - Zero or more characters.
? - Exactly one character.
- Characters other than the wildcards represent themselves. - For example, the searchPattern string "*.txt" searches for all names/paths - ending with the ".txt". The searchPattern string "s*" searches for all - names/paths beginning with the letter "s". -

-

- The method works in two different modes (determined by property): - Filenames without path are searched and returned. This mode is used by default for collections returned by GetList method.Filenames with path are searched and returned. This mode is used by default for collection returned by GetItems method.

-
-
- - - Returns the names of files in the collection that match the specified search pattern. - - The search string to match the items against. - A array containing the names of files in the specified directory that match the specified search pattern. - -

The following wildcard specifiers are permitted in searchPattern:
* - Zero or more characters.
? - Exactly one character.
- Characters other than the wild card specifiers represent themselves. - For example, the searchPattern string "*t" searches for all names in path - ending with the letter "t". The searchPattern string "s*" searches for all - names in path beginning with the letter "s". -

-

- The method works in two different modes (determined by property): - Filenames without path are searched and returned. This mode is used by default for collections returned by GetList method.Filenames with path are searched and returned. This mode is used by default for collection returned by GetItems method.

-
-
- - - Sorts the items in the entire collection alphabetically. - - - - - Sorts the elements in the entire collection using the specified comparer. - - The implementation to use when comparing elements, or a null reference to sort alphabetically. - - - - Sorts the elements in a section of the collection using the specified comparer. - - The zero-based starting index of the range to sort. - The length of the range to sort. - The implementation to use when comparing elements, or a null reference to sort alphabetically. - - - - Gets an object that can be used to synchronize access to the collection. - - An object that can be used to synchronize access to the collection. - - - - Gets the number of elements contained in the collection. - - The number of elements contained in the collection. - - - - Gets the item at the specified index. - - A zero-based index of the item to get. - Item at the specified index. - - - - Gets the item of the specified path. - - The path of the item to get. - Item with the specified path, or null if not found. - - - - Gets or sets a value that indicates whether to use a Path or Name for pattern matching - and return values in the method. - - - - - List of possible compare types for the FileSystemItemComparer class. - - - - - Compare by . - - - - - Compare by . - - - - - Compare by creation date and time of the item. - - - - - Compare by last modification date and time of the item. - - - - - Compare by last access date and time of the item. - - - - - Compare by type of the item (directory/file/link). - - - - - Class used to compare objects. - - - - - Creates a new instance of FileSystemItemComparer with default sorting by file name and with ascending sort mode. - - - - - Creates a new instance of FileSystemItemComparer with specified comparer type and ascending sort mode. - - Type of the comparer. - - - - Creates a new instance of FileSystemItemComparer with specified comparer type and sort mode. - - Type of the comparer. - Sorting order. - - - - IComparer interface implementation. Compares two instances of . - - First object to compare. - Second object to compare. - Value greater than zero when x is greater then y, zero when they are equal, or less than zero when x is lesser than y. - - - - Specifies how a search pattern is treated (how to traverse a hierarchy of directories). - - - See Using TraversalMode blog post for samples. - - - - - Performs shallow search for files and directories; do recursive transfer of matching directories.
- Shallow search means that items are searched only in the first level of given directory.
- If the pattern matches a file, the file is processed.
- If the pattern matches a directory, all files and subdirectories are processed. -
-
- - - Performs shallow search for files and directories; do non-recursive transfer of matching directories.
- Shallow search means that items are searched only in the first level of given directory.
- If the pattern matches a file, the file is processed.
- If the pattern matches a directory, only the directory itself is processed (without any content = empty directory will be created). -
-
- - - Performs shallow search for files only. This is the same as mode, but only files are processed.
- Shallow search means that files are searched only in the first level of given directory. -
-
- - - Performs deep search for files only. This is like DOS xcopy deep file search.
- Deep search means that files are searched in the given directory and also in all its subdirectories.
- However, if this mode is used in GetItems method, returned collection will also contains directories where the files were found. -
- - This behavior is useful in situations where you need to prepare the containing directory before the file is processed. - To get only files, just use Linq like this: collection.Where(item => !item.IsDirectory) -
- - - Specifies the default action to perform when a target file already exists. - However, the default action can still be changed using the ProblemDetected event. - - - - - Existing files are to cause the whole multi-file transfer to be canceled and an exception to be raised. - - - - - Existing files are to be always skipped. - - - - - Existing files are to be always overwritten. - - - - - Existing files are to be overwritten if they are older than source files. - This is strongly discouraged because modification dates are often misreported by FTP and SFTP servers, making this mode highly unreliable. - We strongly recommend to use a different mode or develop a custom solution using the ProblemDetected event. - - - - - Existing files with different sizes are to be overwritten. - - - - - Existing files are to be resumed if they are smaller than source files. - - - - - Existing files are to be renamed according the pattern "filename[number].extension". - You can still change the generated name using the ProblemDetected event and the method. - - - - - Existing files with different checksum are to be overwritten.
- Works on FTP and ZIP only. ZIP uses CRC-32 always; FTP uses checksums provided by the server (some FTP servers support no checksums). -
-
- - - Specifies behavior on links and reparse points in multi-file operations. - - - - - Detected links are to be resolved and processed - however, this can still be changed by ProblemDetected handler. - - - - - Detected links are to be skipped - however, this can still be changed by ProblemDetected handler. - - - - - Detected links cause an exception to be thrown - however, this can still be changed by ProblemDetected handler. - - - - - Specifies link type. - - - - - Symbolic link (symlink). - - - - - Hard link. - - - - - Specifies the method of the transfer. - - - - - Items are copied. - - - - - Items are moved to the target destination (items are deleted in the source location). - - - - - Specifies the behaviour of the . - - - - - All items (files and directories) are moved to the target destination deleting them in the source location. - - - - - Only files are moved to the target destination. Directories remain (not deleted) in the source location. - - - - - Specifies which date/time to restore. - - - - - Restore no date/time. - - - - - Restore CreationTime. - - - - - Restore LastWriteTime. - - - - - Restore LastAccessTime. - - - - - Restore all date and times. - - - - - Represents a file or directory on the local file system. - - - - - Initializes a new instance of the class. - - Path to a file or directory on the local file system. - - - - Gets the last modification time of the item. - - - - - Sets the last modification time of the item. - - The last modification time. - - - - Gets the last access time of the item. - - - - - Sets the last access time of the item. - - The last access time. - - - - Gets the creation time of the item. - - - - - Sets the creation time of the item. - - The creation time. - - - - Returns the full path of the item. - - The full path of the item. - - - - Deletes the local item. - - - - - Gets the list of file items in a directory represented by this object. - Fails if this object is not a directory. - - - This is only valid for directories. - - List of file items. - - - - Gets the list of directory items in a directory represented by this object. - Fails if this object is not a directory. - - - This is only valid for directories. - - List of directory items. - - - - Computes the CRC32 (Cyclic Redundancy Check) value of the file. - - - This is only valid for files. - - - CRC32 checksum value. - - - - - Calculates the checksum for the specified file. - - Path to the file. - Desired checksum algorithm. - Checksum of the specified file. - - - - Calculates the checksum of the specified part of the specified file. - - Path to the file. - Desired checksum algorithm. - The offset in the local file at which to start processing. - The maximum number of bytes to process. - /// Checksum of the specified file. - - - Gets a value indicating whether the file or directory exists. - - True if the file or directory exists; false otherwise. - - - - Gets file length. - - - - - Gets a value indicating whether the item is a file. - - True if the item is a file; false otherwise. - - - - Gets a value indicating whether the item is a directory. - - True if the archive item is directory; false otherwise. - - - - Gets a value indicating whether the item is a link. - - True if the archive item is a link; false otherwise. - - - - Gets the name of the file or directory. - - The name of the file or directory. - - - - Gets the relative path of the file or directory. - - The relative path of the file or directory. - - - - Gets the full path of the file or directory. - - The full path of the file or directory. - - - - Gets item attributes. - - - - - Provides a container for a collection of objects. - - - - - Initializes a new instance of the class. - - - - - Validates whether the item is correct and can be added. - - Item to add. - - - - Adds the item to the collection. - - The item to be added to the collection. - - - - Adds the item to the collection. - - The item to be added to the collection. - - - - Adds the elements of the specified collection to the end of the LocalItemCollection. - - The collection whose elements should be added to the end of the FtpItemCollection. - - - - Adds the elements of the specified collection to the end of the LocalItemCollection. - - The collection whose elements should be added to the end of the FtpItemCollection. - - - - Determines whether the item is in the collection. - - The item to locate in the collection. - True if the item is located in the collection; false otherwise. - - - - Determines whether the item is in the collection. - - The item to locate in the collection. - True if the item is located in the collection; false otherwise. - - - - Determines whether the item with the specified path is in the colleciton. - - The path to locate in the collection. - True if the item with the specified path is located in the collection; false otherwise. - - - - Copies the range of elements from the collection to a one-dimensional - array, starting at the specified index of the target array. - - One-dimensional zero-based array that is the destination of the elements copied from the collection. - A zero-based index in the destination array at which copying begins. - - - - Removes the specified item from the collection. - - The item to remove from the collection. - - True if item was successfully removed from the collection; false otherwise. - - - - - Removes the specified item from the collection. - - The item to remove from the collection. - - True if item was successfully removed from the collection; false otherwise. - - - - - Gets an for the collection. - - An for the collection. - - - - Gets the item at the specified index. - - A zero-based index of the item to get. - Item at the specified index. - - - - Gets the item of the specified path. - - The path of the item to get. - Item with the specified path, or null if not found. - - - - License key infrastructure for trial versions of Rebex components. - - - - - Gets or sets the license key. - - License key. - - - - Gets collection of license keys. - - - - - Class for chained comparison of objects. - - - - - Creates a new instance of MultiComparer. - - An array of comparers to use. - - - - IComparer interface implementation. Compares two instances of provided objects. - - The first object to compare. - The second object to compare. - - A signed integer that indicates the result of of x and y comparison. - Value Less than zero means x is less than y. Zero x equals y. Greater than zero x is greater than y. - - - - - SSPI data representation. - - - Only supported on Windows platforms. - - - - Native. - - - Network. - - - - SSPI requirements flag. - - - Only supported on Windows platforms. - - - - The server can use the context to authenticate to other servers as the client. Must be used with MutualAuthentication flag. - - - Mutual authentication. - - - Confidentiality. - - - Connection. - - - Integrity. - - - - SSPI credential usage. - - - Only supported on Windows platforms. - - - - - Inbound. - - - - - Outbound. - - - - - SSPI credential use. - - - Only supported on Windows platforms. - - - - - Inbound. - - - - - Outbound. - - - - - Represents an SSPI error. - - - Only supported on Windows platforms. - - - - - Wrapper class for SSPI authentication. - - - Only supported on Windows platforms. - - - - - Creates a new SSPI session. - - Authentication package. - Data representation. - Target name. - Requirements. - User name. - Password. - User domain - - Only supported on Windows platforms. - - - - - Creates a new SSPI session. - - Authentication package. - Credential use. - Data representation. - Target name. - Requirements. - User name. - Password. - User domain - - Only supported on Windows platforms. - - - - - Creates a new SSPI session. - - Authentication package. - Credential usage. - Data representation. - Target name. - Requirements. - User name. - Password. - User domain - - Only supported on Windows platforms. - - - - - Disposes the SSPI session. - - - - - Get next SSPI message. - - Challenge. - Receives a value indicating whether the SSPI has finished. - Next SSPI message. - - Only supported on Windows platforms. - - - - - Verifies an SSPI signature. - - Message. - Signature. - True if valid, false otherwise. - - Only supported on Windows platforms. - - - - - Creates an SSPI signature. - - Challenge. - Signature. - - Only supported on Windows platforms. - - - - - Unwraps (decrypts) the SSPI message. - - Challenge. - QOP - Unwrapped (decrypted) message. - - Only supported on Windows platforms. - - - - - Wraps (encrypts) SSPI message. - - Response. - QOP. - Receives a value indicating whether the SSPI has finished. - Wrapped (encrypted) message. - - Only supported on Windows platforms. - - - - - The hash algorithm used to compute the hash for hash signing - and verification methods. - - - - - Unsupported hash algorithm. - - - - - MD5. - - - - - SHA1. - - - - - MD5SHA1. - - - - - GOST R 34.11-94. Not supported. - - - - - SHA-256. - - - - - SHA-384. - - - - - SHA-512. - - - - - MD4. - - - - - The key algorithm for the certificate. - - - - - Unsupported key algorithm. - - - - - RSA. - - - - - DSA. - - - - - GOST R 34.10-2001. Not supported. - - - - - Elliptic Curve DSA. - - - - - ED25519. - - - - - Intended key usage. - - - - Digital signature. - - - Non-repudiation. - - - Key encipherment. - - - Data encipherment. - - - Key agreement. - - - Certificate signing. - - - CRL signing. - - - Key encipherment only. - - - Key decipherment only. - - - - Key set options. - - - - Imported keys are marked as exportable. - - - The user is to be notified through a dialog box or other method when certain attempts to use this key are made. - - - Private keys are stored under the local computer and not under the current user. - - - Private keys are stored under the current user and not under the local computer even if the PFX BLOB specifies that they should go into the local computer. - - - Private keys are persisted on disk when importing a certificate - - - Always load the key into CNG key storage provider. Only supported on Windows Vista or higher. - - - Load the key into CNG key storage provider if possible. Only supported on Windows Vista or higher. - - - - Specifies certificate file format. - - - - Binary DER encoded X.509 certificate. - - - Base-64 encoded DER X.509 certificate. - - - P12/PFX certificate with private key. - - - - Represents an X509 v3 certificate. - - - - - Loads a certificate from an array. - - An array containing DER encoded certificate data. - - - - Loads a DER encoded certificate from the specified file. - - Path to a file. - A certificate. - - - - Loads a DER encoded certificate from the specified stream. - - Stream to load a certificate from. - A certificate. - - - - Loads a DER encoded certificate and a private key (in PKCS #8, PuTTY or SSLeay format) from the specified files. - - Path to a certificate file. - Path to the private key file. - Private key password. - A certificate. - - - - Loads a DER encoded certificate and a private key (in PKCS #8, PuTTY or SSLeay format) from the specified streams. - - Stream with the certificate. - Stream with the private key. - Private key password. - A certificate. - - - - Associates the supplied private key with the certificate to perform operations that need a private key. - - An instance of RSA, DSA, RSACryptoServiceProvider or DSACryptoServiceProvider. - - - - Associates the supplied private key with the certificate to perform operations that need a private key. - - The private key. - - - - Associates the supplied private key with the certificate to perform operations that need a private key. - - The private key. - - - - Associates the supplied private key with the certificate to perform operations that need a private key. - - An instance of RSA, DSA, RSACryptoServiceProvider or DSACryptoServiceProvider. - Specifies whether to permanently bind the certificate to the specified CSP. - - - - Associates the supplied private key with the certificate to perform operations that need a private key. - - The private key. - Specifies whether to permanently bind the certificate to the specified CSP. - - - - Associates the supplied private key with the certificate to perform operations that need a private key. - - The private key. - Specifies whether to permanently bind the certificate to the specified CSP. - - - - Loads a certificate with a private key from a PKCS#12 (PFX) file. - - Path to a file. - Encryption password. - A certificate with private key. - - - - Loads a certificate with a private key from a PKCS#12 (PFX) array. - - An array containing DER encoded PKCS#12 data. - Encryption password. - A certificate with private key. - - - - Loads a certificate with a private key from a PKCS#12 (PFX) file. - - Path to a file. - Encryption password. - Key set options. - A certificate with private key. - - - - Loads a certificate with a private key from a PKCS#12 (PFX) array. - - An array containing DER encoded PKCS#12 data. - Encryption password. - Key set options. - A certificate with private key. - - - - Saves the certificate to the supplied file in DER format. - - Path to the file to save the certificate to. If the file exists, it is overwritten. - - - - Saves the certificate to the supplied stream in DER format. - - Stream to save the certificate to. - - - - Saves the certificate to the supplied file in specified format. - - Path to the file to save the certificate to. If the file exists, it is overwritten. - Certificate format. - - - - Saves the certificate to the supplied stream in specified format. - - Stream to save the certificate to. - Certificate format. - - - - Saves the certificate to the supplied file in specified format. - - Path to the file to save the certificate to. If the file exists, it is overwritten. - Certificate format. - Password (only used by PFX/P12 format). - On .NET Compact Framework, this is only supported in Windows CE 5.0 or later. - - - - Saves the certificate to the supplied stream in specified format. - - Stream to save the certificate to. - Certificate format. - Password (only used by PFX/P12 format). - On .NET Compact Framework, this is only supported in Windows CE 5.0 or later. - - - - Saves the certificate's private key to the supplied file. - - Path to the file to save the certificate to. If the file exists, it is overwritten. - Private key password. - Private key file format. - If set to true, the cryptographic provider should not display any user interface (UI) when exporting private key parameters. - - - - Saves the certificate's private key to the supplied stream. - - Stream to save the private key to. - Private key password. - Private key file format. - If set to true, the cryptographic provider should not display any user interface (UI) when exporting private key parameters. - - - - Creates a new instance of based on the specified context. - - A pointer to the certificate context. - -

- Only supported on Windows platforms. -

-
-
- - - Creates a new instance of based on the specified certificate or . - - An instance of or . - - - - Converts an or to a . - - An instance of or . - A . - - - - Converts a to (or ). - - An instance of . - An . - - - - Returns the hash algorithm used to create the signature of this certificate. - - Hash algorithm. - - - - Returns the collection of CRL distribution points. - - Collection of CRL distribution points, or null if not available. - - - - Returns the DN of the certification authority that issued the X.509v3 certificate. - - DN of the certification authority that issued the X.509 certificate. - - - - Returns the name of the certification authority that issued the X.509v3 certificate. - - The name of the certification authority that issued the X.509 certificate. - - - - Returns DN of the principal to which the certificate was issued. - - DN of the principal to which the certificate was issued. - - - - Returns the name of the principal to which the certificate was issued. - - The name of the principal to which the certificate was issued. - - - - Returns the public key for the X.509v3 certificate. - - The public key for the X.509v3 certificate. - - - - Returns the key algorithm parameters for the X.509v3 certificate. - - The key algorithm parameters for the X.509v3 certificate. - - - - Returns the public key info for the X.509v3 certificate. - - The public key info for the X.509v3 certificate. - - - - Returns the certificate's subject key identifier (SKI). - - Subject key identifier. - - - - Returns the certificate's issuer key identifier (AKI). - - Issuer (authority) key identifier. - - - - Returns the certificate's common name, if available. - - Common name; or null if not available. - - - - Returns the list of certificate's common names. - - The list of common names. - - - - Returns the list of certificate's e-mail addresses. - - The list of addresses. - - - - Returns the serial number of the X.509v3 certificate. - - The serial number of the X.509 certificate as an array of bytes. - - - - Returns the expiration date of this X.509v3 certificate (in local time). - - The expiration date for this X.509 certificate. - The expiration date is the date after which the X.509 certificate is no longer considered valid. - - - - Returns the effective date of this X.509v3 certificate (in local time). - - The effective date for this X.509 certificate. - The effective date is the date after which the X.509 certificate is considered valid. - - - - Returns the hash value for the X.509v3 certificate as an array of bytes. - - The hash value for the X.509 certificate. - - - - Returns the raw data for the entire X.509v3 certificate. - - The raw data for the entire X.509v3 certificate. - - - - Checks whether a certificate is time valid. - - true if valid, false if not valid. - - - - Returns the intended key usage value. - - Intended key usage. - - - - This method is deprecated, use instead. - - An array of intended key usage identifiers. - - - - Returns an array of enhanced key usage identifiers. - - An array of enhanced key usage identifiers, or null if the certificate is valid for all uses. - - - - Returns the DSA parameters of certificate's public key. - - The DSA parameters of certificate's public key. - - - - Returns the RSA parameters of certificate's public key. - - The RSA parameters of certificate's public key. - - - - Returns the RSA parameters of certificate's public or private key. - - True if private key parameters are to be exported as well. - If set to true, the cryptographic provider should not display any user interface (UI) when exporting private key parameters. - The RSA parameters of certificate's public or private key. - - - - Returns the DSA parameters of certificate's public or private key. - True if private key parameters are to be exported as well.If set to true, the cryptographic provider should not display any user interface (UI) when exporting private key parameters. - The DSA parameters of certificate's public or private key. - - - - Checks whether a private key for this certificate is available. - - True if available, false if not available. - - - - Returns the size of the key in bits. - - Size of the key in bits. - - - - Verifies the specified signature data by comparing it to the signature computed for the specified hash value. - - The hash value of the signed data. - A hash algorithm used to create the hash value. - The signature for the specified hash value. - True if the signature verifies as valid; otherwise, false. - - - - Verifies the specified signature data by comparing it to the signature computed for the specified message. - - The message. - The signature for the specified message. - True if the signature verifies as valid; otherwise, false. - - - - Verifies the specified signature data by comparing it to the signature computed for the specified message. - - The message. - The signature for the specified message. - Signature parameters. - True if the signature verifies as valid; otherwise, false. - - - - Computes the signature for the specified hash value by encrypting it with the private key. - - The hash value of the data to be signed. - A hash algorithm used to create the hash value. - If set to true, the cryptographic should not display any user interface (UI). - The signature for the specified hash value. - -

- The private key for a certificate must be available for this method to succeed. -

-

- If silent operation is requested and the CSP must display UI to operate, this method will fail. -

-
-
- - - Computes the signature for the specified message by encrypting it with the private key. - - The message to be signed. - The signature for the specified message. - -

- The private key for a certificate must be available for this method to succeed. -

-
-
- - - Computes the signature for the specified message by encrypting it with the private key. - - The message to be signed. - Signature parameters. - The signature for the specified message. - -

- The private key for a certificate must be available for this method to succeed. -

-
-
- - - Encrypts data. - - Data to be encrypted. - Encrypted data. - - - - Decrypts data. - - Data to be decrypted. - If set to true, the cryptographic provider should not display any user interface (UI). - Decrypted data. - - If silent operation is requested and the cryptographic provider needs to display a UI to operate, this method will fail. - - - - - Verifies the validity of the certificate. - - Validation result. - - - - Verifies the validity of the certificate, including its compliance with the specified criteria. - - Validation options (not supported by CertificateChainEngine.Native engine on Xamarin.iOS and Xamarin.Android). - Validation result. - - - - Verifies the validity of the certificate, including its compliance with the specified criteria. - - The name of the server. - Validation options (not supported by CertificateChainEngine.Native engine on Xamarin.iOS and Xamarin.Android). - Validation result. - - - - Verifies the validity of the certificate, including its compliance with the specified criteria, - using the specified chain engine. - - The name of the server. - Validation options (not supported by CertificateChainEngine.Native engine on Xamarin.iOS and Xamarin.Android). - Certificate chain engine. - Validation result. - - - - Validates the specified certificate revocation list (issued by this certificate). - - Certificate revocation list to validate. - The date in which the validation takes effect; specify null (Nothing in VB.NET) to skip time validation check. - Status of the validation result. If the CRL is valid, the return value is 0. - - - - Disposes the object and releases resources. - - - Calling this method ensures that all resources are freed. - - - - - Finalizer. - - - - - Gets a handle of the certificate. - - A handle of the certificate. - -

- Only supported on Windows platforms. -

-
-
- - - Gets the certificates extensions collection. - - Extensions collection. - - - - Returns the key algorithm for this certificate. - - The key algorithm for this certificate. - - - - Gets the thumbprint of the certificate. - - Certificate's thumbprint. - - - - Gets or sets the friendly name associated with the certificate. - - Friendly name associated with the certificate. - Not available in .NET CF. - - - - Gets or sets a custom object associated with this particular instance of . This value is not persisted. - - - - - A chain engine (name space and cache) to be used to build and validate certificate chains. - - - - - The chain engine of the current user. - - - - - The chain engine of the local machine. - - - - - Use current certificate engine if set; otherwise use engine (platform-specific). - - - - - Represents a chain of certificates. - - - A chain starts by the end certificate and each following certificate - must directly certify the one preceding it. - The last certificate in the list is a self-signed root certificate, and - may be optionally omitted under the assumption it must be known in any case. - - - - - Gets an for the collection. - - An for the collection. - - - - Adds a certificate to the end of the chain. - This certificate represents authority for the previous certificate in the chain - (Leaf certificate is at the beginning of the chain, Root certificate is at the end of the chain). - - The certificate to be added to the chain. - The position of the certificate in the chain. - - - - Creates an empty certificate chain. - - - - - Creates a certificate chain from an array of certificates. - - An array of certificates. - - - - Loads a certificate with a private key from a PKCS#12 (PFX) file. - - Path to a file. - Encryption password. - A certificate with private key. - - - - Loads a certificate with a private key from a PKCS#12 (PFX) array. - - An array containing DER encoded PKCS#12 data. - Encryption password. - A certificate with private key. - - - - Loads a certificate with a private key from a PKCS#12 (PFX) file. - - Path to a file. - Encryption password. - Key set options. - A certificate with private key. - - - - Loads a certificate with a private key from a PKCS #12 (.p12/.pfx) array. - - An array containing DER encoded PKCS #12 data. - Encryption password. - Key set options. - A certificate with private key. - - - - Loads from the specified PKCS #7 (.p7b) file. - - Path to the file. - Instance of , never null. - The PKCS #7 file can be saved using method. - - - - Loads a PKCS #7 (.p7b) encoded from the specified file. - - Stream to load a from. - Instance of , never null. - The PKCS #7 stream can be saved using method. - - - - Verifies the specified signature data by comparing it to the signature computed for the specified hash value. - - The hash value of the signed data. - A hash algorithm used to create the hash value. - The RSA signature for the specified hash value. - true if the signature verifies as valid; otherwise, false. - The hash algorithm parameter is ignored with managed RSA. - - - - Builds a certificate chain for a specified certificate. - - End certificate. - The chain for an end certificate. - - This function builds a certificate chain context starting from an end - certificate and going back, if possible, to a trusted root certificate. - - - - - Builds a certificate chain for a specified certificate. - - End certificate. - Certificate chain engine. - The chain for an end certificate. - - This function builds a certificate chain context starting from an end - certificate and going back, if possible, to a trusted root certificate. - - - - - Builds a certificate chain for a specified certificate. - - End certificate. - Additional store to search in addition to system stores. - The chain for an end certificate. - - This function builds a certificate chain context starting from an end - certificate and going back, if possible, to a trusted root certificate. - - - - - Builds a certificate chain for a specified certificate. - - End certificate. - Certificate chain engine. - Additional store to search in addition to system stores. - The chain for an end certificate. - - This function builds a certificate chain context starting from an end - certificate and going back, if possible, to a trusted root certificate. - - - - - Verifies the validity of the certificate chain. - - Validation result. - - - - Verifies the validity of the certificate chain, including its compliance with the specified criteria. - - Validation options (not supported by CertificateChainEngine.Native engine on Xamarin.iOS and Xamarin.Android). - Validation result. - - - - Verifies the validity of the certificate chain, including its compliance with the specified criteria. - - The name of the server. - Validation options (not supported by CertificateChainEngine.Native engine on Xamarin.iOS and Xamarin.Android). - Validation result. - - - - Verifies the validity of the certificate chain, including its compliance with the specified criteria, - using the specified chain engine. - - The name of the server. - Validation options (not supported by CertificateChainEngine.Native engine on Xamarin.iOS and Xamarin.Android). - Certificate chain engine. - Validation result. - - - - Saves the certificate chain to the specified path as a .P7B (PKCS #7) file. - - Path to save the certificate chain file to. - - - - Saves the certificate chain to the specified stream in .P7B (PKCS #7) format. - - Stream to write the certificate chain to. - - - - Loads a chain of Base-64-encoded X509 certificates from the specified file. - - Path to a file with the certificate chain. - A certificate chain. - - - - Gets the default certificate chain engine (platform-specific). - - - - - Gets the number of certificates in the chain. - - The number of certificates in the chain. - - - - Gets or sets the certificate at the specified position. - - The certificate at the specified position - The certificate at the specified position. - - - - Gets the certificate of the root certification authority, if available. - - Root CA certificate if available; null otherwise. - - - - Gets the first certificate in the chain, if not empty. - - Leaf certificate; null if the chain is empty. - - - - Represents a collection of X509 v3 certificates. - - - - - A base class for various collections of cryptographic objects. - - - - - A base class for various collections of cryptographic objects. - - - - - Gets an for the . - - An for the collection. - - - - Copies the range of elements from the to a compatible one-dimensional - , starting at the specified index of the target array. - - One-dimensional zero-based array that is the destination of the elements copied from . - A zero-based index in the destination array at which copying begins. - - - - Gets the number of items in the . - - The number of items in collection. - - - - Gets a value indicating whether access to the is synchronized. - - - - - Gets an object that can be used to synchronize access to the . - - - - - Adds an item to the collection. - - Item to add. - - - - Removes all elements from the collection. - - - - - Determines whether the collection contains the specified item. - - Item. - True if the collection contains the item; false if it does not. - - - - Returns a position of the specified item within the collection, or -1 if not found. - - Item to find. - Zero-based position of the item; or -1 if not found. - - - - Copies the range of elements from the collection to a compatible one-dimensional - array, starting at the specified index of the target array. - - One-dimensional zero-based array that is the destination of the elements copied from the collection. - A zero-based index in the destination array at which copying begins. - - - - Removes an item from the collection. - - An item to remove. - True if the item was removed; false if not removed. - - - - Removes an item at the specified position from the collection. - - An index of an item to remove. - - - - Adds an item to the collection at the specified position. - - Position at which to insert the item. - Item to add. - - - - Returns an enumerator that iterates through the collection. - - Enumerator. - - - - Returns a value indicating whether the collection is read-only. - - - - - Gets or sets an instance of an item at the specified index. - - The zero-based index of the item to get or set. - An item. - - - - Creates a new instance of . - - - - - Represents a certificate engine. - - - - - Initializes new instance of the class. - - - - - Validates given certificate chain using specified validation parameters. - - Certificate chain to validate. - Validation parameters. - Result of the validation. - - - - Builds a certificate chain from the specified certificate. - - A certificate to build the chain from. - The built certificate chain. - - - - Builds a certificate chain from the specified certificate. - - A certificate to build the chain from. - An extra store to search for intermediate and root CA certificates. - The built certificate chain. - - - - Gets the current certificate engine. - - The current certificate engine; null reference (Nothing in VB.NET) if no engine was set. - - - - Sets the current certificate engine. - - An engine to be used. - - - - Gets or sets the LogWriter used by this object. - - Log writer. - - - - Gets the default certificate engine which is used if no custom engine is set as current engine. - - - - - Certificate validation parameters for 's method. - - - - - Creates a new instance of . - - - - - Gets or sets validation options. - - - - - The exception that is thrown when a certificate-related error occurs. - - - - - Initializes a new instance of the class with serialized data. - - The object that holds the serialized object data. - The contextual information about the source or destination. - - - - Initializes a new instance of the Exception class - with a specified error message. - - The error message that explains the reason for the exception. - - - - Initializes a new instance of the Exception class - with a specified error message and a reference to the - inner exception that is the cause of this exception. - - The error message that explains the reason for the exception. - The exception that is the cause of the current exception. - - - - Represents a collection of X509 v3 certificate extensions. - - - - - Creates a certificate extension collection from an ASN.1 block. - - ASN.1 block. - - - - Gets the first with the specified object identifier. - - The object identifier, either friendly name or dotted string format. - A certificate extension, or null if not found. - - - - Represents an X509 v3 certificate extension. - - - - - Creates a new instance of . - - Extension object identifier. - Specifies whether the extension is critical. - Extension data. - - - - Create extended (enhanced) key usage extension (2.5.29.37). - - Specifies whether this extension is considered critical (not-critical extensions may be ignored by servers that don't support them). - Key usage OIDs. - An extension object. - - - - Creates a key usage extension (2.5.29.15). - - Key usage flags. - An extension object. - - - - Gets the object identifier that identifies the extension. - - The object identifier. - - - - Gets a value indicating whether the extension is critical. - - True if critical; false otherwise. - - - - Gets the extension value. - - An array of bytes in ASN.1 format. - - - - Options for methods. - - - - - No filter. - - - - - Only find certificates that have a private key. - - - - - Only find certificates that are time valid. - - - - - Only find certificates that can be used for client authentication. - - - - - Only find certificates that can be used for server authentication. - - - - - When searching by certificate issuer, include known subordinate CAs in the search as well. - - - - - The type of search for method. - - - - - Certificates whose subject key identifier (SKI) matches the specified value. - - - - - Specifies the location of the certificate store. - - - - None. - - - The store located at HKEY_CURRENT_USER\Software\Microsoft\SystemCertificates. - - - The store located at HKEY_LOCAL_MACHINE\Software\Microsoft\SystemCertificates. - - - The store located at HKEY_LOCAL_MACHINE\Software\Microsoft\Cryptography\Services\<ServiceName>>\SystemCertificates. - - - The store located at HKEY_LOCAL_MACHINE\Software\Microsoft\Cryptography\Services\<ServiceName>\SystemCertificates. - - - The store located at HKEY_USERS\<UserName>\Software\Microsoft\SystemCertificates. - - - The store located at HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates. - - - The store located at HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\SystemCertificates. - - - The store located at HKEY_LOCAL_MACHINE\Software\Microsoft\EnterpriseCertificates. - - - - Specifies the name of the certificate store. - - - - None. - - - Other users. - - - Third-party certificate authorities. - - - Intermediate certificate authorities. - - - Revoked certificates. - - - Personal certificates. - - - Trusted root certificate authorities. - - - Directly trusted people and resources. - - - Directly trusted publishers. - - - - Represents a certificate store. - - - - - Opens a system certificate store of the specified name a the specified location. - - The store name. - Specifies the location of the certificate store. - - Some example system stores are:
- "CA" - Certification authority certificates.
- "My" - A certificate store that holds certificates with associated private keys.
- "Root" - Root certificates.
- "SPC" - Software publisher certificate.
- "Trust"
- "Disallowed"
-
- - - Opens a system certificate store of the specified name a the specified location. - - The store name value. - Specifies the location of the certificate store. - - - - Opens a system certificate store of the specified name. - - The store name. - - Some example system stores are:
- "CA" - Certification authority certificates.
- "My" - A certificate store that holds certificates with associated private keys.
- "Root" - Root certificates.
- "SPC" - Software publisher certificate.
- "Trust"
- "Disallowed"
-
- - - Opens a system certificate store of the specified name. - - The store name value. - - - - Creates a temporary memory-based certificate store - and populates it with certificates from the specified collection. - - The certificate collection. - - - - Determines whether the specified certificate store exists. - - The store name. - Specifies the location of the certificate store. - True if the store exists; false otherwise. - - - - Determines whether the specified certificate store exists. - - The store name value. - Specifies the location of the certificate store. - True if the store exists; false otherwise. - - - - Determines whether the specified certificate store exists. - - The store name. - True if the store exists; false otherwise. - - - - Determines whether the specified certificate store exists. - - The store name value. - True if the store exists; false otherwise. - - - - Adds a certificate to this certificate store. - - Certificate to be added. - - On Windows, the certificate is added even if the same certificate is already present in the store. - If this is undesirable, use instead. - - - - - Adds a certificate to this certificate store. - - Certificate to be added. - - - - Removes a certificate from this certificate store. - - Certificate to be removed. - - - - Returns all certificates matching the specified criteria. - - Specifies the type of search being made. - A byte array whose meaning is defined by 'findType'. - Options. - An array of certificates. - - - - Returns all certificates issued by the specified issuer (or its subordinate issuer) and corresponding to the specified options. - - Issuer DN. - Options. - An array of certificates. - - - - Returns all certificates with the specified serial number issued by the specified issuer (or its subordinate issuer) - and corresponding to the specified options. - - Issuer DN. - Certificate serial number. - Options. - An array of certificates. - - - - Returns all certificates issued by one of specified issuers (or their subordinate issuer) and corresponding to the specified options. - - An array of issuers' DNs. - Options. - An array of certificates. - - - - Returns all certificates issued by one of specified issuers (or their subordinate issuer) and corresponding to the specified options. - - An array of issuers' DNs. - Certificate serial number. - Options. - An array of certificates. - - - - Returns all certificates matching the specified certificate and options. - - Certificate to find. - Options. - An array of certificates. - - - - Returns all certificates corresponding to the specified options. - - Options. - An array of certificates. - - - - Returns all certificates corresponding to the specified e-mail address. - - E-mail address. - An array of certificates. - - - - Returns all certificates corresponding to the specified e-mail address and options. - - E-mail address. - Options. - An array of certificates. - - - - Disposes the object and releases resources. - - - Calling this method ensures that all resources are freed. - - - - - Finalizer called by garbage collector. - - - - - Gets a handle of the certificate store. - - A handle of the certificate store. - -

- Only supported on Windows platforms. -

-
-
- - - Represents a distinguished name. - - - - - Creates an instance of distinguished name from an ASN.1 block. - - ASN.1 block. - - - - Creates an instance of distinguished name from a DN string. - - DN string. - - - - Returns the DN's common name, if available. - - Common name; or null if not available. - - - - Returns the list of DN's e-mail addresses. - - The list of addresses. - - - - Determines whether the specified object is equal to the current object. - - Object to compare with the current object. - True if equal; false if not equal. - - - - Servers as a hash function for a particular type. Suitable for use in hashing algorithms and hash tables. - - Hash code. - - - - Converts a distinguished name into a byte array. - - Byte array. - - - - Returns a string representation of the object. - - A DN string. - - - - Converts string DN to its BER-encoded representation. - - String DN. - BER-encoded DN. - - - - Converts BER-encoded representation of DB to its string representation. - - BER-encoded DN. - String DN. - - - - Represents a collection of CRL distribution points. - - - - - Creates a new instance of . - - - - - A CRL distribution point. - - - - - Create a new instance of a CRL distribution point that represents the specified URL. - - CRL URL. - - - - Gets distribution point URL, if available. - - Distribution point URL, or null if not available. - - - - Certificate validation method options. (Not supported by CertificateChainEngine.Native engine on Xamarin.iOS and Xamarin.Android). - - - - - No options specified. - - - - - Ignore an invalid time (such as expiration). - - - - - Ignore an invalid certificate trust list time. - - - - - Ignore an invalid time nesting. - - - - - Ignore all invalid time checks (such as expiration, nesting, CRL or CTL times). - - - - - Ignore invalid basic constraints. - - - - - Allow unknown certification authority. - - - - - Ignore wrong usage of the certificate. - - - - - Ignore invalid policy. - - - - - Ignore an unknown revocation status of the end certificate. - - Not supported in builds for .NET CF. - - - - Ignore an unknown revocation status of the certificate trust list signer. - - Not supported in builds for .NET CF. - - - - Ignore an unknown revocation status of the CA certificate. - - Not supported in builds for .NET CF. - - - - Ignore an unknown revocation status of a root certificate. - - Not supported in builds for .NET CF. - - - - Ignore all unknown revocation statuses. - - - - - Not supported. - - Not supported in builds for .NET CF. - - - - Not supported. - - Not supported in builds for .NET CF. - - - - Only use local cache, do not access the network. - - Not supported in builds for .NET CF. - - - - Ignore invalid common name. - - - - - Skip certificate revocation check. - - - - - Ignore invalid chain. - - - - - Certificate validation status. - - - - - This certificate or one of the certificates in the certificate chain is not time valid. - - - - - Certificates in the chain are not properly time nested. - - - - - Trust for this certificate or one of the certificates in the certificate chain has been revoked. - - - - - The certificate or one of the certificates in the certificate chain does not have a valid signature. - - - - - The certificate or certificate chain is not valid for its proposed usage. - - - - - The certificate or certificate chain is based on an untrusted root. - - - - - The revocation status of the certificate or one of the certificates in the certificate chain is unknown. - - - - - One of the certificates in the chain was issued by a certification authority that the original certificate had certified. - - - - - One of the certificates has an invalid extension. - - - - - The certificate or one of the certificates in the certificate chain has - a policy constraints extension, and one of the issued certificates has - a disallowed policy mapping extension or does not have a required issuance - policies extension. - - - - - The certificate or one of the certificates in the certificate chain has - a basic constraints extension and either the certificate cannot be used - to issue other certificates or the chain path length has been exceeded. - - - - - The certificate or one of the certificates in the certificate chain has - an invalid name constraints extension. - - - - - The certificate or one of the certificates in the certificate chain has a name constraints extension containing unsupported fields. - - - - - The certificate or one of the certificates in the certificate chain has a name constraints extension and a name constraint is missing for one of the name choices in the end certificate. - - - - - The certificate or one of the certificates in the certificate chain has a name constraints extension and there is not a permitted name constraint for one of the name choices in the end certificate. - - - - - The certificate or one of the certificates in the certificate chain has a name constraints extension and one of the name choices in the end certificate is explicitly excluded. - - - - - The certificate chain is not complete. - - - - - A CTL used to create this chain was not time valid. - - - - - A CTL used to create this chain did not have a valid signature. - - - - - A CTL used to create this chain is not valid for this usage. - - - - - The revocation status of the certificate or one of the certificates in the certificate chain is either off-line or stale. - - - - - The end certificate does not have any resultant issuance policies, and one of the issuing CA certificates has a policy constraints extension requiring it. - - - - - The certificate chain contains a certificate with unsupported signature hash algorithm (usually SHA-2) or unsupported key algorithm (usually ECDSA). - - - - - Unknown error. - - - - - A path length constraint in the certification chain has been violated. - - - - - A certificate contains an unknown extension that is marked critical. - - - - - A certificate chain is invalid, - such as an certificate's Issuer not matching the CA's Subject or - an certificate's AKI not matching the CA's SKI. - - - - - A certificate chain could not be built to a trusted root authority. - - Not supported in builds for .NET CF. - - - - The certificate's CN name does not match the passed value. - - - - - A certification chain processed correctly, but one of the CA certificates - is not trusted by the policy provider. - - Not supported in builds for .NET CF. - - - - The certificate was explicitly marked as untrusted by the user or CA. - - - - - A certificate or CRL is malformed. - - - - - There might be more errors apart from those reported. - - - - - Certificate uses algorithm which is not considered secure on this platform. - - - - - Certificate is not trusted. - - - - - Represents the result of certificate chain validation. - - - - - Initialize instance of the . - - A validation status (use zero for success). - - - - Gets the status mask. - - Status mask. - - - - Gets the certificate chain validity status. - - True if valid, false if not valid. - - - - Gets the native error code returned by the validation function (this property returns always zero). - - The error code returned by the validation function. - - - - Gets the native error code returned by the validation function or zero if the native error code is not available. - - The error code returned by the validation function. - - - - Key material deriver. - - - - - Derives key material. - - Parameters that specify how to derive the key material.. - Key material. - - - - Finalizer. Called by garbage collector during object destruction. - - - - - Disposes the deriver object. - - - - - Specifies asymmetric algorithm. - - - - - RSA. - - - - - DSA. - - - - - Diffie-Hellman. - - - - - Elliptic Curve Digital Signature Algorithm (.NET >= 4.0 or through a plugin). - - - - - Elliptic Curve Diffie-Hellman algorithm (.NET >= 4.0 or through a plugin). - - - - - Twisted Edwards Curve DSA algorithm such as ED25519 (supported through a plugin). - - - - - Specifies key blob format. - - - - - ECPrivateKey (defined by RFC 5915). - - - - - Raw public key data. - - - - - Raw private key data. - - - - - A platform-independent asymmetric algorithm object. - - - - - Register custom asymmetric key algorithm. - - Factory function that accepts algorithm name and returns algorithm. - - - - Gets CSP parameters if the instance of represents a key stored in a Windows Cryptographic Service Provider. - - CSP parameters if available; null if not available. - - - - Creates an instance of . - - - - - Frees the resources used by this object. - - - - - Creates an instance of from the specified asymmetric algorithm object. - - Asymmetric algorithm object. - True if the created object owns the asymmetric algorithm object. - An instance of . - - - - Exports a public key to the specified private key info object. - - Public key info object. - - - - Exports a private key to the specified private key info object. - - Private key info object. - - - - Imports a key from the specified public key info object. - - Public key info object. - - - - Imports a key from the specified private key info object. - - Private key info object. - - - - Imports a key from the specified RSA parameters. - - RSA key parameters. - - - - Imports a key from the specified DSA parameters. - - DSA key parameters. - - - - Imports a key from the specified Diffie-Hellman parameters. - - Diffie-Hellman key parameters. - - - - Imports a private key for the specified algorithm/curve. Only some algorithms/curves are supported. - - Key algorithm. - Key algorithm curve. - Key data. - Key format. - - - - Returns a value indicating whether the specified algorithm is supported. - - Asymmetric algorithm. - Curve name or OID (if needed). - Key size (specify 0 to indicate default key size). - True if supported; false if not supported. - - - - Generates Diffie-Hellman parameters corresponding to the specified key size. - - Key size. - Diffie-Hellman parameters. - - - - Generates a private key for the specified asymmetric algorithm with of the specified key size. - - Key algorithm. - Key size. Specify 0 to use default key size. - - - - Generates a private key for the specified asymmetric algorithm based on the specified curve. - - Key algorithm. - Curve name or OID. - - - - Computes the signature for the specified hash value. - - The hash value of the data to be signed. - A hash algorithm used to create the hash value. - The signature for the specified hash value. - -

- The private key must be available for this method to succeed. -

-
-
- - - Computes the signature for the specified message (using default parameters). - - Message to be signed. - Signature for the specified message. - -

- The private key must be available for this method to succeed. -

-
-
- - - Computes the signature for the specified message. - - Message to be signed. - Signature parameters. - Signature for the specified message. - -

- The private key must be available for this method to succeed. -

-
-
- - - Verifies the specified signature. - - The hash value of the signed data. - A hash algorithm used to create the hash value. - The signature for the specified hash value. - True if the signature verifies as valid; otherwise, false. - - - - Verifies the specified signature (using default parameters). - - Signed message. - The signature for the specified message. - True if the signature verifies as valid; otherwise, false. - - - - Verifies the specified signature. - - Signed message. - The signature for the specified message. - Signature parameters. - True if the signature verifies as valid; otherwise, false. - - - - Encrypts data. - - Data to be encrypted. - Encrypted data. - - - - Encrypts data. - - Data to be encrypted. - Encryption parameters. - Encrypted data. - - - - Decrypts data. - - Data to be decrypted. - Decrypted data. - - If silent operation is requested and the CSP must display UI to operate, this method will fail. - - - - - Decrypts data. - - Data to be decrypted. - Encryption parameters. - Decrypted data. - - - - Gets key material deriver. Only supported by Diffie-Hellman-like algorithms. - - Other side's public key in raw form. - Key material deriver. - - - - Gets the current key size. - - - - - Gets the current key algorithm. - - - - - Gets a value indicating whether this instance only contains the public key. - - - - - Provides various cryptography-related helper methods. - - - - - Creates an instance of default random number generator. - - - - - - Returns an array of bytes with a cryptographically strong random sequence of values. - - Array length. - Array filled with random data. - - - - Fills specified array of bytes with a cryptographically strong random sequence of values. - - Array to fill random data with. - - - - Decodes a signature from a PKCS #7 form. - - Signature. - Key algorithm. - Decoded signature. - - - - Encodes a signature to a PKCS #7 form. - - Signature. - Key algorithm. - Encoded signature. - - - - Sets internal option. - - Instance. - Name. - Value. - - - - Gets internal option. - - Instance. - Name. - Value. - - - - Forces RijndaelManaged to be used even when AesCryptoServiceProvider is available. - - True if RijndaelManaged is to be used instead of AesCryptoServiceProvider; false otherwise. - - - - Enables or disables an option that specifies whether only FIPS 140-2 compliant cryptographic algorithm providers are to be used. - - True if only FIPS 140-2 compliant algorithms are to be used; false to allow all supported algorithms. - - In .NET 2.0 and higher, this option reflects the Windows OS settings unless explicitly set to a different value. - - - - - Implements Diffie-Hellman key agreement protocol (also called exponential key agreement). - - - This algorithm was developed by Diffie and Hellman in 1976. It allows two users - to exchange a secret key over an insecure medium without any prior secrets. - - - - - Initializes a new instance of DiffieHellman. - - - You cannot create an instance of an abstract class. - Create an instance of class instead. - - - - - Returns the public key. - - The public key. - - - - Calculates the shared secret key from the other side's public key. - - Other side's public key. - The shared secret key. - - - - Imports the specified . - - The Diffie-Hellman parameters. - - - - Exports the . - - true to include private parameter; otherwise, false. - The Diffie-Hellman parameters. - - - - Returns Oakley generator value. - - Oakley generator. - - - - Returns Oakley group 2. - - Oakley group 2. - - - - Returns Oakley group 14. - - Oakley group 14. - - - - Wrapper around Diffie-Hellman CSP. - - - - - Creates an instance of using the default key size of 1024. - - - - - Creates an instance of using the specified key size. - - Key size. - - - - Returns the public key. - - The public key. - - - - Imports the specified . - - The Diffie-Hellman parameters. - - - - Exports the . - - true to include private parameter; otherwise, false. - The Diffie-Hellman parameters. - - - - Creates and returns an XML string representation of the current object. - - true to include private parameters; otherwise, false. - An XML string encoding of the current object. - - - - When overridden in a derived class, reconstructs a DiffieHellmanManaged object from an XML string. - - The XML string to use to reconstruct the DiffieHellmanManaged object. - - - - Releases the unmanaged resources and optionally releases the managed resources. - - true to release both managed and unmanaged resources; false to release only unmanaged resources. - - - - Gets the name of the signature algorithm available with this implementation of DiffieHellman. - - The name of the signature algorithm. - DiffieHellman does not support signatures. This property will throw an exception. - - - - Gets the name of the key exchange algorithm available with this implementation of DiffieHellman. - - The name of the key exchange algorithm. - - - - Managed implementation of Diffie-Hellman algorithm. - - - - - Initializes a new instance of the DiffieHellmanManaged class. - - - - - Initializes a new instance of the DiffieHellmanManaged class - with a specified key size. - - The size of the key to use in bits. - - - - Creates and returns an XML string representation of the current object. - - true to include private parameters; otherwise, false. - An XML string encoding of the current object. - - - - When overridden in a derived class, reconstructs a DiffieHellmanManaged object from an XML string. - - The XML string to use to reconstruct the DiffieHellmanManaged object. - - - - Returns the public key. - - The public key. - - - - Imports the specified . - - The Diffie-Hellman parameters. - - - - Exports the . - - true to include private parameter; otherwise, false. - The Diffie-Hellman parameters. - - - - Releases the unmanaged resources and optionally releases the managed resources. - - true to release both managed and unmanaged resources; false to release only unmanaged resources. - - - - Gets the name of the signature algorithm available with this implementation of DiffieHellman. - - The name of the signature algorithm. - DiffieHellman does not support signatures. This property will throw an exception. - - - - Gets the name of the key exchange algorithm available with this implementation of DiffieHellman. - - The name of the key exchange algorithm. - - - - Contains the parameters for Diffie-Hellman algorithm. - - - - - The prime modulus used for the operation. - - - - - The generator used for the operation. - - - - - The private key for the operation. - - - - - The public key for the operation. - - - - - Managed implementation of DSA signature algorithm. - - -

- The purpose of this class is to make it possible to verify - signatures without the need to use CryptoAPI, which is not available - in some scenarios. -

-

- Even though it is possible to generate DSA keys and sign data using - this class, but this process has not been optimized for speed and is - very slow. -

-
-
- - - Initializes a new instance of the DSAManaged class with the key size of 1024. - - - - - Initializes a new instance of the DSAManaged class with the specified key size. - - The size of the key to use in bits. - - - - Initializes a new instance of the DSAManaged class with the specified key size and seed. - - The size of the key to use in bits. - The initial seed to use for key generation. - - - - Creates and returns an XML string representation of the current object. - - true to include private parameters; otherwise, false. - An XML string encoding of the current object. - - - - When overridden in a derived class, reconstructs a DSAManaged object from an XML string. - - The XML string to use to reconstruct the DSAManaged object. - - - - Encodes the signature in raw format (40 bytes) using the DER encoding of DssSigValue. - - Raw signature. - DER encoded signature - - - - Decodes the DER encoding of DssSigValue to raw format (40 bytes). - - DER encoded signature. - Raw signature - - - - Exports the . - - true to include private parameters; otherwise, false. - The DSA parameters. - - - - Imports the specified . - - The DSA parameters. - - - - Creates the DSA signature for the specified data. - - The SHA1 hash of data to be signed. - The DSA signature for the specified hash value. - - DSA signature is a pair of numbers r and s. - This method always returns an array of 40 bytes. - Bytes 0..19 contain the value of r, bytes 20..39 contain the value of s. - - - - - Verifies the DSA signature for the specified data. - - The SHA1 hash of signed data to be verified. - The signature to be verified for rgbData. - true if the signature verifies as valid; otherwise, false. - - DSA signature is a pair of numbers r and s. - The rgbSignature parameter must be 40 bytes long. - Bytes 0..19 must contain the value of r, bytes 20..39 must contain the value of s. - - - - - Computes the signature for the specified hash value by signing - it with the private key. - - The SHA1 hash of data to be signed. - The DSA signature for the specified hash value. - - - - Verifies the specified signature data by comparing it to the signature computed for the specified hash value. - - The hash value of the signed data. - The signature data to be verified. - true if the signature verifies as valid; otherwise, false. - - - - Computes the hash value of the specified byte array using the specified hash algorithm, and signs the resulting hash value. - - The input data for which to compute the hash. - The hash algorithm to use to create the hash value. - The DSA signature for the specified data. - - - - Verifies the specified signature data by comparing it to the signature computed for the specified data. - - The signed data. - The hash algorithm used to create the hash value of the data. - The signature data to be verified. - true if the signature verifies as valid; otherwise, false. - - - - Releases the unmanaged resources and optionally releases the managed resources. - - true to release both managed and unmanaged resources; false to release only unmanaged resources. - - - - Gets the name of the signature algorithm available with this implementation of DSA. - - The name of the signature algorithm. - - - - Gets the name of the key exchange algorithm available with this implementation of DSA. - - The name of the key exchange algorithm. - - - - Encryption schemes. - - - - - Default padding scheme (depends on key algorithm). - - - - - RSAES-PKCS1-v1_5 (RFC 3447). - - - - - RSAES-OAEP (RFC 3447). - - - - - Encryption parameters. - - - - - Initialize new instance of the . - - - - - Encryption scheme. - - - - - Hashing algorithm for padding generation. - - - - - Optional input parameter for . - - - - - If set to true (default), the cryptographic provider should not display any user interface (UI) when working with private keys. - Only used for decryption operations. - - - If silent operation is requested and the cryptographic provider needs to display a UI to operate, the requested method will fail. - - - - - Represents a hash transform. - - - - - Computes the hash value for the specified region of the input byte array. - - The input to compute the hash code for. - The offset into the input byte array from which to begin using data. - The number of bytes in the input byte array to use as data. - - - - Gets the value of the computed hash code. - - The computed hash value. - - - - Resets the transform. - - - - - Represents the size, in bits, of the computed hash code. - - - - - Specifies hash algorithm. - - - - - SHA-1. - - - - - SHA-256. - - - - - SHA-384. - - - - - SHA-512. - - - - - MD4. - - - - - MD5. - - - - - Specifies hash algorithm key mode. - - - - - No keyed hash. - - - - - HMAC. - - - - - Represents a hash algorithm. - - - - - Gets the current key. - - The current key. - - - - Sets the current key to the specified value. - - Key to be set. - - - - Creates an instance of for the specified algorithm. - - Algorithm. - - - - Gets a value indicating whether the specified algorithm is supported. - - Algorithm. - True if supported; false if not supported. - - - - Creates a hash transform object for this algorithm based on the currently set parameters. - - Hash transform object. - - - - Creates a hash transform object for this algorithm based on the currently set parameters. - - Hash transform object. - - - - Computes the hash value for the specified data. - - Input data. - Hash value. - - - - Computes the hash value for the specified data. - - Input data. - Input offset. - Input length. - Hash value. - - - - Computes the hash value for the specified data using the specified algorithm. - - Hash algorithm. - Input data. - Hash value. - - - - Computes the hash value for the specified data using the specified algorithm. - - Hash algorithm. - Input data. - Input offset. - Input length. - Hash value. - - - - Disposes the object. - - - - - Gets algorithm ID. - - - - - Gets the size of the computed hash code (in bits). - - - - - Gets or sets the algorithm's key mode. - - - - - Computes a Hash-based Message Authentication Code (HMAC) - for the input data using the specified hash function. - - - HMAC is defined by RFC 2104 and look like this: - alg(K XOR opad + alg(K XOR ipad + text))
- where alg is the base hash algorithm,
- K is an n byte key,
- ipad is the byte 0x36 repeated 64 times (or 128 times),
- opad is the byte 0x5c repeated 64 times (or 128 times),
- and text is the data being protected.
-
- - - Initializes a new instance of the HMAC class with the specified hash algorithm and key data. - - A type of hash algorithm to use. Must be a subclass of HashAlgorithm. - The secret key for HMAC encryption. - - - - Initializes a new instance of the HMAC class with the specified hash algorithm and key data. - - A type of hash algorithm to use. - The secret key for HMAC encryption. - - - - Initializes a new instance of the HMAC class with the specified hash algorithm and a randomly generated key. - - A type of hash algorithm to use. Must be a subclass of HashAlgorithm. - - - - Initializes a new instance of the HMAC class with the specified hash algorithm and a randomly generated key. - - A type of hash algorithm to use. Must be a subclass of HashAlgorithm. - - - - Initializes an instance of HMAC. - - - - - Routes data written to the object into the hash algorithm for computing the HMAC. - - The input data. - The offset into the byte array from which to begin using data. - The number of bytes in the array to use as data. - - - - Returns the computed Hash-based Message Authentication Code (HMAC) after all data has been written to the object. - - The computed HMAC. - - - - Releases the unmanaged resources used by the HMAC and optionally releases the managed resources. - - true to release both managed and unmanaged resources; false to release only unmanaged resources. - - - - Gets or sets the key to be used in the hash algorithm. - - The key to be used in the hash algorithm. - - - - Key derivation options. - - - - - Key derivation parameters. - - - - - Gets or sets key derivation function ("HASH" or "HMAC"). - - - - - Hashing algorithm. - - - - - HMAC key. - - - - - Data to append to shared secret when hashing. - - - - - Data to prepend to shared secret when hashing. - - - - - Represents the base class from which all implementations of the ArcFour algorithm must derive. - - - - - Initializes a new instance of ArcFour. - - - You cannot create an instance of an abstract class. - Create an instance of class instead. - - - - - Generates a random initialization vector (IV) to be used for the algorithm. - - ArcFour is a stream cipher, it does not use IV. - - - - Generates a random key to be used for the algorithm. - - Use this method to generate a random key when none is specified. - - - - Creates a cryptographic object to perform the ArcFour algorithm. - - A cryptographic object to perform the ArcFour algorithm. - - - - Gets or sets the block size of the cryptographic operation in bits. - - The block size. - ArcFour is a stream cipher, blocks can be of any size. - - - - Gets or sets the initialization vector (IV) for the symmetric algorithm. - - Initialization vector. - ArcFour is a stream cipher, it does not use IV. - - - - Gets or sets the mode for operation of the symmetric algorithm. - - The mode for operation. - ArcFour is a stream cipher, the only mode supported is CipherMode.OFB. - - - - Gets or sets the padding mode used in the symmetric algorithm. - - The padding mode. - ArcFour is a stream cipher, no padding is done. - - - - The managed version of the ArcFour algorithm. - - - - - Initializes a new instance of ArcFourManaged class. - - - - - Creates a symmetric ArcFour decryptor object with the specified Key and initialization vector (IV). - - The secret key to be used for the symmetric algorithm. - The IV. Not used by ArcFour. - A symmetric ArcFour decryptor object. - - - - Creates a symmetric ArcFour encryptor object with the specified Key and initialization vector (IV). - - The secret key to be used for the symmetric algorithm. - The IV. Not used by ArcFour. - A symmetric ArcFour encryptor object. - - - - The managed version of the algorithm defined by RFC 2268. - - - - - Initializes a new instance of class. - - - - - Generates a random initialization vector (IV) to be used for the algorithm. - - Use this method to generate a random initialization vector (IV) when none is specified. - - - - Generates a random key to be used for the algorithm. - - Use this method to generate a random key when none is specified. - - - - Creates a RC2 encryptor object with the specified key. - - The secret key to be used for the symmetric algorithm. - The initialization vector for - . - A RC2 encryptor object. - - - - Creates a RC2 decryptor object with the specified key. - - The secret key to be used for the symmetric algorithm. - The initialization vector for . - A RC2 decryptor object. - - - - Gets or sets the mode for operation of the symmetric algorithm. - - The mode for operation of the symmetric algorithm. - - - - Gets or sets the padding mode used in the symmetric algorithm. - - The padding mode used in the symmetric algorithm. - - - - Represents the base class from which all implementations of Bruce Schneier's Blowfish algorithm must derive. - - - - - Initializes a new instance of Blowfish. - - - You cannot create an instance of an abstract class. - Create an instance of class instead. - - - - - Creates a cryptographic object to perform the Schneier's Blowfish algorithm. - - A cryptographic object to perform the Schneier's Blowfish algorithm. - - - - The managed version of the Blowfish algorithm. - - - - - Initializes a new instance of class. - - - - - Generates a random initialization vector (IV) to be used for the algorithm. - - Use this method to generate a random initialization vector (IV) when none is specified. - - - - Generates a random key to be used for the algorithm. - - Use this method to generate a random key when none is specified. - - - - Creates a Blowfish encryptor object with the specified key. - - The secret key to be used for the symmetric algorithm. - The initialization vector for - . - A Blowfish encryptor object. - - - - Creates a Blowfish decryptor object with the specified key. - - The secret key to be used for the symmetric algorithm. - The initialization vector for - . - A Blowfish decryptor object. - - - - Gets or sets the mode for operation of the symmetric algorithm. - - The mode for operation of the symmetric algorithm. - - - - Gets or sets the padding mode used in the symmetric algorithm. - - The padding mode used in the symmetric algorithm. - - - - Computes the combined MD5/SHA1 hash for the input data. - - - The resulting hash value is 36 bytes long. - Bytes 0..15 contain the MD5 hash and bytes 16..35 contain the SHA1 hash. - - - - - Initializes a new instance of the MD5SHA1 class. - - - - - Creates an instance of the MD5SHA1 hash algorithm. - - A new instance of the MD5SHA1 hash algorithm. - - - - Initializes an instance of MD5SHA1. - - - - - Routes data written to the object into MD5 and SHA1 hash algorithms for computing the hash. - - The array of data bytes. - The offset into the byte array from which to begin using data. - The number of bytes in the array to use as data. - - - - Returns the computed MD5SHA1 hash as an array of bytes after all data has been written to the object. - - The computed hash value. - - - - Releases the unmanaged resources used by the MD5SHA1 and optionally releases the managed resources. - - true to release both managed and unmanaged resources; false to release only unmanaged resources. - - - - Returns the underlying instance of the MD5 object that is used to compute the MD5 part of the combined hash. - - - - - Returns the underlying instance of the SHA1 object that is used to compute the SHA1 part of the combined hash. - - - - - Represents the base class from which all implementations of Bruce Schneier's Twofish algorithm must derive. - - - - - Initializes a new instance of Twofish. - - - You cannot create an instance of an abstract class. - Create an instance of class instead. - - - - - Creates a cryptographic object to perform the Schneier's Twofish algorithm. - - A cryptographic object to perform the Schneier's Twofish algorithm. - - - - The managed version of the Twofish algorithm. - - - - - Initializes a new instance of class. - - - - - Generates a random initialization vector (IV) to be used for the algorithm. - - Use this method to generate a random initialization vector (IV) when none is specified. - - - - Generates a random key to be used for the algorithm. - - Use this method to generate a random key when none is specified. - - - - Creates a Twofish encryptor object with the specified key. - - The secret key to be used for the symmetric algorithm. - The initialization vector for - . - A Twofish encryptor object. - - - - Creates a Twofish decryptor object with the specified key. - - The secret key to be used for the symmetric algorithm. - The initialization vector for - . - A Twofish decryptor object. - - - - Gets or sets the mode for operation of the symmetric algorithm. - - The mode for operation of the symmetric algorithm. - - - - Gets or sets the padding mode used in the symmetric algorithm. - - The padding mode used in the symmetric algorithm. - - - - Managed implementation of MD5 algorithm. - - - - - Initializes a new instance. - - - - - Initializes an instance of MD5. - - - - - Updates the MD5 hash code. - - The array of data bytes. - The zero based offset into the byte array from which to begin using data. - The number of bytes in the array to use as data. - - - - Returns the computed MD5 hash as an array of bytes. - - The computed MD5 hash value. - - - - Managed implementation of MD4 algorithm. - - - - - Initializes a new instance. - - - - - Initializes an instance of MD4. - - - - - Updates the MD4 hash code. - - The array of data bytes. - The zero based offset into the byte array from which to begin using data. - The number of bytes in the array to use as data. - - - - Returns the computed MD4 hash as an array of bytes. - - The computed MD4 hash value. - - - - Represents a cryptographic object identifier. - - - - - Initializes a new instance of the class using the specified object. - - The object identifier information to use to create the new object identifier. - - - - Initializes a new instance of the class using the specified OID dotted number string. - - An object identifier in dotted number format. - - - - Converts a OID to an . - - An object identifier in dotted number format. - An . - - - - Parses an OID from an ASN.1 encoded byte array. - - Byte array. - OID. - - - - Gets an ASN.1 encoded byte array representaion of this OID. - - Byte array. - - - - Gets an ASN.1 encoded byte array representaion of this OID. - - True if DER-formatting is to be used. - Byte array. - - - - Returns a string in dotted number format that represents the current . - - A string representation of the current Oid. - - - - Gets the dotted number representation of the object identifier. - - - - - PKCS #12 key derivation algorithm. - - - - - ID value for key material. - - - - - ID value for IV material. - - - - - ID value for MAC material. - - - - - Initializes a new instance of PKCS #12 key derivation algorithm. - - Hash algorithm. - Password. - Salt value. - Number of iterations. - ID value. - - - Resets the state of the operation. - - - Returns a pseudo-random key from a password, salt and iteration count. - A byte array filled with pseudo-random key bytes. - The number of pseudo-random key bytes to generate. - - - - Managed implementation of RSA algorithm. - -

- The purpose of this class is to make it possible to verify - signatures and encrypt data without the need to use CryptoAPI, which - is not available in some scenarios. -

-

- Even though it is possible to generate RSA keys and sign data using - this class, it is not recommended because the generated keys are not - being checked to ensure they are strong primes. -

-
- - - Initializes a new instance of the RSAManaged class with the key size of 1024. - - - - - Initializes a new instance of the RSAManaged class with the specified key size. - - The size of the key to use in bits. - - - - Exports the . - - true to include private parameters; otherwise, false. - The RSA parameters. - - - - Imports the specified . - - The RSA parameters. - - - - Decrypts data with the RSA algorithm. - - The data to be decrypted. - The decrypted data. - No processing of raw data is performed. - - - - Encrypts data with the RSA algorithm. - - The data to be encrypted. - The encrypted data. - No processing of raw data is performed. - - - - Decrypts data with the RSA algorithm. - - The data to be decrypted. - The decrypted data. - Uses PKCS#1 v1.5 padding. - - - - Encrypts data with the RSA algorithm. - - The data to be encrypted. - The encrypted data. - Uses PKCS#1 v1.5 padding. - - - - Verifies the specified signature data by comparing it to the signature computed for the specified hash value. - - The hash value of the signed data. - The signature data to be verified. - true if the signature verifies as valid; otherwise, false. - - - - Verifies the specified signature data by comparing it to the signature computed for the specified hash value. - - RSA algorithm. - The hash value of the signed data. - A hash algorithm used to create the hash value. - The signature data to be verified. - true if the signature verifies as valid; otherwise, false. - - - - Verifies the specified signature data by comparing it to the signature computed for the specified hash value. - - The hash value of the signed data. - A hash algorithm used to create the hash value. - The signature data to be verified. - true if the signature verifies as valid; otherwise, false. - - - - Computes the signature for the specified hash value by signing - it with the private key. - - The hash of data to be signed. - The RSA signature for the specified hash value. - - - - Computes the signature for the specified hash value by signing - it with the private key. - - RSA algorithm. - The hash of data to be signed. - A hash algorithm used to create the hash value. - The RSA signature for the specified hash value. - - - - Computes the signature for the specified hash value by signing - it with the private key. - - The hash of data to be signed. - A hash algorithm used to create the hash value. - The RSA signature for the specified hash value. - - - - Verifies the specified signature data by comparing it to the signature computed for the specified data. - - The data that was signed. - The hash algorithm used to create the hash value of the data. - The signature data to be verified. - true if the signature verifies as valid; otherwise, false. - - - - Computes the hash value of the specified byte array using the specified hash algorithm, and signs the resulting hash value. - - The input data for which to compute the hash. - The hash algorithm to use to create the hash value. - The RSA signature for the specified data. - - - - Releases the unmanaged resources and optionally releases the managed resources. - - true to release both managed and unmanaged resources; false to release only unmanaged resources. - - - - Gets the name of the signature algorithm available with this implementation of RSA. - - The name of the signature algorithm. - - - - Gets the name of the key exchange algorithm available with this implementation of RSA. - - The name of the key exchange algorithm. - - - - Signature format. - - - - - Raw signature data. - - - - - DER-encoded ASN.1 form of the signature formatted according to Cryptographic Message Syntax (PKCS #7). - - - - - Signature padding scheme. - - - - - Default padding scheme (depends on key algorithm). - - - - - PKCS #1 padding scheme (RSASSA-PKCS1-v1_5 defined by RFC 3447). - - - - - Probabilistic Signature Scheme (PSS) padding scheme (RSASSA-PSS defined by RFC 3447). - - - - - Signature parameters. - - - - - Creates a new instance of . - - - - - Hashing algorithm. - - - - - Signature format. - - - - - Signature padding scheme. - - - - - Salt length in bytes (only used for ). - - - - - If set to true (default), the cryptographic provider should not display any user interface (UI) when working with private keys. - Only used for signing operations. - - - If silent operation is requested and the cryptographic provider needs to display a UI to operate, the requested method will fail. - - - - - Specifies symmetric algorithm. - - - - - AES. - - - - - 3DES. - - - - - Twofish. - - - - - DES. - - - - - RC2. - - - - - An algorithm compatible with RC4. - - - - - Blowfish. - - - - - Represents a symmetric cipher algorithm. - - - - - Gets the current initialization vector. - - Initialization vector. - - - - Gets the current key. - - Key. - - - - Derives a key (of length) using the specified generator. - - Generator algorithm. - - - - Derives an initialization vector (of length) using the specified generator. - - Generator algorithm. - - - - Generates a random key (of length). - - - - - Generates a initialization vector (of length). - - - - - Sets the current key to the specified value and changes the accordingly. - - Key. Cannot be null. - - - - Sets the current initialization vector to the specified value. - - Initialization vector. - - - - Creates an encryptor object for this algorithm based on the currently set parameters. - - Encryptor object. - - - - Creates a decryptor object for this algorithm based on the currently set parameters. - - Decryptor object. - - - - Creates a symmetric algorithm object for this algorithm based on the currently set parameters. - - Symmetric algorithm object. - - - - Disposes the object. - - - - - Creates an instance of for the specified algorithm. - - Algorithm. - - - - Gets a value indicating whether the specified algorithm is supported. - - Algorithm. - True if supported; false if not supported. - - - - Gets algorithm ID. - - - - - Gets or sets the desired block size in bits. - - - - - Gets or sets the desired key size in bits. - - - - - Gets or sets the desired effective key size in bits. - - - - - Gets or sets the desired block cipher padding mode. - - - - - Gets or sets the desired block cipher mode. - - - - - The AlgorithmIdentifier class defines an algorithm used for a cryptographic operation. - - - - - Creates an instance of the class - with the specified algorithm identifier. - - An object identifier for the algorithm. - - - - Creates an instance of the class with - the specified algorithm identifier and parameters. - - An object identifier for the algorithm. - ASN.1 DER encoded parameters. - - - - Gets the object identifier for the algorithm. - - On that represents the algorithm. - - - - Gets the algorithm parameters. - - The algorithm parameters. - - - - A collection of values associated with a . - - - - - Copies the range of elements from the to a compatible one-dimensional - array, starting at the specified index of the target array. - - One-dimensional zero-based array that is the destination of the elements copied from . - A zero-based index in the destination array at which copying begins. - - - - Gets the value at the specified index. - - An array of bytes in ASN.1 format. - - - - A cryptographic attribute that contains a type and a collection of associated values. - - - - - Initializes an instance of a . - - The object identifier that identifies the attribute type. - Parameters in ASN.1 format, in a form of one or more byte arrays. - - - - Initializes an instance of a . - - The object identifier that identifies the attribute type. - Parameters in ASN.1 format. - Not supported in .NET 1.0, use instead. - - - - Gets the object identifier that identifies the attribute type. - - The object identifier. - - - - Gets the collection of values associated with the attribute. - - A . - - - - A collection of objects. - - - - - Gets or sets the at the specified index. - - The zero-based index of the to get or set. - A cryptographic attribute. - - - - Gets the first with the specified object identifier. - - The object identifier, either friendly name or dotted string format. - A cryptographic attribute if found, or null if not found. - - - - Contains string representations of common extended usage OIDs. - - - - Any purpose. - - - TLS Web server authentication. - - - TLS Web client authentication. - - - Code signing. - - - E-mail protection. - - - Timestamping. - - - OCSPstamping. - - - - A utility class that features a certificate issuer functionality. This can be used as a base of simple custom certification authority. - - - - - Issues a certificate signed by the specified certification authority using the specified signature hash algorithm. - - Certification authority certificate to issue and sign the certificate. - Certificate info. - Certificate public key. - A new certificate. - - - - Issues a self-signed certificate, signed using the specified algorithm. Also passes back the private key info. - - Certificate info. - Certificate private key. - A new certificate. - - - - Issues a certificate signed by the specified certification authority using the specified signature hash algorithm. - - Certification authority certificate to issue and sign the certificate. - Signature hash algorithm. - Certificate public key. - Certificate info. - A new certificate. - - - - Issues a self-signed certificate, signed using the specified algorithm. Also passes back the private key info. - - Signature algorithm. - Key size. - Signature hash algorithm. - Certificate info. - This will contain the on return. - A new certificate. - - - - Issues a certificate signed by the specified certification authority using the specified signature hash algorithm. - - Certification authority certificate to issue and sign the certificate. - Signature hash algorithm. - Certificate revocation list info. - A collection of objects. - A new certificate. - - - - Contains information describing the certificate for the .Issue method. - - - - - Creates an instance of class. - - - - - Gets the certificate serial number. - - Serial number. - - - - Sets the certificate serial number. - - Serial number. - - - - Sets the certificate serial number. - - Serial number. - - - - Gets the extended certificate usage. - - Extended certificate usage. - - - - Sets the extended certificate usage. - - Extended certificate usage. - - - - Sets alternative hostnames. - - Alternative hostnames. - - - - Sets alternative hostnames. - - Alternative hostnames. - - - - Gets or sets the certificate subject. - - Certificate subject. - - - - Gets or sets the basic certificate usage. - - Basic certificate usage. - - - - Gets or sets the certificate effective date. - - Certificate effective date. - - - - Gets or sets the certificate expiration date. - - Certificate expiration date. - - - - Gets the certificate extensions collection. - - Certificate extensions collection. - - - - Gets the CRL distribution points collection. - - CRL distribution points collection. - - - - Gets or sets the certificate owner's e-mail address. - - E-mail address. - - - - Gets or sets the hash algorithm to be used to create the signature of the certificate. - - The hash algorithm to be used to create the signature of the certificate. - - - - Contains information describing the certificate for the .IssueRevocationList method. - - - - - Creates an instance of class. - - - - - Gets or sets the datetime of this CRL update. - - Datetime of this CRL update. - - - - Gets or sets the datetime of the next CRL update. - - Datetime of the next CRL update. - - - - A SPKAC certificate request. This is used by Mozilla, Opera and other browsers except Internet Explorer. - For Internet Explorer, use . - - - - - Creates a SPKAC request from an ASN.1 block. - - ASN.1 block. - - - - Validates the SPKAC request's signature. - - Challenge string. - True if valid; false if not valid. - - - - Gets the SPKAC request's public key info. This includes the key itself. - - Public key info. - - - - Gets the SPKAC request's public key info. This includes the key itself. - - Public key info. - - - - PKCS #10 certification request. This is the standard certificate format. - It is used (for example) by Internet Explorer's XEnroll control, but non-IE browsers generally use instead. - - - - - Creates a new PKCS #10 request for the specified subject and public key. - - Request subject. - Request public key. - - - - Parses a PKCS #10 request from an ASN.1 block. - - ASN.1 block. - - - - Validates the PKCS #10 request's signature. - - True if valid; false if not valid. - - - - Validates the PKCS #10 request's signature. - - Subject - in practice, this is used in place of a challenge string. - True if valid; false if not valid. - - - - Signs the certification request using a private key corresponding to the request's public key. - - An instance of . - Hash algorithm to use for the signature. - - - - Signs the certification request using a private key corresponding to the request's public key. - - An instance of representing the private key. - Hash algorithm to use for the signature. - - - - Signs the certification request using a private key corresponding to the request's public key. - - An instance of asymmetric algorithm such as RSACryptoServiceProvider, DSACryptoServiceProvider, RSAManaged or DSAManaged. - Hash algorithm to use for the signature. - - - - Gets list of alternative hostnames. - - List of alternative hostnames. - - - - Gets ASN.1 encoded form of this object. - - Array of bytes. - - - - Gets the PKCS #10 request's public key info. This includes the key itself. - - Public key info. - - - - Gets the PKCS #10 request's public key info. This includes the key itself. - - Public key info. - - - - Gets the PKCS #10 request's subject. - - Request subject. - - - - Gets the PKCS #10 request's attributes. - - Request attributes. - - - - Gets the PKCS #10 request's certificate extension collection (represented by 1.2.840.113549.1.9.14 attribute in collection). - - - - - Specifies the reason for inclusion in the certificate revocation list. - - - - Unspecified. - - - Key was compromised. - - - CA was compromised. - - - Affiliation changed. - - - Certificate was superseded. - - - Operation was ceased. - - - Certificate hold. - - - Remove from CRL. - - - - The certificate revocation list. - - - - - Base class for various PKCS objects. - - - - - Loads a CMS/PKCS #7 signed or enveloped message from a stream. - Returns an instance of for signed message, for enveloped message, or null for - methods and properties. - - A stream from which to load the message. - Gets or sets the to be used to find certificates corresponding to a . - A value indicating whether cryptographic providers are permitted to display a user interface. - An instance of , or null. - - - - Creates a certificate revocation list from an ASN.1 block. - - ASN.1 block. - - - - Loads a certificate revocation list from given stream. - - Stream to load the certificate revocation list from. - - - - Converts a certificate revocation list into a byte array. - - Byte array. - - - - Returns the certificate revocation list hash. - - CRL hash. - - - - Returns the certificate revocation list signature. - - CRL signature. - - - - Returns distribution point URL from issuing distribution point extension, if both present. Otherwise returns null. - - Distribution point URL. - - - - Checks whether the certificate revocation list contains the specified certificate. - Also makes sure that the CRL is suitable for the certificate. - - Certificate to check. - Revocation check result. - - Please note that this method does not check the validity of the CRL itself. - Call on the issuer certificate - to perform this check. - - - - - Gets the DN of the issuer of this certificate revocation list. - - DN of the issuer of this certificate revocation list. - - - - Gets the datetime of this CRL update. - - Datetime of this CRL update. - - - - Gets the datetime of the next CRL update. - - Datetime of the next CRL update. - - - - Gets the CRL number if appropriate extension is present. - - CRL number or null (Nothing in VB.NET) if not specified. - - - - Gets the collection of CRL's extensions. - - Extensions collection. - - - - Gets the collection of revoked certificates. - - Revoked certificate collection. - - - - Returns the key algorithm used to sign this certificate revocation list. - - The key algorithm. - - - - Returns the hash algorithm used to create the signed hash value. - - Hash algorithm. - - - - Collection of information about revoked certificates. A part of . - - - - - Creates a new instance of . - - - - - Information about revoked certificate. - - - - - Creates a new instance of revoked certificate based on the supplied data. - - Serial number. - Revocation date. - Revocation reason. - - - - Creates a new instance of revoked certificate based on the supplied data. - - Serial number. - Revocation date. - Revocation reason. - - - - Gets the certificate's serial number. - - Serial number. - - - - Returns revocation reason of the revoked certificate. - - If the revocation reason extension is present, returns the reason from that extension; otherwise returns . - - - - Gets the revocation date. - - Revocation date. - - - - Gets the collection of revoked certificate info's extensions. - - Extensions collection. - - - - Represents revocation check outcome. - - - - - The issuer of the certificate does not match the issuer of the CRL. - - - - - This CRL is not supposed to be used to check the status of this certificate (try the next CRL). - - - - - The certificate has not been revoked according to this CRL. - - - - - The certificate has been revoked. - - - - - Represents the result of certificate revocation check. - - - - - Gets revocation check outcome. - - - - - Gets the revocation date. - - Revocation date. - - - - Gets revocation reason of the revoked certificate. - - If the revocation reason extension is present, returns the reason from that extension; otherwise returns null (Nothing in VB.NET). - - - - Certificate revocation list status. - - - - - The CRL is valid (make sure to check the issuer certificate for validity as well). - - - - - The CRL has expired or is not valid yet. - - - - - The CRL has not been issued by the specified issuer. - - - - - The CRL contains an unsupported critical extension. - - - - - The CRL update time is outside the issuer certificate's time validity range. - - - - - The CRL issuer is not intended to issue CRLs. - - - - - The CRL signature is not valid. - - - - - Malformed structure of the CRL or its extensions. - - - - - Collection of certificate revocation lists. - - - - - The class represents the CMS/PKCS #7 ContentInfo data structure. - It encapsulates the content of or messages. - - - - - Initializes a new instance of using the specified array of bytes - as content and an object identifier "data" as content type. - - The message content. - - - - Initializes a new instance of using the specified array of bytes - as content and the specified object identifier as content type. - - The message content type. - The message content. - - - - Gets the content of the CMS/PKCS #7 message. - - An array of bytes that represent the content data. - - - - Copies the content of the CMS/PKCS #7 message into the supplied stream. - - Stream into which the content will be written. - - - - Gets the object identifier of the CMS/PKCS #7 message content type. - - - - - Gets the content of the CMS/PKCS #7 message. - - An array of bytes that represent the content data. - - Please note that the array is a copy of the content. - If you modify it, the actual content will not change. - - - - - Represents a CMS/PKCS #7 encrypted data. - - - - - Tries acquiring a private key unless it is already available. - - True if the key has been acquired, false otherwise. - - - - Gets the symmetric key used to encrypt the message, - or null if it cannot be retrieved. - - The symmetric key used to encrypt the message, or null. - - - - Gets the symmetric algorithm used to encrypt or decrypt the content, - or null if it cannot be retrieved. - - The . - - - - Encrypts the contents of the CMS/PKCS #7 message. - - - - - Decrypts the contents of the CMS/PKCS #7 message. - - For a successful decryption, a symmetric key must be available. - - - - Decodes an encoded CMS/PKCS #7 encrypted message from raw data. - Upon successful decoding, information can be retrieved using - methods and properties. - - Arrays of bytes representing a CMS/PKCS #7 message. - - - - Encodes the object into CMS/PKCS #7 message data. - - Array of bytes representing a CMS/PKCS #7 message. - - - - Determines whether the specified content info ASN.1 sequence is an enveloped data sequence. - - Sequence data. - Offset. - Count. - True if yes; false if not. - - - - Loads a CMS/PKCS #7 encrypted message from a stream. - Upon successful decoding, information can be retrieved using - methods and properties. - - A stream from which to load the message. - - - - Saves into a stream. - - A stream to which to save the message. - - - - Creates a copy of this object. - - A new object. - - - - Creates an instance of class. - It must be initialized using or methods before - any other methods and properties can be accessed. - - - - - Creates an instance of class using the specified content - information as the inner content. - - The inner content of the encrypted message. - - - - Creates an instance of class using the specified content - information and encryption algorithm. - - The inner content of the encrypted message. - Encryption algorithm identifier (see remarks). Can be null for 3DES. - - Currently, 3DES ("1.2.840.113549.3.7"), - AES ("2.16.840.1.101.3.4.1.2" for 128-bit, "2.16.840.1.101.3.4.1.22" for 192-bit and "2.16.840.1.101.3.4.1.42" for 256-bit), - DES ("1.3.14.3.2.7") and RC2 ("1.2.840.113549.3.2") algorithms are supported. - - - - - Creates an instance of class using the specified content - information and encryption algorithm. - - The inner content of the encrypted message. - Encryption algorithm identifier (see remarks). Can be null for 3DES. - The effective key length in bits (only used by RC2 algorithm). - - Currently, 3DES ("1.2.840.113549.3.7"), - AES ("2.16.840.1.101.3.4.1.2" for 128-bit, "2.16.840.1.101.3.4.1.22" for 192-bit and "2.16.840.1.101.3.4.1.42" for 256-bit), - DES ("1.3.14.3.2.7") and RC2 ("1.2.840.113549.3.2") algorithms are supported. - - - - - Gets or sets the to be used to find certificates - corresponding to a . - - The certificate finder. - - - - Gets or sets a value indicating whether cryptographic providers - are allowed to display any user interface (UI) when working with private keys. - - A value indicating whether a cryptographic provider can display a UI. - - - - Gets a value indicating whether the content is encrypted. - - A value indicating whether the content is encrypted. - - - - Gets the collection of unprotected (unencrypted) attributes associated with this CMS/PKCS #7 message. - - Unprotected attribute collection. - - - - Gets the collection of certificates that are embedded in the message. - - Collection of certificates - - - - Gets the collection of certificate revocation lists (CRLs) that are embedded in the message. - - Collection of CRLs - - - - Gets the collection of recipients associated with this CMS/PKCS #7 message. - - A collection of recipients. - - - - Gets the inner content information for this CMS/PKCS #7 message. - It contains the content type identifier and content data. - - The inner content. - - This method returns the encrypted content for parsed messages - and unencrypted content for newly created messages. To encrypt or decrypt - the content, use and methods. - - - - - Gets the identifier of the algorithm used to encrypt the content. - - An object. - - - - Returns a value indicating whether the private key to decrypt the symmetric key - and encrypted content is available. - - True if the private key is available, false if it isn't. - - - - Defines the interface that certificate finder classes must implement. - - - - - Finds a certificate corresponding to the specified subject identifier. - - Identifier of the subject certificate. - A certificate store containing the certificates that were included with the message. - Certificate chain if found, or null (Nothing in Visual Basic). - - - - Provides a set of common certificate finders. - - - - - Certificate finder. - - CertificateChain array. - A new instance of ICertificateFinder. - - - - Default certificate finder. - - - Searches for certificates in the current user's "My", - "Trusted people" and "Other people" stores. - - - - - Specifies private key file format. - - - - Base64-encoded PKCS #8 format. - - - PuTTY PPKv2 format. - - - OpenSSH/OpenSSL SSLeay format. - - - Raw PKCS #8 format. - - - New OpenSSH format with bcrypt key expansion (Base64-encoded keys with "BEGIN OPENSSH PRIVATE KEY" header). - - - - Represents a private key. - - - - - Creates a new instance of . Use the method to load a private key. - - - - - Creates a new instance of based on the specified RSA parameters. - - RSA parameters including private keys. - - - - Creates a new instance of based on the specified DSA parameters. - - DSA parameters including private keys. - - - - Generates a private key using the specified algorithm and default key size. - - Key algorithm. - An instance of . - - - - Generates a private key using the specified algorithm and key size. - - Key algorithm. - Key size. Specify 0 to use default key size. - An instance of . - - - - Gets the raw form of the private key. - - Array of bytes. - - - - Gets the raw form of the private key. - - Array of bytes. - - - - Gets a public key corresponding to the private key. - - An instance of . - - - - Gets the DSA parameters for a DSA key. May only be used for DSA private keys. - - DSA paramaters. - - - - Gets the RSA parameters for a RSA key. May only be used for RSA private keys. - - RSA paramaters. - - - - Gets ASN.1 encoded form of this object. - - Array of bytes. - - - - Saves the private key into the supplied stream in the specified format. - - A stream to which to save the private key. - Password to encrypted the private key, or null if no encryption desired. - Private key file format. - - - - Saves the private key into the supplied stream in the specified format. - - A file to which to save the public key. - Password to encrypted the private key, or null if no encryption desired. - Private key file format. - - - - Saves the private key into the supplied stream in Base64-encoded PKCS #8 format. - - A stream to which to save the private key. - Password to encrypted the private key, or null if no encryption desired. - Encryption algorithm identifier. Ignored if password is null. - - Currently, 3DES ("1.2.840.113549.3.7"), DES ("1.3.14.3.2.7") and RC2 ("1.2.840.113549.3.2") algorithms are supported. - - - - - Loads a PKCS #8, PuTTY or SSLeay (OpenSSL/OpenSSH) format private key from a stream. - Upon successful decoding, information can be retrieved using - methods and properties. - - A stream from which to load the private key. - Password used to encrypted the private key, or null if no password needed. - - - - Loads a PKCS #8, PuTTY or SSLeay (OpenSSL/OpenSSH) format private key from a stream. - Upon successful decoding, information can be retrieved using - methods and properties. - - A file from which to load the private key. - Password used to encrypted the private key, or null if no password needed. - - - - Gets the key algorithm identifier. - - Key algorithm identifier. - - - - Gets or ets the key comment. The comment is used while saving in some formats. - - Key comment. - - - - Represents a public key. - - - - - Creates a new instance of . Use the method to load a public key. - - - - - Creates a new instance of based on the specified RSA parameters. - - RSA parameters. - - - - Creates a new instance of based on the specified DSA parameters. - - DSA parameters. - - - - Gets the raw form of the public key. - - Array of bytes. - - - - Gets the raw form of the public key. - - Array of bytes. - - - - Gets ASN.1 encoded form of this object. - - Array of bytes. - - - - Gets the DSA parameters for a DSA public key. May only be used for DSA public keys. - - DSA paramaters. - - - - Gets the RSA parameters for a RSA public key. May only be used for RSA public keys. - - RSA paramaters. - - - - Returns the size of the key in bits. - - Size of the key in bits. - - - - Returns the key algorithm. - - Key algorithm. - - - - Saves the public key into the supplied stream in Base64-encoded PKCS #8 format. - - A stream to which to save the public key. - - - - Saves the public key into the supplied stream in Base64-encoded PKCS #8 format. - - A file to which to save the public key. - - - - Loads a PKCS #8 public key from a stream. - Upon successful decoding, information can be retrieved using - methods and properties. - - A stream from which to load the public key. - - - - Loads a PKCS #8 public key from a file. - Upon successful decoding, information can be retrieved using - methods and properties. - - A file from which to load the public key. - - - - Gets the key algorithm identifier. - - Key algorithm identifier. - - - - Represents a CMS/PKCS #7 encrypted message recipient. - This class is inherited by and classes. - - - - - Gets signature parameters (if available). - - Signature parameters. - - - - Gets the identifier of the recipient. - - Identifier of the recipient. - - - - Gets the identifier of the algorithm used to encrypt the symmetric key. - - An object. - - - - Gets the encrypted key for the recipient. - - Encrypted key. - - - - Gets the certificate associated with the recipient, or null if not available. - - The recipient's certificate, or null. - - - - Gets the certificate chain associated with the recipient, or null if not available. - - The recipient's certificate chain, or null. - - - - Defines key transport recipient information, typically using the RSA algorithm to - encrypt the shared symmetric key to transport. - - - - - Creates a new instance of that defines the - key transport recipient information for the owner of the specified RSA certificate. - Use to specify RSAES-OAEP parameters. - - The recipient's certificate. - - - - Creates a new instance of that defines the - key transport recipient information for the owner of the specified RSA certificate. - Use to specify RSAES-OAEP parameters. - - The recipient's certificate. - Subject identifier type - only IssuerAndSerialNumber and SubjectKeyIdentifier values are accepted. - - - - Creates a new instance of that defines the - key transport recipient information for the owner of the specified RSA certificate. - - The recipient's certificate. - Encryption parameters (to specify RSAES-OAEP parameters). Can be null (for PKCS #1). - - - - Creates a new instance of that defines the - key transport recipient information for the owner of the specified RSA certificate. - - The recipient's certificate. - Subject identifier type - only IssuerAndSerialNumber and SubjectKeyIdentifier values are accepted. - Encryption parameters (to specify RSAES-OAEP parameters). Can be null (for PKCS #1). - - - - Gets signature parameters (if available). - - Signature parameters. - - - - Gets the identifier of the recipient. - - Identifier of the recipient. - - - - Gets the identifier of the algorithm used to encrypt the symmetric key. - - An object. - - - - Gets the encrypted key for the recipient. - - Encrypted key. - - - - Gets the certificate associated with the recipient, or null if not available. - - The recipient's certificate, or null. - - - - Gets the certificate chain associated with the recipient, or null if not available. - - The recipient's certificate chain, or null. - - - - Defines key agreement algorithm recipient information. The key itself is not transported - the two - parties that will be using a symmetric key both take part in its generation. Please note that - this method is not yet fully supported by Rebex Security library. - - - - - Gets the identifier of the key originator. - - Identifier of the key originator. - - - - Gets the identifier of the recipient. - - Identifier of the recipient. - - - - Gets the identifier of the algorithm used to encrypt the symmetric key. - - An object. - - - - Gets the encrypted key for the recipient. - - Encrypted key. - - - - Gets the certificate associated with the recipient, or null if not available. - - The recipient's certificate, or null. - - - - Gets the certificate chain associated with the recipient, or null if not available. - - The recipient's certificate chain, or null. - - - - A collection of objects. - - - - - Creates an empty and read-only instance of . - - - - - Represents a CMS/PKCS #7 signed data. - - - - - Creates a signatures for all signers that do not have one yet. - - - - - Creates a signatures for all signers that do not have one yet. - - Signature options. - - - - Validates all digital signatures on this CMS/PKCS #7 signed message - and validates all the signers' certificates. - - Validation result. - - - - Validates all digital signatures on this CMS/PKCS #7 signed message. - Optionally, signers' certificates are validated, and the specified validation - options are taken into account. - - Specifies whether to only verify the signatures, skipping the certificate validation. - Signature and certificate validation options. - Validation result. - - - - Validates all digital signatures on this CMS/PKCS #7 signed message. - Optionally, signers' certificates are validated, and the specified validation - options are taken into account. - - Specifies whether to only verify the signatures, skipping the certificate validation. - Signature and certificate validation options. - Certificate chain engine. - Validation result. - - - - Decodes an encoded CMS/PKCS #7 signed message from raw data. - Upon successful decoding, information can be retrieved using - methods and properties. - - Array of bytes representing a CMS/PKCS #7 message. - - - - Encodes the object into CMS/PKCS #7 message data. - - Array of bytes representing a CMS/PKCS #7 message. - - - - Determines whether the specified content info ASN.1 sequence is a signed data sequence. - - Sequence data. - Offset. - Count. - True if yes; false if not. - - - - Loads a CMS/PKCS #7 signed message from a stream. - Upon successful decoding, information can be retrieved using - methods and properties. - - A stream from which to load the message. - - - - Saves into a stream. - - A stream to which to save the message. - - - - Creates a copy of this object. - - A new object. - - - - Creates an instance of class. - - - - - Creates an instance of class using the specified content - information as the inner content. - - The inner content of the signed message. - - - - Creates an instance of class using the specified content - information as the inner content. - - The inner content of the signed message. - - Specifies whether the signature is detached. - If detached, the actual content is not included within the signed message. - - - - - Specifies what parts of the certificate chain should be included in the signed data. - - Certificate include option. - - - - Gets or sets the to be used to find certificates - corresponding to a . - - The certificate finder. - - - - Gets or sets a value indicating whether cryptographic providers - are allowed to display any user interface (UI) when working with private keys. - - A value indicating whether cryptographic providers can display a UI. - - In case of signing, the actual behavior is determined by the combination of this value and the value of - passed to associated objects. - Cryptographic providers are only permitted to display a UI if both Silent properties are set to true. - - - - - Gets the collection of certificates that are embedded in the message. - - Collection of certificates - - - - Gets the collection of certificate revocation lists (CRLs) that are embedded in the message. - - Collection of CRLs - - - - Gets the collection of signers associated with this CMS/PKCS #7 message. - - A collection of signers. - - - - Gets or sets the inner content information for this CMS/PKCS #7 message. - It contains the content type identifier and content data. - - The inner content. - - - - Gets or sets a value indicating whether the actual content is detached from the message. - - True if the content is detached; False if the content is embedded within the message. - - - - Specifies what parts of the certificate chain should be included in the message. - - - - Leave the existing certificate in the collection. - - - The certificate chain is not included. - - - The certificate chain is included, except for the root certificate. - - - Only the end certificate is included. - - - The certificate chain, including the root certificate, is included. - - - - Represents a CMS/PKCS #7 message signer. - - - - - Gets a value that identifies the digest algorithm. - - Digest algorithm. - - - - Gets signature parameters (if available). - - Signature parameters. - - - - Validates the signer's digital signature and validates the certificate. - - Validation result. - - - - Validates the signer's digital signatures. - Optionally, signers' certificates are validated, and the specified validation - options are taken into account. - - Specifies whether to only verify the signatures, skipping the certificate validation. - Signature and certificate validation options. - Validation result. - - - - Validates the signer's digital signatures. - Optionally, signers' certificates are validated, and the specified validation - options are taken into account. - - Specifies whether to only verify the signatures, skipping the certificate validation. - Signature and certificate validation options. - Certificate chain engine. - Validation result. - - - - Creates a signatures for the signer. - - - - - Creates a signature for the signer. - - Signature options. - - - - Creates a new instance of that defines - a signer corresponding to the specified certificate. An associated private - key for the certificate must be available. - Use to specify RSASSA-PSS parameters. - - The signer's certificate. - - - - Creates a new instance of that defines - a signer corresponding to the specified certificate. An associated private - key for the certificate must be available. - Use to specify RSASSA-PSS parameters. - - The signer's certificate. - Subject identifier type - only IssuerAndSerialNumber and SubjectKeyIdentifier values are accepted. - - - - Creates a new instance of that defines - a signer corresponding to the specified certificate. An associated private - key for the certificate must be available. - Use to specify RSASSA-PSS parameters. - - The signer's certificate. - Subject identifier type - only IssuerAndSerialNumber and SubjectKeyIdentifier values are accepted. - Digest algorithm. - - - - Creates a new instance of that defines - a signer corresponding to the specified certificate. An associated private - key for the certificate must be available. - - The signer's certificate. - Signature parameters (to specify RSASSA-PSS parameters). Can be null (for PKCS #1). - - - - Creates a new instance of that defines - a signer corresponding to the specified certificate using the - specified subject identifier type. An associated private - key for the certificate must be available. - - The signer's certificate. - Signature parameters (to specify RSASSA-PSS parameters). Can be null (for PKCS #1). - Subject identifier type - only IssuerAndSerialNumber and SubjectKeyIdentifier values are accepted. - - - - Gets the identifier of the signer. - - Identifier of the signer. - - - - Gets the identifier of the digest algorithm. - - An object. - - - - Gets the identifier of the signature algorithm. - - An object. - - - - Gets the signature, or null if it is not available yet. - - The signature. - - - - Gets the collection of signed attributes associated with this CMS/PKCS #7 message. - - Signed attribute collection. - - - - Gets the collection of unsigned attributes associated with this CMS/PKCS #7 message. - - Unsigned attribute collection. - - - - Gets the certificate associated with the signer, or null if not available. - - The signer's certificate, or null. - - - - Gets the certificate chain associated with the signer, or null if not available. - - The signer's certificate chain, or null. - - - - Gets the signing time, or 1970-01-01 if not available. - - Singing time. - - - - Gets the preferred subject identifier for key encryption. - - The preferred subject identifier. - - - - Gets the collection of S/MIME capabilities the signer supports. - - Collection of supported S/MIME capabilities. - - - - A collection of objects. - - - - - Creates an empty and read-only instance of . - - - - - Options for and methods. - - - - Don't include any signed attributes in the signature. Not recommended. - - - Don't include key Microsoft extensions in the signature attributes. - - - Don't include S/MIME capabilities extensions in the signature attributes. - - - Skip certificate usage check. - - - - Signature validation status. - - - - Certificate is not valid. - - - Certificate is not available. - - - A digest algorithm is not supported. - - - A signature algorithm is not supported. - - - A signature is invalid. - - - Invalid key usage. The certificate usage doesn't include message signing. - - - Content type mismatch. - - - - Represents the result of signature validation. - - - - - Gets the status mask. - - Status mask. - - - - Gets the certificate validation status mask. - - Certificate validation status mask. - - - - Gets the certificate chain validity status. - - True if valid, false if not valid. - - - - Represents an S/MIME capability. - - - - - Initializes an instance of a with no parameters. - - The object identifier that identifies the S//MIME capability. - - - - Initializes an instance of a . - - The object identifier that identifies the S//MIME capability. - Capability parameters in ASN.1 format. - - - - Gets the object identifier that identifies the S/MIME capability. - - The object identifier. - - - - Gets the S/MIME capability parameters. - - An array of bytes in ASN.1 format. - - - - A collection of objects. - - - - - Gets or sets the at the specified index. - - The zero-based index of the to get or set. - An S/MIME capability. - - - - Gets the first with the specified object identifier. - - The object identifier, either friendly name or dotted string format. - An S/MIME capability if found, or null if not found. - - - - Defines the type of subject identifier that identifies a subject and a certificate. - - - - - The type of subject identifier is unknown. - - - - - The subject is identified by the certificate issuer and serial number. - - - - - The subject is identified by the hash of the subject's public key. The hash algorithm used is determined by the signature algorithm suite in the subject's certificate. - - - - - The subject is identified by the subject's public key. - - - - - The class identifies a subject, either by certificate issuer - and serial number, by the subject key identifier or by a public key. - - - - - Gets the type of the subject identifier. - - The type of the subject identifier. - - - - Gets the of the certificate issuer if - this subject identifier is identified by the issuer name and serial number. - Otherwise, this property will return null. - - Certificate issuer. - - - - Gets the serial number of the certificate if - this subject identifier is identified by the issuer name and serial number. - Otherwise, this property will return null. - - Certificate serial number. - - - - Gets the subject key identifier of the certificate if - this subject identifier is identified by the subject key identifier. - Otherwise, this property will return null. - - Certificate subject key identifier. - - - - Gets the public algorithm of the certificate if - this subject identifier is identified by the public key. - Otherwise, this property will return null. - - Certificate public key algorithm. - - - - Gets the public of the certificate if - this subject identifier is identified by the public key. - Otherwise, this property will return null. - - Certificate public key. - - - - Represents a public key. - - - - - Creates a new instance of . Use the method to load a public key. - - - - - Creates a new instance of based on the specified RSA parameters. - - RSA parameters. - - - - Creates a new instance of based on the specified DSA parameters. - - DSA parameters. - - - - Represents sorting order. - - - - - Ascending sort order. - - - - - Descending sort order. - - - - - Log writer acting as a container that writes log messages to all inner writers. - - - - - Creates a new instance of a tee log writer over given set of individual . - - A non-empty collection of log writers. - - - - Creates a new instance of a tee log writer over given set of individual . - - A non-empty array of log writers. - - - - Write a message into all inner writers. - - Message level. - Logging object type. - Logging object ID. - Logging area. - Message. - - - - Write a message and data block into all inner writers. - - Message level. - Logging object type. - Logging object ID. - Logging area. - Message. - Data block. - Data offset. - Date length. - - - - Implements the interface method IDisposable.Dispose - Use this method to explicitly release all resources hold by the inner writers. - - - - - A cumulative log level.
- When getting, it returns the minimum level of inner writers' levels.
- When setting, the value is propagated to all inner writers. -
- Log level. -
- - - Specifies granularity for time comparisons. - - - - - Time is taken as is. - - - Useful when working with NTFS file system. - - - - - The smallest time unit is one second (milliseconds are ignored). - E.g. 11:33:55.999 is rounded to 11:33:55.000. - - - Useful when working with some UNIX FTP or SFTP servers. - - - - - The smallest time unit is two-second. So odd seconds are rounded to lower even value (milliseconds are ignored). - E.g. 11:33:55.999 is rounded to 11:33:54.000. - - - Useful when working with FAT file system (.NET CF, MS-DOS). - - - - - The smallest time unit is one day (time component is ignored). - E.g. 2012-12-12 11:33:55.999 is rounded to 2012-12-12 00:00:00.000. - - - Useful when working with some UNIX FTP or SFTP servers. - - - - - Trace-based log writer that writes log messages to all trace listeners. - - - For general information about NET trace, see for instance - Microsoft's trace listeners. - - - - - Creates a new instance of trace log writer based on the default "Info" log level. - - - - - Creates a new instance of trace log writer based on the specified log level. - - Log level. - - - - Clean up any resources being used. - - true if managed resources should be disposed; otherwise, false. - - - - Appends the specified message text to the trace listeners log. This method is only called by method - and is only used by text-based loggers. - - Full message info. - - - - Get a value indicating whether the log writer is closed. - - True when log writer is closed. False if log writer is opened and ready for writing. - - - Creates an instance of class. - - - Creates an instance of class. - - - Creates an instance of class. - - - Creates an instance of class. - - - Creates an instance of class. - -
-
\ No newline at end of file diff --git a/packages/Rebex.Common.2.5.6930/lib/netstandard1.5/Rebex.Common.dll b/packages/Rebex.Common.2.5.6930/lib/netstandard1.5/Rebex.Common.dll deleted file mode 100644 index 3d788989..00000000 Binary files a/packages/Rebex.Common.2.5.6930/lib/netstandard1.5/Rebex.Common.dll and /dev/null differ diff --git a/packages/Rebex.Common.2.5.6930/lib/netstandard1.5/Rebex.Common.xml b/packages/Rebex.Common.2.5.6930/lib/netstandard1.5/Rebex.Common.xml deleted file mode 100644 index 4dd3b0e3..00000000 --- a/packages/Rebex.Common.2.5.6930/lib/netstandard1.5/Rebex.Common.xml +++ /dev/null @@ -1,7865 +0,0 @@ - - - Rebex.Common - - - - - Console-based log writer that writes log messages to the console. - - - - - Creates a new instance of console log writer with a log level of Info. - - - - - Creates a new instance of console log writer with the specified log level. - - Log level. - - - - Gets or sets a value that indicates whether to use console colors. - - - - - Writes a message into the log. - - Message level. - Logging object type. - Logging object ID. - Logging area. - Message. - - - - Writes a message and data block into the log. - - Message level. - Logging object type. - Logging object ID. - Logging area. - Message. - Data block. - Data offset. - Date length. - - - - Appends the specified message text into a text-based log. - - Full message info. - - - - Various methods related to encoding (charset) used by Rebex components. - - - - - ASCII encoding. - - - - - Default encoding. - - - - - UTF-8 encoding. - - - - - Gets a list of supported encoding names. - - List of encoding names. - - - - Returns the encoding associated with the specified code page name. - - Code page name. - Encoding. - - - - Returns the encoding associated with the specified code page. - - Code page. - Encoding. - - - - Provides data for progress events. - - - - - Creates a new instance of . - - A percentage of the operation that has already been completed. - User state ID. - - - - Gets the progress percentage. - - A progress percentage value. - - - - Gets a user state object. - - A user state object. - - - - Provides data for the completed asynchronous events. - - - - - Creates a new instance of . - - An exception thrown by the asynchronous operation. - True if the operation was canceled, false otherwise. - User state ID. - - - - Gets a value indicating whether the operation has been cancelled. - - True if the operation has been cancelled; false otherwise. - - - - Gets a value indicating whether an error occurred during the operation. - - The object; or null reference (Nothing in Visual Basic) if no error occurred. - - - - Gets a user state object. - - A user state object. - - - - Raises an exception if the operation has failed or has been canceled. - - The property is true. - The property is set. - - - - File-based log writer that saves log messages into a text file. - - - - - Creates a new instance of file log writer based on the specified file and the default "Info" log level. - - Path to log file. - - - - Creates a new instance of file log writer based on the specified file and log level. - - Path to log file. - Log level. - - - - Path to the log file. - - - - - Get a value indicating whether the log writer is closed. - - True when logfile is closed. False if logfile is opened and ready for writing. - - - - Dispose(bool disposing) executes in two distinct scenarios. - If disposing equals true, the method has been called directly - or indirectly by a user's code. Managed and unmanaged resources - can be disposed. - If disposing equals false, the method has been called by the - runtime from inside the finalizer and you should not reference - other objects. Only unmanaged resources can be disposed. - - If true, is called by IDisposable.Dispose. - Otherwise it is called by finalizer. - - - - Appends the specified message text into a text-based log. - - Full message info. - - - - Finalizer. Called by garbage collector during object destruction. - - - - - Log level - specifies the levels of severity. - - - - - Be verbose - log everything. - - - - - Log all messages useful for debugging purposes. - - - - - Only log informative messages. - - - - - Only log errors. - - - - - The Off level designates a higher level than all the rest. - - - - - Defines methods and properties all log writers must implement. - - - - - Get or set the log level - only log messages with log level equal to or greater than the specified one. - - Log level. - - - - Write a message into the log. - - Message level. - Logging object type. - Logging object ID. - Logging area. - Message. - - - - Write a message and data block into the log. - - Message level. - Logging object type. - Logging object ID. - Logging area. - Message. - Data block. - Data offset. - Date length. - - - - Define properties and methods for logging providers. - - - - - Gets a to use for logging. - - - - - Represents mode for interval boundaries. - - - - - Include interval boundary. - - - - - Exclude interval boundary. - - - - - Currently executed operation. - - - - Uploading files. - - - Downloading files. - - - Deleting files. - - - Getting item list. - - - - Current traversal state of the . - - - - - Retrieving of the file system hierarchy was started. - - - - - Retrieving of the file system hierarchy was successfully completed. - - - - - Retrieving of the particular directory hierarchy was started. - - - - - Retrieving of the particular directory hierarchy was successfully completed. - - - - - Current transfer state of the . - - - - - Directory processing was started. - - - - - Processing of a file was started. - - - - - File was successfully transferred. - - - - - A file data block was processed. - - - - - The transfer action was successfully completed. - Triggered only with multi-file operations. (For single-file operations, only is triggered.) - - - - - Current delete state of the . - - - - - File processing was started. - - - - - File was successfully deleted. - - - - - Directory processing was started. - - - - - Directory was successfully deleted. - - - - - The delete action was successfully completed. - - - - - Detailed specification of a problem that occurred during a multi-file operation. - - - - - A target file with the same name already exists. - - - - - A symbolic link was detected. - - - - - Symbolic link is probably a part of an infinite loop in the file system hierarchy. - - - - - Cannot create target directory. - - - - - Cannot transfer file. - - - - - Cannot read from a directory. - - - - - Cannot find the file which was found while retrieving file system hierarchy earlier. - - - - - Name of the file is invalid on the target file system. - For example, backslash is a valid filename character on Unix FTP servers, but invalid in local Windows file system. - - - - - Name of the directory is invalid on the target file system. - For example, backslash is a valid directory name character on Unix FTP servers, but invalid in local Windows file system. - - - - - Cannot find the directory which was found while retrieving file system hierarchy earlier. - - - - - Cannot find the link which was found while retrieving file system hierarchy earlier. - - - - - Link is corrupted or its target cannot be found. - - - - - Currently processed item is neither a file nor a directory. - - - - - Operation was canceled. - - - - - Feature required to complete the operation is not supported. - - - - - Cannot delete the file. - - - - - Cannot delete the directory. - - - - - Cannot calculate checksum. - - - - - Specifies the reaction to resolve the current problem that occurred during a multi-file operation. - - - - - Cancel the whole operation. An exception with the value is thrown. - - - - - Cancel the whole operation. An exception is thrown. - - - - - Skip the current problematic item. - - - - - Retry the current operation again. - - - - - Overwrite target file with the same name. - - - - - Transfer the source file to a different name. - - - - - Resume target file. - - - - - Resolve the symbolic link. - - - - - Specifies the condition for overwriting a file. - - - - - No condition = always overwrite. - - - - - Overwrite if size differs. - - - - - Overwrite if the target file is older than the source file. - If working with remote servers, this condition is strongly discouraged - because modification dates are often misreported by FTP servers, - making this mode highly unreliable. - - - - - Overwrite if checksum differs. - Available for ZIP and FTP; only some FTP servers support checksums.
- You can check availability of this condition using method. -
-
- - - Provides data for the ProblemDetected event. - - - - - Gets the current transfer action. - - Current transfer action. - - - - Gets the exception which will be raised if chosen Reaction is . - - Exception. - - - - Gets the type of the error that classifies the problem. - - Problem type. - - - - Gets the path of the local file or directory that is currently processed. - - Local path. - - - - Gets the local file or directory that is currently processed or null (Nothing in Visual Basic) if not available. - - Local item. - - - - Gets the path of the remote file or directory that is currently processed. - - Remote path. - - - - Gets the remote file or directory that is currently processed or null (Nothing in Visual Basic) if not available. - - Remote item. - - - - Gets the currently selected reaction to the current problem. - - The operation to be performed as the next step of the multi-file operation execution. - - - - Gets the condition to apply for the Overwrite reaction. - If the chosen reaction is not Overwrite, this property is ignored. - - Overwrite condition. - - - - Gets the new name for the currently processed file or directory. - If the chosen reaction is not Rename, this property is ignored. - - New name. - - - - Gets a user state object. - - User state object. - - - - Initializes a new instance of the class (for internal use only). - - Event data. - - - - Determines whether the specified reaction is currently possible - use this to determine which reactions can be applied. - - Desired reaction. - True if the specified reaction is possible; false otherwise. - - - - Determines whether the specified overwrite condition is currently possible - use this to determine which overwrite conditions can be applied. - - Desired condition. - True if the specified condition is possible; false otherwise. - - - - Indicate to the sender that the problematic item should be skipped. - - - - - Indicate to the sender that the operation should be canceled. - - - - - Indicate to the sender that an exception should be raised. - - - - - Indicate to the sender that the operation on the current item should be retired. - - - - - Indicate to the sender that the current item should be resumed. - - - - - Indicate to the sender that the current link should be resolved. - - - - - Indicate to the sender that the current item should be renamed. - New name is generated from the current item according the pattern "filename[number].extension". - - - - - Indicate to the sender that the current item should be renamed. - - New name of the item or null (Nothing in Visual Basic) to use generated name according the pattern "filename[number].extension". - - - - Indicate to the sender that the current item should be overwritten. - - - - - Indicate to the sender that the current item should be overwritten if the specified condition is met. - - Condition for the overwrite. - - - - Provides data for the Traversing event. - - - - - Gets the current transfer action. - - Current transfer action. - - - - Gets the current traversing state of the current . - - Current traversing state of the current . - - - - Gets the file or directory which is currently processed. - - Currently processed item. - - - - Gets the current total number of files to be processed (traversed so far). - - Current total number of files to be processed (traversed so far). - - - - Gets the current total number of bytes to be processed (traversed so far). - - Current total number of bytes (traversed so far). - - - - Gets a user state object. - - User state object. - - - - Initializes a new instance of the class (for internal use only). - - Event data. - - - - Provides data for the TransferProgressChanged event. - - - - - Gets the current transfer action. - - Current transfer action. - - - - Gets the current transfer state of the current . - - Current transfer state of the current . - - - - Gets the file or directory which is currently processed. - - Currently processed item. - - - - Gets the target path of the file or directory which is currently processed. - - Target path. - - - - Gets the total number of bytes transferred during the transfer of the current file. - - The number of bytes transferred. - - - - Gets the total number of files to be transferred. - - Number of files. - - - - Gets the number of files that were already processed (either transferred or skipped). - - Number of files. - - - - Gets the number of files that were already successfully transferred. - - Number of files. - - - - Gets the total number of bytes to be transferred. - - Number of bytes. - - - - Gets the total number of bytes transferred. - - Number of bytes. - - - - Gets the number of bytes transferred during the current transfer since the last time the event was raised. - - The number of bytes transferred since the last time the event was raised. - - - - Gets the current transfer speed in bytes transferred per second (or 0 if not available). - - An estimate of the current speed in number of bytes per second. - Value of 0 indicates that this information is not available. - - - - Gets a number between 0 and 100 representing the percentage of completeness of the operation. - - Percentage value (0..100). - - - - Gets a number between 0 and 100 representing the percentage of completeness of the current file transfer. - - Percentage value (0..100). - - - - Initializes a new instance of the class (for internal use only). - - Event data. - - - - Provides data for the DeleteProgressChanged event. - - - - - Gets the current delete state of the current . - - Current delete state of the current . - - - - Gets the file or directory which is currently processed. - - Remote item. - - - - Gets the total number of files to be deleted. - - Number of files. - - - - Gets the number of files that were already processed (either deleted or skipped). - - Number of files. - - - - Gets the number of files that were already successfully deleted. - - Number of files. - - - - Gets a number between 0 and 100 representing the percentage of completeness of the operation. - - Percentage value (0..100). - - - - Initializes a new instance of the class (for internal use only). - - Event data. - - - - Specifies checksum algorithm. - - - - - SHA-1 checksum. - - - - - SHA-256 checksum. - - - - - SHA-384 checksum. - - - - - SHA-512 checksum. - - - - - MD5 checksum. - - - - - SHA-224 checksum. - - - - - Request CRC32 checksum. - - - - - Represents data checksum. - - - - - Returns checksum algorithm. - - - - - Returns checksum data. - - - - - - Returns a hex string representation of the checksum. - - - - - Creates an instance of an object that represents data checksum. - - Checksum algorithm used to compute the checksum. - Checksum data. - - - - Implicit conversion from to string. - - Checksum to convert to string. - Hex string representation of the checksum. - - - - Comparest the checksum with another object of the same type and returns a value indicating whether - the current instance precedes, follows or occurs in the same position in the sort order. - - Object to compare with this instance. - A value that indicates the relative order of checksums being compared. - - - - Returns a value indicating whether the specified object is equal to this checksum. - - Object to compare with this instance. - True if the two instances are same type and represent the same checksum. - - - - Returns the hash code for this checksum. - - - - - - Returns a hex string representation of this checksum. - - Hex string representation of this checksum. - - - - Specifies modes of the method. - - - - - Specifies whether the specified regular file matches the the . - - - - - Specifies whether the specified directory matches the the . - - - - - Specifies whether the specified directory should be traversed to retrieve another matches. - - - - - Set of inclusion and exclusion patterns. - It doesn't depend on the order how the inclusion and exclusion patterns are added into the . - - - - - Gets or sets the base path of the set. - - A path to be considered as a base path of the set. - - - - Gets or sets a value indicating whether the is case sensitive. - - True if the is case sensitive; false otherwise. - - - - Gets or sets a value indicating whether a consumer of the should include empty directories or not. - Also used in the method. - - True if empty directories should not be included; false otherwise. - - - - Gets or sets a value indicating whether a consumer of the should also include directories where the files are located. - Also used in the method. - Example: Ftp.GetItems("DIR/*.txt") - this property determines whether item "DIR" should be also included in output collection. - - True if directories where the files are located should be included; false otherwise. - - - - Gets or sets a value indicating whether a consumer of the should flatten the output. - Flatten means to don't persist directory structure. - For example if used to upload files "A/a.txt" and "B/b.txt" to the "/data" directory on a FTP server, - files "a.txt" and "b.txt" are uploaded directly into the "/data" directory - (directories "A" and "B" are not created in the "/data" directory). - - True if flatten the output; false otherwise. - - - - Initializes a new instance of the class. - - - - - Initializes a new instance of the class. - - A path to be considered as a base path of the set. - - - - Initializes a new instance of the class. - - Directory separators to be used in all paths. - - - - Initializes a new instance of the class. - - A path to be considered as a base path of the set. - Directory separators to be used in all paths. - - - - Initializes the object. - - A path to be considered as a base path of the set. - A path or mask relative to a base path which define an initial inclusion pattern. - - - - Initializes the object. - - A path to be considered as a base path of the set. - A path or mask relative to a base path which define an initial inclusion pattern. - Specifies traversal mode of directories for the . - - - - Adds a path or mask into collection of inclusion patterns. The supported wildcards are '?' and '*' and '**'. - For detailed specification with examples see the documentation. - - A path or mask (relative to the base path) which define an inclusion pattern. - - - - Adds a path or mask into collection of inclusion patterns. The supported wildcards are '?' and '*' and '**'. - For detailed specification with examples see the documentation. - - A path or mask (relative to the base path) which define an inclusion pattern. - Specifies traversal mode of directories for the . - - '?' matches any single character.
- '*' matches any number of any characters except the directory separators.
- '**' matches any number of any characters (directory separators can be reduced e.g. "a\**\b" is equivalent to "a\**\**\b" which matches "a\x\y\z\b" and also "a\b" but not "ab").
- - - - - - - - - - - - - - -
data\file-???.txtMatches files within the "data" directory e.g. "data\file-007.txt", but not "data\file-7.txt".
data\*.txtMatches any ".txt" file within the "data" directory (only within the "data" directory, not in subdirectories) e.g. "data\file.txt", but not "data\a\b\c\file.txt".
data\**\*.txtMatches any ".txt" file anywhere within the "data" directory and its subdirectories e.g. "data\file.txt" and also "data\a\b\c\file.txt".
-
-
- - - Adds a path or mask into collection of exclusion patterns. The supported wildcards are '?' and '*' and '**'. - For detailed specification with examples see the documentation. - - A path or mask (relative to the base path) which define an exclusion pattern. - - - - Adds a path or mask into collection of exclusion patterns. The supported wildcards are '?' and '*' and '**'. - For detailed specification with examples see the documentation. - - A path or mask (relative to the base path) which define an exclusion pattern. - Specifies traversal mode of directories for the . - - '?' matches any single character.
- '*' matches any number of any characters except the directory separators.
- '**' matches any number of any characters (directory separators can be reduced e.g. "a\**\b" is equivalent to "a\**\**\b" which matches "a\x\y\z\b" and also "a\b" but not "ab").
- - - - - - - - - - - - - - -
data\file-???.txtMatches files within the "data" directory e.g. "data\file-007.txt", but not "data\file-7.txt".
data\*.txtMatches any ".txt" file within the "data" directory (only within the "data" directory, not in subdirectories) e.g. "data\file.txt", but not "data\a\b\c\file.txt".
data\**\*.txtMatches any ".txt" file anywhere within the "data" directory and its subdirectories e.g. "data\file.txt" and also "data\a\b\c\file.txt".
-
-
- - - Returns a value indicating whether the specified relative path matches the . - This method is intended to be overwritten by descendants. - In this case please note that for optimization issues when called with parameters equal to "." and - this method should return false if no inclusion pattern was specified; true otherwise. - - A relative path to a base path to be tested for a match. - Specifies how the should be treated for match. - True if the path matches the set; false otherwise. - - - - Gets a collection of local file system items (files and directories) which matches this . - Only items which matches no exclusion pattern and matches at leas one inclusion pattern are included into result collection. - It doesn't depend on the order how the inclusion and exclusion patterns were added into the .
- If you don't want to include empty directories into result collection, please set the to false. -
- A collection of local file system items which matches this . -
- - - The exception that is thrown when an error occurs while using Rebex FileSystem. - - - - - Initializes a new instance of the class. - - - - - Initializes a new instance of the class. - - - - - Initializes a new instance of the class. - - - - - Represents a file system provider. - - This type is not intended to be used directly from your code. To implement custom file system providers, - add reference to the Rebex.FileSystem assembly and use one of the following base classes. - - - - Constructor. - - - - - Performs application-defined tasks associated with freeing, releasing, or resetting resources. - - 2 - - - - Derived classes must create a child file system with the root path equals to the . - - Root path of the child file system. - Child file system with the root path equals to the . - - - - Releases the resources used by the . - - true to release both managed and unmanaged resources; false to release only unmanaged resources. - - - - Configuration options for the . - - - - - Initializes new instance of the . - - - - - Gets or sets value indicating - whether the method is called for directories. - - Default value is false. - - - - - Gets or sets value indicating - whether the strict checks for is enabled. - - Default value is false. - - Enable strict checks only for debugging purposes. Do not use strict checks in production. - - - - - Gets or sets value indicating - whether the method is called for directories. - - Default value is false. - - - - - Gets or sets value indicating - whether the method is called for directories. - - Default value is false. - - - - - Gets or sets used for logging. - - Default value is null. - - - - - Gets or sets default used by the classes - inherited from the - and . - - - - - Represents basic type of the Rebex file system. - - - - - Read only Rebex file system. - - - - - Read-write Rebex file system. - - - - - Represents an attributes of the node. - - - - - Initializes a new instance of the - - of the node - - - - Gets the file atttributes of the node. - - - - - Gets a value indicating whether the .ReadOnly flag is set. - - true if the the .ReadOnly flag is set, otherwise false. - - - Indicates whether the current object is equal to another object of the same type. - true if the current object is equal to the parameter; otherwise, false. - An object to compare with this object. - - - - - - - - - - Determines whether two specified have the same value. - - The first to compare, or null. - The second to compare, or null. - true if the value of left is the same as the value of right, otherwise false. - - - - Determines whether two specified have different values. - - The first to compare, or null. - The second to compare, or null. - true if the value of left is different from the value of right; otherwise false. - - - Returns a string that represents the current . - A string that represents the current . - 2 - - - - Represents a content of a file. - - - - - Gets a value indicating whether underlying stream of this instance is read only. - - true if the content is read only, otherwise false. - - - - Returns a value indicating whether this node's stream was closed forcefully. - Forceful close occurs if the stream is not gracefully closed by the consumer. - - - - Performs application-defined tasks associated with freeing, releasing, or resetting resources. - 2 - - - - Method creates read only content from the given . - - Stream containing the content of the node. - New read only content. - - - - - - Method creates read/delayed write content from the given stream. - Use this method when following is desired/acceptable behavior: -
  • Underlying stream does not support immediate writing to the file.
  • When previously returned from this method is disposed - and underlying stream has been changed, then - the method method - in the is called.
- Stream containing the content of the node. - New read/delayed write content. - - -
- - - Method creates read/immediate write content from the given stream. Use this method when following is desired/acceptable behavior: -
  • Stream supports immediate writing to the file (e. g. ).
  • SaveContent method in ReadWriteFileSystemProvider is NEVER called. All data are written immediately using the suitable write methods.
- Stream containing the content of the node. - New read/immediate write content. - - -
- - - Returns with the content of the file. - - Stream with the content of the file. - - - - Represents read, write or read/write access to the file. - - This enumeration has a attribute that allows a bitwise combination of its member values. - - - - - Read access to the file. - - - - - Write access to the file. - - - - - Read and write access to the file. - - - - - Represents retrieval parameters. - - - - - Represents read access requirement. - - - - - Represents write access requirement. - - - - - Represents read and write access requirement. - - - - - Initializes a new instance of the - Required access type to the file. - - - - Gets required access type to the file. - - - - - - - - - - - - - - Determines whether two specified have the same value. - - The first to compare, or null. - The second to compare, or null. - true if the value of left is the same as the value of right, otherwise false. - - - - Determines whether two specified have different values. - - The first to compare, or null. - The second to compare, or null. - true if the value of left is different from the value of right; otherwise false. - - - Returns a string that represents the current . - A string that represents the current . - 2 - - - - Representats a file system path. - - - - - Used directory separator. - - - - - Name of the root directory. - - - - - Represents the empty . - - - - - Initializes a new instance of the . - - Examples of the valid path: - - / - - /dir1 - - /dir1/ - - /dir1/dir2 - - /dir1/dir2/ - - /dir1/dir2/file.txt - - path in the string format - Exception is thrown when the is malformed. - - - - Gets the name of the - or the . - - - - - Gets the name without an extension. - - - - - Indicates whether a path contains file name extension. - - True if path contains file name extension, otherwise false. - - - - Gets an enumerator that iterates through the elements of this path. - - - - - Gets the parent path, or path if this path does not have parent. - - - - - Gets the file name extension, or if this path does not have extension. - - - - - Returns true if this path equals to path, otherwise returns false. - - - - - Returns this as a . - - - - - Indicates if this instance is the root path ('/'). - - True if this instance is the root path, otherwise false. - - - - Returns an element of this path. - - Index of the element to return. - An element of this path. - - - - Gets the IEqualityComparer that is used to determine equality of . - - - - - Returns an array of characters not allowed in . - - - - - Returns the number of elements in the path. - - The number of elements in the path. - - - - Gets an enumerator that iterates through the elements of this path. - - - - Indicates whether the current is equal to another . - true if the current object is equal to the parameter; otherwise, false. - An to compare with this . - - - - Returns a subpath that is a subsequence of the parts of this path. - Subpath starts with the first part (on the index 0) of this path - and ends with the part on the index . - Root path ('/') does not have any subpath. - For the with the path '/dir1/dir2/file.txt'; - - GetSubPath(0) returns '/dir1'. - - GetSubPath(1) returns '/dir1/dir2'. - - GetSubPath(2) returns 'dir1/dir2/file.txt'. - - GetSubPath(3) throws . - - Zero based index of the end part of the subpath. - A subpath that is a subsequence of the parts of this path. - - - Determines whether the specified is equal to the current . - true if the specified is equal to the current ; otherwise, false. - The object to compare with the current object. - 2 - - - - Creates new with added to the end of this . - - New part of the path. - New with the added to the end of this . - - - - Creates new with added to this . - - The new extension. - New with the added to this . - - - - Creates new based on this and with the new . - - The new extension. - New based on this and with the new . - - - - Creates new based on this and with the extension deleted. - - New based on this and with the extension deleted. - - - - Tests if this starts with the given . - - Given . - True if this starts with the given , otherwise false. - - - - Determines whether two specified have the same value. - - The first path to compare, or null. - The second path to compare, or null. - true if the value of left is the same as the value of right, otherwise false. - - - - Determines whether two specified have different values. - - The first path to compare, or null. - The second path to compare, or null. - true if the value of left is different from the value of right, otherwise false. - - - Returns a string that represents the current . - A string that represents the current . - 2 - - - - Convert the value of the to the string representation. - - The to cast to . - - - - Convert the value of to the instance of the . - - The path to convert to the . - Exception is thrown when the is malformed. - - - - Combines strings in the array into a . - - - New combined from the strings in the array. - - - - Indicates whether the specified is null or an instance of the . - - The to test. - true if the parameter is null or an instance of the ; - otherwise false. - - - - - - - The exception that is thrown when an error occurs while creating new . - - - - - Initializes a new instance of the class - - - - - Initializes a new instance of the class - - - - - Initializes a new instance of the class - - - - - Holds the last access time, the last write time and the creation time of the node. All dates are expressed as UTC. - - Immutable type. - - - - Initializes a new instance of the . - - Creation time of the node (expressed as UTC). - Last access time of the node (expressed as UTC). - Last write time of the node (expressed as UTC). - - Missing or null parameters will have default value . - Time values with 'local' or 'unspecified' kind are converted to UTC automatically. - - - - - Represents the empty . - - - Empty has - == - and - == - and - == . - > - - - - Creation time of the node (expressed as UTC). - - - - - Last access time of the node (expressed as UTC). - - - - - Last write time of the node (expressed as UTC). - - - - - - - - Creates new instance with all properties equals to the current - instance properties except the property , which is set to value. - - New creation time (expressed as UTC). - New instance with all properties equals to the current - instance properties except the property , which is set to value. - - - - Creates new instance with all properties equals to the current - instance properties except the property , which is set to value. - - New last access time (expressed as UTC). - New instance with all properties equals to the current - instance properties except the property , which is set to value. - - - - - Creates new instance with all properties equals to the current - instance properties except the property , which is set to value. - - New last write time (expressed as UTC). - New instance with all properties equals to the current - instance properties except the property , which is set to value. - - - - - Indicates whether the specified is null or an NodeTimeInfo. - - The to test. - true if the parameter is null or an NodeTimeInfo ("CreationTime=LastAccessTime=LastWriteTime=DateTim.MinValue"), - otherwise false. - - - - Determines whether two specified have the same value. - - The first to compare, or null. - The second to compare, or null. - true if the value of left is the same as the value of right, otherwise false. - - - - Determines whether two specified have different values. - - The first to compare, or null. - The second to compare, or null. - true if the value of left is different from the value of right; otherwise false. - - - - - - - - - - - - - The type of the file system node. - - - - - Invalid value. - - - - - File node. - - - - - Directory node. - - - - - Link node (unused). - - - - - Specifies all node types, including File, Directory and Link. - - - - - Represents a file or directory item. - - - - - Gets file length. - - - - - Gets the last modification time of the item. - - - - - Gets the last access time of the item. - - - - - Gets the creation time of the item. - - - - - Gets the last modification time of the item. - - - - - Gets the last access time of the item. - - - - - Gets the creation time of the item. - - - - - Gets a value indicating whether the item is a file. - - True if the item is a file; false otherwise. - - - - Gets a value indicating whether the item is a directory. - - True if the archive item is directory; false otherwise. - - - - Gets a value indicating whether the item is a link. - - True if the archive item is a link; false otherwise. - - - - Gets the name of the file or directory. - - The name of the file or directory. - - - - Gets the path of the file or directory. - It can be relative or absolute path depending on the way of use. - - It contains a full path if returned by the GetItems method or a file/directory name only if returned by the GetList method. - The path of the file or directory. - - - - Provides a container for a collection of objects. - - - - - Initializes a new instance of the class. - - - - - Validates whether the item is correct and can be added. - - Item to add. - - - - Gets an for the collection. - - An for the collection. - - - - Gets an object that can be used to synchronize access to the collection. - - An object that can be used to synchronize access to the collection. - - - - Adds the elements of the specified collection to the end of the FileSystemItemCollection. - - The collection whose elements should be added to the end of the FileSystemItemCollection. - - - - Adds the specified item to the collection. - - The item to be added to the collection. - - - - Removes the specified item from the collection. - - The item to remove from the collection. - - True if item was successfully removed from the collection; false otherwise. - - - - - Removes the item with the specified path from the collection. - - The path of an item to remove from the collection. - - - - Removes the item at the specified index from the collection. - - The zero-based index of the item to remove. - - - - Gets the number of elements contained in the collection. - - The number of elements contained in the collection. - - - - Gets the item at the specified index. - - A zero-based index of the item to get. - Item at the specified index. - - - - Gets the item of the specified path. - - The path of the item to get. - Item with the specified path, or null if not found. - - - - Removes all items from the collection. - - - - - Copies the range of elements from the collection to a one-dimensional - array, starting at the specified index of the target array. - - One-dimensional zero-based array that is the destination of the elements copied from the collection. - A zero-based index in the destination array at which copying begins. - - - - Determines whether the item is in the collection. - - The item to locate in the collection. - True if the item is located in the collection; false otherwise. - - - - Determines whether the item with the specified path is in the collection. - - The path to locate in the collection. - True if the item with the specified path is located in the collection; false otherwise. - - - - Gets the total size of files contained in the collection. - - The total size of files contained it the collection. - - - - Gets or sets a value that indicates whether to use a Path or Name for pattern matching - and return values in the method. - - - - - Returns the paths of files in the collection that match the specified search pattern. - - The regular expression to match the paths or filenames against. - A array containing the paths or names of files in the specified directory that match the specified search pattern. - - The method works in two different modes (determined by property): - Filenames without path are searched and returned. This mode is used by default for collections returned by GetList method.Filenames with path are searched and returned. This mode is used by default for collection returned by GetItems method. - - - - Returns the names of files in the collection that match the specified search pattern. - - The search string to match the items against. - If tree, perform unix-like case-sensitive matching. - A array containing the names of files in the specified directory that match the specified search pattern. - -

The following wildcards are permitted in searchPattern:
* - Zero or more characters.
? - Exactly one character.
- Characters other than the wildcards represent themselves. - For example, the searchPattern string "*.txt" searches for all names/paths - ending with the ".txt". The searchPattern string "s*" searches for all - names/paths beginning with the letter "s". -

-

- The method works in two different modes (determined by property): - Filenames without path are searched and returned. This mode is used by default for collections returned by GetList method.Filenames with path are searched and returned. This mode is used by default for collection returned by GetItems method.

-
-
- - - Returns the names of files in the collection that match the specified search pattern. - - The search string to match the items against. - A array containing the names of files in the specified directory that match the specified search pattern. - -

The following wildcard specifiers are permitted in searchPattern:
* - Zero or more characters.
? - Exactly one character.
- Characters other than the wild card specifiers represent themselves. - For example, the searchPattern string "*t" searches for all names in path - ending with the letter "t". The searchPattern string "s*" searches for all - names in path beginning with the letter "s". -

-

- The method works in two different modes (determined by property): - Filenames without path are searched and returned. This mode is used by default for collections returned by GetList method.Filenames with path are searched and returned. This mode is used by default for collection returned by GetItems method.

-
-
- - - Sorts the items in the entire collection alphabetically. - - - - - Sorts the elements in the entire collection using the specified comparer. - - The implementation to use when comparing elements, or a null reference to sort alphabetically. - - - - Sorts the elements in a section of the collection using the specified comparer. - - The zero-based starting index of the range to sort. - The length of the range to sort. - The implementation to use when comparing elements, or a null reference to sort alphabetically. - - - - List of possible compare types for the FileSystemItemComparer class. - - - - - Compare by . - - - - - Compare by . - - - - - Compare by creation date and time of the item. - - - - - Compare by last modification date and time of the item. - - - - - Compare by last access date and time of the item. - - - - - Compare by type of the item (directory/file/link). - - - - - Class used to compare objects. - - - - - Creates a new instance of FileSystemItemComparer with default sorting by file name and with ascending sort mode. - - - - - Creates a new instance of FileSystemItemComparer with specified comparer type and ascending sort mode. - - Type of the comparer. - - - - Creates a new instance of FileSystemItemComparer with specified comparer type and sort mode. - - Type of the comparer. - Sorting order. - - - - IComparer interface implementation. Compares two instances of . - - First object to compare. - Second object to compare. - Value greater than zero when x is greater then y, zero when they are equal, or less than zero when x is lesser than y. - - - - Specifies how a search pattern is treated (how to traverse a hierarchy of directories). - - - See Using TraversalMode blog post for samples. - - - - - Performs shallow search for files and directories; do recursive transfer of matching directories.
- Shallow search means that items are searched only in the first level of given directory.
- If the pattern matches a file, the file is processed.
- If the pattern matches a directory, all files and subdirectories are processed. -
-
- - - Performs shallow search for files and directories; do non-recursive transfer of matching directories.
- Shallow search means that items are searched only in the first level of given directory.
- If the pattern matches a file, the file is processed.
- If the pattern matches a directory, only the directory itself is processed (without any content = empty directory will be created). -
-
- - - Performs shallow search for files only. This is the same as mode, but only files are processed.
- Shallow search means that files are searched only in the first level of given directory. -
-
- - - Performs deep search for files only. This is like DOS xcopy deep file search.
- Deep search means that files are searched in the given directory and also in all its subdirectories.
- However, if this mode is used in GetItems method, returned collection will also contains directories where the files were found. -
- - This behavior is useful in situations where you need to prepare the containing directory before the file is processed. - To get only files, just use Linq like this: collection.Where(item => !item.IsDirectory) -
- - - Specifies the default action to perform when a target file already exists. - However, the default action can still be changed using the ProblemDetected event. - - - - - Existing files are to cause the whole multi-file transfer to be canceled and an exception to be raised. - - - - - Existing files are to be always skipped. - - - - - Existing files are to be always overwritten. - - - - - Existing files are to be overwritten if they are older than source files. - This is strongly discouraged because modification dates are often misreported by FTP and SFTP servers, making this mode highly unreliable. - We strongly recommend to use a different mode or develop a custom solution using the ProblemDetected event. - - - - - Existing files with different sizes are to be overwritten. - - - - - Existing files are to be resumed if they are smaller than source files. - - - - - Existing files are to be renamed according the pattern "filename[number].extension". - You can still change the generated name using the ProblemDetected event and the method. - - - - - Existing files with different checksum are to be overwritten.
- Works on FTP and ZIP only. ZIP uses CRC-32 always; FTP uses checksums provided by the server (some FTP servers support no checksums). -
-
- - - Specifies behavior on links and reparse points in multi-file operations. - - - - - Detected links are to be resolved and processed - however, this can still be changed by ProblemDetected handler. - - - - - Detected links are to be skipped - however, this can still be changed by ProblemDetected handler. - - - - - Detected links cause an exception to be thrown - however, this can still be changed by ProblemDetected handler. - - - - - Specifies link type. - - - - - Symbolic link (symlink). - - - - - Hard link. - - - - - Specifies the method of the transfer. - - - - - Items are copied. - - - - - Items are moved to the target destination (items are deleted in the source location). - - - - - Specifies the behaviour of the . - - - - - All items (files and directories) are moved to the target destination deleting them in the source location. - - - - - Only files are moved to the target destination. Directories remain (not deleted) in the source location. - - - - - Specifies which date/time to restore. - - - - - Restore no date/time. - - - - - Restore CreationTime. - - - - - Restore LastWriteTime. - - - - - Restore LastAccessTime. - - - - - Restore all date and times. - - - - - Represents a file or directory on the local file system. - - - - - Initializes a new instance of the class. - - Path to a file or directory on the local file system. - - - - Gets a value indicating whether the file or directory exists. - - True if the file or directory exists; false otherwise. - - - - Gets file length. - - - - - Gets the last modification time of the item. - - - - - Sets the last modification time of the item. - - The last modification time. - - - - Gets the last access time of the item. - - - - - Sets the last access time of the item. - - The last access time. - - - - Gets the creation time of the item. - - - - - Sets the creation time of the item. - - The creation time. - - - - Gets a value indicating whether the item is a file. - - True if the item is a file; false otherwise. - - - - Gets a value indicating whether the item is a directory. - - True if the archive item is directory; false otherwise. - - - - Gets a value indicating whether the item is a link. - - True if the archive item is a link; false otherwise. - - - - Gets the name of the file or directory. - - The name of the file or directory. - - - - Gets the relative path of the file or directory. - - The relative path of the file or directory. - - - - Gets the full path of the file or directory. - - The full path of the file or directory. - - - - Returns the full path of the item. - - The full path of the item. - - - - Deletes the local item. - - - - - Gets item attributes. - - - - - Gets the list of file items in a directory represented by this object. - Fails if this object is not a directory. - - - This is only valid for directories. - - List of file items. - - - - Gets the list of directory items in a directory represented by this object. - Fails if this object is not a directory. - - - This is only valid for directories. - - List of directory items. - - - - Computes the CRC32 (Cyclic Redundancy Check) value of the file. - - - This is only valid for files. - - - CRC32 checksum value. - - - - - Calculates the checksum for the specified file. - - Path to the file. - Desired checksum algorithm. - Checksum of the specified file. - - - - Calculates the checksum of the specified part of the specified file. - - Path to the file. - Desired checksum algorithm. - The offset in the local file at which to start processing. - The maximum number of bytes to process. - /// Checksum of the specified file. - - - Provides a container for a collection of objects. - - - - - Initializes a new instance of the class. - - - - - Validates whether the item is correct and can be added. - - Item to add. - - - - Adds the item to the collection. - - The item to be added to the collection. - - - - Adds the item to the collection. - - The item to be added to the collection. - - - - Adds the elements of the specified collection to the end of the LocalItemCollection. - - The collection whose elements should be added to the end of the FtpItemCollection. - - - - Adds the elements of the specified collection to the end of the LocalItemCollection. - - The collection whose elements should be added to the end of the FtpItemCollection. - - - - Determines whether the item is in the collection. - - The item to locate in the collection. - True if the item is located in the collection; false otherwise. - - - - Determines whether the item is in the collection. - - The item to locate in the collection. - True if the item is located in the collection; false otherwise. - - - - Determines whether the item with the specified path is in the colleciton. - - The path to locate in the collection. - True if the item with the specified path is located in the collection; false otherwise. - - - - Copies the range of elements from the collection to a one-dimensional - array, starting at the specified index of the target array. - - One-dimensional zero-based array that is the destination of the elements copied from the collection. - A zero-based index in the destination array at which copying begins. - - - - Removes the specified item from the collection. - - The item to remove from the collection. - - True if item was successfully removed from the collection; false otherwise. - - - - - Removes the specified item from the collection. - - The item to remove from the collection. - - True if item was successfully removed from the collection; false otherwise. - - - - - Gets an for the collection. - - An for the collection. - - - - Gets the item at the specified index. - - A zero-based index of the item to get. - Item at the specified index. - - - - Gets the item of the specified path. - - The path of the item to get. - Item with the specified path, or null if not found. - - - - License key infrastructure for trial versions of Rebex components. - - - - - Gets or sets the license key. - - License key. - - - - Gets collection of license keys. - - - - - Common base class for log writers. A derived class must override either the method or both Write methods. - - - - - Creates a new instance of . - - - - - Gets or sets the log level - only log messages with log level equal to or greater than the specified one. - - Log level. - - - - Get a value indicating whether the log writer is closed. - - True when log writer is closed. False if log writer is opened and ready for writing. - Implementation in this base class returns false, as the close method actually does not close any resource. - - - - Closes the log writer. - - - - - Releases unmanaged and managed resources (depending on the scenario). - If is false, the method has been called from - the finalizer and should not reference other objects (therefore only unmanaged resources can be disposed). - - True indicates that the method has been called via IDisposable.Dispose. - False indicates that it has been called by the finalizer. - - - - Writes a message into the log. - - Message level. - Logging object type. - Logging object ID. - Logging area. - Message. - - - - Writes a message and data block into the log. - - Message level. - Logging object type. - Logging object ID. - Logging area. - Message. - Data block. - Data offset. - Date length. - - - - Appends the specified message text into a text-based log. This method is only called by method - and is only used by text-based loggers. - - Full message info. - - - - Disposes the object. - - - - - Class for chained comparison of objects. - - - - - Creates a new instance of MultiComparer. - - An array of comparers to use. - - - - IComparer interface implementation. Compares two instances of provided objects. - - The first object to compare. - The second object to compare. - - A signed integer that indicates the result of of x and y comparison. - Value Less than zero means x is less than y. Zero x equals y. Greater than zero x is greater than y. - - - - - Specifies asymmetric algorithm. - - - - - RSA. - - - - - DSA. - - - - - Diffie-Hellman. - - - - - Elliptic Curve Digital Signature Algorithm (.NET >= 4.0 or through a plugin). - - - - - Elliptic Curve Diffie-Hellman algorithm (.NET >= 4.0 or through a plugin). - - - - - Twisted Edwards Curve DSA algorithm such as ED25519 (supported through a plugin). - - - - - Specifies key blob format. - - - - - ECPrivateKey (defined by RFC 5915). - - - - - Raw public key data. - - - - - Raw private key data. - - - - - A platform-independent asymmetric algorithm object. - - - - - Register custom asymmetric key algorithm. - - Factory function that accepts algorithm name and returns algorithm. - - - - Gets the current key size. - - - - - Gets the current key algorithm. - - - - - Gets a value indicating whether this instance only contains the public key. - - - - - Gets CSP parameters if the instance of represents a key stored in a Windows Cryptographic Service Provider. - - CSP parameters if available; null if not available. - - - - Creates an instance of . - - - - - Frees the resources used by this object. - - - - - Creates an instance of from the specified asymmetric algorithm object. - - Asymmetric algorithm object. - True if the created object owns the asymmetric algorithm object. - An instance of . - - - - Exports a public key to the specified private key info object. - - Public key info object. - - - - Exports a private key to the specified private key info object. - - Private key info object. - - - - Imports a key from the specified public key info object. - - Public key info object. - - - - Imports a key from the specified private key info object. - - Private key info object. - - - - Imports a key from the specified RSA parameters. - - RSA key parameters. - - - - Imports a key from the specified DSA parameters. - - DSA key parameters. - - - - Imports a key from the specified Diffie-Hellman parameters. - - Diffie-Hellman key parameters. - - - - Imports a private key for the specified algorithm/curve. Only some algorithms/curves are supported. - - Key algorithm. - Key algorithm curve. - Key data. - Key format. - - - - Returns a value indicating whether the specified algorithm is supported. - - Asymmetric algorithm. - Curve name or OID (if needed). - Key size (specify 0 to indicate default key size). - True if supported; false if not supported. - - - - Generates Diffie-Hellman parameters corresponding to the specified key size. - - Key size. - Diffie-Hellman parameters. - - - - Generates a private key for the specified asymmetric algorithm with of the specified key size. - - Key algorithm. - Key size. Specify 0 to use default key size. - - - - Generates a private key for the specified asymmetric algorithm based on the specified curve. - - Key algorithm. - Curve name or OID. - - - - Computes the signature for the specified hash value. - - The hash value of the data to be signed. - A hash algorithm used to create the hash value. - The signature for the specified hash value. - -

- The private key must be available for this method to succeed. -

-
-
- - - Computes the signature for the specified message (using default parameters). - - Message to be signed. - Signature for the specified message. - -

- The private key must be available for this method to succeed. -

-
-
- - - Computes the signature for the specified message. - - Message to be signed. - Signature parameters. - Signature for the specified message. - -

- The private key must be available for this method to succeed. -

-
-
- - - Verifies the specified signature. - - The hash value of the signed data. - A hash algorithm used to create the hash value. - The signature for the specified hash value. - True if the signature verifies as valid; otherwise, false. - - - - Verifies the specified signature (using default parameters). - - Signed message. - The signature for the specified message. - True if the signature verifies as valid; otherwise, false. - - - - Verifies the specified signature. - - Signed message. - The signature for the specified message. - Signature parameters. - True if the signature verifies as valid; otherwise, false. - - - - Encrypts data. - - Data to be encrypted. - Encrypted data. - - - - Encrypts data. - - Data to be encrypted. - Encryption parameters. - Encrypted data. - - - - Decrypts data. - - Data to be decrypted. - Decrypted data. - - If silent operation is requested and the CSP must display UI to operate, this method will fail. - - - - - Decrypts data. - - Data to be decrypted. - Encryption parameters. - Decrypted data. - - - - Gets key material deriver. Only supported by Diffie-Hellman-like algorithms. - - Other side's public key in raw form. - Key material deriver. - - - - Provides various cryptography-related helper methods. - - - - - Gets a value indicating whether only FIPS-compliant algorithms are to be used. - - - - - Creates an instance of default random number generator. - - - - - - Returns an array of bytes with a cryptographically strong random sequence of values. - - Array length. - Array filled with random data. - - - - Fills specified array of bytes with a cryptographically strong random sequence of values. - - Array to fill random data with. - - - - Decodes a signature from a PKCS #7 form. - - Signature. - Key algorithm. - Decoded signature. - - - - Encodes a signature to a PKCS #7 form. - - Signature. - Key algorithm. - Encoded signature. - - - - Sets internal option. - - Instance. - Name. - Value. - - - - Gets internal option. - - Instance. - Name. - Value. - - - - Contains the parameters for Diffie-Hellman algorithm. - - - - - The prime modulus used for the operation. - - - - - The generator used for the operation. - - - - - The private key for the operation. - - - - - The public key for the operation. - - - - - Represents the standard parameters for the DSA algorithm. - - - - Specifies the counter for the DSA algorithm. - - - Represents the G parameter for the RSA algorithm. - - - Represents the J parameter for the RSA algorithm. - - - Represents the P parameter for the RSA algorithm. - - - Represents the Q parameter for the RSA algorithm. - - - Specifies the seed for the DSA algorithm. - - - Represents the X parameter for the RSA algorithm. - - - Represents the Y parameter for the RSA algorithm. - - - - Encryption schemes. - - - - - Default padding scheme (depends on key algorithm). - - - - - RSAES-PKCS1-v1_5 (RFC 3447). - - - - - RSAES-OAEP (RFC 3447). - - - - - Encryption parameters. - - - - - Encryption scheme. - - - - - Hashing algorithm for padding generation. - - - - - Optional input parameter for . - - - - - If set to true (default), the cryptographic provider should not display any user interface (UI) when working with private keys. - Only used for decryption operations. - - - If silent operation is requested and the cryptographic provider needs to display a UI to operate, the requested method will fail. - - - - - Initialize new instance of the . - - - - - Specifies hash algorithm. - - - - - SHA-1. - - - - - SHA-256. - - - - - SHA-384. - - - - - SHA-512. - - - - - MD4. - - - - - MD5. - - - - - Specifies hash algorithm key mode. - - - - - No keyed hash. - - - - - HMAC. - - - - - Represents a hash transform. - - - - - Represents the size, in bits, of the computed hash code. - - - - - Computes the hash value for the specified region of the input byte array. - - The input to compute the hash code for. - The offset into the input byte array from which to begin using data. - The number of bytes in the input byte array to use as data. - - - - Gets the value of the computed hash code. - - The computed hash value. - - - - Resets the transform. - - - - - Represents a hash algorithm. - - - - - Gets algorithm ID. - - - - - Gets the size of the computed hash code (in bits). - - - - - Gets the current key. - - The current key. - - - - Sets the current key to the specified value. - - Key to be set. - - - - Gets or sets the algorithm's key mode. - - - - - Creates an instance of for the specified algorithm. - - Algorithm. - - - - Gets a value indicating whether the specified algorithm is supported. - - Algorithm. - True if supported; false if not supported. - - - - Creates a hash transform object for this algorithm based on the currently set parameters. - - Hash transform object. - - - - Computes the hash value for the specified data. - - Input data. - Hash value. - - - - Computes the hash value for the specified data. - - Input data. - Input offset. - Input length. - Hash value. - - - - Computes the hash value for the specified data using the specified algorithm. - - Hash algorithm. - Input data. - Hash value. - - - - Computes the hash value for the specified data using the specified algorithm. - - Hash algorithm. - Input data. - Input offset. - Input length. - Hash value. - - - - Disposes the object. - - - - - Key derivation parameters. - - - - - Gets or sets key derivation function ("HASH" or "HMAC"). - - - - - Hashing algorithm. - - - - - HMAC key. - - - - - Data to append to shared secret when hashing. - - - - - Data to prepend to shared secret when hashing. - - - - - Key material deriver. - - - - - Derives key material. - - Parameters that specify how to derive the key material.. - Key material. - - - - Finalizer. Called by garbage collector during object destruction. - - - - - Disposes the deriver object. - - - - - Represents a cryptographic object identifier. - - - - - Initializes a new instance of the class using the specified object. - - The object identifier information to use to create the new object identifier. - - - - Initializes a new instance of the class using the specified OID dotted number string. - - An object identifier in dotted number format. - - - - Converts a OID to an . - - An object identifier in dotted number format. - An . - - - - Parses an OID from an ASN.1 encoded byte array. - - Byte array. - OID. - - - - Gets the dotted number representation of the object identifier. - - - - - Gets an ASN.1 encoded byte array representaion of this OID. - - Byte array. - - - - Gets an ASN.1 encoded byte array representaion of this OID. - - True if DER-formatting is to be used. - Byte array. - - - - Returns a string in dotted number format that represents the current . - - A string representation of the current Oid. - - - - Signature format. - - - - - Raw signature data. - - - - - DER-encoded ASN.1 form of the signature formatted according to Cryptographic Message Syntax (PKCS #7). - - - - - Signature padding scheme. - - - - - Default padding scheme (depends on key algorithm). - - - - - PKCS #1 padding scheme (RSASSA-PKCS1-v1_5 defined by RFC 3447). - - - - - Probabilistic Signature Scheme (PSS) padding scheme (RSASSA-PSS defined by RFC 3447). - - - - - Signature parameters. - - - - - Hashing algorithm. - - - - - Signature format. - - - - - Signature padding scheme. - - - - - Salt length in bytes (only used for ). - - - - - If set to true (default), the cryptographic provider should not display any user interface (UI) when working with private keys. - Only used for signing operations. - - - If silent operation is requested and the cryptographic provider needs to display a UI to operate, the requested method will fail. - - - - - Creates a new instance of . - - - - - Specifies symmetric algorithm. - - - - - AES. - - - - - 3DES. - - - - - Twofish. - - - - - DES. - - - - - RC2. - - - - - An algorithm compatible with RC4. - - - - - Blowfish. - - - - - Represents a symmetric cipher algorithm. - - - - - Gets algorithm ID. - - - - - Gets or sets the desired block size in bits. - - - - - Gets or sets the desired key size in bits. - - - - - Gets or sets the desired effective key size in bits. - - - - - Gets or sets the desired block cipher padding mode. - - - - - Gets or sets the desired block cipher mode. - - - - - Gets the current initialization vector. - - Initialization vector. - - - - Gets the current key. - - Key. - - - - Derives a key (of length) using the specified generator. - - Generator algorithm. - - - - Derives an initialization vector (of length) using the specified generator. - - Generator algorithm. - - - - Generates a random key (of length). - - - - - Generates a initialization vector (of length). - - - - - Sets the current key to the specified value and changes the accordingly. - - Key. Cannot be null. - - - - Sets the current initialization vector to the specified value. - - Initialization vector. - - - - Creates an encryptor object for this algorithm based on the currently set parameters. - - Encryptor object. - - - - Creates a decryptor object for this algorithm based on the currently set parameters. - - Decryptor object. - - - - Disposes the object. - - - - - Creates an instance of for the specified algorithm. - - Algorithm. - - - - Gets a value indicating whether the specified algorithm is supported. - - Algorithm. - True if supported; false if not supported. - - - - The AlgorithmIdentifier class defines an algorithm used for a cryptographic operation. - - - - - Creates an instance of the class - with the specified algorithm identifier. - - An object identifier for the algorithm. - - - - Creates an instance of the class with - the specified algorithm identifier and parameters. - - An object identifier for the algorithm. - ASN.1 DER encoded parameters. - - - - Gets the object identifier for the algorithm. - - On that represents the algorithm. - - - - Gets the algorithm parameters. - - The algorithm parameters. - - - - A collection of values associated with a . - - - - - Gets the value at the specified index. - - An array of bytes in ASN.1 format. - - - - Copies the range of elements from the to a compatible one-dimensional - array, starting at the specified index of the target array. - - One-dimensional zero-based array that is the destination of the elements copied from . - A zero-based index in the destination array at which copying begins. - - - - A cryptographic attribute that contains a type and a collection of associated values. - - - - - Initializes an instance of a . - - The object identifier that identifies the attribute type. - Parameters in ASN.1 format, in a form of one or more byte arrays. - - - - Initializes an instance of a . - - The object identifier that identifies the attribute type. - Parameters in ASN.1 format. - Not supported in .NET 1.0, use instead. - - - - Gets the object identifier that identifies the attribute type. - - The object identifier. - - - - Gets the collection of values associated with the attribute. - - A . - - - - A collection of objects. - - - - - Gets or sets the at the specified index. - - The zero-based index of the to get or set. - A cryptographic attribute. - - - - Gets the first with the specified object identifier. - - The object identifier, either friendly name or dotted string format. - A cryptographic attribute if found, or null if not found. - - - - Contains string representations of common extended usage OIDs. - - - - Any purpose. - - - TLS Web server authentication. - - - TLS Web client authentication. - - - Code signing. - - - E-mail protection. - - - Timestamping. - - - OCSPstamping. - - - - A utility class that features a certificate issuer functionality. This can be used as a base of simple custom certification authority. - - - - - Issues a certificate signed by the specified certification authority using the specified signature hash algorithm. - - Certification authority certificate to issue and sign the certificate. - Certificate info. - Certificate public key. - A new certificate. - - - - Issues a self-signed certificate, signed using the specified algorithm. Also passes back the private key info. - - Certificate info. - Certificate private key. - A new certificate. - - - - Issues a certificate signed by the specified certification authority using the specified signature hash algorithm. - - Certification authority certificate to issue and sign the certificate. - Signature hash algorithm. - Certificate revocation list info. - A collection of objects. - A new certificate. - - - - Contains information describing the certificate for the .Issue method. - - - - - Creates an instance of class. - - - - - Gets the certificate serial number. - - Serial number. - - - - Sets the certificate serial number. - - Serial number. - - - - Sets the certificate serial number. - - Serial number. - - - - Gets or sets the certificate subject. - - Certificate subject. - - - - Gets or sets the basic certificate usage. - - Basic certificate usage. - - - - Gets the extended certificate usage. - - Extended certificate usage. - - - - Sets the extended certificate usage. - - Extended certificate usage. - - - - Gets or sets the certificate effective date. - - Certificate effective date. - - - - Gets or sets the certificate expiration date. - - Certificate expiration date. - - - - Gets the certificate extensions collection. - - Certificate extensions collection. - - - - Gets the CRL distribution points collection. - - CRL distribution points collection. - - - - Gets or sets the certificate owner's e-mail address. - - E-mail address. - - - - Sets alternative hostnames. - - Alternative hostnames. - - - - Sets alternative hostnames. - - Alternative hostnames. - - - - Gets or sets the hash algorithm to be used to create the signature of the certificate. - - The hash algorithm to be used to create the signature of the certificate. - - - - Contains information describing the certificate for the .IssueRevocationList method. - - - - - Creates an instance of class. - - - - - Gets or sets the datetime of this CRL update. - - Datetime of this CRL update. - - - - Gets or sets the datetime of the next CRL update. - - Datetime of the next CRL update. - - - - A SPKAC certificate request. This is used by Mozilla, Opera and other browsers except Internet Explorer. - For Internet Explorer, use . - - - - - Creates a SPKAC request from an ASN.1 block. - - ASN.1 block. - - - - Validates the SPKAC request's signature. - - Challenge string. - True if valid; false if not valid. - - - - Gets the SPKAC request's public key info. This includes the key itself. - - Public key info. - - - - PKCS #10 certification request. This is the standard certificate format. - It is used (for example) by Internet Explorer's XEnroll control, but non-IE browsers generally use instead. - - - - - Creates a new PKCS #10 request for the specified subject and public key. - - Request subject. - Request public key. - - - - Parses a PKCS #10 request from an ASN.1 block. - - ASN.1 block. - - - - Validates the PKCS #10 request's signature. - - True if valid; false if not valid. - - - - Validates the PKCS #10 request's signature. - - Subject - in practice, this is used in place of a challenge string. - True if valid; false if not valid. - - - - Signs the certification request using a private key corresponding to the request's public key. - - An instance of . - Hash algorithm to use for the signature. - - - - Signs the certification request using a private key corresponding to the request's public key. - - An instance of representing the private key. - Hash algorithm to use for the signature. - - - - Gets the PKCS #10 request's public key info. This includes the key itself. - - Public key info. - - - - Gets the PKCS #10 request's subject. - - Request subject. - - - - Gets list of alternative hostnames. - - List of alternative hostnames. - - - - Gets the PKCS #10 request's attributes. - - Request attributes. - - - - Gets the PKCS #10 request's certificate extension collection (represented by 1.2.840.113549.1.9.14 attribute in collection). - - - - - Gets ASN.1 encoded form of this object. - - Array of bytes. - - - - Specifies the reason for inclusion in the certificate revocation list. - - - - Unspecified. - - - Key was compromised. - - - CA was compromised. - - - Affiliation changed. - - - Certificate was superseded. - - - Operation was ceased. - - - Certificate hold. - - - Remove from CRL. - - - - The certificate revocation list. - - - - - Creates a certificate revocation list from an ASN.1 block. - - ASN.1 block. - - - - Loads a certificate revocation list from given stream. - - Stream to load the certificate revocation list from. - - - - Converts a certificate revocation list into a byte array. - - Byte array. - - - - Gets the DN of the issuer of this certificate revocation list. - - DN of the issuer of this certificate revocation list. - - - - Gets the datetime of this CRL update. - - Datetime of this CRL update. - - - - Gets the datetime of the next CRL update. - - Datetime of the next CRL update. - - - - Gets the CRL number if appropriate extension is present. - - CRL number or null (Nothing in VB.NET) if not specified. - - - - Gets the collection of CRL's extensions. - - Extensions collection. - - - - Gets the collection of revoked certificates. - - Revoked certificate collection. - - - - Returns the key algorithm used to sign this certificate revocation list. - - The key algorithm. - - - - Returns the hash algorithm used to create the signed hash value. - - Hash algorithm. - - - - Returns the certificate revocation list hash. - - CRL hash. - - - - Returns the certificate revocation list signature. - - CRL signature. - - - - Returns distribution point URL from issuing distribution point extension, if both present. Otherwise returns null. - - Distribution point URL. - - - - Checks whether the certificate revocation list contains the specified certificate. - Also makes sure that the CRL is suitable for the certificate. - - Certificate to check. - Revocation check result. - - Please note that this method does not check the validity of the CRL itself. - Call on the issuer certificate - to perform this check. - - - - - Collection of information about revoked certificates. A part of . - - - - - Creates a new instance of . - - - - - Information about revoked certificate. - - - - - Creates a new instance of revoked certificate based on the supplied data. - - Serial number. - Revocation date. - Revocation reason. - - - - Creates a new instance of revoked certificate based on the supplied data. - - Serial number. - Revocation date. - Revocation reason. - - - - Gets the certificate's serial number. - - Serial number. - - - - Gets the revocation date. - - Revocation date. - - - - Gets the collection of revoked certificate info's extensions. - - Extensions collection. - - - - Returns revocation reason of the revoked certificate. - - If the revocation reason extension is present, returns the reason from that extension; otherwise returns . - - - - Represents revocation check outcome. - - - - - The issuer of the certificate does not match the issuer of the CRL. - - - - - This CRL is not supposed to be used to check the status of this certificate (try the next CRL). - - - - - The certificate has not been revoked according to this CRL. - - - - - The certificate has been revoked. - - - - - Represents the result of certificate revocation check. - - - - - Gets revocation check outcome. - - - - - Gets the revocation date. - - Revocation date. - - - - Gets revocation reason of the revoked certificate. - - If the revocation reason extension is present, returns the reason from that extension; otherwise returns null (Nothing in VB.NET). - - - - Certificate revocation list status. - - - - - The CRL is valid (make sure to check the issuer certificate for validity as well). - - - - - The CRL has expired or is not valid yet. - - - - - The CRL has not been issued by the specified issuer. - - - - - The CRL contains an unsupported critical extension. - - - - - The CRL update time is outside the issuer certificate's time validity range. - - - - - The CRL issuer is not intended to issue CRLs. - - - - - The CRL signature is not valid. - - - - - Malformed structure of the CRL or its extensions. - - - - - Collection of certificate revocation lists. - - - - - The class represents the CMS/PKCS #7 ContentInfo data structure. - It encapsulates the content of or messages. - - - - - Initializes a new instance of using the specified array of bytes - as content and an object identifier "data" as content type. - - The message content. - - - - Initializes a new instance of using the specified array of bytes - as content and the specified object identifier as content type. - - The message content type. - The message content. - - - - Gets the object identifier of the CMS/PKCS #7 message content type. - - - - - Gets the content of the CMS/PKCS #7 message. - - An array of bytes that represent the content data. - - - - Copies the content of the CMS/PKCS #7 message into the supplied stream. - - Stream into which the content will be written. - - - - Represents a CMS/PKCS #7 encrypted data. - - - - - Gets or sets the to be used to find certificates - corresponding to a . - - The certificate finder. - - - - Gets or sets a value indicating whether cryptographic providers - are allowed to display any user interface (UI) when working with private keys. - - A value indicating whether a cryptographic provider can display a UI. - - - - Gets a value indicating whether the content is encrypted. - - A value indicating whether the content is encrypted. - - - - Gets the collection of unprotected (unencrypted) attributes associated with this CMS/PKCS #7 message. - - Unprotected attribute collection. - - - - Gets the collection of certificates that are embedded in the message. - - Collection of certificates - - - - Gets the collection of certificate revocation lists (CRLs) that are embedded in the message. - - Collection of CRLs - - - - Gets the collection of recipients associated with this CMS/PKCS #7 message. - - A collection of recipients. - - - - Gets the inner content information for this CMS/PKCS #7 message. - It contains the content type identifier and content data. - - The inner content. - - This method returns the encrypted content for parsed messages - and unencrypted content for newly created messages. To encrypt or decrypt - the content, use and methods. - - - - - Gets the identifier of the algorithm used to encrypt the content. - - An object. - - - - Returns a value indicating whether the private key to decrypt the symmetric key - and encrypted content is available. - - True if the private key is available, false if it isn't. - - - - Tries acquiring a private key unless it is already available. - - True if the key has been acquired, false otherwise. - - - - Gets the symmetric key used to encrypt the message, - or null if it cannot be retrieved. - - The symmetric key used to encrypt the message, or null. - - - - Encrypts the contents of the CMS/PKCS #7 message. - - - - - Decrypts the contents of the CMS/PKCS #7 message. - - For a successful decryption, a symmetric key must be available. - - - - Decodes an encoded CMS/PKCS #7 encrypted message from raw data. - Upon successful decoding, information can be retrieved using - methods and properties. - - Arrays of bytes representing a CMS/PKCS #7 message. - - - - Encodes the object into CMS/PKCS #7 message data. - - Array of bytes representing a CMS/PKCS #7 message. - - - - Determines whether the specified content info ASN.1 sequence is an enveloped data sequence. - - Sequence data. - Offset. - Count. - True if yes; false if not. - - - - Loads a CMS/PKCS #7 encrypted message from a stream. - Upon successful decoding, information can be retrieved using - methods and properties. - - A stream from which to load the message. - - - - Saves into a stream. - - A stream to which to save the message. - - - - Creates a copy of this object. - - A new object. - - - - Creates an instance of class. - It must be initialized using or methods before - any other methods and properties can be accessed. - - - - - Creates an instance of class using the specified content - information as the inner content. - - The inner content of the encrypted message. - - - - Creates an instance of class using the specified content - information and encryption algorithm. - - The inner content of the encrypted message. - Encryption algorithm identifier (see remarks). Can be null for 3DES. - - Currently, 3DES ("1.2.840.113549.3.7"), - AES ("2.16.840.1.101.3.4.1.2" for 128-bit, "2.16.840.1.101.3.4.1.22" for 192-bit and "2.16.840.1.101.3.4.1.42" for 256-bit), - DES ("1.3.14.3.2.7") and RC2 ("1.2.840.113549.3.2") algorithms are supported. - - - - - Creates an instance of class using the specified content - information and encryption algorithm. - - The inner content of the encrypted message. - Encryption algorithm identifier (see remarks). Can be null for 3DES. - The effective key length in bits (only used by RC2 algorithm). - - Currently, 3DES ("1.2.840.113549.3.7"), - AES ("2.16.840.1.101.3.4.1.2" for 128-bit, "2.16.840.1.101.3.4.1.22" for 192-bit and "2.16.840.1.101.3.4.1.42" for 256-bit), - DES ("1.3.14.3.2.7") and RC2 ("1.2.840.113549.3.2") algorithms are supported. - - - - - Defines the interface that certificate finder classes must implement. - - - - - Finds a certificate corresponding to the specified subject identifier. - - Identifier of the subject certificate. - A certificate store containing the certificates that were included with the message. - Certificate chain if found, or null (Nothing in Visual Basic). - - - - Provides a set of common certificate finders. - - - - - Certificate finder. - - CertificateChain array. - A new instance of ICertificateFinder. - - - - Default certificate finder. - - - Searches for certificates in the current user's "My", - "Trusted people" and "Other people" stores. - - - - - Base class for various PKCS objects. - - - - - Specifies private key file format. - - - - Base64-encoded PKCS #8 format. - - - PuTTY PPKv2 format. - - - OpenSSH/OpenSSL SSLeay format. - - - Raw PKCS #8 format. - - - New OpenSSH format with bcrypt key expansion (Base64-encoded keys with "BEGIN OPENSSH PRIVATE KEY" header). - - - - Represents a private key. - - - - - Creates a new instance of . Use the method to load a private key. - - - - - Creates a new instance of based on the specified RSA parameters. - - RSA parameters including private keys. - - - - Creates a new instance of based on the specified DSA parameters. - - DSA parameters including private keys. - - - - Gets the key algorithm identifier. - - Key algorithm identifier. - - - - Gets or ets the key comment. The comment is used while saving in some formats. - - Key comment. - - - - Gets the raw form of the private key. - - Array of bytes. - - - - Gets the raw form of the private key. - - Array of bytes. - - - - Gets a public key corresponding to the private key. - - An instance of . - - - - Gets the DSA parameters for a DSA key. May only be used for DSA private keys. - - DSA paramaters. - - - - Gets the RSA parameters for a RSA key. May only be used for RSA private keys. - - RSA paramaters. - - - - Gets ASN.1 encoded form of this object. - - Array of bytes. - - - - Saves the private key into the supplied stream in the specified format. - - A stream to which to save the private key. - Password to encrypted the private key, or null if no encryption desired. - Private key file format. - - - - Saves the private key into the supplied stream in the specified format. - - A file to which to save the public key. - Password to encrypted the private key, or null if no encryption desired. - Private key file format. - - - - Saves the private key into the supplied stream in Base64-encoded PKCS #8 format. - - A stream to which to save the private key. - Password to encrypted the private key, or null if no encryption desired. - Encryption algorithm identifier. Ignored if password is null. - - Currently, 3DES ("1.2.840.113549.3.7"), DES ("1.3.14.3.2.7") and RC2 ("1.2.840.113549.3.2") algorithms are supported. - - - - - Loads a PKCS #8, PuTTY or SSLeay (OpenSSL/OpenSSH) format private key from a stream. - Upon successful decoding, information can be retrieved using - methods and properties. - - A stream from which to load the private key. - Password used to encrypted the private key, or null if no password needed. - - - - Loads a PKCS #8, PuTTY or SSLeay (OpenSSL/OpenSSH) format private key from a stream. - Upon successful decoding, information can be retrieved using - methods and properties. - - A file from which to load the private key. - Password used to encrypted the private key, or null if no password needed. - - - - Represents a public key. - - - - - Creates a new instance of . Use the method to load a public key. - - - - - Creates a new instance of based on the specified RSA parameters. - - RSA parameters. - - - - Creates a new instance of based on the specified DSA parameters. - - DSA parameters. - - - - Gets the key algorithm identifier. - - Key algorithm identifier. - - - - Gets the raw form of the public key. - - Array of bytes. - - - - Gets the raw form of the public key. - - Array of bytes. - - - - Gets ASN.1 encoded form of this object. - - Array of bytes. - - - - Gets the DSA parameters for a DSA public key. May only be used for DSA public keys. - - DSA paramaters. - - - - Gets the RSA parameters for a RSA public key. May only be used for RSA public keys. - - RSA paramaters. - - - - Returns the size of the key in bits. - - Size of the key in bits. - - - - Returns the key algorithm. - - Key algorithm. - - - - Saves the public key into the supplied stream in Base64-encoded PKCS #8 format. - - A stream to which to save the public key. - - - - Saves the public key into the supplied stream in Base64-encoded PKCS #8 format. - - A file to which to save the public key. - - - - Loads a PKCS #8 public key from a stream. - Upon successful decoding, information can be retrieved using - methods and properties. - - A stream from which to load the public key. - - - - Loads a PKCS #8 public key from a file. - Upon successful decoding, information can be retrieved using - methods and properties. - - A file from which to load the public key. - - - - Represents a CMS/PKCS #7 encrypted message recipient. - This class is inherited by and classes. - - - - - Gets the identifier of the recipient. - - Identifier of the recipient. - - - - Gets the identifier of the algorithm used to encrypt the symmetric key. - - An object. - - - - Gets signature parameters (if available). - - Signature parameters. - - - - Gets the encrypted key for the recipient. - - Encrypted key. - - - - Gets the certificate associated with the recipient, or null if not available. - - The recipient's certificate, or null. - - - - Gets the certificate chain associated with the recipient, or null if not available. - - The recipient's certificate chain, or null. - - - - Defines key transport recipient information, typically using the RSA algorithm to - encrypt the shared symmetric key to transport. - - - - - Creates a new instance of that defines the - key transport recipient information for the owner of the specified RSA certificate. - Use to specify RSAES-OAEP parameters. - - The recipient's certificate. - - - - Creates a new instance of that defines the - key transport recipient information for the owner of the specified RSA certificate. - Use to specify RSAES-OAEP parameters. - - The recipient's certificate. - Subject identifier type - only IssuerAndSerialNumber and SubjectKeyIdentifier values are accepted. - - - - Creates a new instance of that defines the - key transport recipient information for the owner of the specified RSA certificate. - - The recipient's certificate. - Encryption parameters (to specify RSAES-OAEP parameters). Can be null (for PKCS #1). - - - - Creates a new instance of that defines the - key transport recipient information for the owner of the specified RSA certificate. - - The recipient's certificate. - Subject identifier type - only IssuerAndSerialNumber and SubjectKeyIdentifier values are accepted. - Encryption parameters (to specify RSAES-OAEP parameters). Can be null (for PKCS #1). - - - - Gets the identifier of the recipient. - - Identifier of the recipient. - - - - Gets the identifier of the algorithm used to encrypt the symmetric key. - - An object. - - - - Gets signature parameters (if available). - - Signature parameters. - - - - Gets the encrypted key for the recipient. - - Encrypted key. - - - - Gets the certificate associated with the recipient, or null if not available. - - The recipient's certificate, or null. - - - - Gets the certificate chain associated with the recipient, or null if not available. - - The recipient's certificate chain, or null. - - - - Defines key agreement algorithm recipient information. The key itself is not transported - the two - parties that will be using a symmetric key both take part in its generation. Please note that - this method is not yet fully supported by Rebex Security library. - - - - - Gets the identifier of the key originator. - - Identifier of the key originator. - - - - Gets the identifier of the recipient. - - Identifier of the recipient. - - - - Gets the identifier of the algorithm used to encrypt the symmetric key. - - An object. - - - - Gets the encrypted key for the recipient. - - Encrypted key. - - - - Gets the certificate associated with the recipient, or null if not available. - - The recipient's certificate, or null. - - - - Gets the certificate chain associated with the recipient, or null if not available. - - The recipient's certificate chain, or null. - - - - A collection of objects. - - - - - Creates an empty and read-only instance of . - - - - - Represents a CMS/PKCS #7 signed data. - - - - - Specifies what parts of the certificate chain should be included in the signed data. - - Certificate include option. - - - - Gets or sets the to be used to find certificates - corresponding to a . - - The certificate finder. - - - - Gets or sets a value indicating whether cryptographic providers - are allowed to display any user interface (UI) when working with private keys. - - A value indicating whether cryptographic providers can display a UI. - - In case of signing, the actual behavior is determined by the combination of this value and the value of - passed to associated objects. - Cryptographic providers are only permitted to display a UI if both Silent properties are set to true. - - - - - Gets the collection of certificates that are embedded in the message. - - Collection of certificates - - - - Gets the collection of certificate revocation lists (CRLs) that are embedded in the message. - - Collection of CRLs - - - - Gets the collection of signers associated with this CMS/PKCS #7 message. - - A collection of signers. - - - - Gets or sets the inner content information for this CMS/PKCS #7 message. - It contains the content type identifier and content data. - - The inner content. - - - - Gets or sets a value indicating whether the actual content is detached from the message. - - True if the content is detached; False if the content is embedded within the message. - - - - Creates a signatures for all signers that do not have one yet. - - - - - Creates a signatures for all signers that do not have one yet. - - Signature options. - - - - Validates all digital signatures on this CMS/PKCS #7 signed message - and validates all the signers' certificates. - - Validation result. - - - - Validates all digital signatures on this CMS/PKCS #7 signed message. - Optionally, signers' certificates are validated, and the specified validation - options are taken into account. - - Specifies whether to only verify the signatures, skipping the certificate validation. - Signature and certificate validation options. - Validation result. - - - - Validates all digital signatures on this CMS/PKCS #7 signed message. - Optionally, signers' certificates are validated, and the specified validation - options are taken into account. - - Specifies whether to only verify the signatures, skipping the certificate validation. - Signature and certificate validation options. - Certificate chain engine. - Validation result. - - - - Decodes an encoded CMS/PKCS #7 signed message from raw data. - Upon successful decoding, information can be retrieved using - methods and properties. - - Array of bytes representing a CMS/PKCS #7 message. - - - - Encodes the object into CMS/PKCS #7 message data. - - Array of bytes representing a CMS/PKCS #7 message. - - - - Determines whether the specified content info ASN.1 sequence is a signed data sequence. - - Sequence data. - Offset. - Count. - True if yes; false if not. - - - - Loads a CMS/PKCS #7 signed message from a stream. - Upon successful decoding, information can be retrieved using - methods and properties. - - A stream from which to load the message. - - - - Saves into a stream. - - A stream to which to save the message. - - - - Creates a copy of this object. - - A new object. - - - - Creates an instance of class. - - - - - Creates an instance of class using the specified content - information as the inner content. - - The inner content of the signed message. - - - - Creates an instance of class using the specified content - information as the inner content. - - The inner content of the signed message. - - Specifies whether the signature is detached. - If detached, the actual content is not included within the signed message. - - - - - Specifies what parts of the certificate chain should be included in the message. - - - - Leave the existing certificate in the collection. - - - The certificate chain is not included. - - - The certificate chain is included, except for the root certificate. - - - Only the end certificate is included. - - - The certificate chain, including the root certificate, is included. - - - - Represents a CMS/PKCS #7 message signer. - - - - - Gets the identifier of the signer. - - Identifier of the signer. - - - - Gets the identifier of the digest algorithm. - - An object. - - - - Gets a value that identifies the digest algorithm. - - Digest algorithm. - - - - Gets the identifier of the signature algorithm. - - An object. - - - - Gets the signature, or null if it is not available yet. - - The signature. - - - - Gets the collection of signed attributes associated with this CMS/PKCS #7 message. - - Signed attribute collection. - - - - Gets the collection of unsigned attributes associated with this CMS/PKCS #7 message. - - Unsigned attribute collection. - - - - Gets the certificate associated with the signer, or null if not available. - - The signer's certificate, or null. - - - - Gets the certificate chain associated with the signer, or null if not available. - - The signer's certificate chain, or null. - - - - Gets the signing time, or 1970-01-01 if not available. - - Singing time. - - - - Gets the preferred subject identifier for key encryption. - - The preferred subject identifier. - - - - Gets the collection of S/MIME capabilities the signer supports. - - Collection of supported S/MIME capabilities. - - - - Gets signature parameters (if available). - - Signature parameters. - - - - Validates the signer's digital signature and validates the certificate. - - Validation result. - - - - Validates the signer's digital signatures. - Optionally, signers' certificates are validated, and the specified validation - options are taken into account. - - Specifies whether to only verify the signatures, skipping the certificate validation. - Signature and certificate validation options. - Validation result. - - - - Validates the signer's digital signatures. - Optionally, signers' certificates are validated, and the specified validation - options are taken into account. - - Specifies whether to only verify the signatures, skipping the certificate validation. - Signature and certificate validation options. - Certificate chain engine. - Validation result. - - - - Creates a signatures for the signer. - - - - - Creates a signature for the signer. - - Signature options. - - - - Creates a new instance of that defines - a signer corresponding to the specified certificate. An associated private - key for the certificate must be available. - Use to specify RSASSA-PSS parameters. - - The signer's certificate. - - - - Creates a new instance of that defines - a signer corresponding to the specified certificate. An associated private - key for the certificate must be available. - Use to specify RSASSA-PSS parameters. - - The signer's certificate. - Subject identifier type - only IssuerAndSerialNumber and SubjectKeyIdentifier values are accepted. - - - - Creates a new instance of that defines - a signer corresponding to the specified certificate. An associated private - key for the certificate must be available. - Use to specify RSASSA-PSS parameters. - - The signer's certificate. - Subject identifier type - only IssuerAndSerialNumber and SubjectKeyIdentifier values are accepted. - Digest algorithm. - - - - Creates a new instance of that defines - a signer corresponding to the specified certificate. An associated private - key for the certificate must be available. - - The signer's certificate. - Signature parameters (to specify RSASSA-PSS parameters). Can be null (for PKCS #1). - - - - Creates a new instance of that defines - a signer corresponding to the specified certificate using the - specified subject identifier type. An associated private - key for the certificate must be available. - - The signer's certificate. - Signature parameters (to specify RSASSA-PSS parameters). Can be null (for PKCS #1). - Subject identifier type - only IssuerAndSerialNumber and SubjectKeyIdentifier values are accepted. - - - - A collection of objects. - - - - - Creates an empty and read-only instance of . - - - - - Options for and methods. - - - - Don't include any signed attributes in the signature. Not recommended. - - - Don't include key Microsoft extensions in the signature attributes. - - - Don't include S/MIME capabilities extensions in the signature attributes. - - - Skip certificate usage check. - - - - Signature validation status. - - - - Certificate is not valid. - - - Certificate is not available. - - - A digest algorithm is not supported. - - - A signature algorithm is not supported. - - - A signature is invalid. - - - Invalid key usage. The certificate usage doesn't include message signing. - - - Content type mismatch. - - - - Represents the result of signature validation. - - - - - Gets the status mask. - - Status mask. - - - - Gets the certificate validation status mask. - - Certificate validation status mask. - - - - Gets the certificate chain validity status. - - True if valid, false if not valid. - - - - Represents an S/MIME capability. - - - - - Initializes an instance of a with no parameters. - - The object identifier that identifies the S//MIME capability. - - - - Initializes an instance of a . - - The object identifier that identifies the S//MIME capability. - Capability parameters in ASN.1 format. - - - - Gets the object identifier that identifies the S/MIME capability. - - The object identifier. - - - - Gets the S/MIME capability parameters. - - An array of bytes in ASN.1 format. - - - - A collection of objects. - - - - - Gets or sets the at the specified index. - - The zero-based index of the to get or set. - An S/MIME capability. - - - - Gets the first with the specified object identifier. - - The object identifier, either friendly name or dotted string format. - An S/MIME capability if found, or null if not found. - - - - Defines the type of subject identifier that identifies a subject and a certificate. - - - - - The type of subject identifier is unknown. - - - - - The subject is identified by the certificate issuer and serial number. - - - - - The subject is identified by the hash of the subject's public key. The hash algorithm used is determined by the signature algorithm suite in the subject's certificate. - - - - - The subject is identified by the subject's public key. - - - - - The class identifies a subject, either by certificate issuer - and serial number, by the subject key identifier or by a public key. - - - - - Gets the type of the subject identifier. - - The type of the subject identifier. - - - - Gets the of the certificate issuer if - this subject identifier is identified by the issuer name and serial number. - Otherwise, this property will return null. - - Certificate issuer. - - - - Gets the serial number of the certificate if - this subject identifier is identified by the issuer name and serial number. - Otherwise, this property will return null. - - Certificate serial number. - - - - Gets the subject key identifier of the certificate if - this subject identifier is identified by the subject key identifier. - Otherwise, this property will return null. - - Certificate subject key identifier. - - - - Gets the public algorithm of the certificate if - this subject identifier is identified by the public key. - Otherwise, this property will return null. - - Certificate public key algorithm. - - - - Gets the public of the certificate if - this subject identifier is identified by the public key. - Otherwise, this property will return null. - - Certificate public key. - - - - A base class for various collections of cryptographic objects. - - - - - Returns a value indicating whether the collection is read-only. - - - - - Adds an item to the collection. - - Item to add. - - - - Removes all elements from the collection. - - - - - Determines whether the collection contains the specified item. - - Item. - True if the collection contains the item; false if it does not. - - - - Returns a position of the specified item within the collection, or -1 if not found. - - Item to find. - Zero-based position of the item; or -1 if not found. - - - - Copies the range of elements from the collection to a compatible one-dimensional - array, starting at the specified index of the target array. - - One-dimensional zero-based array that is the destination of the elements copied from the collection. - A zero-based index in the destination array at which copying begins. - - - - Removes an item from the collection. - - An item to remove. - True if the item was removed; false if not removed. - - - - Removes an item at the specified position from the collection. - - An index of an item to remove. - - - - Adds an item to the collection at the specified position. - - Position at which to insert the item. - Item to add. - - - - Gets or sets an instance of an item at the specified index. - - The zero-based index of the item to get or set. - An item. - - - - Returns an enumerator that iterates through the collection. - - Enumerator. - - - - A base class for various collections of cryptographic objects. - - - - - Gets the number of items in the . - - The number of items in collection. - - - - Gets an for the . - - An for the collection. - - - - Gets a value indicating whether access to the is synchronized. - - - - - Copies the range of elements from the to a compatible one-dimensional - , starting at the specified index of the target array. - - One-dimensional zero-based array that is the destination of the elements copied from . - A zero-based index in the destination array at which copying begins. - - - - Gets an object that can be used to synchronize access to the . - - - - - SSPI data representation. - - - Only supported on Windows platforms. - - - - Native. - - - Network. - - - - SSPI requirements flag. - - - Only supported on Windows platforms. - - - - The server can use the context to authenticate to other servers as the client. Must be used with MutualAuthentication flag. - - - Mutual authentication. - - - Confidentiality. - - - Connection. - - - Integrity. - - - - SSPI credential usage. - - - Only supported on Windows platforms. - - - - - Inbound. - - - - - Outbound. - - - - - Represents an SSPI error. - - - Only supported on Windows platforms. - - - - - Wrapper class for SSPI authentication. - - - Only supported on Windows platforms. - - - - - Creates a new SSPI session. - - Authentication package. - Data representation. - Target name. - Requirements. - User name. - Password. - User domain - - Only supported on Windows platforms. - - - - - Creates a new SSPI session. - - Authentication package. - Credential usage. - Data representation. - Target name. - Requirements. - User name. - Password. - User domain - - Only supported on Windows platforms. - - - - - Disposes the SSPI session. - - - - - Get next SSPI message. - - Challenge. - Receives a value indicating whether the SSPI has finished. - Next SSPI message. - - Only supported on Windows platforms. - - - - - Verifies an SSPI signature. - - Message. - Signature. - True if valid, false otherwise. - - Only supported on Windows platforms. - - - - - Creates an SSPI signature. - - Challenge. - Signature. - - Only supported on Windows platforms. - - - - - Unwraps (decrypts) the SSPI message. - - Challenge. - QOP - Unwrapped (decrypted) message. - - Only supported on Windows platforms. - - - - - Wraps (encrypts) SSPI message. - - Response. - QOP. - Receives a value indicating whether the SSPI has finished. - Wrapped (encrypted) message. - - Only supported on Windows platforms. - - - - - The hash algorithm used to compute the hash for hash signing - and verification methods. - - - - - Unsupported hash algorithm. - - - - - MD5. - - - - - SHA1. - - - - - MD5SHA1. - - - - - SHA-256. - - - - - SHA-384. - - - - - SHA-512. - - - - - MD4. - - - - - The key algorithm for the certificate. - - - - - Unsupported key algorithm. - - - - - RSA. - - - - - DSA. - - - - - Elliptic Curve DSA. - - - - - ED25519. - - - - - Intended key usage. - - - - Digital signature. - - - Non-repudiation. - - - Key encipherment. - - - Data encipherment. - - - Key agreement. - - - Certificate signing. - - - CRL signing. - - - Key encipherment only. - - - Key decipherment only. - - - - Key set options. - - - - Imported keys are marked as exportable. - - - The user is to be notified through a dialog box or other method when certain attempts to use this key are made. - - - Private keys are stored under the local computer and not under the current user. - - - Private keys are stored under the current user and not under the local computer even if the PFX BLOB specifies that they should go into the local computer. - - - Private keys are persisted on disk when importing a certificate - - - Always load the key into CNG key storage provider. Only supported on Windows Vista or higher. - - - Load the key into CNG key storage provider if possible. Only supported on Windows Vista or higher. - - - - Specifies certificate file format. - - - - Binary DER encoded X.509 certificate. - - - Base-64 encoded DER X.509 certificate. - - - P12/PFX certificate with private key. - - - - Represents an X509 v3 certificate. - - - - - Gets a handle of the certificate. - - A handle of the certificate. - -

- Only supported on Windows platforms. -

-
-
- - - Gets the certificates extensions collection. - - Extensions collection. - - - - Loads a certificate from an array. - - An array containing DER encoded certificate data. - - - - Loads a DER encoded certificate from the specified file. - - Path to a file. - A certificate. - - - - Loads a DER encoded certificate from the specified stream. - - Stream to load a certificate from. - A certificate. - - - - Loads a DER encoded certificate and a private key (in PKCS #8, PuTTY or SSLeay format) from the specified files. - - Path to a certificate file. - Path to the private key file. - Private key password. - A certificate. - - - - Loads a DER encoded certificate and a private key (in PKCS #8, PuTTY or SSLeay format) from the specified streams. - - Stream with the certificate. - Stream with the private key. - Private key password. - A certificate. - - - - Associates the supplied private key with the certificate to perform operations that need a private key. - - An instance of RSA, DSA, RSACryptoServiceProvider or DSACryptoServiceProvider. - - - - Associates the supplied private key with the certificate to perform operations that need a private key. - - The private key. - - - - Associates the supplied private key with the certificate to perform operations that need a private key. - - The private key. - - - - Associates the supplied private key with the certificate to perform operations that need a private key. - - An instance of RSA, DSA, RSACryptoServiceProvider or DSACryptoServiceProvider. - Specifies whether to permanently bind the certificate to the specified CSP. - - - - Associates the supplied private key with the certificate to perform operations that need a private key. - - The private key. - Specifies whether to permanently bind the certificate to the specified CSP. - - - - Associates the supplied private key with the certificate to perform operations that need a private key. - - The private key. - Specifies whether to permanently bind the certificate to the specified CSP. - - - - Loads a certificate with a private key from a PKCS#12 (PFX) file. - - Path to a file. - Encryption password. - A certificate with private key. - - - - Loads a certificate with a private key from a PKCS#12 (PFX) array. - - An array containing DER encoded PKCS#12 data. - Encryption password. - A certificate with private key. - - - - Loads a certificate with a private key from a PKCS#12 (PFX) file. - - Path to a file. - Encryption password. - Key set options. - A certificate with private key. - - - - Loads a certificate with a private key from a PKCS#12 (PFX) array. - - An array containing DER encoded PKCS#12 data. - Encryption password. - Key set options. - A certificate with private key. - - - - Saves the certificate to the supplied file in DER format. - - Path to the file to save the certificate to. If the file exists, it is overwritten. - - - - Saves the certificate to the supplied stream in DER format. - - Stream to save the certificate to. - - - - Saves the certificate to the supplied file in specified format. - - Path to the file to save the certificate to. If the file exists, it is overwritten. - Certificate format. - - - - Saves the certificate to the supplied stream in specified format. - - Stream to save the certificate to. - Certificate format. - - - - Saves the certificate to the supplied file in specified format. - - Path to the file to save the certificate to. If the file exists, it is overwritten. - Certificate format. - Password (only used by PFX/P12 format). - On .NET Compact Framework, this is only supported in Windows CE 5.0 or later. - - - - Saves the certificate to the supplied stream in specified format. - - Stream to save the certificate to. - Certificate format. - Password (only used by PFX/P12 format). - On .NET Compact Framework, this is only supported in Windows CE 5.0 or later. - - - - Saves the certificate's private key to the supplied file. - - Path to the file to save the certificate to. If the file exists, it is overwritten. - Private key password. - Private key file format. - If set to true, the cryptographic provider should not display any user interface (UI) when exporting private key parameters. - - - - Saves the certificate's private key to the supplied stream. - - Stream to save the private key to. - Private key password. - Private key file format. - If set to true, the cryptographic provider should not display any user interface (UI) when exporting private key parameters. - - - - Creates a new instance of based on the specified context. - - A pointer to the certificate context. - -

- Only supported on Windows platforms. -

-
-
- - - Creates a new instance of based on the specified certificate or . - - An instance of or . - - - - Converts an or to a . - - An instance of or . - A . - - - - Converts a to (or ). - - An instance of . - An . - - - - Returns the key algorithm for this certificate. - - The key algorithm for this certificate. - - - - Returns the hash algorithm used to create the signature of this certificate. - - Hash algorithm. - - - - Returns the collection of CRL distribution points. - - Collection of CRL distribution points, or null if not available. - - - - Returns the DN of the certification authority that issued the X.509v3 certificate. - - DN of the certification authority that issued the X.509 certificate. - - - - Returns the name of the certification authority that issued the X.509v3 certificate. - - The name of the certification authority that issued the X.509 certificate. - - - - Returns DN of the principal to which the certificate was issued. - - DN of the principal to which the certificate was issued. - - - - Returns the name of the principal to which the certificate was issued. - - The name of the principal to which the certificate was issued. - - - - Returns the public key for the X.509v3 certificate. - - The public key for the X.509v3 certificate. - - - - Returns the key algorithm parameters for the X.509v3 certificate. - - The key algorithm parameters for the X.509v3 certificate. - - - - Returns the public key info for the X.509v3 certificate. - - The public key info for the X.509v3 certificate. - - - - Returns the certificate's subject key identifier (SKI). - - Subject key identifier. - - - - Returns the certificate's issuer key identifier (AKI). - - Issuer (authority) key identifier. - - - - Returns the certificate's common name, if available. - - Common name; or null if not available. - - - - Returns the list of certificate's common names. - - The list of common names. - - - - Returns the list of certificate's e-mail addresses. - - The list of addresses. - - - - Returns the serial number of the X.509v3 certificate. - - The serial number of the X.509 certificate as an array of bytes. - - - - Returns the expiration date of this X.509v3 certificate (in local time). - - The expiration date for this X.509 certificate. - The expiration date is the date after which the X.509 certificate is no longer considered valid. - - - - Returns the effective date of this X.509v3 certificate (in local time). - - The effective date for this X.509 certificate. - The effective date is the date after which the X.509 certificate is considered valid. - - - - Returns the hash value for the X.509v3 certificate as an array of bytes. - - The hash value for the X.509 certificate. - - - - Returns the raw data for the entire X.509v3 certificate. - - The raw data for the entire X.509v3 certificate. - - - - Gets the thumbprint of the certificate. - - Certificate's thumbprint. - - - - Checks whether a certificate is time valid. - - true if valid, false if not valid. - - - - Returns the intended key usage value. - - Intended key usage. - - - - Returns an array of enhanced key usage identifiers. - - An array of enhanced key usage identifiers, or null if the certificate is valid for all uses. - - - - Gets or sets the friendly name associated with the certificate. - - Friendly name associated with the certificate. - Not available in .NET CF. - - - - Gets or sets a custom object associated with this particular instance of . This value is not persisted. - - - - - Returns the DSA parameters of certificate's public key. - - The DSA parameters of certificate's public key. - - - - Returns the RSA parameters of certificate's public key. - - The RSA parameters of certificate's public key. - - - - Returns the RSA parameters of certificate's public or private key. - - True if private key parameters are to be exported as well. - If set to true, the cryptographic provider should not display any user interface (UI) when exporting private key parameters. - The RSA parameters of certificate's public or private key. - - - - Returns the DSA parameters of certificate's public or private key. - True if private key parameters are to be exported as well.If set to true, the cryptographic provider should not display any user interface (UI) when exporting private key parameters. - The DSA parameters of certificate's public or private key. - - - - Checks whether a private key for this certificate is available. - - True if available, false if not available. - - - - Returns the size of the key in bits. - - Size of the key in bits. - - - - Verifies the specified signature data by comparing it to the signature computed for the specified hash value. - - The hash value of the signed data. - A hash algorithm used to create the hash value. - The signature for the specified hash value. - True if the signature verifies as valid; otherwise, false. - - - - Verifies the specified signature data by comparing it to the signature computed for the specified message. - - The message. - The signature for the specified message. - True if the signature verifies as valid; otherwise, false. - - - - Verifies the specified signature data by comparing it to the signature computed for the specified message. - - The message. - The signature for the specified message. - Signature parameters. - True if the signature verifies as valid; otherwise, false. - - - - Computes the signature for the specified hash value by encrypting it with the private key. - - The hash value of the data to be signed. - A hash algorithm used to create the hash value. - If set to true, the cryptographic should not display any user interface (UI). - The signature for the specified hash value. - -

- The private key for a certificate must be available for this method to succeed. -

-

- If silent operation is requested and the CSP must display UI to operate, this method will fail. -

-
-
- - - Computes the signature for the specified message by encrypting it with the private key. - - The message to be signed. - The signature for the specified message. - -

- The private key for a certificate must be available for this method to succeed. -

-
-
- - - Computes the signature for the specified message by encrypting it with the private key. - - The message to be signed. - Signature parameters. - The signature for the specified message. - -

- The private key for a certificate must be available for this method to succeed. -

-
-
- - - Encrypts data. - - Data to be encrypted. - Encrypted data. - - - - Decrypts data. - - Data to be decrypted. - If set to true, the cryptographic provider should not display any user interface (UI). - Decrypted data. - - If silent operation is requested and the cryptographic provider needs to display a UI to operate, this method will fail. - - - - - Verifies the validity of the certificate. - - Validation result. - - - - Verifies the validity of the certificate, including its compliance with the specified criteria. - - Validation options (not supported by CertificateChainEngine.Native engine on Xamarin.iOS and Xamarin.Android). - Validation result. - - - - Verifies the validity of the certificate, including its compliance with the specified criteria. - - The name of the server. - Validation options (not supported by CertificateChainEngine.Native engine on Xamarin.iOS and Xamarin.Android). - Validation result. - - - - Verifies the validity of the certificate, including its compliance with the specified criteria, - using the specified chain engine. - - The name of the server. - Validation options (not supported by CertificateChainEngine.Native engine on Xamarin.iOS and Xamarin.Android). - Certificate chain engine. - Validation result. - - - - Validates the specified certificate revocation list (issued by this certificate). - - Certificate revocation list to validate. - The date in which the validation takes effect; specify null (Nothing in VB.NET) to skip time validation check. - Status of the validation result. If the CRL is valid, the return value is 0. - - - - Disposes the object and releases resources. - - - Calling this method ensures that all resources are freed. - - - - - Finalizer. - - - - - A chain engine (name space and cache) to be used to build and validate certificate chains. - - - - - The chain engine of the current user. - - - - - Use current certificate engine if set; otherwise use engine (platform-specific). - - - - - Represents a chain of certificates. - - - A chain starts by the end certificate and each following certificate - must directly certify the one preceding it. - The last certificate in the list is a self-signed root certificate, and - may be optionally omitted under the assumption it must be known in any case. - - - - - Gets the number of certificates in the chain. - - The number of certificates in the chain. - - - - Gets or sets the certificate at the specified position. - - The certificate at the specified position - The certificate at the specified position. - - - - Gets an for the collection. - - An for the collection. - - - - Gets the certificate of the root certification authority, if available. - - Root CA certificate if available; null otherwise. - - - - Gets the first certificate in the chain, if not empty. - - Leaf certificate; null if the chain is empty. - - - - Adds a certificate to the end of the chain. - This certificate represents authority for the previous certificate in the chain - (Leaf certificate is at the beginning of the chain, Root certificate is at the end of the chain). - - The certificate to be added to the chain. - The position of the certificate in the chain. - - - - Creates an empty certificate chain. - - - - - Creates a certificate chain from an array of certificates. - - An array of certificates. - - - - Loads a certificate with a private key from a PKCS#12 (PFX) file. - - Path to a file. - Encryption password. - A certificate with private key. - - - - Loads a certificate with a private key from a PKCS#12 (PFX) array. - - An array containing DER encoded PKCS#12 data. - Encryption password. - A certificate with private key. - - - - Loads a certificate with a private key from a PKCS#12 (PFX) file. - - Path to a file. - Encryption password. - Key set options. - A certificate with private key. - - - - Loads a certificate with a private key from a PKCS #12 (.p12/.pfx) array. - - An array containing DER encoded PKCS #12 data. - Encryption password. - Key set options. - A certificate with private key. - - - - Loads from the specified PKCS #7 (.p7b) file. - - Path to the file. - Instance of , never null. - The PKCS #7 file can be saved using method. - - - - Loads a PKCS #7 (.p7b) encoded from the specified file. - - Stream to load a from. - Instance of , never null. - The PKCS #7 stream can be saved using method. - - - - Builds a certificate chain for a specified certificate. - - End certificate. - The chain for an end certificate. - - This function builds a certificate chain context starting from an end - certificate and going back, if possible, to a trusted root certificate. - - - - - Builds a certificate chain for a specified certificate. - - End certificate. - Certificate chain engine. - The chain for an end certificate. - - This function builds a certificate chain context starting from an end - certificate and going back, if possible, to a trusted root certificate. - - - - - Builds a certificate chain for a specified certificate. - - End certificate. - Additional store to search in addition to system stores. - The chain for an end certificate. - - This function builds a certificate chain context starting from an end - certificate and going back, if possible, to a trusted root certificate. - - - - - Builds a certificate chain for a specified certificate. - - End certificate. - Certificate chain engine. - Additional store to search in addition to system stores. - The chain for an end certificate. - - This function builds a certificate chain context starting from an end - certificate and going back, if possible, to a trusted root certificate. - - - - - Verifies the validity of the certificate chain. - - Validation result. - - - - Verifies the validity of the certificate chain, including its compliance with the specified criteria. - - Validation options (not supported by CertificateChainEngine.Native engine on Xamarin.iOS and Xamarin.Android). - Validation result. - - - - Verifies the validity of the certificate chain, including its compliance with the specified criteria. - - The name of the server. - Validation options (not supported by CertificateChainEngine.Native engine on Xamarin.iOS and Xamarin.Android). - Validation result. - - - - Verifies the validity of the certificate chain, including its compliance with the specified criteria, - using the specified chain engine. - - The name of the server. - Validation options (not supported by CertificateChainEngine.Native engine on Xamarin.iOS and Xamarin.Android). - Certificate chain engine. - Validation result. - - - - Saves the certificate chain to the specified path as a .P7B (PKCS #7) file. - - Path to save the certificate chain file to. - - - - Saves the certificate chain to the specified stream in .P7B (PKCS #7) format. - - Stream to write the certificate chain to. - - - - Loads a chain of Base-64-encoded X509 certificates from the specified file. - - Path to a file with the certificate chain. - A certificate chain. - - - - Represents a collection of X509 v3 certificates. - - - - - Creates a new instance of . - - - - - Represents a certificate engine. - - - - - Gets or sets the LogWriter used by this object. - - Log writer. - - - - Initializes new instance of the class. - - - - - Validates given certificate chain using specified validation parameters. - - Certificate chain to validate. - Validation parameters. - Result of the validation. - - - - Builds a certificate chain from the specified certificate. - - A certificate to build the chain from. - The built certificate chain. - - - - Builds a certificate chain from the specified certificate. - - A certificate to build the chain from. - An extra store to search for intermediate and root CA certificates. - The built certificate chain. - - - - Gets the current certificate engine. - - The current certificate engine; null reference (Nothing in VB.NET) if no engine was set. - - - - Sets the current certificate engine. - - An engine to be used. - - - - Gets the default certificate engine which is used if no custom engine is set as current engine. - - - - - Certificate validation parameters for 's method. - - - - - Gets or sets validation options. - - - - - Creates a new instance of . - - - - - The exception that is thrown when a certificate-related error occurs. - - - - - Initializes a new instance of the Exception class - with a specified error message. - - The error message that explains the reason for the exception. - - - - Initializes a new instance of the Exception class - with a specified error message and a reference to the - inner exception that is the cause of this exception. - - The error message that explains the reason for the exception. - The exception that is the cause of the current exception. - - - - Represents a collection of X509 v3 certificate extensions. - - - - - Creates a certificate extension collection from an ASN.1 block. - - ASN.1 block. - - - - Gets the first with the specified object identifier. - - The object identifier, either friendly name or dotted string format. - A certificate extension, or null if not found. - - - - Represents an X509 v3 certificate extension. - - - - - Creates a new instance of . - - Extension object identifier. - Specifies whether the extension is critical. - Extension data. - - - - Create extended (enhanced) key usage extension (2.5.29.37). - - Specifies whether this extension is considered critical (not-critical extensions may be ignored by servers that don't support them). - Key usage OIDs. - An extension object. - - - - Creates a key usage extension (2.5.29.15). - - Key usage flags. - An extension object. - - - - Gets the object identifier that identifies the extension. - - The object identifier. - - - - Gets a value indicating whether the extension is critical. - - True if critical; false otherwise. - - - - Gets the extension value. - - An array of bytes in ASN.1 format. - - - - Options for methods. - - - - - No filter. - - - - - Only find certificates that have a private key. - - - - - Only find certificates that are time valid. - - - - - Only find certificates that can be used for client authentication. - - - - - Only find certificates that can be used for server authentication. - - - - - When searching by certificate issuer, include known subordinate CAs in the search as well. - - - - - The type of search for method. - - - - - Certificates whose subject key identifier (SKI) matches the specified value. - - - - - Specifies the location of the certificate store. - - - - None. - - - The store located at HKEY_CURRENT_USER\Software\Microsoft\SystemCertificates. - - - The store located at HKEY_LOCAL_MACHINE\Software\Microsoft\SystemCertificates. - - - The store located at HKEY_LOCAL_MACHINE\Software\Microsoft\Cryptography\Services\<ServiceName>>\SystemCertificates. - - - The store located at HKEY_LOCAL_MACHINE\Software\Microsoft\Cryptography\Services\<ServiceName>\SystemCertificates. - - - The store located at HKEY_USERS\<UserName>\Software\Microsoft\SystemCertificates. - - - The store located at HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates. - - - The store located at HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\SystemCertificates. - - - The store located at HKEY_LOCAL_MACHINE\Software\Microsoft\EnterpriseCertificates. - - - - Specifies the name of the certificate store. - - - - None. - - - Other users. - - - Third-party certificate authorities. - - - Intermediate certificate authorities. - - - Revoked certificates. - - - Personal certificates. - - - Trusted root certificate authorities. - - - Directly trusted people and resources. - - - Directly trusted publishers. - - - - Represents a certificate store. - - - - - Gets a handle of the certificate store. - - A handle of the certificate store. - -

- Only supported on Windows platforms. -

-
-
- - - Opens a system certificate store of the specified name a the specified location. - - The store name. - Specifies the location of the certificate store. - - Some example system stores are:
- "CA" - Certification authority certificates.
- "My" - A certificate store that holds certificates with associated private keys.
- "Root" - Root certificates.
- "SPC" - Software publisher certificate.
- "Trust"
- "Disallowed"
-
- - - Opens a system certificate store of the specified name a the specified location. - - The store name value. - Specifies the location of the certificate store. - - - - Opens a system certificate store of the specified name. - - The store name. - - Some example system stores are:
- "CA" - Certification authority certificates.
- "My" - A certificate store that holds certificates with associated private keys.
- "Root" - Root certificates.
- "SPC" - Software publisher certificate.
- "Trust"
- "Disallowed"
-
- - - Opens a system certificate store of the specified name. - - The store name value. - - - - Creates a temporary memory-based certificate store - and populates it with certificates from the specified collection. - - The certificate collection. - - - - Determines whether the specified certificate store exists. - - The store name. - Specifies the location of the certificate store. - True if the store exists; false otherwise. - - - - Determines whether the specified certificate store exists. - - The store name value. - Specifies the location of the certificate store. - True if the store exists; false otherwise. - - - - Determines whether the specified certificate store exists. - - The store name. - True if the store exists; false otherwise. - - - - Determines whether the specified certificate store exists. - - The store name value. - True if the store exists; false otherwise. - - - - Adds a certificate to this certificate store. - - Certificate to be added. - - - - Removes a certificate from this certificate store. - - Certificate to be removed. - - - - Returns all certificates matching the specified criteria. - - Specifies the type of search being made. - A byte array whose meaning is defined by 'findType'. - Options. - An array of certificates. - - - - Returns all certificates issued by the specified issuer (or its subordinate issuer) and corresponding to the specified options. - - Issuer DN. - Options. - An array of certificates. - - - - Returns all certificates with the specified serial number issued by the specified issuer (or its subordinate issuer) - and corresponding to the specified options. - - Issuer DN. - Certificate serial number. - Options. - An array of certificates. - - - - Returns all certificates issued by one of specified issuers (or their subordinate issuer) and corresponding to the specified options. - - An array of issuers' DNs. - Options. - An array of certificates. - - - - Returns all certificates issued by one of specified issuers (or their subordinate issuer) and corresponding to the specified options. - - An array of issuers' DNs. - Certificate serial number. - Options. - An array of certificates. - - - - Returns all certificates matching the specified certificate and options. - - Certificate to find. - Options. - An array of certificates. - - - - Returns all certificates corresponding to the specified options. - - Options. - An array of certificates. - - - - Returns all certificates corresponding to the specified e-mail address. - - E-mail address. - An array of certificates. - - - - Returns all certificates corresponding to the specified e-mail address and options. - - E-mail address. - Options. - An array of certificates. - - - - Disposes the object and releases resources. - - - Calling this method ensures that all resources are freed. - - - - - Finalizer called by garbage collector. - - - - - Represents a distinguished name. - - - - - Creates an instance of distinguished name from an ASN.1 block. - - ASN.1 block. - - - - Creates an instance of distinguished name from a DN string. - - DN string. - - - - Returns the DN's common name, if available. - - Common name; or null if not available. - - - - Returns the list of DN's e-mail addresses. - - The list of addresses. - - - - Determines whether the specified object is equal to the current object. - - Object to compare with the current object. - True if equal; false if not equal. - - - - Servers as a hash function for a particular type. Suitable for use in hashing algorithms and hash tables. - - Hash code. - - - - Converts a distinguished name into a byte array. - - Byte array. - - - - Returns a string representation of the object. - - A DN string. - - - - Converts string DN to its BER-encoded representation. - - String DN. - BER-encoded DN. - - - - Converts BER-encoded representation of DB to its string representation. - - BER-encoded DN. - String DN. - - - - Represents a collection of CRL distribution points. - - - - - Creates a new instance of . - - - - - A CRL distribution point. - - - - - Gets distribution point URL, if available. - - Distribution point URL, or null if not available. - - - - Create a new instance of a CRL distribution point that represents the specified URL. - - CRL URL. - - - - Certificate validation method options. (Not supported by CertificateChainEngine.Native engine on Xamarin.iOS and Xamarin.Android). - - - - - No options specified. - - - - - Ignore an invalid time (such as expiration). - - - - - Ignore an invalid certificate trust list time. - - - - - Ignore an invalid time nesting. - - - - - Ignore all invalid time checks (such as expiration, nesting, CRL or CTL times). - - - - - Ignore invalid basic constraints. - - - - - Allow unknown certification authority. - - - - - Ignore wrong usage of the certificate. - - - - - Ignore invalid policy. - - - - - Ignore an unknown revocation status of the end certificate. - - Not supported in builds for .NET CF. - - - - Ignore an unknown revocation status of the certificate trust list signer. - - Not supported in builds for .NET CF. - - - - Ignore an unknown revocation status of the CA certificate. - - Not supported in builds for .NET CF. - - - - Ignore an unknown revocation status of a root certificate. - - Not supported in builds for .NET CF. - - - - Ignore all unknown revocation statuses. - - - - - Not supported. - - Not supported in builds for .NET CF. - - - - Not supported. - - Not supported in builds for .NET CF. - - - - Only use local cache, do not access the network. - - Not supported in builds for .NET CF. - - - - Ignore invalid common name. - - - - - Skip certificate revocation check. - - - - - Ignore invalid chain. - - - - - Certificate validation status. - - - - - This certificate or one of the certificates in the certificate chain is not time valid. - - - - - Certificates in the chain are not properly time nested. - - - - - Trust for this certificate or one of the certificates in the certificate chain has been revoked. - - - - - The certificate or one of the certificates in the certificate chain does not have a valid signature. - - - - - The certificate or certificate chain is not valid for its proposed usage. - - - - - The certificate or certificate chain is based on an untrusted root. - - - - - The revocation status of the certificate or one of the certificates in the certificate chain is unknown. - - - - - One of the certificates in the chain was issued by a certification authority that the original certificate had certified. - - - - - One of the certificates has an invalid extension. - - - - - The certificate or one of the certificates in the certificate chain has - a policy constraints extension, and one of the issued certificates has - a disallowed policy mapping extension or does not have a required issuance - policies extension. - - - - - The certificate or one of the certificates in the certificate chain has - a basic constraints extension and either the certificate cannot be used - to issue other certificates or the chain path length has been exceeded. - - - - - The certificate or one of the certificates in the certificate chain has - an invalid name constraints extension. - - - - - The certificate or one of the certificates in the certificate chain has a name constraints extension containing unsupported fields. - - - - - The certificate or one of the certificates in the certificate chain has a name constraints extension and a name constraint is missing for one of the name choices in the end certificate. - - - - - The certificate or one of the certificates in the certificate chain has a name constraints extension and there is not a permitted name constraint for one of the name choices in the end certificate. - - - - - The certificate or one of the certificates in the certificate chain has a name constraints extension and one of the name choices in the end certificate is explicitly excluded. - - - - - The certificate chain is not complete. - - - - - A CTL used to create this chain was not time valid. - - - - - A CTL used to create this chain did not have a valid signature. - - - - - A CTL used to create this chain is not valid for this usage. - - - - - The revocation status of the certificate or one of the certificates in the certificate chain is either off-line or stale. - - - - - The end certificate does not have any resultant issuance policies, and one of the issuing CA certificates has a policy constraints extension requiring it. - - - - - The certificate chain contains a certificate with unsupported signature hash algorithm (usually SHA-2) or unsupported key algorithm (usually ECDSA). - - - - - Unknown error. - - - - - A path length constraint in the certification chain has been violated. - - - - - A certificate contains an unknown extension that is marked critical. - - - - - A certificate chain is invalid, - such as an certificate's Issuer not matching the CA's Subject or - an certificate's AKI not matching the CA's SKI. - - - - - The certificate's CN name does not match the passed value. - - - - - The certificate was explicitly marked as untrusted by the user or CA. - - - - - A certificate or CRL is malformed. - - - - - There might be more errors apart from those reported. - - - - - Certificate uses algorithm which is not considered secure on this platform. - - - - - Certificate is not trusted. - - - - - Represents the result of certificate chain validation. - - - - - Gets the status mask. - - Status mask. - - - - Gets the certificate chain validity status. - - True if valid, false if not valid. - - - - Gets the native error code returned by the validation function or zero if the native error code is not available. - - The error code returned by the validation function. - - - - Initialize instance of the . - - A validation status (use zero for success). - - - - Represents sorting order. - - - - - Ascending sort order. - - - - - Descending sort order. - - - - - Log writer acting as a container that writes log messages to all inner writers. - - - - - A cumulative log level.
- When getting, it returns the minimum level of inner writers' levels.
- When setting, the value is propagated to all inner writers. -
- Log level. -
- - - Creates a new instance of a tee log writer over given set of individual . - - A non-empty collection of log writers. - - - - Creates a new instance of a tee log writer over given set of individual . - - A non-empty array of log writers. - - - - Write a message into all inner writers. - - Message level. - Logging object type. - Logging object ID. - Logging area. - Message. - - - - Write a message and data block into all inner writers. - - Message level. - Logging object type. - Logging object ID. - Logging area. - Message. - Data block. - Data offset. - Date length. - - - - Implements the interface method IDisposable.Dispose - Use this method to explicitly release all resources hold by the inner writers. - - - - - Specifies granularity for time comparisons. - - - - - Time is taken as is. - - - Useful when working with NTFS file system. - - - - - The smallest time unit is one second (milliseconds are ignored). - E.g. 11:33:55.999 is rounded to 11:33:55.000. - - - Useful when working with some UNIX FTP or SFTP servers. - - - - - The smallest time unit is two-second. So odd seconds are rounded to lower even value (milliseconds are ignored). - E.g. 11:33:55.999 is rounded to 11:33:54.000. - - - Useful when working with FAT file system (.NET CF, MS-DOS). - - - - - The smallest time unit is one day (time component is ignored). - E.g. 2012-12-12 11:33:55.999 is rounded to 2012-12-12 00:00:00.000. - - - Useful when working with some UNIX FTP or SFTP servers. - - - - Creates an instance of class. - - - Creates an instance of class. - - - Creates an instance of class. - - - Creates an instance of class. - - - Creates an instance of class. - -
-
\ No newline at end of file diff --git a/packages/Rebex.Common.2.5.6930/lib/uap10.0/Rebex.Common.dll b/packages/Rebex.Common.2.5.6930/lib/uap10.0/Rebex.Common.dll deleted file mode 100644 index ad7a8bf5..00000000 Binary files a/packages/Rebex.Common.2.5.6930/lib/uap10.0/Rebex.Common.dll and /dev/null differ diff --git a/packages/Rebex.Common.2.5.6930/lib/uap10.0/Rebex.Common.xml b/packages/Rebex.Common.2.5.6930/lib/uap10.0/Rebex.Common.xml deleted file mode 100644 index 442c0aef..00000000 --- a/packages/Rebex.Common.2.5.6930/lib/uap10.0/Rebex.Common.xml +++ /dev/null @@ -1,7535 +0,0 @@ - - - Rebex.Common - - - - - Various methods related to encoding (charset) used by Rebex components. - - - - - ASCII encoding. - - - - - Default encoding. - - - - - UTF-8 encoding. - - - - - Gets a list of supported encoding names. - - List of encoding names. - - - - Returns the encoding associated with the specified code page name. - - Code page name. - Encoding. - - - - Returns the encoding associated with the specified code page. - - Code page. - Encoding. - - - - File-based log writer that saves log messages into a text file. - - - - - Creates a new instance of file log writer based on the specified file and the default "Info" log level. - - Path to log file. - - - - Creates a new instance of file log writer based on the specified file and log level. - - Path to log file. - Log level. - - - - Path to the log file. - - - - - Get a value indicating whether the log writer is closed. - - True when logfile is closed. False if logfile is opened and ready for writing. - - - - Dispose(bool disposing) executes in two distinct scenarios. - If disposing equals true, the method has been called directly - or indirectly by a user's code. Managed and unmanaged resources - can be disposed. - If disposing equals false, the method has been called by the - runtime from inside the finalizer and you should not reference - other objects. Only unmanaged resources can be disposed. - - If true, is called by IDisposable.Dispose. - Otherwise it is called by finalizer. - - - - Appends the specified message text into a text-based log. - - Full message info. - - - - Finalizer. Called by garbage collector during object destruction. - - - - - Log level - specifies the levels of severity. - - - - - Be verbose - log everything. - - - - - Log all messages useful for debugging purposes. - - - - - Only log informative messages. - - - - - Only log errors. - - - - - The Off level designates a higher level than all the rest. - - - - - Defines methods and properties all log writers must implement. - - - - - Get or set the log level - only log messages with log level equal to or greater than the specified one. - - Log level. - - - - Write a message into the log. - - Message level. - Logging object type. - Logging object ID. - Logging area. - Message. - - - - Write a message and data block into the log. - - Message level. - Logging object type. - Logging object ID. - Logging area. - Message. - Data block. - Data offset. - Date length. - - - - Define properties and methods for logging providers. - - - - - Gets a to use for logging. - - - - - Represents mode for interval boundaries. - - - - - Include interval boundary. - - - - - Exclude interval boundary. - - - - - Currently executed operation. - - - - Uploading files. - - - Downloading files. - - - Deleting files. - - - Getting item list. - - - - Current traversal state of the . - - - - - Retrieving of the file system hierarchy was started. - - - - - Retrieving of the file system hierarchy was successfully completed. - - - - - Retrieving of the particular directory hierarchy was started. - - - - - Retrieving of the particular directory hierarchy was successfully completed. - - - - - Current transfer state of the . - - - - - Directory processing was started. - - - - - Processing of a file was started. - - - - - File was successfully transferred. - - - - - A file data block was processed. - - - - - The transfer action was successfully completed. - Triggered only with multi-file operations. (For single-file operations, only is triggered.) - - - - - Current delete state of the . - - - - - File processing was started. - - - - - File was successfully deleted. - - - - - Directory processing was started. - - - - - Directory was successfully deleted. - - - - - The delete action was successfully completed. - - - - - Detailed specification of a problem that occurred during a multi-file operation. - - - - - A target file with the same name already exists. - - - - - A symbolic link was detected. - - - - - Symbolic link is probably a part of an infinite loop in the file system hierarchy. - - - - - Cannot create target directory. - - - - - Cannot transfer file. - - - - - Cannot read from a directory. - - - - - Cannot find the file which was found while retrieving file system hierarchy earlier. - - - - - Name of the file is invalid on the target file system. - For example, backslash is a valid filename character on Unix FTP servers, but invalid in local Windows file system. - - - - - Name of the directory is invalid on the target file system. - For example, backslash is a valid directory name character on Unix FTP servers, but invalid in local Windows file system. - - - - - Cannot find the directory which was found while retrieving file system hierarchy earlier. - - - - - Cannot find the link which was found while retrieving file system hierarchy earlier. - - - - - Link is corrupted or its target cannot be found. - - - - - Currently processed item is neither a file nor a directory. - - - - - Operation was canceled. - - - - - Feature required to complete the operation is not supported. - - - - - Cannot delete the file. - - - - - Cannot delete the directory. - - - - - Cannot calculate checksum. - - - - - Specifies the reaction to resolve the current problem that occurred during a multi-file operation. - - - - - Cancel the whole operation. An exception with the value is thrown. - - - - - Cancel the whole operation. An exception is thrown. - - - - - Skip the current problematic item. - - - - - Retry the current operation again. - - - - - Overwrite target file with the same name. - - - - - Transfer the source file to a different name. - - - - - Resume target file. - - - - - Resolve the symbolic link. - - - - - Specifies the condition for overwriting a file. - - - - - No condition = always overwrite. - - - - - Overwrite if size differs. - - - - - Overwrite if the target file is older than the source file. - If working with remote servers, this condition is strongly discouraged - because modification dates are often misreported by FTP servers, - making this mode highly unreliable. - - - - - Overwrite if checksum differs. - Available for ZIP and FTP; only some FTP servers support checksums.
- You can check availability of this condition using method. -
-
- - - Provides data for the ProblemDetected event. - - - - - Gets the current transfer action. - - Current transfer action. - - - - Gets the exception which will be raised if chosen Reaction is . - - Exception. - - - - Gets the type of the error that classifies the problem. - - Problem type. - - - - Gets the path of the local file or directory that is currently processed. - - Local path. - - - - Gets the local file or directory that is currently processed or null (Nothing in Visual Basic) if not available. - - Local item. - - - - Gets the path of the remote file or directory that is currently processed. - - Remote path. - - - - Gets the remote file or directory that is currently processed or null (Nothing in Visual Basic) if not available. - - Remote item. - - - - Gets the currently selected reaction to the current problem. - - The operation to be performed as the next step of the multi-file operation execution. - - - - Gets the condition to apply for the Overwrite reaction. - If the chosen reaction is not Overwrite, this property is ignored. - - Overwrite condition. - - - - Gets the new name for the currently processed file or directory. - If the chosen reaction is not Rename, this property is ignored. - - New name. - - - - Gets a user state object. - - User state object. - - - - Initializes a new instance of the class (for internal use only). - - Event data. - - - - Determines whether the specified reaction is currently possible - use this to determine which reactions can be applied. - - Desired reaction. - True if the specified reaction is possible; false otherwise. - - - - Determines whether the specified overwrite condition is currently possible - use this to determine which overwrite conditions can be applied. - - Desired condition. - True if the specified condition is possible; false otherwise. - - - - Indicate to the sender that the problematic item should be skipped. - - - - - Indicate to the sender that the operation should be canceled. - - - - - Indicate to the sender that an exception should be raised. - - - - - Indicate to the sender that the operation on the current item should be retired. - - - - - Indicate to the sender that the current item should be resumed. - - - - - Indicate to the sender that the current link should be resolved. - - - - - Indicate to the sender that the current item should be renamed. - New name is generated from the current item according the pattern "filename[number].extension". - - - - - Indicate to the sender that the current item should be renamed. - - New name of the item or null (Nothing in Visual Basic) to use generated name according the pattern "filename[number].extension". - - - - Indicate to the sender that the current item should be overwritten. - - - - - Indicate to the sender that the current item should be overwritten if the specified condition is met. - - Condition for the overwrite. - - - - Provides data for the Traversing event. - - - - - Gets the current transfer action. - - Current transfer action. - - - - Gets the current traversing state of the current . - - Current traversing state of the current . - - - - Gets the file or directory which is currently processed. - - Currently processed item. - - - - Gets the current total number of files to be processed (traversed so far). - - Current total number of files to be processed (traversed so far). - - - - Gets the current total number of bytes to be processed (traversed so far). - - Current total number of bytes (traversed so far). - - - - Gets a user state object. - - User state object. - - - - Initializes a new instance of the class (for internal use only). - - Event data. - - - - Provides data for the TransferProgressChanged event. - - - - - Gets the current transfer action. - - Current transfer action. - - - - Gets the current transfer state of the current . - - Current transfer state of the current . - - - - Gets the file or directory which is currently processed. - - Currently processed item. - - - - Gets the target path of the file or directory which is currently processed. - - Target path. - - - - Gets the total number of bytes transferred during the transfer of the current file. - - The number of bytes transferred. - - - - Gets the total number of files to be transferred. - - Number of files. - - - - Gets the number of files that were already processed (either transferred or skipped). - - Number of files. - - - - Gets the number of files that were already successfully transferred. - - Number of files. - - - - Gets the total number of bytes to be transferred. - - Number of bytes. - - - - Gets the total number of bytes transferred. - - Number of bytes. - - - - Gets the number of bytes transferred during the current transfer since the last time the event was raised. - - The number of bytes transferred since the last time the event was raised. - - - - Gets the current transfer speed in bytes transferred per second (or 0 if not available). - - An estimate of the current speed in number of bytes per second. - Value of 0 indicates that this information is not available. - - - - Gets a number between 0 and 100 representing the percentage of completeness of the operation. - - Percentage value (0..100). - - - - Gets a number between 0 and 100 representing the percentage of completeness of the current file transfer. - - Percentage value (0..100). - - - - Initializes a new instance of the class (for internal use only). - - Event data. - - - - Provides data for the DeleteProgressChanged event. - - - - - Gets the current delete state of the current . - - Current delete state of the current . - - - - Gets the file or directory which is currently processed. - - Remote item. - - - - Gets the total number of files to be deleted. - - Number of files. - - - - Gets the number of files that were already processed (either deleted or skipped). - - Number of files. - - - - Gets the number of files that were already successfully deleted. - - Number of files. - - - - Gets a number between 0 and 100 representing the percentage of completeness of the operation. - - Percentage value (0..100). - - - - Initializes a new instance of the class (for internal use only). - - Event data. - - - - Specifies checksum algorithm. - - - - - SHA-1 checksum. - - - - - SHA-256 checksum. - - - - - SHA-384 checksum. - - - - - SHA-512 checksum. - - - - - MD5 checksum. - - - - - SHA-224 checksum. - - - - - Request CRC32 checksum. - - - - - Represents data checksum. - - - - - Returns checksum algorithm. - - - - - Returns checksum data. - - - - - - Returns a hex string representation of the checksum. - - - - - Creates an instance of an object that represents data checksum. - - Checksum algorithm used to compute the checksum. - Checksum data. - - - - Implicit conversion from to string. - - Checksum to convert to string. - Hex string representation of the checksum. - - - - Comparest the checksum with another object of the same type and returns a value indicating whether - the current instance precedes, follows or occurs in the same position in the sort order. - - Object to compare with this instance. - A value that indicates the relative order of checksums being compared. - - - - Returns a value indicating whether the specified object is equal to this checksum. - - Object to compare with this instance. - True if the two instances are same type and represent the same checksum. - - - - Returns the hash code for this checksum. - - - - - - Returns a hex string representation of this checksum. - - Hex string representation of this checksum. - - - - Specifies modes of the method. - - - - - Specifies whether the specified regular file matches the the . - - - - - Specifies whether the specified directory matches the the . - - - - - Specifies whether the specified directory should be traversed to retrieve another matches. - - - - - Set of inclusion and exclusion patterns. - It doesn't depend on the order how the inclusion and exclusion patterns are added into the . - - - - - Gets or sets the base path of the set. - - A path to be considered as a base path of the set. - - - - Gets or sets a value indicating whether the is case sensitive. - - True if the is case sensitive; false otherwise. - - - - Gets or sets a value indicating whether a consumer of the should include empty directories or not. - Also used in the method. - - True if empty directories should not be included; false otherwise. - - - - Gets or sets a value indicating whether a consumer of the should also include directories where the files are located. - Also used in the method. - Example: Ftp.GetItems("DIR/*.txt") - this property determines whether item "DIR" should be also included in output collection. - - True if directories where the files are located should be included; false otherwise. - - - - Gets or sets a value indicating whether a consumer of the should flatten the output. - Flatten means to don't persist directory structure. - For example if used to upload files "A/a.txt" and "B/b.txt" to the "/data" directory on a FTP server, - files "a.txt" and "b.txt" are uploaded directly into the "/data" directory - (directories "A" and "B" are not created in the "/data" directory). - - True if flatten the output; false otherwise. - - - - Initializes a new instance of the class. - - - - - Initializes a new instance of the class. - - A path to be considered as a base path of the set. - - - - Initializes a new instance of the class. - - Directory separators to be used in all paths. - - - - Initializes a new instance of the class. - - A path to be considered as a base path of the set. - Directory separators to be used in all paths. - - - - Initializes the object. - - A path to be considered as a base path of the set. - A path or mask relative to a base path which define an initial inclusion pattern. - - - - Initializes the object. - - A path to be considered as a base path of the set. - A path or mask relative to a base path which define an initial inclusion pattern. - Specifies traversal mode of directories for the . - - - - Adds a path or mask into collection of inclusion patterns. The supported wildcards are '?' and '*' and '**'. - For detailed specification with examples see the documentation. - - A path or mask (relative to the base path) which define an inclusion pattern. - - - - Adds a path or mask into collection of inclusion patterns. The supported wildcards are '?' and '*' and '**'. - For detailed specification with examples see the documentation. - - A path or mask (relative to the base path) which define an inclusion pattern. - Specifies traversal mode of directories for the . - - '?' matches any single character.
- '*' matches any number of any characters except the directory separators.
- '**' matches any number of any characters (directory separators can be reduced e.g. "a\**\b" is equivalent to "a\**\**\b" which matches "a\x\y\z\b" and also "a\b" but not "ab").
- - - - - - - - - - - - - - -
data\file-???.txtMatches files within the "data" directory e.g. "data\file-007.txt", but not "data\file-7.txt".
data\*.txtMatches any ".txt" file within the "data" directory (only within the "data" directory, not in subdirectories) e.g. "data\file.txt", but not "data\a\b\c\file.txt".
data\**\*.txtMatches any ".txt" file anywhere within the "data" directory and its subdirectories e.g. "data\file.txt" and also "data\a\b\c\file.txt".
-
-
- - - Adds a path or mask into collection of exclusion patterns. The supported wildcards are '?' and '*' and '**'. - For detailed specification with examples see the documentation. - - A path or mask (relative to the base path) which define an exclusion pattern. - - - - Adds a path or mask into collection of exclusion patterns. The supported wildcards are '?' and '*' and '**'. - For detailed specification with examples see the documentation. - - A path or mask (relative to the base path) which define an exclusion pattern. - Specifies traversal mode of directories for the . - - '?' matches any single character.
- '*' matches any number of any characters except the directory separators.
- '**' matches any number of any characters (directory separators can be reduced e.g. "a\**\b" is equivalent to "a\**\**\b" which matches "a\x\y\z\b" and also "a\b" but not "ab").
- - - - - - - - - - - - - - -
data\file-???.txtMatches files within the "data" directory e.g. "data\file-007.txt", but not "data\file-7.txt".
data\*.txtMatches any ".txt" file within the "data" directory (only within the "data" directory, not in subdirectories) e.g. "data\file.txt", but not "data\a\b\c\file.txt".
data\**\*.txtMatches any ".txt" file anywhere within the "data" directory and its subdirectories e.g. "data\file.txt" and also "data\a\b\c\file.txt".
-
-
- - - Returns a value indicating whether the specified relative path matches the . - This method is intended to be overwritten by descendants. - In this case please note that for optimization issues when called with parameters equal to "." and - this method should return false if no inclusion pattern was specified; true otherwise. - - A relative path to a base path to be tested for a match. - Specifies how the should be treated for match. - True if the path matches the set; false otherwise. - - - - Gets a collection of local file system items (files and directories) which matches this . - Only items which matches no exclusion pattern and matches at leas one inclusion pattern are included into result collection. - It doesn't depend on the order how the inclusion and exclusion patterns were added into the .
- If you don't want to include empty directories into result collection, please set the to false. -
- A collection of local file system items which matches this . -
- - - The exception that is thrown when an error occurs while using Rebex FileSystem. - - - - - Initializes a new instance of the class. - - - - - Initializes a new instance of the class. - - - - - Initializes a new instance of the class. - - - - - Represents a file system provider. - - This type is not intended to be used directly from your code. To implement custom file system providers, - add reference to the Rebex.FileSystem assembly and use one of the following base classes. - - - - Constructor. - - - - - Performs application-defined tasks associated with freeing, releasing, or resetting resources. - - 2 - - - - Derived classes must create a child file system with the root path equals to the . - - Root path of the child file system. - Child file system with the root path equals to the . - - - - Releases the resources used by the . - - true to release both managed and unmanaged resources; false to release only unmanaged resources. - - - - Configuration options for the . - - - - - Initializes new instance of the . - - - - - Gets or sets value indicating - whether the method is called for directories. - - Default value is false. - - - - - Gets or sets value indicating - whether the strict checks for is enabled. - - Default value is false. - - Enable strict checks only for debugging purposes. Do not use strict checks in production. - - - - - Gets or sets value indicating - whether the method is called for directories. - - Default value is false. - - - - - Gets or sets value indicating - whether the method is called for directories. - - Default value is false. - - - - - Gets or sets used for logging. - - Default value is null. - - - - - Gets or sets default used by the classes - inherited from the - and . - - - - - Represents basic type of the Rebex file system. - - - - - Read only Rebex file system. - - - - - Read-write Rebex file system. - - - - - Represents an attributes of the node. - - - - - Initializes a new instance of the - - of the node - - - - Gets the file atttributes of the node. - - - - - Gets a value indicating whether the .ReadOnly flag is set. - - true if the the .ReadOnly flag is set, otherwise false. - - - Indicates whether the current object is equal to another object of the same type. - true if the current object is equal to the parameter; otherwise, false. - An object to compare with this object. - - - - - - - - - - Determines whether two specified have the same value. - - The first to compare, or null. - The second to compare, or null. - true if the value of left is the same as the value of right, otherwise false. - - - - Determines whether two specified have different values. - - The first to compare, or null. - The second to compare, or null. - true if the value of left is different from the value of right; otherwise false. - - - Returns a string that represents the current . - A string that represents the current . - 2 - - - - Represents a content of a file. - - - - - Gets a value indicating whether underlying stream of this instance is read only. - - true if the content is read only, otherwise false. - - - - Returns a value indicating whether this node's stream was closed forcefully. - Forceful close occurs if the stream is not gracefully closed by the consumer. - - - - Performs application-defined tasks associated with freeing, releasing, or resetting resources. - 2 - - - - Method creates read only content from the given . - - Stream containing the content of the node. - New read only content. - - - - - - Method creates read/delayed write content from the given stream. - Use this method when following is desired/acceptable behavior: -
  • Underlying stream does not support immediate writing to the file.
  • When previously returned from this method is disposed - and underlying stream has been changed, then - the method method - in the is called.
- Stream containing the content of the node. - New read/delayed write content. - - -
- - - Method creates read/immediate write content from the given stream. Use this method when following is desired/acceptable behavior: -
  • Stream supports immediate writing to the file (e. g. ).
  • SaveContent method in ReadWriteFileSystemProvider is NEVER called. All data are written immediately using the suitable write methods.
- Stream containing the content of the node. - New read/immediate write content. - - -
- - - Returns with the content of the file. - - Stream with the content of the file. - - - - Represents read, write or read/write access to the file. - - This enumeration has a attribute that allows a bitwise combination of its member values. - - - - - Read access to the file. - - - - - Write access to the file. - - - - - Read and write access to the file. - - - - - Represents retrieval parameters. - - - - - Represents read access requirement. - - - - - Represents write access requirement. - - - - - Represents read and write access requirement. - - - - - Initializes a new instance of the - Required access type to the file. - - - - Gets required access type to the file. - - - - - - - - - - - - - - Determines whether two specified have the same value. - - The first to compare, or null. - The second to compare, or null. - true if the value of left is the same as the value of right, otherwise false. - - - - Determines whether two specified have different values. - - The first to compare, or null. - The second to compare, or null. - true if the value of left is different from the value of right; otherwise false. - - - Returns a string that represents the current . - A string that represents the current . - 2 - - - - Representats a file system path. - - - - - Used directory separator. - - - - - Name of the root directory. - - - - - Represents the empty . - - - - - Initializes a new instance of the . - - Examples of the valid path: - - / - - /dir1 - - /dir1/ - - /dir1/dir2 - - /dir1/dir2/ - - /dir1/dir2/file.txt - - path in the string format - Exception is thrown when the is malformed. - - - - Gets the name of the - or the . - - - - - Gets the name without an extension. - - - - - Indicates whether a path contains file name extension. - - True if path contains file name extension, otherwise false. - - - - Gets an enumerator that iterates through the elements of this path. - - - - - Gets the parent path, or path if this path does not have parent. - - - - - Gets the file name extension, or if this path does not have extension. - - - - - Returns true if this path equals to path, otherwise returns false. - - - - - Returns this as a . - - - - - Indicates if this instance is the root path ('/'). - - True if this instance is the root path, otherwise false. - - - - Returns an element of this path. - - Index of the element to return. - An element of this path. - - - - Gets the IEqualityComparer that is used to determine equality of . - - - - - Returns an array of characters not allowed in . - - - - - Returns the number of elements in the path. - - The number of elements in the path. - - - - Gets an enumerator that iterates through the elements of this path. - - - - Indicates whether the current is equal to another . - true if the current object is equal to the parameter; otherwise, false. - An to compare with this . - - - - Returns a subpath that is a subsequence of the parts of this path. - Subpath starts with the first part (on the index 0) of this path - and ends with the part on the index . - Root path ('/') does not have any subpath. - For the with the path '/dir1/dir2/file.txt'; - - GetSubPath(0) returns '/dir1'. - - GetSubPath(1) returns '/dir1/dir2'. - - GetSubPath(2) returns 'dir1/dir2/file.txt'. - - GetSubPath(3) throws . - - Zero based index of the end part of the subpath. - A subpath that is a subsequence of the parts of this path. - - - Determines whether the specified is equal to the current . - true if the specified is equal to the current ; otherwise, false. - The object to compare with the current object. - 2 - - - - Creates new with added to the end of this . - - New part of the path. - New with the added to the end of this . - - - - Creates new with added to this . - - The new extension. - New with the added to this . - - - - Creates new based on this and with the new . - - The new extension. - New based on this and with the new . - - - - Creates new based on this and with the extension deleted. - - New based on this and with the extension deleted. - - - - Tests if this starts with the given . - - Given . - True if this starts with the given , otherwise false. - - - - Determines whether two specified have the same value. - - The first path to compare, or null. - The second path to compare, or null. - true if the value of left is the same as the value of right, otherwise false. - - - - Determines whether two specified have different values. - - The first path to compare, or null. - The second path to compare, or null. - true if the value of left is different from the value of right, otherwise false. - - - Returns a string that represents the current . - A string that represents the current . - 2 - - - - Convert the value of the to the string representation. - - The to cast to . - - - - Convert the value of to the instance of the . - - The path to convert to the . - Exception is thrown when the is malformed. - - - - Combines strings in the array into a . - - - New combined from the strings in the array. - - - - Indicates whether the specified is null or an instance of the . - - The to test. - true if the parameter is null or an instance of the ; - otherwise false. - - - - - - - The exception that is thrown when an error occurs while creating new . - - - - - Initializes a new instance of the class - - - - - Initializes a new instance of the class - - - - - Initializes a new instance of the class - - - - - Holds the last access time, the last write time and the creation time of the node. All dates are expressed as UTC. - - Immutable type. - - - - Initializes a new instance of the . - - Creation time of the node (expressed as UTC). - Last access time of the node (expressed as UTC). - Last write time of the node (expressed as UTC). - - Missing or null parameters will have default value . - Time values with 'local' or 'unspecified' kind are converted to UTC automatically. - - - - - Represents the empty . - - - Empty has - == - and - == - and - == . - > - - - - Creation time of the node (expressed as UTC). - - - - - Last access time of the node (expressed as UTC). - - - - - Last write time of the node (expressed as UTC). - - - - - - - - Creates new instance with all properties equals to the current - instance properties except the property , which is set to value. - - New creation time (expressed as UTC). - New instance with all properties equals to the current - instance properties except the property , which is set to value. - - - - Creates new instance with all properties equals to the current - instance properties except the property , which is set to value. - - New last access time (expressed as UTC). - New instance with all properties equals to the current - instance properties except the property , which is set to value. - - - - - Creates new instance with all properties equals to the current - instance properties except the property , which is set to value. - - New last write time (expressed as UTC). - New instance with all properties equals to the current - instance properties except the property , which is set to value. - - - - - Indicates whether the specified is null or an NodeTimeInfo. - - The to test. - true if the parameter is null or an NodeTimeInfo ("CreationTime=LastAccessTime=LastWriteTime=DateTim.MinValue"), - otherwise false. - - - - Determines whether two specified have the same value. - - The first to compare, or null. - The second to compare, or null. - true if the value of left is the same as the value of right, otherwise false. - - - - Determines whether two specified have different values. - - The first to compare, or null. - The second to compare, or null. - true if the value of left is different from the value of right; otherwise false. - - - - - - - - - - - - - The type of the file system node. - - - - - Invalid value. - - - - - File node. - - - - - Directory node. - - - - - Link node (unused). - - - - - Specifies all node types, including File, Directory and Link. - - - - - Represents a file or directory item. - - - - - Gets file length. - - - - - Gets the last modification time of the item. - - - - - Gets the last access time of the item. - - - - - Gets the creation time of the item. - - - - - Gets the last modification time of the item. - - - - - Gets the last access time of the item. - - - - - Gets the creation time of the item. - - - - - Gets a value indicating whether the item is a file. - - True if the item is a file; false otherwise. - - - - Gets a value indicating whether the item is a directory. - - True if the archive item is directory; false otherwise. - - - - Gets a value indicating whether the item is a link. - - True if the archive item is a link; false otherwise. - - - - Gets the name of the file or directory. - - The name of the file or directory. - - - - Gets the path of the file or directory. - It can be relative or absolute path depending on the way of use. - - It contains a full path if returned by the GetItems method or a file/directory name only if returned by the GetList method. - The path of the file or directory. - - - - Provides a container for a collection of objects. - - - - - Initializes a new instance of the class. - - - - - Validates whether the item is correct and can be added. - - Item to add. - - - - Gets an for the collection. - - An for the collection. - - - - Gets an object that can be used to synchronize access to the collection. - - An object that can be used to synchronize access to the collection. - - - - Adds the elements of the specified collection to the end of the FileSystemItemCollection. - - The collection whose elements should be added to the end of the FileSystemItemCollection. - - - - Adds the specified item to the collection. - - The item to be added to the collection. - - - - Removes the specified item from the collection. - - The item to remove from the collection. - - True if item was successfully removed from the collection; false otherwise. - - - - - Removes the item with the specified path from the collection. - - The path of an item to remove from the collection. - - - - Removes the item at the specified index from the collection. - - The zero-based index of the item to remove. - - - - Gets the number of elements contained in the collection. - - The number of elements contained in the collection. - - - - Gets the item at the specified index. - - A zero-based index of the item to get. - Item at the specified index. - - - - Gets the item of the specified path. - - The path of the item to get. - Item with the specified path, or null if not found. - - - - Removes all items from the collection. - - - - - Copies the range of elements from the collection to a one-dimensional - array, starting at the specified index of the target array. - - One-dimensional zero-based array that is the destination of the elements copied from the collection. - A zero-based index in the destination array at which copying begins. - - - - Determines whether the item is in the collection. - - The item to locate in the collection. - True if the item is located in the collection; false otherwise. - - - - Determines whether the item with the specified path is in the collection. - - The path to locate in the collection. - True if the item with the specified path is located in the collection; false otherwise. - - - - Gets the total size of files contained in the collection. - - The total size of files contained it the collection. - - - - Gets or sets a value that indicates whether to use a Path or Name for pattern matching - and return values in the method. - - - - - Returns the paths of files in the collection that match the specified search pattern. - - The regular expression to match the paths or filenames against. - A array containing the paths or names of files in the specified directory that match the specified search pattern. - - The method works in two different modes (determined by property): - Filenames without path are searched and returned. This mode is used by default for collections returned by GetList method.Filenames with path are searched and returned. This mode is used by default for collection returned by GetItems method. - - - - Returns the names of files in the collection that match the specified search pattern. - - The search string to match the items against. - If tree, perform unix-like case-sensitive matching. - A array containing the names of files in the specified directory that match the specified search pattern. - -

The following wildcards are permitted in searchPattern:
* - Zero or more characters.
? - Exactly one character.
- Characters other than the wildcards represent themselves. - For example, the searchPattern string "*.txt" searches for all names/paths - ending with the ".txt". The searchPattern string "s*" searches for all - names/paths beginning with the letter "s". -

-

- The method works in two different modes (determined by property): - Filenames without path are searched and returned. This mode is used by default for collections returned by GetList method.Filenames with path are searched and returned. This mode is used by default for collection returned by GetItems method.

-
-
- - - Returns the names of files in the collection that match the specified search pattern. - - The search string to match the items against. - A array containing the names of files in the specified directory that match the specified search pattern. - -

The following wildcard specifiers are permitted in searchPattern:
* - Zero or more characters.
? - Exactly one character.
- Characters other than the wild card specifiers represent themselves. - For example, the searchPattern string "*t" searches for all names in path - ending with the letter "t". The searchPattern string "s*" searches for all - names in path beginning with the letter "s". -

-

- The method works in two different modes (determined by property): - Filenames without path are searched and returned. This mode is used by default for collections returned by GetList method.Filenames with path are searched and returned. This mode is used by default for collection returned by GetItems method.

-
-
- - - Sorts the items in the entire collection alphabetically. - - - - - Sorts the elements in the entire collection using the specified comparer. - - The implementation to use when comparing elements, or a null reference to sort alphabetically. - - - - Sorts the elements in a section of the collection using the specified comparer. - - The zero-based starting index of the range to sort. - The length of the range to sort. - The implementation to use when comparing elements, or a null reference to sort alphabetically. - - - - List of possible compare types for the FileSystemItemComparer class. - - - - - Compare by . - - - - - Compare by . - - - - - Compare by creation date and time of the item. - - - - - Compare by last modification date and time of the item. - - - - - Compare by last access date and time of the item. - - - - - Compare by type of the item (directory/file/link). - - - - - Class used to compare objects. - - - - - Creates a new instance of FileSystemItemComparer with default sorting by file name and with ascending sort mode. - - - - - Creates a new instance of FileSystemItemComparer with specified comparer type and ascending sort mode. - - Type of the comparer. - - - - Creates a new instance of FileSystemItemComparer with specified comparer type and sort mode. - - Type of the comparer. - Sorting order. - - - - IComparer interface implementation. Compares two instances of . - - First object to compare. - Second object to compare. - Value greater than zero when x is greater then y, zero when they are equal, or less than zero when x is lesser than y. - - - - Specifies how a search pattern is treated (how to traverse a hierarchy of directories). - - - See Using TraversalMode blog post for samples. - - - - - Performs shallow search for files and directories; do recursive transfer of matching directories.
- Shallow search means that items are searched only in the first level of given directory.
- If the pattern matches a file, the file is processed.
- If the pattern matches a directory, all files and subdirectories are processed. -
-
- - - Performs shallow search for files and directories; do non-recursive transfer of matching directories.
- Shallow search means that items are searched only in the first level of given directory.
- If the pattern matches a file, the file is processed.
- If the pattern matches a directory, only the directory itself is processed (without any content = empty directory will be created). -
-
- - - Performs shallow search for files only. This is the same as mode, but only files are processed.
- Shallow search means that files are searched only in the first level of given directory. -
-
- - - Performs deep search for files only. This is like DOS xcopy deep file search.
- Deep search means that files are searched in the given directory and also in all its subdirectories.
- However, if this mode is used in GetItems method, returned collection will also contains directories where the files were found. -
- - This behavior is useful in situations where you need to prepare the containing directory before the file is processed. - To get only files, just use Linq like this: collection.Where(item => !item.IsDirectory) -
- - - Specifies the default action to perform when a target file already exists. - However, the default action can still be changed using the ProblemDetected event. - - - - - Existing files are to cause the whole multi-file transfer to be canceled and an exception to be raised. - - - - - Existing files are to be always skipped. - - - - - Existing files are to be always overwritten. - - - - - Existing files are to be overwritten if they are older than source files. - This is strongly discouraged because modification dates are often misreported by FTP and SFTP servers, making this mode highly unreliable. - We strongly recommend to use a different mode or develop a custom solution using the ProblemDetected event. - - - - - Existing files with different sizes are to be overwritten. - - - - - Existing files are to be resumed if they are smaller than source files. - - - - - Existing files are to be renamed according the pattern "filename[number].extension". - You can still change the generated name using the ProblemDetected event and the method. - - - - - Existing files with different checksum are to be overwritten.
- Works on FTP and ZIP only. ZIP uses CRC-32 always; FTP uses checksums provided by the server (some FTP servers support no checksums). -
-
- - - Specifies behavior on links and reparse points in multi-file operations. - - - - - Detected links are to be resolved and processed - however, this can still be changed by ProblemDetected handler. - - - - - Detected links are to be skipped - however, this can still be changed by ProblemDetected handler. - - - - - Detected links cause an exception to be thrown - however, this can still be changed by ProblemDetected handler. - - - - - Specifies link type. - - - - - Symbolic link (symlink). - - - - - Hard link. - - - - - Specifies the method of the transfer. - - - - - Items are copied. - - - - - Items are moved to the target destination (items are deleted in the source location). - - - - - Specifies the behaviour of the . - - - - - All items (files and directories) are moved to the target destination deleting them in the source location. - - - - - Only files are moved to the target destination. Directories remain (not deleted) in the source location. - - - - - Specifies which date/time to restore. - - - - - Restore no date/time. - - - - - Restore CreationTime. - - - - - Restore LastWriteTime. - - - - - Restore LastAccessTime. - - - - - Restore all date and times. - - - - - Represents a file or directory on the local file system. - - - - - Initializes a new instance of the class. - - Path to a file or directory on the local file system. - - - - Gets the underlying object that represents the parent folder of the item. - - An instance of , or null if not available. - - - - Gets the underlying object. - - An instance of , or null if not available. - - - - Gets a value indicating whether the file or directory exists. - - True if the file or directory exists; false otherwise. - - - - Gets file length. - - - - - Gets the last modification time of the item. - - - - - Sets the last modification time of the item. - - The last modification time. - - - - Gets the last access time of the item. - - - - - Sets the last access time of the item. - - The last access time. - - - - Gets the creation time of the item. - - - - - Sets the creation time of the item. - - The creation time. - - - - Gets a value indicating whether the item is a file. - - True if the item is a file; false otherwise. - - - - Gets a value indicating whether the item is a directory. - - True if the archive item is directory; false otherwise. - - - - Gets a value indicating whether the item is a link. - - True if the archive item is a link; false otherwise. - - - - Gets the name of the file or directory. - - The name of the file or directory. - - - - Gets the relative path of the file or directory. - - The relative path of the file or directory. - - - - Gets the full path of the file or directory. - - The full path of the file or directory. - - - - Returns the full path of the item. - - The full path of the item. - - - - Deletes the local item. - - - - - Gets item attributes. - - - - - Gets the list of file items in a directory represented by this object. - Fails if this object is not a directory. - - - This is only valid for directories. - - List of file items. - - - - Gets the list of directory items in a directory represented by this object. - Fails if this object is not a directory. - - - This is only valid for directories. - - List of directory items. - - - - Computes the CRC32 (Cyclic Redundancy Check) value of the file. - - - This is only valid for files. - - - CRC32 checksum value. - - - - - Calculates the checksum for the specified file. - - Path to the file. - Desired checksum algorithm. - Checksum of the specified file. - - - - Calculates the checksum of the specified part of the specified file. - - Path to the file. - Desired checksum algorithm. - The offset in the local file at which to start processing. - The maximum number of bytes to process. - /// Checksum of the specified file. - - - Provides a container for a collection of objects. - - - - - Initializes a new instance of the class. - - - - - Validates whether the item is correct and can be added. - - Item to add. - - - - Adds the item to the collection. - - The item to be added to the collection. - - - - Adds the item to the collection. - - The item to be added to the collection. - - - - Adds the elements of the specified collection to the end of the LocalItemCollection. - - The collection whose elements should be added to the end of the FtpItemCollection. - - - - Adds the elements of the specified collection to the end of the LocalItemCollection. - - The collection whose elements should be added to the end of the FtpItemCollection. - - - - Determines whether the item is in the collection. - - The item to locate in the collection. - True if the item is located in the collection; false otherwise. - - - - Determines whether the item is in the collection. - - The item to locate in the collection. - True if the item is located in the collection; false otherwise. - - - - Determines whether the item with the specified path is in the colleciton. - - The path to locate in the collection. - True if the item with the specified path is located in the collection; false otherwise. - - - - Copies the range of elements from the collection to a one-dimensional - array, starting at the specified index of the target array. - - One-dimensional zero-based array that is the destination of the elements copied from the collection. - A zero-based index in the destination array at which copying begins. - - - - Removes the specified item from the collection. - - The item to remove from the collection. - - True if item was successfully removed from the collection; false otherwise. - - - - - Removes the specified item from the collection. - - The item to remove from the collection. - - True if item was successfully removed from the collection; false otherwise. - - - - - Gets an for the collection. - - An for the collection. - - - - Gets the item at the specified index. - - A zero-based index of the item to get. - Item at the specified index. - - - - Gets the item of the specified path. - - The path of the item to get. - Item with the specified path, or null if not found. - - - - License key infrastructure for trial versions of Rebex components. - - - - - Gets or sets the license key. - - License key. - - - - Gets collection of license keys. - - - - - Common base class for log writers. A derived class must override either the method or both Write methods. - - - - - Creates a new instance of . - - - - - Gets or sets the log level - only log messages with log level equal to or greater than the specified one. - - Log level. - - - - Get a value indicating whether the log writer is closed. - - True when log writer is closed. False if log writer is opened and ready for writing. - Implementation in this base class returns false, as the close method actually does not close any resource. - - - - Closes the log writer. - - - - - Releases unmanaged and managed resources (depending on the scenario). - If is false, the method has been called from - the finalizer and should not reference other objects (therefore only unmanaged resources can be disposed). - - True indicates that the method has been called via IDisposable.Dispose. - False indicates that it has been called by the finalizer. - - - - Writes a message into the log. - - Message level. - Logging object type. - Logging object ID. - Logging area. - Message. - - - - Writes a message and data block into the log. - - Message level. - Logging object type. - Logging object ID. - Logging area. - Message. - Data block. - Data offset. - Date length. - - - - Appends the specified message text into a text-based log. This method is only called by method - and is only used by text-based loggers. - - Full message info. - - - - Disposes the object. - - - - - Class for chained comparison of objects. - - - - - Creates a new instance of MultiComparer. - - An array of comparers to use. - - - - IComparer interface implementation. Compares two instances of provided objects. - - The first object to compare. - The second object to compare. - - A signed integer that indicates the result of of x and y comparison. - Value Less than zero means x is less than y. Zero x equals y. Greater than zero x is greater than y. - - - - - Specifies asymmetric algorithm. - - - - - RSA. - - - - - DSA. - - - - - Diffie-Hellman. - - - - - Elliptic Curve Digital Signature Algorithm (.NET >= 4.0 or through a plugin). - - - - - Elliptic Curve Diffie-Hellman algorithm (.NET >= 4.0 or through a plugin). - - - - - Twisted Edwards Curve DSA algorithm such as ED25519 (supported through a plugin). - - - - - Specifies key blob format. - - - - - ECPrivateKey (defined by RFC 5915). - - - - - Raw public key data. - - - - - Raw private key data. - - - - - A platform-independent asymmetric algorithm object. - - - - - Register custom asymmetric key algorithm. - - Factory function that accepts algorithm name and returns algorithm. - - - - Gets the current key size. - - - - - Gets the current key algorithm. - - - - - Gets a value indicating whether this instance only contains the public key. - - - - - Creates an instance of . - - - - - Frees the resources used by this object. - - - - - Exports a public key to the specified private key info object. - - Public key info object. - - - - Exports a private key to the specified private key info object. - - Private key info object. - - - - Imports a key from the specified public key info object. - - Public key info object. - - - - Imports a key from the specified private key info object. - - Private key info object. - - - - Imports a key from the specified RSA parameters. - - RSA key parameters. - - - - Imports a key from the specified DSA parameters. - - DSA key parameters. - - - - Imports a key from the specified Diffie-Hellman parameters. - - Diffie-Hellman key parameters. - - - - Imports a private key for the specified algorithm/curve. Only some algorithms/curves are supported. - - Key algorithm. - Key algorithm curve. - Key data. - Key format. - - - - Returns a value indicating whether the specified algorithm is supported. - - Asymmetric algorithm. - Curve name or OID (if needed). - Key size (specify 0 to indicate default key size). - True if supported; false if not supported. - - - - Imports a key from the specified Windows Runtime cryptographic key. - - Cryptographic key object. - - - - Generates Diffie-Hellman parameters corresponding to the specified key size. - - Key size. - Diffie-Hellman parameters. - - - - Generates a private key for the specified asymmetric algorithm with of the specified key size. - - Key algorithm. - Key size. Specify 0 to use default key size. - - - - Generates a private key for the specified asymmetric algorithm based on the specified curve. - - Key algorithm. - Curve name or OID. - - - - Computes the signature for the specified hash value. - - The hash value of the data to be signed. - A hash algorithm used to create the hash value. - The signature for the specified hash value. - -

- The private key must be available for this method to succeed. -

-
-
- - - Computes the signature for the specified message (using default parameters). - - Message to be signed. - Signature for the specified message. - -

- The private key must be available for this method to succeed. -

-
-
- - - Computes the signature for the specified message. - - Message to be signed. - Signature parameters. - Signature for the specified message. - -

- The private key must be available for this method to succeed. -

-
-
- - - Verifies the specified signature. - - The hash value of the signed data. - A hash algorithm used to create the hash value. - The signature for the specified hash value. - True if the signature verifies as valid; otherwise, false. - - - - Verifies the specified signature (using default parameters). - - Signed message. - The signature for the specified message. - True if the signature verifies as valid; otherwise, false. - - - - Verifies the specified signature. - - Signed message. - The signature for the specified message. - Signature parameters. - True if the signature verifies as valid; otherwise, false. - - - - Encrypts data. - - Data to be encrypted. - Encrypted data. - - - - Encrypts data. - - Data to be encrypted. - Encryption parameters. - Encrypted data. - - - - Decrypts data. - - Data to be decrypted. - Decrypted data. - - If silent operation is requested and the CSP must display UI to operate, this method will fail. - - - - - Decrypts data. - - Data to be decrypted. - Encryption parameters. - Decrypted data. - - - - Gets key material deriver. Only supported by Diffie-Hellman-like algorithms. - - Other side's public key in raw form. - Key material deriver. - - - - Provides various cryptography-related helper methods. - - - - - Gets a value indicating whether only FIPS-compliant algorithms are to be used. - - - - - Creates an instance of default random number generator. - - - - - - Returns an array of bytes with a cryptographically strong random sequence of values. - - Array length. - Array filled with random data. - - - - Fills specified array of bytes with a cryptographically strong random sequence of values. - - Array to fill random data with. - - - - Decodes a signature from a PKCS #7 form. - - Signature. - Key algorithm. - Decoded signature. - - - - Encodes a signature to a PKCS #7 form. - - Signature. - Key algorithm. - Encoded signature. - - - - Sets internal option. - - Instance. - Name. - Value. - - - - Gets internal option. - - Instance. - Name. - Value. - - - - Represents an error during cryptographic operation. - - - - - Creates a new instance of . - - Exception message. - - - - Creates a new instance of with the specified inner exception. - - Exception message. - Inner exception - - - - Represents the abstract class from which all implementations of cryptographic random number generators derive. - - - - - When overridden in a derived class, fills an array of bytes with a cryptographically - strong random sequence of values. - - The array to fill with cryptographically strong random bytes. - - - - Represents the abstract base class from which all classes that derive byte sequences of a specified length inherit. - - - - - Initializes a new instance of the class. - - - - - Returns derived bytes. - - The number of bytes to return. - - - - - Resets the state of the operation. - - - - - Dispose the object by releasing all resources. - - - - - Dispose all unmanaged resources and optionaly dispose all managed resources. - - True to dispose all resources; false to dispose unmanaged resources only. - - - - Contains the parameters for Diffie-Hellman algorithm. - - - - - The prime modulus used for the operation. - - - - - The generator used for the operation. - - - - - The private key for the operation. - - - - - The public key for the operation. - - - - - Represents the standard parameters for the DSA algorithm. - - - - Specifies the counter for the DSA algorithm. - - - Represents the G parameter for the RSA algorithm. - - - Represents the J parameter for the RSA algorithm. - - - Represents the P parameter for the RSA algorithm. - - - Represents the Q parameter for the RSA algorithm. - - - Specifies the seed for the DSA algorithm. - - - Represents the X parameter for the RSA algorithm. - - - Represents the Y parameter for the RSA algorithm. - - - - Encryption schemes. - - - - - Default padding scheme (depends on key algorithm). - - - - - RSAES-PKCS1-v1_5 (RFC 3447). - - - - - RSAES-OAEP (RFC 3447). - - - - - Encryption parameters. - - - - - Encryption scheme. - - - - - Hashing algorithm for padding generation. - - - - - Optional input parameter for . - - - - - If set to true (default), the cryptographic provider should not display any user interface (UI) when working with private keys. - Only used for decryption operations. - - - If silent operation is requested and the cryptographic provider needs to display a UI to operate, the requested method will fail. - - - - - Initialize new instance of the . - - - - - Specifies hash algorithm. - - - - - SHA-1. - - - - - SHA-256. - - - - - SHA-384. - - - - - SHA-512. - - - - - MD4. - - - - - MD5. - - - - - Specifies hash algorithm key mode. - - - - - No keyed hash. - - - - - HMAC. - - - - - Represents a hash transform. - - - - - Represents the size, in bits, of the computed hash code. - - - - - Computes the hash value for the specified region of the input byte array. - - The input to compute the hash code for. - The offset into the input byte array from which to begin using data. - The number of bytes in the input byte array to use as data. - - - - Gets the value of the computed hash code. - - The computed hash value. - - - - Resets the transform. - - - - - Represents a hash algorithm. - - - - - Gets algorithm ID. - - - - - Gets the size of the computed hash code (in bits). - - - - - Gets the current key. - - The current key. - - - - Sets the current key to the specified value. - - Key to be set. - - - - Gets or sets the algorithm's key mode. - - - - - Creates an instance of for the specified algorithm. - - Algorithm. - - - - Gets a value indicating whether the specified algorithm is supported. - - Algorithm. - True if supported; false if not supported. - - - - Creates a hash transform object for this algorithm based on the currently set parameters. - - Hash transform object. - - - - Computes the hash value for the specified data. - - Input data. - Hash value. - - - - Computes the hash value for the specified data. - - Input data. - Input offset. - Input length. - Hash value. - - - - Computes the hash value for the specified data using the specified algorithm. - - Hash algorithm. - Input data. - Hash value. - - - - Computes the hash value for the specified data using the specified algorithm. - - Hash algorithm. - Input data. - Input offset. - Input length. - Hash value. - - - - Disposes the object. - - - - - Key derivation parameters. - - - - - Gets or sets key derivation function ("HASH" or "HMAC"). - - - - - Hashing algorithm. - - - - - HMAC key. - - - - - Data to append to shared secret when hashing. - - - - - Data to prepend to shared secret when hashing. - - - - - Key material deriver. - - - - - Derives key material. - - Parameters that specify how to derive the key material.. - Key material. - - - - Finalizer. Called by garbage collector during object destruction. - - - - - Disposes the deriver object. - - - - - Represents a cryptographic object identifier. - - - - - Initializes a new instance of the class using the specified object. - - The object identifier information to use to create the new object identifier. - - - - Initializes a new instance of the class using the specified OID dotted number string. - - An object identifier in dotted number format. - - - - Converts a OID to an . - - An object identifier in dotted number format. - An . - - - - Parses an OID from an ASN.1 encoded byte array. - - Byte array. - OID. - - - - Gets the dotted number representation of the object identifier. - - - - - Gets an ASN.1 encoded byte array representaion of this OID. - - Byte array. - - - - Gets an ASN.1 encoded byte array representaion of this OID. - - True if DER-formatting is to be used. - Byte array. - - - - Returns a string in dotted number format that represents the current . - - A string representation of the current Oid. - - - - Implements PBKDF2, a password-based key derivation function specified by RFC 2898. - - - - - Initializes a new instance of Rfc2898DeriveBytes using a password, salt size, and number of iterations. - - The password used to derive the key. - The size of the random key salt value to be generated. - - - - Initializes a new instance of Rfc2898DeriveBytes using a password and salt. - - The password used to derive the key. - The key salt value used to derive the key. - - - - Initializes a new instance of Rfc2898DeriveBytes using a password, salt size, and number of iterations. - - The password used to derive the key. - The size of the random key salt value to be generated. - Number of iterations. - - - - Initializes a new instance of Rfc2898DeriveBytes using a password, salt size, and number of iterations. - - The password used to derive the key. - The key salt value used to derive the key. - Number of iterations. - - - - Initializes a new instance of Rfc2898DeriveBytes using a password, salt size, and number of iterations. - - The password used to derive the key. - The key salt value used to derive the key. - Number of iterations. - - - - Resets the state of the operation. - - - - - Returns a pseudo-random key generated from a password, salt and iteration count. - - A byte array filled with pseudo-random key bytes. - The number of pseudo-random key bytes to generate. - - - - Gets or sets the number of iterations. - - Number of iterations. - - - - Gets or sets the key salt value. - - The key salt value. - - - - Represents the standard parameters for the RSA algorithm. - - - - Represents the D parameter for the RSA algorithm. - - - Represents the DP parameter for the RSA algorithm. - - - Represents the DQ parameter for the RSA algorithm. - - - Represents the Exponent parameter for the RSA algorithm. - - - Represents the InverseQ parameter for the RSA algorithm. - - - Represents the Modulus parameter for the RSA algorithm. - - - Represents the P parameter for the RSA algorithm. - - - Represents the Q parameter for the RSA algorithm. - - - - Signature format. - - - - - Raw signature data. - - - - - DER-encoded ASN.1 form of the signature formatted according to Cryptographic Message Syntax (PKCS #7). - - - - - Signature padding scheme. - - - - - Default padding scheme (depends on key algorithm). - - - - - PKCS #1 padding scheme (RSASSA-PKCS1-v1_5 defined by RFC 3447). - - - - - Probabilistic Signature Scheme (PSS) padding scheme (RSASSA-PSS defined by RFC 3447). - - - - - Signature parameters. - - - - - Hashing algorithm. - - - - - Signature format. - - - - - Signature padding scheme. - - - - - Salt length in bytes (only used for ). - - - - - If set to true (default), the cryptographic provider should not display any user interface (UI) when working with private keys. - Only used for signing operations. - - - If silent operation is requested and the cryptographic provider needs to display a UI to operate, the requested method will fail. - - - - - Creates a new instance of . - - - - - Specifies the type of padding to apply when the message data block is shorter - than the full number of bytes needed for a cryptographic operation. - - - - No padding is done. - - - The PKCS #7 padding string consists of a sequence of bytes, each of which is equal to the total number of padding bytes added. - - - The padding string consists of bytes set to zero. - - - - Specifies the block cipher mode to use for encryption. - - - - - The Cipher Block Chaining (CBC) mode. - - - - - The Electronic Codebook (ECB) mode encrypts each block individually. - - - - - Defines the basic operations of cryptographic transformations. - - - - - Transforms the specified region of the input byte array and copies the resulting transform to the specified region of the output byte array. - - The input for which to compute the transform. - The offset into the input byte array from which to begin using data. - The number of bytes in the input byte array to use as data. - The output to which to write the transform. - The offset into the output byte array from which to begin writing data. - The number of bytes written. - - - - Transforms the specified region of the specified byte array. - - The input for which to compute the transform. - The offset into the input byte array from which to begin using data. - The number of bytes in the input byte array to use as data. - The computed transform. - - - - Gets the input block size. - - The size of the input data blocks in bytes. - - - - Gets the output block size. - - The size of the output data blocks in bytes. - - - - Specifies symmetric algorithm. - - - - - AES. - - - - - 3DES. - - - - - Twofish. - - - - - DES. - - - - - RC2. - - - - - An algorithm compatible with RC4. - - - - - Blowfish. - - - - - Represents a symmetric cipher algorithm. - - - - - Gets algorithm ID. - - - - - Gets or sets the desired block size in bits. - - - - - Gets or sets the desired key size in bits. - - - - - Gets or sets the desired effective key size in bits. - - - - - Gets or sets the desired block cipher padding mode. - - - - - Gets or sets the desired block cipher mode. - - - - - Gets the current initialization vector. - - Initialization vector. - - - - Gets the current key. - - Key. - - - - Derives a key (of length) using the specified generator. - - Generator algorithm. - - - - Derives an initialization vector (of length) using the specified generator. - - Generator algorithm. - - - - Generates a random key (of length). - - - - - Generates a initialization vector (of length). - - - - - Sets the current key to the specified value and changes the accordingly. - - Key. Cannot be null. - - - - Sets the current initialization vector to the specified value. - - Initialization vector. - - - - Creates an encryptor object for this algorithm based on the currently set parameters. - - Encryptor object. - - - - Creates a decryptor object for this algorithm based on the currently set parameters. - - Decryptor object. - - - - Disposes the object. - - - - - Creates an instance of for the specified algorithm. - - Algorithm. - - - - Gets a value indicating whether the specified algorithm is supported. - - Algorithm. - True if supported; false if not supported. - - - - The AlgorithmIdentifier class defines an algorithm used for a cryptographic operation. - - - - - Creates an instance of the class - with the specified algorithm identifier. - - An object identifier for the algorithm. - - - - Creates an instance of the class with - the specified algorithm identifier and parameters. - - An object identifier for the algorithm. - ASN.1 DER encoded parameters. - - - - Gets the object identifier for the algorithm. - - On that represents the algorithm. - - - - Gets the algorithm parameters. - - The algorithm parameters. - - - - A collection of values associated with a . - - - - - Gets the value at the specified index. - - An array of bytes in ASN.1 format. - - - - Copies the range of elements from the to a compatible one-dimensional - array, starting at the specified index of the target array. - - One-dimensional zero-based array that is the destination of the elements copied from . - A zero-based index in the destination array at which copying begins. - - - - A cryptographic attribute that contains a type and a collection of associated values. - - - - - Initializes an instance of a . - - The object identifier that identifies the attribute type. - Parameters in ASN.1 format, in a form of one or more byte arrays. - - - - Initializes an instance of a . - - The object identifier that identifies the attribute type. - Parameters in ASN.1 format. - Not supported in .NET 1.0, use instead. - - - - Gets the object identifier that identifies the attribute type. - - The object identifier. - - - - Gets the collection of values associated with the attribute. - - A . - - - - A collection of objects. - - - - - Gets or sets the at the specified index. - - The zero-based index of the to get or set. - A cryptographic attribute. - - - - Gets the first with the specified object identifier. - - The object identifier, either friendly name or dotted string format. - A cryptographic attribute if found, or null if not found. - - - - Contains string representations of common extended usage OIDs. - - - - Any purpose. - - - TLS Web server authentication. - - - TLS Web client authentication. - - - Code signing. - - - E-mail protection. - - - Timestamping. - - - OCSPstamping. - - - - A utility class that features a certificate issuer functionality. This can be used as a base of simple custom certification authority. - - - - - Issues a certificate signed by the specified certification authority using the specified signature hash algorithm. - - Certification authority certificate to issue and sign the certificate. - Certificate info. - Certificate public key. - A new certificate. - - - - Issues a self-signed certificate, signed using the specified algorithm. Also passes back the private key info. - - Certificate info. - Certificate private key. - A new certificate. - - - - Issues a certificate signed by the specified certification authority using the specified signature hash algorithm. - - Certification authority certificate to issue and sign the certificate. - Signature hash algorithm. - Certificate revocation list info. - A collection of objects. - A new certificate. - - - - Contains information describing the certificate for the .Issue method. - - - - - Creates an instance of class. - - - - - Gets the certificate serial number. - - Serial number. - - - - Sets the certificate serial number. - - Serial number. - - - - Sets the certificate serial number. - - Serial number. - - - - Gets or sets the certificate subject. - - Certificate subject. - - - - Gets or sets the basic certificate usage. - - Basic certificate usage. - - - - Gets the extended certificate usage. - - Extended certificate usage. - - - - Sets the extended certificate usage. - - Extended certificate usage. - - - - Gets or sets the certificate effective date. - - Certificate effective date. - - - - Gets or sets the certificate expiration date. - - Certificate expiration date. - - - - Gets the certificate extensions collection. - - Certificate extensions collection. - - - - Gets the CRL distribution points collection. - - CRL distribution points collection. - - - - Gets or sets the certificate owner's e-mail address. - - E-mail address. - - - - Sets alternative hostnames. - - Alternative hostnames. - - - - Sets alternative hostnames. - - Alternative hostnames. - - - - Gets or sets the hash algorithm to be used to create the signature of the certificate. - - The hash algorithm to be used to create the signature of the certificate. - - - - Contains information describing the certificate for the .IssueRevocationList method. - - - - - Creates an instance of class. - - - - - Gets or sets the datetime of this CRL update. - - Datetime of this CRL update. - - - - Gets or sets the datetime of the next CRL update. - - Datetime of the next CRL update. - - - - A SPKAC certificate request. This is used by Mozilla, Opera and other browsers except Internet Explorer. - For Internet Explorer, use . - - - - - Creates a SPKAC request from an ASN.1 block. - - ASN.1 block. - - - - Validates the SPKAC request's signature. - - Challenge string. - True if valid; false if not valid. - - - - Gets the SPKAC request's public key info. This includes the key itself. - - Public key info. - - - - PKCS #10 certification request. This is the standard certificate format. - It is used (for example) by Internet Explorer's XEnroll control, but non-IE browsers generally use instead. - - - - - Creates a new PKCS #10 request for the specified subject and public key. - - Request subject. - Request public key. - - - - Parses a PKCS #10 request from an ASN.1 block. - - ASN.1 block. - - - - Validates the PKCS #10 request's signature. - - True if valid; false if not valid. - - - - Validates the PKCS #10 request's signature. - - Subject - in practice, this is used in place of a challenge string. - True if valid; false if not valid. - - - - Signs the certification request using a private key corresponding to the request's public key. - - An instance of . - Hash algorithm to use for the signature. - - - - Signs the certification request using a private key corresponding to the request's public key. - - An instance of representing the private key. - Hash algorithm to use for the signature. - - - - Gets the PKCS #10 request's public key info. This includes the key itself. - - Public key info. - - - - Gets the PKCS #10 request's subject. - - Request subject. - - - - Gets list of alternative hostnames. - - List of alternative hostnames. - - - - Gets the PKCS #10 request's attributes. - - Request attributes. - - - - Gets the PKCS #10 request's certificate extension collection (represented by 1.2.840.113549.1.9.14 attribute in collection). - - - - - Gets ASN.1 encoded form of this object. - - Array of bytes. - - - - Specifies the reason for inclusion in the certificate revocation list. - - - - Unspecified. - - - Key was compromised. - - - CA was compromised. - - - Affiliation changed. - - - Certificate was superseded. - - - Operation was ceased. - - - Certificate hold. - - - Remove from CRL. - - - - The certificate revocation list. - - - - - Creates a certificate revocation list from an ASN.1 block. - - ASN.1 block. - - - - Loads a certificate revocation list from given stream. - - Stream to load the certificate revocation list from. - - - - Converts a certificate revocation list into a byte array. - - Byte array. - - - - Gets the DN of the issuer of this certificate revocation list. - - DN of the issuer of this certificate revocation list. - - - - Gets the datetime of this CRL update. - - Datetime of this CRL update. - - - - Gets the datetime of the next CRL update. - - Datetime of the next CRL update. - - - - Gets the CRL number if appropriate extension is present. - - CRL number or null (Nothing in VB.NET) if not specified. - - - - Gets the collection of CRL's extensions. - - Extensions collection. - - - - Gets the collection of revoked certificates. - - Revoked certificate collection. - - - - Returns the key algorithm used to sign this certificate revocation list. - - The key algorithm. - - - - Returns the hash algorithm used to create the signed hash value. - - Hash algorithm. - - - - Returns the certificate revocation list hash. - - CRL hash. - - - - Returns the certificate revocation list signature. - - CRL signature. - - - - Returns distribution point URL from issuing distribution point extension, if both present. Otherwise returns null. - - Distribution point URL. - - - - Checks whether the certificate revocation list contains the specified certificate. - Also makes sure that the CRL is suitable for the certificate. - - Certificate to check. - Revocation check result. - - Please note that this method does not check the validity of the CRL itself. - Call on the issuer certificate - to perform this check. - - - - - Collection of information about revoked certificates. A part of . - - - - - Creates a new instance of . - - - - - Information about revoked certificate. - - - - - Creates a new instance of revoked certificate based on the supplied data. - - Serial number. - Revocation date. - Revocation reason. - - - - Creates a new instance of revoked certificate based on the supplied data. - - Serial number. - Revocation date. - Revocation reason. - - - - Gets the certificate's serial number. - - Serial number. - - - - Gets the revocation date. - - Revocation date. - - - - Gets the collection of revoked certificate info's extensions. - - Extensions collection. - - - - Returns revocation reason of the revoked certificate. - - If the revocation reason extension is present, returns the reason from that extension; otherwise returns . - - - - Represents revocation check outcome. - - - - - The issuer of the certificate does not match the issuer of the CRL. - - - - - This CRL is not supposed to be used to check the status of this certificate (try the next CRL). - - - - - The certificate has not been revoked according to this CRL. - - - - - The certificate has been revoked. - - - - - Represents the result of certificate revocation check. - - - - - Gets revocation check outcome. - - - - - Gets the revocation date. - - Revocation date. - - - - Gets revocation reason of the revoked certificate. - - If the revocation reason extension is present, returns the reason from that extension; otherwise returns null (Nothing in VB.NET). - - - - Certificate revocation list status. - - - - - The CRL is valid (make sure to check the issuer certificate for validity as well). - - - - - The CRL has expired or is not valid yet. - - - - - The CRL has not been issued by the specified issuer. - - - - - The CRL contains an unsupported critical extension. - - - - - The CRL update time is outside the issuer certificate's time validity range. - - - - - The CRL issuer is not intended to issue CRLs. - - - - - The CRL signature is not valid. - - - - - Malformed structure of the CRL or its extensions. - - - - - Collection of certificate revocation lists. - - - - - The class represents the CMS/PKCS #7 ContentInfo data structure. - It encapsulates the content of or messages. - - - - - Initializes a new instance of using the specified array of bytes - as content and an object identifier "data" as content type. - - The message content. - - - - Initializes a new instance of using the specified array of bytes - as content and the specified object identifier as content type. - - The message content type. - The message content. - - - - Gets the object identifier of the CMS/PKCS #7 message content type. - - - - - Gets the content of the CMS/PKCS #7 message. - - An array of bytes that represent the content data. - - - - Copies the content of the CMS/PKCS #7 message into the supplied stream. - - Stream into which the content will be written. - - - - Represents a CMS/PKCS #7 encrypted data. - - - - - Gets or sets the to be used to find certificates - corresponding to a . - - The certificate finder. - - - - Gets or sets a value indicating whether cryptographic providers - are allowed to display any user interface (UI) when working with private keys. - - A value indicating whether a cryptographic provider can display a UI. - - - - Gets a value indicating whether the content is encrypted. - - A value indicating whether the content is encrypted. - - - - Gets the collection of unprotected (unencrypted) attributes associated with this CMS/PKCS #7 message. - - Unprotected attribute collection. - - - - Gets the collection of certificates that are embedded in the message. - - Collection of certificates - - - - Gets the collection of certificate revocation lists (CRLs) that are embedded in the message. - - Collection of CRLs - - - - Gets the collection of recipients associated with this CMS/PKCS #7 message. - - A collection of recipients. - - - - Gets the inner content information for this CMS/PKCS #7 message. - It contains the content type identifier and content data. - - The inner content. - - This method returns the encrypted content for parsed messages - and unencrypted content for newly created messages. To encrypt or decrypt - the content, use and methods. - - - - - Gets the identifier of the algorithm used to encrypt the content. - - An object. - - - - Returns a value indicating whether the private key to decrypt the symmetric key - and encrypted content is available. - - True if the private key is available, false if it isn't. - - - - Tries acquiring a private key unless it is already available. - - True if the key has been acquired, false otherwise. - - - - Gets the symmetric key used to encrypt the message, - or null if it cannot be retrieved. - - The symmetric key used to encrypt the message, or null. - - - - Encrypts the contents of the CMS/PKCS #7 message. - - - - - Decrypts the contents of the CMS/PKCS #7 message. - - For a successful decryption, a symmetric key must be available. - - - - Decodes an encoded CMS/PKCS #7 encrypted message from raw data. - Upon successful decoding, information can be retrieved using - methods and properties. - - Arrays of bytes representing a CMS/PKCS #7 message. - - - - Encodes the object into CMS/PKCS #7 message data. - - Array of bytes representing a CMS/PKCS #7 message. - - - - Determines whether the specified content info ASN.1 sequence is an enveloped data sequence. - - Sequence data. - Offset. - Count. - True if yes; false if not. - - - - Loads a CMS/PKCS #7 encrypted message from a stream. - Upon successful decoding, information can be retrieved using - methods and properties. - - A stream from which to load the message. - - - - Saves into a stream. - - A stream to which to save the message. - - - - Creates a copy of this object. - - A new object. - - - - Creates an instance of class. - It must be initialized using or methods before - any other methods and properties can be accessed. - - - - - Creates an instance of class using the specified content - information as the inner content. - - The inner content of the encrypted message. - - - - Creates an instance of class using the specified content - information and encryption algorithm. - - The inner content of the encrypted message. - Encryption algorithm identifier (see remarks). Can be null for 3DES. - - Currently, 3DES ("1.2.840.113549.3.7"), - AES ("2.16.840.1.101.3.4.1.2" for 128-bit, "2.16.840.1.101.3.4.1.22" for 192-bit and "2.16.840.1.101.3.4.1.42" for 256-bit), - DES ("1.3.14.3.2.7") and RC2 ("1.2.840.113549.3.2") algorithms are supported. - - - - - Creates an instance of class using the specified content - information and encryption algorithm. - - The inner content of the encrypted message. - Encryption algorithm identifier (see remarks). Can be null for 3DES. - The effective key length in bits (only used by RC2 algorithm). - - Currently, 3DES ("1.2.840.113549.3.7"), - AES ("2.16.840.1.101.3.4.1.2" for 128-bit, "2.16.840.1.101.3.4.1.22" for 192-bit and "2.16.840.1.101.3.4.1.42" for 256-bit), - DES ("1.3.14.3.2.7") and RC2 ("1.2.840.113549.3.2") algorithms are supported. - - - - - Defines the interface that certificate finder classes must implement. - - - - - Finds a certificate corresponding to the specified subject identifier. - - Identifier of the subject certificate. - A certificate store containing the certificates that were included with the message. - Certificate chain if found, or null (Nothing in Visual Basic). - - - - Provides a set of common certificate finders. - - - - - Certificate finder. - - CertificateChain array. - A new instance of ICertificateFinder. - - - - Default certificate finder. - - - Searches for certificates in the current user's "My", - "Trusted people" and "Other people" stores. - - - - - Base class for various PKCS objects. - - - - - Specifies private key file format. - - - - Base64-encoded PKCS #8 format. - - - PuTTY PPKv2 format. - - - OpenSSH/OpenSSL SSLeay format. - - - Raw PKCS #8 format. - - - New OpenSSH format with bcrypt key expansion (Base64-encoded keys with "BEGIN OPENSSH PRIVATE KEY" header). - - - - Represents a private key. - - - - - Creates a new instance of . Use the method to load a private key. - - - - - Creates a new instance of based on the specified RSA parameters. - - RSA parameters including private keys. - - - - Creates a new instance of based on the specified DSA parameters. - - DSA parameters including private keys. - - - - Gets the key algorithm identifier. - - Key algorithm identifier. - - - - Gets or ets the key comment. The comment is used while saving in some formats. - - Key comment. - - - - Gets the raw form of the private key. - - Array of bytes. - - - - Gets the raw form of the private key. - - Array of bytes. - - - - Gets a public key corresponding to the private key. - - An instance of . - - - - Gets the DSA parameters for a DSA key. May only be used for DSA private keys. - - DSA paramaters. - - - - Gets the RSA parameters for a RSA key. May only be used for RSA private keys. - - RSA paramaters. - - - - Gets ASN.1 encoded form of this object. - - Array of bytes. - - - - Saves the private key into the supplied stream in the specified format. - - A stream to which to save the private key. - Password to encrypted the private key, or null if no encryption desired. - Private key file format. - - - - Saves the private key into the supplied stream in the specified format. - - A file to which to save the public key. - Password to encrypted the private key, or null if no encryption desired. - Private key file format. - - - - Saves the private key into the supplied stream in Base64-encoded PKCS #8 format. - - A stream to which to save the private key. - Password to encrypted the private key, or null if no encryption desired. - Encryption algorithm identifier. Ignored if password is null. - - Currently, 3DES ("1.2.840.113549.3.7"), DES ("1.3.14.3.2.7") and RC2 ("1.2.840.113549.3.2") algorithms are supported. - - - - - Loads a PKCS #8, PuTTY or SSLeay (OpenSSL/OpenSSH) format private key from a stream. - Upon successful decoding, information can be retrieved using - methods and properties. - - A stream from which to load the private key. - Password used to encrypted the private key, or null if no password needed. - - - - Loads a PKCS #8, PuTTY or SSLeay (OpenSSL/OpenSSH) format private key from a stream. - Upon successful decoding, information can be retrieved using - methods and properties. - - A file from which to load the private key. - Password used to encrypted the private key, or null if no password needed. - - - - Represents a public key. - - - - - Creates a new instance of . Use the method to load a public key. - - - - - Creates a new instance of based on the specified RSA parameters. - - RSA parameters. - - - - Creates a new instance of based on the specified DSA parameters. - - DSA parameters. - - - - Gets the key algorithm identifier. - - Key algorithm identifier. - - - - Gets the raw form of the public key. - - Array of bytes. - - - - Gets the raw form of the public key. - - Array of bytes. - - - - Gets ASN.1 encoded form of this object. - - Array of bytes. - - - - Gets the DSA parameters for a DSA public key. May only be used for DSA public keys. - - DSA paramaters. - - - - Gets the RSA parameters for a RSA public key. May only be used for RSA public keys. - - RSA paramaters. - - - - Returns the size of the key in bits. - - Size of the key in bits. - - - - Returns the key algorithm. - - Key algorithm. - - - - Saves the public key into the supplied stream in Base64-encoded PKCS #8 format. - - A stream to which to save the public key. - - - - Saves the public key into the supplied stream in Base64-encoded PKCS #8 format. - - A file to which to save the public key. - - - - Loads a PKCS #8 public key from a stream. - Upon successful decoding, information can be retrieved using - methods and properties. - - A stream from which to load the public key. - - - - Loads a PKCS #8 public key from a file. - Upon successful decoding, information can be retrieved using - methods and properties. - - A file from which to load the public key. - - - - Represents a CMS/PKCS #7 encrypted message recipient. - This class is inherited by and classes. - - - - - Gets the identifier of the recipient. - - Identifier of the recipient. - - - - Gets the identifier of the algorithm used to encrypt the symmetric key. - - An object. - - - - Gets signature parameters (if available). - - Signature parameters. - - - - Gets the encrypted key for the recipient. - - Encrypted key. - - - - Gets the certificate associated with the recipient, or null if not available. - - The recipient's certificate, or null. - - - - Gets the certificate chain associated with the recipient, or null if not available. - - The recipient's certificate chain, or null. - - - - Defines key transport recipient information, typically using the RSA algorithm to - encrypt the shared symmetric key to transport. - - - - - Creates a new instance of that defines the - key transport recipient information for the owner of the specified RSA certificate. - Use to specify RSAES-OAEP parameters. - - The recipient's certificate. - - - - Creates a new instance of that defines the - key transport recipient information for the owner of the specified RSA certificate. - Use to specify RSAES-OAEP parameters. - - The recipient's certificate. - Subject identifier type - only IssuerAndSerialNumber and SubjectKeyIdentifier values are accepted. - - - - Creates a new instance of that defines the - key transport recipient information for the owner of the specified RSA certificate. - - The recipient's certificate. - Encryption parameters (to specify RSAES-OAEP parameters). Can be null (for PKCS #1). - - - - Creates a new instance of that defines the - key transport recipient information for the owner of the specified RSA certificate. - - The recipient's certificate. - Subject identifier type - only IssuerAndSerialNumber and SubjectKeyIdentifier values are accepted. - Encryption parameters (to specify RSAES-OAEP parameters). Can be null (for PKCS #1). - - - - Gets the identifier of the recipient. - - Identifier of the recipient. - - - - Gets the identifier of the algorithm used to encrypt the symmetric key. - - An object. - - - - Gets signature parameters (if available). - - Signature parameters. - - - - Gets the encrypted key for the recipient. - - Encrypted key. - - - - Gets the certificate associated with the recipient, or null if not available. - - The recipient's certificate, or null. - - - - Gets the certificate chain associated with the recipient, or null if not available. - - The recipient's certificate chain, or null. - - - - Defines key agreement algorithm recipient information. The key itself is not transported - the two - parties that will be using a symmetric key both take part in its generation. Please note that - this method is not yet fully supported by Rebex Security library. - - - - - Gets the identifier of the key originator. - - Identifier of the key originator. - - - - Gets the identifier of the recipient. - - Identifier of the recipient. - - - - Gets the identifier of the algorithm used to encrypt the symmetric key. - - An object. - - - - Gets the encrypted key for the recipient. - - Encrypted key. - - - - Gets the certificate associated with the recipient, or null if not available. - - The recipient's certificate, or null. - - - - Gets the certificate chain associated with the recipient, or null if not available. - - The recipient's certificate chain, or null. - - - - A collection of objects. - - - - - Creates an empty and read-only instance of . - - - - - Represents a CMS/PKCS #7 signed data. - - - - - Specifies what parts of the certificate chain should be included in the signed data. - - Certificate include option. - - - - Gets or sets the to be used to find certificates - corresponding to a . - - The certificate finder. - - - - Gets or sets a value indicating whether cryptographic providers - are allowed to display any user interface (UI) when working with private keys. - - A value indicating whether cryptographic providers can display a UI. - - In case of signing, the actual behavior is determined by the combination of this value and the value of - passed to associated objects. - Cryptographic providers are only permitted to display a UI if both Silent properties are set to true. - - - - - Gets the collection of certificates that are embedded in the message. - - Collection of certificates - - - - Gets the collection of certificate revocation lists (CRLs) that are embedded in the message. - - Collection of CRLs - - - - Gets the collection of signers associated with this CMS/PKCS #7 message. - - A collection of signers. - - - - Gets or sets the inner content information for this CMS/PKCS #7 message. - It contains the content type identifier and content data. - - The inner content. - - - - Gets or sets a value indicating whether the actual content is detached from the message. - - True if the content is detached; False if the content is embedded within the message. - - - - Creates a signatures for all signers that do not have one yet. - - - - - Creates a signatures for all signers that do not have one yet. - - Signature options. - - - - Validates all digital signatures on this CMS/PKCS #7 signed message - and validates all the signers' certificates. - - Validation result. - - - - Validates all digital signatures on this CMS/PKCS #7 signed message. - Optionally, signers' certificates are validated, and the specified validation - options are taken into account. - - Specifies whether to only verify the signatures, skipping the certificate validation. - Signature and certificate validation options. - Validation result. - - - - Validates all digital signatures on this CMS/PKCS #7 signed message. - Optionally, signers' certificates are validated, and the specified validation - options are taken into account. - - Specifies whether to only verify the signatures, skipping the certificate validation. - Signature and certificate validation options. - Certificate chain engine. - Validation result. - - - - Decodes an encoded CMS/PKCS #7 signed message from raw data. - Upon successful decoding, information can be retrieved using - methods and properties. - - Array of bytes representing a CMS/PKCS #7 message. - - - - Encodes the object into CMS/PKCS #7 message data. - - Array of bytes representing a CMS/PKCS #7 message. - - - - Determines whether the specified content info ASN.1 sequence is a signed data sequence. - - Sequence data. - Offset. - Count. - True if yes; false if not. - - - - Loads a CMS/PKCS #7 signed message from a stream. - Upon successful decoding, information can be retrieved using - methods and properties. - - A stream from which to load the message. - - - - Saves into a stream. - - A stream to which to save the message. - - - - Creates a copy of this object. - - A new object. - - - - Creates an instance of class. - - - - - Creates an instance of class using the specified content - information as the inner content. - - The inner content of the signed message. - - - - Creates an instance of class using the specified content - information as the inner content. - - The inner content of the signed message. - - Specifies whether the signature is detached. - If detached, the actual content is not included within the signed message. - - - - - Specifies what parts of the certificate chain should be included in the message. - - - - Leave the existing certificate in the collection. - - - The certificate chain is not included. - - - The certificate chain is included, except for the root certificate. - - - Only the end certificate is included. - - - The certificate chain, including the root certificate, is included. - - - - Represents a CMS/PKCS #7 message signer. - - - - - Gets the identifier of the signer. - - Identifier of the signer. - - - - Gets the identifier of the digest algorithm. - - An object. - - - - Gets a value that identifies the digest algorithm. - - Digest algorithm. - - - - Gets the identifier of the signature algorithm. - - An object. - - - - Gets the signature, or null if it is not available yet. - - The signature. - - - - Gets the collection of signed attributes associated with this CMS/PKCS #7 message. - - Signed attribute collection. - - - - Gets the collection of unsigned attributes associated with this CMS/PKCS #7 message. - - Unsigned attribute collection. - - - - Gets the certificate associated with the signer, or null if not available. - - The signer's certificate, or null. - - - - Gets the certificate chain associated with the signer, or null if not available. - - The signer's certificate chain, or null. - - - - Gets the signing time, or 1970-01-01 if not available. - - Singing time. - - - - Gets the preferred subject identifier for key encryption. - - The preferred subject identifier. - - - - Gets the collection of S/MIME capabilities the signer supports. - - Collection of supported S/MIME capabilities. - - - - Gets signature parameters (if available). - - Signature parameters. - - - - Validates the signer's digital signature and validates the certificate. - - Validation result. - - - - Validates the signer's digital signatures. - Optionally, signers' certificates are validated, and the specified validation - options are taken into account. - - Specifies whether to only verify the signatures, skipping the certificate validation. - Signature and certificate validation options. - Validation result. - - - - Validates the signer's digital signatures. - Optionally, signers' certificates are validated, and the specified validation - options are taken into account. - - Specifies whether to only verify the signatures, skipping the certificate validation. - Signature and certificate validation options. - Certificate chain engine. - Validation result. - - - - Creates a signatures for the signer. - - - - - Creates a signature for the signer. - - Signature options. - - - - Creates a new instance of that defines - a signer corresponding to the specified certificate. An associated private - key for the certificate must be available. - Use to specify RSASSA-PSS parameters. - - The signer's certificate. - - - - Creates a new instance of that defines - a signer corresponding to the specified certificate. An associated private - key for the certificate must be available. - Use to specify RSASSA-PSS parameters. - - The signer's certificate. - Subject identifier type - only IssuerAndSerialNumber and SubjectKeyIdentifier values are accepted. - - - - Creates a new instance of that defines - a signer corresponding to the specified certificate. An associated private - key for the certificate must be available. - Use to specify RSASSA-PSS parameters. - - The signer's certificate. - Subject identifier type - only IssuerAndSerialNumber and SubjectKeyIdentifier values are accepted. - Digest algorithm. - - - - Creates a new instance of that defines - a signer corresponding to the specified certificate. An associated private - key for the certificate must be available. - - The signer's certificate. - Signature parameters (to specify RSASSA-PSS parameters). Can be null (for PKCS #1). - - - - Creates a new instance of that defines - a signer corresponding to the specified certificate using the - specified subject identifier type. An associated private - key for the certificate must be available. - - The signer's certificate. - Signature parameters (to specify RSASSA-PSS parameters). Can be null (for PKCS #1). - Subject identifier type - only IssuerAndSerialNumber and SubjectKeyIdentifier values are accepted. - - - - A collection of objects. - - - - - Creates an empty and read-only instance of . - - - - - Options for and methods. - - - - Don't include any signed attributes in the signature. Not recommended. - - - Don't include key Microsoft extensions in the signature attributes. - - - Don't include S/MIME capabilities extensions in the signature attributes. - - - Skip certificate usage check. - - - - Signature validation status. - - - - Certificate is not valid. - - - Certificate is not available. - - - A digest algorithm is not supported. - - - A signature algorithm is not supported. - - - A signature is invalid. - - - Invalid key usage. The certificate usage doesn't include message signing. - - - Content type mismatch. - - - - Represents the result of signature validation. - - - - - Gets the status mask. - - Status mask. - - - - Gets the certificate validation status mask. - - Certificate validation status mask. - - - - Gets the certificate chain validity status. - - True if valid, false if not valid. - - - - Represents an S/MIME capability. - - - - - Initializes an instance of a with no parameters. - - The object identifier that identifies the S//MIME capability. - - - - Initializes an instance of a . - - The object identifier that identifies the S//MIME capability. - Capability parameters in ASN.1 format. - - - - Gets the object identifier that identifies the S/MIME capability. - - The object identifier. - - - - Gets the S/MIME capability parameters. - - An array of bytes in ASN.1 format. - - - - A collection of objects. - - - - - Gets or sets the at the specified index. - - The zero-based index of the to get or set. - An S/MIME capability. - - - - Gets the first with the specified object identifier. - - The object identifier, either friendly name or dotted string format. - An S/MIME capability if found, or null if not found. - - - - Defines the type of subject identifier that identifies a subject and a certificate. - - - - - The type of subject identifier is unknown. - - - - - The subject is identified by the certificate issuer and serial number. - - - - - The subject is identified by the hash of the subject's public key. The hash algorithm used is determined by the signature algorithm suite in the subject's certificate. - - - - - The subject is identified by the subject's public key. - - - - - The class identifies a subject, either by certificate issuer - and serial number, by the subject key identifier or by a public key. - - - - - Gets the type of the subject identifier. - - The type of the subject identifier. - - - - Gets the of the certificate issuer if - this subject identifier is identified by the issuer name and serial number. - Otherwise, this property will return null. - - Certificate issuer. - - - - Gets the serial number of the certificate if - this subject identifier is identified by the issuer name and serial number. - Otherwise, this property will return null. - - Certificate serial number. - - - - Gets the subject key identifier of the certificate if - this subject identifier is identified by the subject key identifier. - Otherwise, this property will return null. - - Certificate subject key identifier. - - - - Gets the public algorithm of the certificate if - this subject identifier is identified by the public key. - Otherwise, this property will return null. - - Certificate public key algorithm. - - - - Gets the public of the certificate if - this subject identifier is identified by the public key. - Otherwise, this property will return null. - - Certificate public key. - - - - A base class for various collections of cryptographic objects. - - - - - Returns a value indicating whether the collection is read-only. - - - - - Adds an item to the collection. - - Item to add. - - - - Removes all elements from the collection. - - - - - Determines whether the collection contains the specified item. - - Item. - True if the collection contains the item; false if it does not. - - - - Returns a position of the specified item within the collection, or -1 if not found. - - Item to find. - Zero-based position of the item; or -1 if not found. - - - - Copies the range of elements from the collection to a compatible one-dimensional - array, starting at the specified index of the target array. - - One-dimensional zero-based array that is the destination of the elements copied from the collection. - A zero-based index in the destination array at which copying begins. - - - - Removes an item from the collection. - - An item to remove. - True if the item was removed; false if not removed. - - - - Removes an item at the specified position from the collection. - - An index of an item to remove. - - - - Adds an item to the collection at the specified position. - - Position at which to insert the item. - Item to add. - - - - Gets or sets an instance of an item at the specified index. - - The zero-based index of the item to get or set. - An item. - - - - Returns an enumerator that iterates through the collection. - - Enumerator. - - - - A base class for various collections of cryptographic objects. - - - - - Gets the number of items in the . - - The number of items in collection. - - - - Gets an for the . - - An for the collection. - - - - Gets a value indicating whether access to the is synchronized. - - - - - Copies the range of elements from the to a compatible one-dimensional - , starting at the specified index of the target array. - - One-dimensional zero-based array that is the destination of the elements copied from . - A zero-based index in the destination array at which copying begins. - - - - Gets an object that can be used to synchronize access to the . - - - - - The hash algorithm used to compute the hash for hash signing - and verification methods. - - - - - Unsupported hash algorithm. - - - - - MD5. - - - - - SHA1. - - - - - MD5SHA1. - - - - - SHA-256. - - - - - SHA-384. - - - - - SHA-512. - - - - - MD4. - - - - - The key algorithm for the certificate. - - - - - Unsupported key algorithm. - - - - - RSA. - - - - - DSA. - - - - - Elliptic Curve DSA. - - - - - ED25519. - - - - - Intended key usage. - - - - Digital signature. - - - Non-repudiation. - - - Key encipherment. - - - Data encipherment. - - - Key agreement. - - - Certificate signing. - - - CRL signing. - - - Key encipherment only. - - - Key decipherment only. - - - - Key set options. - - - - Imported keys are marked as exportable. - - - The user is to be notified through a dialog box or other method when certain attempts to use this key are made. - - - Private keys are stored under the local computer and not under the current user. - - - Private keys are stored under the current user and not under the local computer even if the PFX BLOB specifies that they should go into the local computer. - - - Private keys are persisted on disk when importing a certificate - - - Always load the key into CNG key storage provider. Only supported on Windows Vista or higher. - - - Load the key into CNG key storage provider if possible. Only supported on Windows Vista or higher. - - - - Specifies certificate file format. - - - - Binary DER encoded X.509 certificate. - - - Base-64 encoded DER X.509 certificate. - - - P12/PFX certificate with private key. - - - - Represents an X509 v3 certificate. - - - - - Gets the certificates extensions collection. - - Extensions collection. - - - - Loads a certificate from an array. - - An array containing DER encoded certificate data. - - - - Loads a DER encoded certificate from the specified file. - - Path to a file. - A certificate. - - - - Loads a DER encoded certificate from the specified stream. - - Stream to load a certificate from. - A certificate. - - - - Loads a DER encoded certificate and a private key (in PKCS #8, PuTTY or SSLeay format) from the specified files. - - Path to a certificate file. - Path to the private key file. - Private key password. - A certificate. - - - - Loads a DER encoded certificate and a private key (in PKCS #8, PuTTY or SSLeay format) from the specified streams. - - Stream with the certificate. - Stream with the private key. - Private key password. - A certificate. - - - - Associates the supplied Windows Runtime cryptographic key with the certificate to perform operations that need a private key. - - An instance of CryptographicKey object. - - - - Associates the supplied private key with the certificate to perform operations that need a private key. - - The private key. - - - - Associates the supplied private key with the certificate to perform operations that need a private key. - - The private key. - - - - Saves the certificate to the supplied file in DER format. - - Path to the file to save the certificate to. If the file exists, it is overwritten. - - - - Saves the certificate to the supplied stream in DER format. - - Stream to save the certificate to. - - - - Saves the certificate to the supplied file in specified format. - - Path to the file to save the certificate to. If the file exists, it is overwritten. - Certificate format. - - - - Saves the certificate to the supplied stream in specified format. - - Stream to save the certificate to. - Certificate format. - - - - Saves the certificate to the supplied file in specified format. - - Path to the file to save the certificate to. If the file exists, it is overwritten. - Certificate format. - Password (only used by PFX/P12 format). - On .NET Compact Framework, this is only supported in Windows CE 5.0 or later. - - - - Saves the certificate to the supplied stream in specified format. - - Stream to save the certificate to. - Certificate format. - Password (only used by PFX/P12 format). - On .NET Compact Framework, this is only supported in Windows CE 5.0 or later. - - - - Saves the certificate's private key to the supplied file. - - Path to the file to save the certificate to. If the file exists, it is overwritten. - Private key password. - Private key file format. - If set to true, the cryptographic provider should not display any user interface (UI) when exporting private key parameters. - - - - Saves the certificate's private key to the supplied stream. - - Stream to save the private key to. - Private key password. - Private key file format. - If set to true, the cryptographic provider should not display any user interface (UI) when exporting private key parameters. - - - - Returns the key algorithm for this certificate. - - The key algorithm for this certificate. - - - - Returns the hash algorithm used to create the signature of this certificate. - - Hash algorithm. - - - - Returns the collection of CRL distribution points. - - Collection of CRL distribution points, or null if not available. - - - - Returns the DN of the certification authority that issued the X.509v3 certificate. - - DN of the certification authority that issued the X.509 certificate. - - - - Returns the name of the certification authority that issued the X.509v3 certificate. - - The name of the certification authority that issued the X.509 certificate. - - - - Returns DN of the principal to which the certificate was issued. - - DN of the principal to which the certificate was issued. - - - - Returns the name of the principal to which the certificate was issued. - - The name of the principal to which the certificate was issued. - - - - Returns the public key for the X.509v3 certificate. - - The public key for the X.509v3 certificate. - - - - Returns the key algorithm parameters for the X.509v3 certificate. - - The key algorithm parameters for the X.509v3 certificate. - - - - Returns the public key info for the X.509v3 certificate. - - The public key info for the X.509v3 certificate. - - - - Returns the certificate's subject key identifier (SKI). - - Subject key identifier. - - - - Returns the certificate's issuer key identifier (AKI). - - Issuer (authority) key identifier. - - - - Returns the certificate's common name, if available. - - Common name; or null if not available. - - - - Returns the list of certificate's common names. - - The list of common names. - - - - Returns the list of certificate's e-mail addresses. - - The list of addresses. - - - - Returns the serial number of the X.509v3 certificate. - - The serial number of the X.509 certificate as an array of bytes. - - - - Returns the expiration date of this X.509v3 certificate (in local time). - - The expiration date for this X.509 certificate. - The expiration date is the date after which the X.509 certificate is no longer considered valid. - - - - Returns the effective date of this X.509v3 certificate (in local time). - - The effective date for this X.509 certificate. - The effective date is the date after which the X.509 certificate is considered valid. - - - - Returns the hash value for the X.509v3 certificate as an array of bytes. - - The hash value for the X.509 certificate. - - - - Returns the raw data for the entire X.509v3 certificate. - - The raw data for the entire X.509v3 certificate. - - - - Gets the thumbprint of the certificate. - - Certificate's thumbprint. - - - - Checks whether a certificate is time valid. - - true if valid, false if not valid. - - - - Returns the intended key usage value. - - Intended key usage. - - - - Returns an array of enhanced key usage identifiers. - - An array of enhanced key usage identifiers, or null if the certificate is valid for all uses. - - - - Gets or sets a custom object associated with this particular instance of . This value is not persisted. - - - - - Returns the DSA parameters of certificate's public key. - - The DSA parameters of certificate's public key. - - - - Returns the RSA parameters of certificate's public key. - - The RSA parameters of certificate's public key. - - - - Returns the RSA parameters of certificate's public or private key. - - True if private key parameters are to be exported as well. - If set to true, the cryptographic provider should not display any user interface (UI) when exporting private key parameters. - The RSA parameters of certificate's public or private key. - - - - Returns the DSA parameters of certificate's public or private key. - True if private key parameters are to be exported as well.If set to true, the cryptographic provider should not display any user interface (UI) when exporting private key parameters. - The DSA parameters of certificate's public or private key. - - - - Checks whether a private key for this certificate is available. - - True if available, false if not available. - - - - Returns the size of the key in bits. - - Size of the key in bits. - - - - Verifies the specified signature data by comparing it to the signature computed for the specified hash value. - - The hash value of the signed data. - A hash algorithm used to create the hash value. - The signature for the specified hash value. - True if the signature verifies as valid; otherwise, false. - - - - Verifies the specified signature data by comparing it to the signature computed for the specified message. - - The message. - The signature for the specified message. - True if the signature verifies as valid; otherwise, false. - - - - Verifies the specified signature data by comparing it to the signature computed for the specified message. - - The message. - The signature for the specified message. - Signature parameters. - True if the signature verifies as valid; otherwise, false. - - - - Computes the signature for the specified hash value by encrypting it with the private key. - - The hash value of the data to be signed. - A hash algorithm used to create the hash value. - If set to true, the cryptographic should not display any user interface (UI). - The signature for the specified hash value. - -

- The private key for a certificate must be available for this method to succeed. -

-

- If silent operation is requested and the CSP must display UI to operate, this method will fail. -

-
-
- - - Computes the signature for the specified message by encrypting it with the private key. - - The message to be signed. - The signature for the specified message. - -

- The private key for a certificate must be available for this method to succeed. -

-
-
- - - Computes the signature for the specified message by encrypting it with the private key. - - The message to be signed. - Signature parameters. - The signature for the specified message. - -

- The private key for a certificate must be available for this method to succeed. -

-
-
- - - Encrypts data. - - Data to be encrypted. - Encrypted data. - - - - Decrypts data. - - Data to be decrypted. - If set to true, the cryptographic provider should not display any user interface (UI). - Decrypted data. - - If silent operation is requested and the cryptographic provider needs to display a UI to operate, this method will fail. - - - - - Verifies the validity of the certificate. - - Validation result. - - - - Verifies the validity of the certificate, including its compliance with the specified criteria. - - Validation options (not supported by CertificateChainEngine.Native engine on Xamarin.iOS and Xamarin.Android). - Validation result. - - - - Verifies the validity of the certificate, including its compliance with the specified criteria. - - The name of the server. - Validation options (not supported by CertificateChainEngine.Native engine on Xamarin.iOS and Xamarin.Android). - Validation result. - - - - Validates the specified certificate revocation list (issued by this certificate). - - Certificate revocation list to validate. - The date in which the validation takes effect; specify null (Nothing in VB.NET) to skip time validation check. - Status of the validation result. If the CRL is valid, the return value is 0. - - - - Disposes the object and releases resources. - - - Calling this method ensures that all resources are freed. - - - - - A chain engine (name space and cache) to be used to build and validate certificate chains. - - - - - Use current certificate engine if set; otherwise use engine (platform-specific). - - - - - Represents a chain of certificates. - - - A chain starts by the end certificate and each following certificate - must directly certify the one preceding it. - The last certificate in the list is a self-signed root certificate, and - may be optionally omitted under the assumption it must be known in any case. - - - - - Gets the number of certificates in the chain. - - The number of certificates in the chain. - - - - Gets or sets the certificate at the specified position. - - The certificate at the specified position - The certificate at the specified position. - - - - Gets an for the collection. - - An for the collection. - - - - Gets the certificate of the root certification authority, if available. - - Root CA certificate if available; null otherwise. - - - - Gets the first certificate in the chain, if not empty. - - Leaf certificate; null if the chain is empty. - - - - Adds a certificate to the end of the chain. - This certificate represents authority for the previous certificate in the chain - (Leaf certificate is at the beginning of the chain, Root certificate is at the end of the chain). - - The certificate to be added to the chain. - The position of the certificate in the chain. - - - - Creates an empty certificate chain. - - - - - Creates a certificate chain from an array of certificates. - - An array of certificates. - - - - Loads from the specified PKCS #7 (.p7b) file. - - Path to the file. - Instance of , never null. - The PKCS #7 file can be saved using method. - - - - Loads a PKCS #7 (.p7b) encoded from the specified file. - - Stream to load a from. - Instance of , never null. - The PKCS #7 stream can be saved using method. - - - - Builds a certificate chain for a specified certificate. - - End certificate. - The chain for an end certificate. - - This function builds a certificate chain context starting from an end - certificate and going back, if possible, to a trusted root certificate. - - - - - Verifies the validity of the certificate chain. - - Validation result. - - - - Verifies the validity of the certificate chain, including its compliance with the specified criteria. - - Validation options (not supported by CertificateChainEngine.Native engine on Xamarin.iOS and Xamarin.Android). - Validation result. - - - - Verifies the validity of the certificate chain, including its compliance with the specified criteria. - - The name of the server. - Validation options (not supported by CertificateChainEngine.Native engine on Xamarin.iOS and Xamarin.Android). - Validation result. - - - - Saves the certificate chain to the specified path as a .P7B (PKCS #7) file. - - Path to save the certificate chain file to. - - - - Saves the certificate chain to the specified stream in .P7B (PKCS #7) format. - - Stream to write the certificate chain to. - - - - Loads a chain of Base-64-encoded X509 certificates from the specified file. - - Path to a file with the certificate chain. - A certificate chain. - - - - Represents a collection of X509 v3 certificates. - - - - - Creates a new instance of . - - - - - Represents a certificate engine. - - - - - Gets or sets the LogWriter used by this object. - - Log writer. - - - - Initializes new instance of the class. - - - - - Validates given certificate chain using specified validation parameters. - - Certificate chain to validate. - Validation parameters. - Result of the validation. - - - - Builds a certificate chain from the specified certificate. - - A certificate to build the chain from. - The built certificate chain. - - - - Builds a certificate chain from the specified certificate. - - A certificate to build the chain from. - An extra store to search for intermediate and root CA certificates. - The built certificate chain. - - - - Gets the current certificate engine. - - The current certificate engine; null reference (Nothing in VB.NET) if no engine was set. - - - - Sets the current certificate engine. - - An engine to be used. - - - - Gets the default certificate engine which is used if no custom engine is set as current engine. - - - - - Certificate validation parameters for 's method. - - - - - Gets or sets validation options. - - - - - Creates a new instance of . - - - - - The exception that is thrown when a certificate-related error occurs. - - - - - Initializes a new instance of the Exception class - with a specified error message. - - The error message that explains the reason for the exception. - - - - Initializes a new instance of the Exception class - with a specified error message and a reference to the - inner exception that is the cause of this exception. - - The error message that explains the reason for the exception. - The exception that is the cause of the current exception. - - - - Represents a collection of X509 v3 certificate extensions. - - - - - Creates a certificate extension collection from an ASN.1 block. - - ASN.1 block. - - - - Gets the first with the specified object identifier. - - The object identifier, either friendly name or dotted string format. - A certificate extension, or null if not found. - - - - Represents an X509 v3 certificate extension. - - - - - Creates a new instance of . - - Extension object identifier. - Specifies whether the extension is critical. - Extension data. - - - - Create extended (enhanced) key usage extension (2.5.29.37). - - Specifies whether this extension is considered critical (not-critical extensions may be ignored by servers that don't support them). - Key usage OIDs. - An extension object. - - - - Creates a key usage extension (2.5.29.15). - - Key usage flags. - An extension object. - - - - Gets the object identifier that identifies the extension. - - The object identifier. - - - - Gets a value indicating whether the extension is critical. - - True if critical; false otherwise. - - - - Gets the extension value. - - An array of bytes in ASN.1 format. - - - - Options for methods. - - - - - No filter. - - - - - Only find certificates that have a private key. - - - - - Only find certificates that are time valid. - - - - - Only find certificates that can be used for client authentication. - - - - - Only find certificates that can be used for server authentication. - - - - - When searching by certificate issuer, include known subordinate CAs in the search as well. - - - - - The type of search for method. - - - - - Certificates whose subject key identifier (SKI) matches the specified value. - - - - - Specifies the location of the certificate store. - - - - None. - - - The store located at HKEY_CURRENT_USER\Software\Microsoft\SystemCertificates. - - - The store located at HKEY_LOCAL_MACHINE\Software\Microsoft\SystemCertificates. - - - The store located at HKEY_LOCAL_MACHINE\Software\Microsoft\Cryptography\Services\<ServiceName>>\SystemCertificates. - - - The store located at HKEY_LOCAL_MACHINE\Software\Microsoft\Cryptography\Services\<ServiceName>\SystemCertificates. - - - The store located at HKEY_USERS\<UserName>\Software\Microsoft\SystemCertificates. - - - The store located at HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates. - - - The store located at HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\SystemCertificates. - - - The store located at HKEY_LOCAL_MACHINE\Software\Microsoft\EnterpriseCertificates. - - - - Specifies the name of the certificate store. - - - - None. - - - Other users. - - - Third-party certificate authorities. - - - Intermediate certificate authorities. - - - Revoked certificates. - - - Personal certificates. - - - Trusted root certificate authorities. - - - Directly trusted people and resources. - - - Directly trusted publishers. - - - - Represents a certificate store. - - - - - Creates a temporary memory-based certificate store - and populates it with certificates from the specified collection. - - The certificate collection. - - - - Determines whether the specified certificate store exists. - - The store name value. - True if the store exists; false otherwise. - - - - Adds a certificate to this certificate store. - - Certificate to be added. - - - - Removes a certificate from this certificate store. - - Certificate to be removed. - - - - Returns all certificates matching the specified criteria. - - Specifies the type of search being made. - A byte array whose meaning is defined by 'findType'. - Options. - An array of certificates. - - - - Returns all certificates issued by the specified issuer (or its subordinate issuer) and corresponding to the specified options. - - Issuer DN. - Options. - An array of certificates. - - - - Returns all certificates with the specified serial number issued by the specified issuer (or its subordinate issuer) - and corresponding to the specified options. - - Issuer DN. - Certificate serial number. - Options. - An array of certificates. - - - - Returns all certificates issued by one of specified issuers (or their subordinate issuer) and corresponding to the specified options. - - An array of issuers' DNs. - Options. - An array of certificates. - - - - Returns all certificates issued by one of specified issuers (or their subordinate issuer) and corresponding to the specified options. - - An array of issuers' DNs. - Certificate serial number. - Options. - An array of certificates. - - - - Returns all certificates matching the specified certificate and options. - - Certificate to find. - Options. - An array of certificates. - - - - Returns all certificates corresponding to the specified options. - - Options. - An array of certificates. - - - - Returns all certificates corresponding to the specified e-mail address. - - E-mail address. - An array of certificates. - - - - Returns all certificates corresponding to the specified e-mail address and options. - - E-mail address. - Options. - An array of certificates. - - - - Disposes the object and releases resources. - - - Calling this method ensures that all resources are freed. - - - - - Represents a distinguished name. - - - - - Creates an instance of distinguished name from an ASN.1 block. - - ASN.1 block. - - - - Creates an instance of distinguished name from a DN string. - - DN string. - - - - Returns the DN's common name, if available. - - Common name; or null if not available. - - - - Returns the list of DN's e-mail addresses. - - The list of addresses. - - - - Determines whether the specified object is equal to the current object. - - Object to compare with the current object. - True if equal; false if not equal. - - - - Servers as a hash function for a particular type. Suitable for use in hashing algorithms and hash tables. - - Hash code. - - - - Converts a distinguished name into a byte array. - - Byte array. - - - - Returns a string representation of the object. - - A DN string. - - - - Converts string DN to its BER-encoded representation. - - String DN. - BER-encoded DN. - - - - Converts BER-encoded representation of DB to its string representation. - - BER-encoded DN. - String DN. - - - - Represents a collection of CRL distribution points. - - - - - Creates a new instance of . - - - - - A CRL distribution point. - - - - - Gets distribution point URL, if available. - - Distribution point URL, or null if not available. - - - - Create a new instance of a CRL distribution point that represents the specified URL. - - CRL URL. - - - - Certificate validation method options. (Not supported by CertificateChainEngine.Native engine on Xamarin.iOS and Xamarin.Android). - - - - - No options specified. - - - - - Ignore an invalid time (such as expiration). - - - - - Ignore an invalid certificate trust list time. - - - - - Ignore an invalid time nesting. - - - - - Ignore all invalid time checks (such as expiration, nesting, CRL or CTL times). - - - - - Ignore invalid basic constraints. - - - - - Allow unknown certification authority. - - - - - Ignore wrong usage of the certificate. - - - - - Ignore invalid policy. - - - - - Ignore an unknown revocation status of the end certificate. - - Not supported in builds for .NET CF. - - - - Ignore an unknown revocation status of the certificate trust list signer. - - Not supported in builds for .NET CF. - - - - Ignore an unknown revocation status of the CA certificate. - - Not supported in builds for .NET CF. - - - - Ignore an unknown revocation status of a root certificate. - - Not supported in builds for .NET CF. - - - - Ignore all unknown revocation statuses. - - - - - Not supported. - - Not supported in builds for .NET CF. - - - - Not supported. - - Not supported in builds for .NET CF. - - - - Only use local cache, do not access the network. - - Not supported in builds for .NET CF. - - - - Ignore invalid common name. - - - - - Skip certificate revocation check. - - - - - Ignore invalid chain. - - - - - Certificate validation status. - - - - - This certificate or one of the certificates in the certificate chain is not time valid. - - - - - Certificates in the chain are not properly time nested. - - - - - Trust for this certificate or one of the certificates in the certificate chain has been revoked. - - - - - The certificate or one of the certificates in the certificate chain does not have a valid signature. - - - - - The certificate or certificate chain is not valid for its proposed usage. - - - - - The certificate or certificate chain is based on an untrusted root. - - - - - The revocation status of the certificate or one of the certificates in the certificate chain is unknown. - - - - - One of the certificates in the chain was issued by a certification authority that the original certificate had certified. - - - - - One of the certificates has an invalid extension. - - - - - The certificate or one of the certificates in the certificate chain has - a policy constraints extension, and one of the issued certificates has - a disallowed policy mapping extension or does not have a required issuance - policies extension. - - - - - The certificate or one of the certificates in the certificate chain has - a basic constraints extension and either the certificate cannot be used - to issue other certificates or the chain path length has been exceeded. - - - - - The certificate or one of the certificates in the certificate chain has - an invalid name constraints extension. - - - - - The certificate or one of the certificates in the certificate chain has a name constraints extension containing unsupported fields. - - - - - The certificate or one of the certificates in the certificate chain has a name constraints extension and a name constraint is missing for one of the name choices in the end certificate. - - - - - The certificate or one of the certificates in the certificate chain has a name constraints extension and there is not a permitted name constraint for one of the name choices in the end certificate. - - - - - The certificate or one of the certificates in the certificate chain has a name constraints extension and one of the name choices in the end certificate is explicitly excluded. - - - - - The certificate chain is not complete. - - - - - A CTL used to create this chain was not time valid. - - - - - A CTL used to create this chain did not have a valid signature. - - - - - A CTL used to create this chain is not valid for this usage. - - - - - The revocation status of the certificate or one of the certificates in the certificate chain is either off-line or stale. - - - - - The end certificate does not have any resultant issuance policies, and one of the issuing CA certificates has a policy constraints extension requiring it. - - - - - The certificate chain contains a certificate with unsupported signature hash algorithm (usually SHA-2) or unsupported key algorithm (usually ECDSA). - - - - - Unknown error. - - - - - A path length constraint in the certification chain has been violated. - - - - - A certificate contains an unknown extension that is marked critical. - - - - - A certificate chain is invalid, - such as an certificate's Issuer not matching the CA's Subject or - an certificate's AKI not matching the CA's SKI. - - - - - The certificate's CN name does not match the passed value. - - - - - The certificate was explicitly marked as untrusted by the user or CA. - - - - - A certificate or CRL is malformed. - - - - - There might be more errors apart from those reported. - - - - - Certificate uses algorithm which is not considered secure on this platform. - - - - - Certificate is not trusted. - - - - - Represents the result of certificate chain validation. - - - - - Gets the status mask. - - Status mask. - - - - Gets the certificate chain validity status. - - True if valid, false if not valid. - - - - Gets the native error code returned by the validation function or zero if the native error code is not available. - - The error code returned by the validation function. - - - - Initialize instance of the . - - A validation status (use zero for success). - - - - Represents sorting order. - - - - - Ascending sort order. - - - - - Descending sort order. - - - - - Log writer acting as a container that writes log messages to all inner writers. - - - - - A cumulative log level.
- When getting, it returns the minimum level of inner writers' levels.
- When setting, the value is propagated to all inner writers. -
- Log level. -
- - - Creates a new instance of a tee log writer over given set of individual . - - A non-empty collection of log writers. - - - - Creates a new instance of a tee log writer over given set of individual . - - A non-empty array of log writers. - - - - Write a message into all inner writers. - - Message level. - Logging object type. - Logging object ID. - Logging area. - Message. - - - - Write a message and data block into all inner writers. - - Message level. - Logging object type. - Logging object ID. - Logging area. - Message. - Data block. - Data offset. - Date length. - - - - Implements the interface method IDisposable.Dispose - Use this method to explicitly release all resources hold by the inner writers. - - - - - Specifies granularity for time comparisons. - - - - - Time is taken as is. - - - Useful when working with NTFS file system. - - - - - The smallest time unit is one second (milliseconds are ignored). - E.g. 11:33:55.999 is rounded to 11:33:55.000. - - - Useful when working with some UNIX FTP or SFTP servers. - - - - - The smallest time unit is two-second. So odd seconds are rounded to lower even value (milliseconds are ignored). - E.g. 11:33:55.999 is rounded to 11:33:54.000. - - - Useful when working with FAT file system (.NET CF, MS-DOS). - - - - - The smallest time unit is one day (time component is ignored). - E.g. 2012-12-12 11:33:55.999 is rounded to 2012-12-12 00:00:00.000. - - - Useful when working with some UNIX FTP or SFTP servers. - - - - Creates an instance of class. - - - Creates an instance of class. - - - Creates an instance of class. - - - Creates an instance of class. - - - Creates an instance of class. - -
-
\ No newline at end of file diff --git a/packages/Rebex.Common.2.5.6930/lib/xamarinios10/Rebex.Common.dll b/packages/Rebex.Common.2.5.6930/lib/xamarinios10/Rebex.Common.dll deleted file mode 100644 index 273b4cd7..00000000 Binary files a/packages/Rebex.Common.2.5.6930/lib/xamarinios10/Rebex.Common.dll and /dev/null differ diff --git a/packages/Rebex.Common.2.5.6930/lib/xamarinios10/Rebex.Common.xml b/packages/Rebex.Common.2.5.6930/lib/xamarinios10/Rebex.Common.xml deleted file mode 100644 index 6bf2769e..00000000 --- a/packages/Rebex.Common.2.5.6930/lib/xamarinios10/Rebex.Common.xml +++ /dev/null @@ -1,8608 +0,0 @@ - - - Rebex.Common - - - - - Console-based log writer that writes log messages to the console. - - - - - Common base class for log writers. A derived class must override either the method or both Write methods. - - - - - Defines methods and properties all log writers must implement. - - - - - Write a message into the log. - - Message level. - Logging object type. - Logging object ID. - Logging area. - Message. - - - - Write a message and data block into the log. - - Message level. - Logging object type. - Logging object ID. - Logging area. - Message. - Data block. - Data offset. - Date length. - - - - Get or set the log level - only log messages with log level equal to or greater than the specified one. - - Log level. - - - - Creates a new instance of . - - - - - Closes the log writer. - - - - - Releases unmanaged and managed resources (depending on the scenario). - If is false, the method has been called from - the finalizer and should not reference other objects (therefore only unmanaged resources can be disposed). - - True indicates that the method has been called via IDisposable.Dispose. - False indicates that it has been called by the finalizer. - - - - Writes a message into the log. - - Message level. - Logging object type. - Logging object ID. - Logging area. - Message. - - - - Writes a message and data block into the log. - - Message level. - Logging object type. - Logging object ID. - Logging area. - Message. - Data block. - Data offset. - Date length. - - - - Appends the specified message text into a text-based log. This method is only called by method - and is only used by text-based loggers. - - Full message info. - - - - Disposes the object. - - - - - Gets or sets the log level - only log messages with log level equal to or greater than the specified one. - - Log level. - - - - Get a value indicating whether the log writer is closed. - - True when log writer is closed. False if log writer is opened and ready for writing. - Implementation in this base class returns false, as the close method actually does not close any resource. - - - - Creates a new instance of console log writer with a log level of Info. - - - - - Creates a new instance of console log writer with the specified log level. - - Log level. - - - - Writes a message into the log. - - Message level. - Logging object type. - Logging object ID. - Logging area. - Message. - - - - Writes a message and data block into the log. - - Message level. - Logging object type. - Logging object ID. - Logging area. - Message. - Data block. - Data offset. - Date length. - - - - Appends the specified message text into a text-based log. - - Full message info. - - - - Gets or sets a value that indicates whether to use console colors. - - - - - Various methods related to encoding (charset) used by Rebex components. - - - - - Gets a list of supported encoding names. - - List of encoding names. - - - - Returns the encoding associated with the specified code page name. - - Code page name. - Encoding. - - - - Returns the encoding associated with the specified code page. - - Code page. - Encoding. - - - - ASCII encoding. - - - - - Default encoding. - - - - - UTF-8 encoding. - - - - - File-based log writer that saves log messages into a text file. - - - - - Creates a new instance of file log writer based on the specified file and the default "Info" log level. - - Path to log file. - - - - Creates a new instance of file log writer based on the specified file and log level. - - Path to log file. - Log level. - - - - Dispose(bool disposing) executes in two distinct scenarios. - If disposing equals true, the method has been called directly - or indirectly by a user's code. Managed and unmanaged resources - can be disposed. - If disposing equals false, the method has been called by the - runtime from inside the finalizer and you should not reference - other objects. Only unmanaged resources can be disposed. - - If true, is called by IDisposable.Dispose. - Otherwise it is called by finalizer. - - - - Appends the specified message text into a text-based log. - - Full message info. - - - - Finalizer. Called by garbage collector during object destruction. - - - - - Path to the log file. - - - - - Get a value indicating whether the log writer is closed. - - True when logfile is closed. False if logfile is opened and ready for writing. - - - - Log level - specifies the levels of severity. - - - - - Be verbose - log everything. - - - - - Log all messages useful for debugging purposes. - - - - - Only log informative messages. - - - - - Only log errors. - - - - - The Off level designates a higher level than all the rest. - - - - - Define properties and methods for logging providers. - - - - - Gets a to use for logging. - - - - - Represents mode for interval boundaries. - - - - - Include interval boundary. - - - - - Exclude interval boundary. - - - - - Represents a file or directory item. - - - - - Gets the last modification time of the item. - - - - - Gets the last access time of the item. - - - - - Gets the creation time of the item. - - - - - Gets file length. - - - - - Gets the last modification time of the item. - - - - - Gets the last access time of the item. - - - - - Gets the creation time of the item. - - - - - Gets a value indicating whether the item is a file. - - True if the item is a file; false otherwise. - - - - Gets a value indicating whether the item is a directory. - - True if the archive item is directory; false otherwise. - - - - Gets a value indicating whether the item is a link. - - True if the archive item is a link; false otherwise. - - - - Gets the name of the file or directory. - - The name of the file or directory. - - - - Gets the path of the file or directory. - It can be relative or absolute path depending on the way of use. - - It contains a full path if returned by the GetItems method or a file/directory name only if returned by the GetList method. - The path of the file or directory. - - - - Currently executed operation. - - - - Uploading files. - - - Downloading files. - - - Deleting files. - - - Getting item list. - - - - Current traversal state of the . - - - - - Retrieving of the file system hierarchy was started. - - - - - Retrieving of the file system hierarchy was successfully completed. - - - - - Retrieving of the particular directory hierarchy was started. - - - - - Retrieving of the particular directory hierarchy was successfully completed. - - - - - Current transfer state of the . - - - - - Directory processing was started. - - - - - Processing of a file was started. - - - - - File was successfully transferred. - - - - - A file data block was processed. - - - - - The transfer action was successfully completed. - Triggered only with multi-file operations. (For single-file operations, only is triggered.) - - - - - Current delete state of the . - - - - - File processing was started. - - - - - File was successfully deleted. - - - - - Directory processing was started. - - - - - Directory was successfully deleted. - - - - - The delete action was successfully completed. - - - - - Detailed specification of a problem that occurred during a multi-file operation. - - - - - A target file with the same name already exists. - - - - - A symbolic link was detected. - - - - - Symbolic link is probably a part of an infinite loop in the file system hierarchy. - - - - - Cannot create target directory. - - - - - Cannot transfer file. - - - - - Cannot read from a directory. - - - - - Cannot find the file which was found while retrieving file system hierarchy earlier. - - - - - Name of the file is invalid on the target file system. - For example, backslash is a valid filename character on Unix FTP servers, but invalid in local Windows file system. - - - - - Name of the directory is invalid on the target file system. - For example, backslash is a valid directory name character on Unix FTP servers, but invalid in local Windows file system. - - - - - Cannot find the directory which was found while retrieving file system hierarchy earlier. - - - - - Cannot find the link which was found while retrieving file system hierarchy earlier. - - - - - Link is corrupted or its target cannot be found. - - - - - Currently processed item is neither a file nor a directory. - - - - - Operation was canceled. - - - - - Feature required to complete the operation is not supported. - - - - - Cannot delete the file. - - - - - Cannot delete the directory. - - - - - Cannot calculate checksum. - - - - - Specifies the reaction to resolve the current problem that occurred during a multi-file operation. - - - - - Cancel the whole operation. An exception with the value is thrown. - - - - - Cancel the whole operation. An exception is thrown. - - - - - Skip the current problematic item. - - - - - Retry the current operation again. - - - - - Overwrite target file with the same name. - - - - - Transfer the source file to a different name. - - - - - Resume target file. - - - - - Resolve the symbolic link. - - - - - Specifies the condition for overwriting a file. - - - - - No condition = always overwrite. - - - - - Overwrite if size differs. - - - - - Overwrite if the target file is older than the source file. - If working with remote servers, this condition is strongly discouraged - because modification dates are often misreported by FTP servers, - making this mode highly unreliable. - - - - - Overwrite if checksum differs. - Available for ZIP and FTP; only some FTP servers support checksums.
- You can check availability of this condition using method. -
-
- - - Provides data for the ProblemDetected event. - - - - - Initializes a new instance of the class (for internal use only). - - Event data. - - - - Determines whether the specified reaction is currently possible - use this to determine which reactions can be applied. - - Desired reaction. - True if the specified reaction is possible; false otherwise. - - - - Determines whether the specified overwrite condition is currently possible - use this to determine which overwrite conditions can be applied. - - Desired condition. - True if the specified condition is possible; false otherwise. - - - - Indicate to the sender that the problematic item should be skipped. - - - - - Indicate to the sender that the operation should be canceled. - - - - - Indicate to the sender that an exception should be raised. - - - - - Indicate to the sender that the operation on the current item should be retired. - - - - - Indicate to the sender that the current item should be resumed. - - - - - Indicate to the sender that the current link should be resolved. - - - - - Indicate to the sender that the current item should be renamed. - New name is generated from the current item according the pattern "filename[number].extension". - - - - - Indicate to the sender that the current item should be renamed. - - New name of the item or null (Nothing in Visual Basic) to use generated name according the pattern "filename[number].extension". - - - - Indicate to the sender that the current item should be overwritten. - - - - - Indicate to the sender that the current item should be overwritten if the specified condition is met. - - Condition for the overwrite. - - - - Gets the current transfer action. - - Current transfer action. - - - - Gets the exception which will be raised if chosen Reaction is . - - Exception. - - - - Gets the type of the error that classifies the problem. - - Problem type. - - - - Gets the path of the local file or directory that is currently processed. - - Local path. - - - - Gets the local file or directory that is currently processed or null (Nothing in Visual Basic) if not available. - - Local item. - - - - Gets the path of the remote file or directory that is currently processed. - - Remote path. - - - - Gets the remote file or directory that is currently processed or null (Nothing in Visual Basic) if not available. - - Remote item. - - - - Gets the currently selected reaction to the current problem. - - The operation to be performed as the next step of the multi-file operation execution. - - - - Gets the condition to apply for the Overwrite reaction. - If the chosen reaction is not Overwrite, this property is ignored. - - Overwrite condition. - - - - Gets the new name for the currently processed file or directory. - If the chosen reaction is not Rename, this property is ignored. - - New name. - - - - Gets a user state object. - - User state object. - - - - Provides data for the Traversing event. - - - - - Initializes a new instance of the class (for internal use only). - - Event data. - - - - Gets the current transfer action. - - Current transfer action. - - - - Gets the current traversing state of the current . - - Current traversing state of the current . - - - - Gets the file or directory which is currently processed. - - Currently processed item. - - - - Gets the current total number of files to be processed (traversed so far). - - Current total number of files to be processed (traversed so far). - - - - Gets the current total number of bytes to be processed (traversed so far). - - Current total number of bytes (traversed so far). - - - - Gets a user state object. - - User state object. - - - - Provides data for the TransferProgressChanged event. - - - - - Initializes a new instance of the class (for internal use only). - - Event data. - - - - Gets the current transfer action. - - Current transfer action. - - - - Gets the current transfer state of the current . - - Current transfer state of the current . - - - - Gets the file or directory which is currently processed. - - Currently processed item. - - - - Gets the target path of the file or directory which is currently processed. - - Target path. - - - - Gets the total number of bytes transferred during the transfer of the current file. - - The number of bytes transferred. - - - - Gets the total number of files to be transferred. - - Number of files. - - - - Gets the number of files that were already processed (either transferred or skipped). - - Number of files. - - - - Gets the number of files that were already successfully transferred. - - Number of files. - - - - Gets the total number of bytes to be transferred. - - Number of bytes. - - - - Gets the total number of bytes transferred. - - Number of bytes. - - - - Gets the number of bytes transferred during the current transfer since the last time the event was raised. - - The number of bytes transferred since the last time the event was raised. - - - - Gets the current transfer speed in bytes transferred per second (or 0 if not available). - - An estimate of the current speed in number of bytes per second. - Value of 0 indicates that this information is not available. - - - - Gets a number between 0 and 100 representing the percentage of completeness of the operation. - - Percentage value (0..100). - - - - Gets a number between 0 and 100 representing the percentage of completeness of the current file transfer. - - Percentage value (0..100). - - - - Provides data for the DeleteProgressChanged event. - - - - - Initializes a new instance of the class (for internal use only). - - Event data. - - - - Gets the current delete state of the current . - - Current delete state of the current . - - - - Gets the file or directory which is currently processed. - - Remote item. - - - - Gets the total number of files to be deleted. - - Number of files. - - - - Gets the number of files that were already processed (either deleted or skipped). - - Number of files. - - - - Gets the number of files that were already successfully deleted. - - Number of files. - - - - Gets a number between 0 and 100 representing the percentage of completeness of the operation. - - Percentage value (0..100). - - - - Specifies checksum algorithm. - - - - - SHA-1 checksum. - - - - - SHA-256 checksum. - - - - - SHA-384 checksum. - - - - - SHA-512 checksum. - - - - - MD5 checksum. - - - - - SHA-224 checksum. - - - - - Request CRC32 checksum. - - - - - Represents data checksum. - - - - - Returns checksum data. - - - - - - Creates an instance of an object that represents data checksum. - - Checksum algorithm used to compute the checksum. - Checksum data. - - - - Implicit conversion from to string. - - Checksum to convert to string. - Hex string representation of the checksum. - - - - Comparest the checksum with another object of the same type and returns a value indicating whether - the current instance precedes, follows or occurs in the same position in the sort order. - - Object to compare with this instance. - A value that indicates the relative order of checksums being compared. - - - - Returns a value indicating whether the specified object is equal to this checksum. - - Object to compare with this instance. - True if the two instances are same type and represent the same checksum. - - - - Returns the hash code for this checksum. - - - - - - Returns a hex string representation of this checksum. - - Hex string representation of this checksum. - - - - Returns checksum algorithm. - - - - - Returns a hex string representation of the checksum. - - - - - Specifies modes of the method. - - - - - Specifies whether the specified regular file matches the the . - - - - - Specifies whether the specified directory matches the the . - - - - - Specifies whether the specified directory should be traversed to retrieve another matches. - - - - - Set of inclusion and exclusion patterns. - It doesn't depend on the order how the inclusion and exclusion patterns are added into the . - - - - - Initializes a new instance of the class. - - - - - Initializes a new instance of the class. - - A path to be considered as a base path of the set. - - - - Initializes a new instance of the class. - - Directory separators to be used in all paths. - - - - Initializes a new instance of the class. - - A path to be considered as a base path of the set. - Directory separators to be used in all paths. - - - - Initializes the object. - - A path to be considered as a base path of the set. - A path or mask relative to a base path which define an initial inclusion pattern. - - - - Initializes the object. - - A path to be considered as a base path of the set. - A path or mask relative to a base path which define an initial inclusion pattern. - Specifies traversal mode of directories for the . - - - - Adds a path or mask into collection of inclusion patterns. The supported wildcards are '?' and '*' and '**'. - For detailed specification with examples see the documentation. - - A path or mask (relative to the base path) which define an inclusion pattern. - - - - Adds a path or mask into collection of inclusion patterns. The supported wildcards are '?' and '*' and '**'. - For detailed specification with examples see the documentation. - - A path or mask (relative to the base path) which define an inclusion pattern. - Specifies traversal mode of directories for the . - - '?' matches any single character.
- '*' matches any number of any characters except the directory separators.
- '**' matches any number of any characters (directory separators can be reduced e.g. "a\**\b" is equivalent to "a\**\**\b" which matches "a\x\y\z\b" and also "a\b" but not "ab").
- - - - - - - - - - - - - - -
data\file-???.txtMatches files within the "data" directory e.g. "data\file-007.txt", but not "data\file-7.txt".
data\*.txtMatches any ".txt" file within the "data" directory (only within the "data" directory, not in subdirectories) e.g. "data\file.txt", but not "data\a\b\c\file.txt".
data\**\*.txtMatches any ".txt" file anywhere within the "data" directory and its subdirectories e.g. "data\file.txt" and also "data\a\b\c\file.txt".
-
-
- - - Adds a path or mask into collection of exclusion patterns. The supported wildcards are '?' and '*' and '**'. - For detailed specification with examples see the documentation. - - A path or mask (relative to the base path) which define an exclusion pattern. - - - - Adds a path or mask into collection of exclusion patterns. The supported wildcards are '?' and '*' and '**'. - For detailed specification with examples see the documentation. - - A path or mask (relative to the base path) which define an exclusion pattern. - Specifies traversal mode of directories for the . - - '?' matches any single character.
- '*' matches any number of any characters except the directory separators.
- '**' matches any number of any characters (directory separators can be reduced e.g. "a\**\b" is equivalent to "a\**\**\b" which matches "a\x\y\z\b" and also "a\b" but not "ab").
- - - - - - - - - - - - - - -
data\file-???.txtMatches files within the "data" directory e.g. "data\file-007.txt", but not "data\file-7.txt".
data\*.txtMatches any ".txt" file within the "data" directory (only within the "data" directory, not in subdirectories) e.g. "data\file.txt", but not "data\a\b\c\file.txt".
data\**\*.txtMatches any ".txt" file anywhere within the "data" directory and its subdirectories e.g. "data\file.txt" and also "data\a\b\c\file.txt".
-
-
- - - Returns a value indicating whether the specified relative path matches the . - This method is intended to be overwritten by descendants. - In this case please note that for optimization issues when called with parameters equal to "." and - this method should return false if no inclusion pattern was specified; true otherwise. - - A relative path to a base path to be tested for a match. - Specifies how the should be treated for match. - True if the path matches the set; false otherwise. - - - - Gets a collection of local file system items (files and directories) which matches this . - Only items which matches no exclusion pattern and matches at leas one inclusion pattern are included into result collection. - It doesn't depend on the order how the inclusion and exclusion patterns were added into the .
- If you don't want to include empty directories into result collection, please set the to false. -
- A collection of local file system items which matches this . -
- - - Gets or sets the base path of the set. - - A path to be considered as a base path of the set. - - - - Gets or sets a value indicating whether the is case sensitive. - - True if the is case sensitive; false otherwise. - - - - Gets or sets a value indicating whether a consumer of the should include empty directories or not. - Also used in the method. - - True if empty directories should not be included; false otherwise. - - - - Gets or sets a value indicating whether a consumer of the should also include directories where the files are located. - Also used in the method. - Example: Ftp.GetItems("DIR/*.txt") - this property determines whether item "DIR" should be also included in output collection. - - True if directories where the files are located should be included; false otherwise. - - - - Gets or sets a value indicating whether a consumer of the should flatten the output. - Flatten means to don't persist directory structure. - For example if used to upload files "A/a.txt" and "B/b.txt" to the "/data" directory on a FTP server, - files "a.txt" and "b.txt" are uploaded directly into the "/data" directory - (directories "A" and "B" are not created in the "/data" directory). - - True if flatten the output; false otherwise. - - - - The exception that is thrown when an error occurs while using Rebex FileSystem. - - - - - Initializes a new instance of the class. - - - - - Initializes a new instance of the class. - - - - - Initializes a new instance of the class. - - - - - Represents a file system provider. - - This type is not intended to be used directly from your code. To implement custom file system providers, - add reference to the Rebex.FileSystem assembly and use one of the following base classes. - - - - Constructor. - - - - - Performs application-defined tasks associated with freeing, releasing, or resetting resources. - - 2 - - - - Derived classes must create a child file system with the root path equals to the . - - Root path of the child file system. - Child file system with the root path equals to the . - - - - Releases the resources used by the . - - true to release both managed and unmanaged resources; false to release only unmanaged resources. - - - - Configuration options for the . - - - - - Initializes new instance of the . - - - - - Gets or sets value indicating - whether the method is called for directories. - - Default value is false. - - - - - Gets or sets value indicating - whether the strict checks for is enabled. - - Default value is false. - - Enable strict checks only for debugging purposes. Do not use strict checks in production. - - - - - Gets or sets value indicating - whether the method is called for directories. - - Default value is false. - - - - - Gets or sets value indicating - whether the method is called for directories. - - Default value is false. - - - - - Gets or sets used for logging. - - Default value is null. - - - - - Gets or sets default used by the classes - inherited from the - and . - - - - - Represents basic type of the Rebex file system. - - - - - Read only Rebex file system. - - - - - Read-write Rebex file system. - - - - - Represents an attributes of the node. - - - - - Initializes a new instance of the - - of the node - - - Indicates whether the current object is equal to another object of the same type. - true if the current object is equal to the parameter; otherwise, false. - An object to compare with this object. - - - - - - - - - - Determines whether two specified have the same value. - - The first to compare, or null. - The second to compare, or null. - true if the value of left is the same as the value of right, otherwise false. - - - - Determines whether two specified have different values. - - The first to compare, or null. - The second to compare, or null. - true if the value of left is different from the value of right; otherwise false. - - - Returns a string that represents the current . - A string that represents the current . - 2 - - - - Gets the file atttributes of the node. - - - - - Gets a value indicating whether the .ReadOnly flag is set. - - true if the the .ReadOnly flag is set, otherwise false. - - - - Represents a content of a file. - - - - Performs application-defined tasks associated with freeing, releasing, or resetting resources. - 2 - - - - Method creates read only content from the given . - - Stream containing the content of the node. - New read only content. - - - - - - Method creates read/delayed write content from the given stream. - Use this method when following is desired/acceptable behavior: -
  • Underlying stream does not support immediate writing to the file.
  • When previously returned from this method is disposed - and underlying stream has been changed, then - the method method - in the is called.
- Stream containing the content of the node. - New read/delayed write content. - - -
- - - Method creates read/immediate write content from the given stream. Use this method when following is desired/acceptable behavior: -
  • Stream supports immediate writing to the file (e. g. ).
  • SaveContent method in ReadWriteFileSystemProvider is NEVER called. All data are written immediately using the suitable write methods.
- Stream containing the content of the node. - New read/immediate write content. - - -
- - - Returns with the content of the file. - - Stream with the content of the file. - - - - Gets a value indicating whether underlying stream of this instance is read only. - - true if the content is read only, otherwise false. - - - - Returns a value indicating whether this node's stream was closed forcefully. - Forceful close occurs if the stream is not gracefully closed by the consumer. - - - - - Represents read, write or read/write access to the file. - - This enumeration has a attribute that allows a bitwise combination of its member values. - - - - - Read access to the file. - - - - - Write access to the file. - - - - - Read and write access to the file. - - - - - Represents retrieval parameters. - - - - - Represents read access requirement. - - - - - Represents write access requirement. - - - - - Represents read and write access requirement. - - - - - Initializes a new instance of the - Required access type to the file. - - - - - - - - - - - - - Determines whether two specified have the same value. - - The first to compare, or null. - The second to compare, or null. - true if the value of left is the same as the value of right, otherwise false. - - - - Determines whether two specified have different values. - - The first to compare, or null. - The second to compare, or null. - true if the value of left is different from the value of right; otherwise false. - - - Returns a string that represents the current . - A string that represents the current . - 2 - - - - Gets required access type to the file. - - - - - Representats a file system path. - - - - - Used directory separator. - - - - - Name of the root directory. - - - - - Represents the empty . - - - - - Initializes a new instance of the . - - Examples of the valid path: - - / - - /dir1 - - /dir1/ - - /dir1/dir2 - - /dir1/dir2/ - - /dir1/dir2/file.txt - - path in the string format - Exception is thrown when the is malformed. - - - - Returns an array of characters not allowed in . - - - - - Gets an enumerator that iterates through the elements of this path. - - - - Indicates whether the current is equal to another . - true if the current object is equal to the parameter; otherwise, false. - An to compare with this . - - - - Returns a subpath that is a subsequence of the parts of this path. - Subpath starts with the first part (on the index 0) of this path - and ends with the part on the index . - Root path ('/') does not have any subpath. - For the with the path '/dir1/dir2/file.txt'; - - GetSubPath(0) returns '/dir1'. - - GetSubPath(1) returns '/dir1/dir2'. - - GetSubPath(2) returns 'dir1/dir2/file.txt'. - - GetSubPath(3) throws . - - Zero based index of the end part of the subpath. - A subpath that is a subsequence of the parts of this path. - - - Determines whether the specified is equal to the current . - true if the specified is equal to the current ; otherwise, false. - The object to compare with the current object. - 2 - - - - Creates new with added to the end of this . - - New part of the path. - New with the added to the end of this . - - - - Creates new with added to this . - - The new extension. - New with the added to this . - - - - Creates new based on this and with the new . - - The new extension. - New based on this and with the new . - - - - Creates new based on this and with the extension deleted. - - New based on this and with the extension deleted. - - - - Tests if this starts with the given . - - Given . - True if this starts with the given , otherwise false. - - - - Determines whether two specified have the same value. - - The first path to compare, or null. - The second path to compare, or null. - true if the value of left is the same as the value of right, otherwise false. - - - - Determines whether two specified have different values. - - The first path to compare, or null. - The second path to compare, or null. - true if the value of left is different from the value of right, otherwise false. - - - Returns a string that represents the current . - A string that represents the current . - 2 - - - - Convert the value of the to the string representation. - - The to cast to . - - - - Convert the value of to the instance of the . - - The path to convert to the . - Exception is thrown when the is malformed. - - - - Combines strings in the array into a . - - - New combined from the strings in the array. - - - - Indicates whether the specified is null or an instance of the . - - The to test. - true if the parameter is null or an instance of the ; - otherwise false. - - - - - - - Gets the name of the - or the . - - - - - Gets the name without an extension. - - - - - Indicates whether a path contains file name extension. - - True if path contains file name extension, otherwise false. - - - - Gets an enumerator that iterates through the elements of this path. - - - - - Gets the parent path, or path if this path does not have parent. - - - - - Gets the file name extension, or if this path does not have extension. - - - - - Returns true if this path equals to path, otherwise returns false. - - - - - Returns this as a . - - - - - Indicates if this instance is the root path ('/'). - - True if this instance is the root path, otherwise false. - - - - Returns an element of this path. - - Index of the element to return. - An element of this path. - - - - Gets the IEqualityComparer that is used to determine equality of . - - - - - Returns the number of elements in the path. - - The number of elements in the path. - - - - The exception that is thrown when an error occurs while creating new . - - - - - Initializes a new instance of the class - - - - - Initializes a new instance of the class - - - - - Initializes a new instance of the class - - - - - Holds the last access time, the last write time and the creation time of the node. All dates are expressed as UTC. - - Immutable type. - - - - Initializes a new instance of the . - - Creation time of the node (expressed as UTC). - Last access time of the node (expressed as UTC). - Last write time of the node (expressed as UTC). - - Missing or null parameters will have default value . - Time values with 'local' or 'unspecified' kind are converted to UTC automatically. - - - - - - - - Creates new instance with all properties equals to the current - instance properties except the property , which is set to value. - - New creation time (expressed as UTC). - New instance with all properties equals to the current - instance properties except the property , which is set to value. - - - - Creates new instance with all properties equals to the current - instance properties except the property , which is set to value. - - New last access time (expressed as UTC). - New instance with all properties equals to the current - instance properties except the property , which is set to value. - - - - - Creates new instance with all properties equals to the current - instance properties except the property , which is set to value. - - New last write time (expressed as UTC). - New instance with all properties equals to the current - instance properties except the property , which is set to value. - - - - - Indicates whether the specified is null or an NodeTimeInfo. - - The to test. - true if the parameter is null or an NodeTimeInfo ("CreationTime=LastAccessTime=LastWriteTime=DateTim.MinValue"), - otherwise false. - - - - Determines whether two specified have the same value. - - The first to compare, or null. - The second to compare, or null. - true if the value of left is the same as the value of right, otherwise false. - - - - Determines whether two specified have different values. - - The first to compare, or null. - The second to compare, or null. - true if the value of left is different from the value of right; otherwise false. - - - - - - - - - - - - - Represents the empty . - - - Empty has - == - and - == - and - == . - > - - - - Creation time of the node (expressed as UTC). - - - - - Last access time of the node (expressed as UTC). - - - - - Last write time of the node (expressed as UTC). - - - - - The type of the file system node. - - - - - Invalid value. - - - - - File node. - - - - - Directory node. - - - - - Link node (unused). - - - - - Specifies all node types, including File, Directory and Link. - - - - - Provides a container for a collection of objects. - - - - - Initializes a new instance of the class. - - - - - Validates whether the item is correct and can be added. - - Item to add. - - - - Gets an for the collection. - - An for the collection. - - - - Adds the elements of the specified collection to the end of the FileSystemItemCollection. - - The collection whose elements should be added to the end of the FileSystemItemCollection. - - - - Adds the specified item to the collection. - - The item to be added to the collection. - - - - Removes the specified item from the collection. - - The item to remove from the collection. - - True if item was successfully removed from the collection; false otherwise. - - - - - Removes the item with the specified path from the collection. - - The path of an item to remove from the collection. - - - - Removes the item at the specified index from the collection. - - The zero-based index of the item to remove. - - - - Removes all items from the collection. - - - - - Copies the range of elements from the collection to a one-dimensional - array, starting at the specified index of the target array. - - One-dimensional zero-based array that is the destination of the elements copied from the collection. - A zero-based index in the destination array at which copying begins. - - - - Determines whether the item is in the collection. - - The item to locate in the collection. - True if the item is located in the collection; false otherwise. - - - - Determines whether the item with the specified path is in the collection. - - The path to locate in the collection. - True if the item with the specified path is located in the collection; false otherwise. - - - - Gets the total size of files contained in the collection. - - The total size of files contained it the collection. - - - - Returns the paths of files in the collection that match the specified search pattern. - - The regular expression to match the paths or filenames against. - A array containing the paths or names of files in the specified directory that match the specified search pattern. - - The method works in two different modes (determined by property): - Filenames without path are searched and returned. This mode is used by default for collections returned by GetList method.Filenames with path are searched and returned. This mode is used by default for collection returned by GetItems method. - - - - Returns the names of files in the collection that match the specified search pattern. - - The search string to match the items against. - If tree, perform unix-like case-sensitive matching. - A array containing the names of files in the specified directory that match the specified search pattern. - -

The following wildcards are permitted in searchPattern:
* - Zero or more characters.
? - Exactly one character.
- Characters other than the wildcards represent themselves. - For example, the searchPattern string "*.txt" searches for all names/paths - ending with the ".txt". The searchPattern string "s*" searches for all - names/paths beginning with the letter "s". -

-

- The method works in two different modes (determined by property): - Filenames without path are searched and returned. This mode is used by default for collections returned by GetList method.Filenames with path are searched and returned. This mode is used by default for collection returned by GetItems method.

-
-
- - - Returns the names of files in the collection that match the specified search pattern. - - The search string to match the items against. - A array containing the names of files in the specified directory that match the specified search pattern. - -

The following wildcard specifiers are permitted in searchPattern:
* - Zero or more characters.
? - Exactly one character.
- Characters other than the wild card specifiers represent themselves. - For example, the searchPattern string "*t" searches for all names in path - ending with the letter "t". The searchPattern string "s*" searches for all - names in path beginning with the letter "s". -

-

- The method works in two different modes (determined by property): - Filenames without path are searched and returned. This mode is used by default for collections returned by GetList method.Filenames with path are searched and returned. This mode is used by default for collection returned by GetItems method.

-
-
- - - Sorts the items in the entire collection alphabetically. - - - - - Sorts the elements in the entire collection using the specified comparer. - - The implementation to use when comparing elements, or a null reference to sort alphabetically. - - - - Sorts the elements in a section of the collection using the specified comparer. - - The zero-based starting index of the range to sort. - The length of the range to sort. - The implementation to use when comparing elements, or a null reference to sort alphabetically. - - - - Gets an object that can be used to synchronize access to the collection. - - An object that can be used to synchronize access to the collection. - - - - Gets the number of elements contained in the collection. - - The number of elements contained in the collection. - - - - Gets the item at the specified index. - - A zero-based index of the item to get. - Item at the specified index. - - - - Gets the item of the specified path. - - The path of the item to get. - Item with the specified path, or null if not found. - - - - Gets or sets a value that indicates whether to use a Path or Name for pattern matching - and return values in the method. - - - - - List of possible compare types for the FileSystemItemComparer class. - - - - - Compare by . - - - - - Compare by . - - - - - Compare by creation date and time of the item. - - - - - Compare by last modification date and time of the item. - - - - - Compare by last access date and time of the item. - - - - - Compare by type of the item (directory/file/link). - - - - - Class used to compare objects. - - - - - Creates a new instance of FileSystemItemComparer with default sorting by file name and with ascending sort mode. - - - - - Creates a new instance of FileSystemItemComparer with specified comparer type and ascending sort mode. - - Type of the comparer. - - - - Creates a new instance of FileSystemItemComparer with specified comparer type and sort mode. - - Type of the comparer. - Sorting order. - - - - IComparer interface implementation. Compares two instances of . - - First object to compare. - Second object to compare. - Value greater than zero when x is greater then y, zero when they are equal, or less than zero when x is lesser than y. - - - - Specifies how a search pattern is treated (how to traverse a hierarchy of directories). - - - See Using TraversalMode blog post for samples. - - - - - Performs shallow search for files and directories; do recursive transfer of matching directories.
- Shallow search means that items are searched only in the first level of given directory.
- If the pattern matches a file, the file is processed.
- If the pattern matches a directory, all files and subdirectories are processed. -
-
- - - Performs shallow search for files and directories; do non-recursive transfer of matching directories.
- Shallow search means that items are searched only in the first level of given directory.
- If the pattern matches a file, the file is processed.
- If the pattern matches a directory, only the directory itself is processed (without any content = empty directory will be created). -
-
- - - Performs shallow search for files only. This is the same as mode, but only files are processed.
- Shallow search means that files are searched only in the first level of given directory. -
-
- - - Performs deep search for files only. This is like DOS xcopy deep file search.
- Deep search means that files are searched in the given directory and also in all its subdirectories.
- However, if this mode is used in GetItems method, returned collection will also contains directories where the files were found. -
- - This behavior is useful in situations where you need to prepare the containing directory before the file is processed. - To get only files, just use Linq like this: collection.Where(item => !item.IsDirectory) -
- - - Specifies the default action to perform when a target file already exists. - However, the default action can still be changed using the ProblemDetected event. - - - - - Existing files are to cause the whole multi-file transfer to be canceled and an exception to be raised. - - - - - Existing files are to be always skipped. - - - - - Existing files are to be always overwritten. - - - - - Existing files are to be overwritten if they are older than source files. - This is strongly discouraged because modification dates are often misreported by FTP and SFTP servers, making this mode highly unreliable. - We strongly recommend to use a different mode or develop a custom solution using the ProblemDetected event. - - - - - Existing files with different sizes are to be overwritten. - - - - - Existing files are to be resumed if they are smaller than source files. - - - - - Existing files are to be renamed according the pattern "filename[number].extension". - You can still change the generated name using the ProblemDetected event and the method. - - - - - Existing files with different checksum are to be overwritten.
- Works on FTP and ZIP only. ZIP uses CRC-32 always; FTP uses checksums provided by the server (some FTP servers support no checksums). -
-
- - - Specifies behavior on links and reparse points in multi-file operations. - - - - - Detected links are to be resolved and processed - however, this can still be changed by ProblemDetected handler. - - - - - Detected links are to be skipped - however, this can still be changed by ProblemDetected handler. - - - - - Detected links cause an exception to be thrown - however, this can still be changed by ProblemDetected handler. - - - - - Specifies link type. - - - - - Symbolic link (symlink). - - - - - Hard link. - - - - - Specifies the method of the transfer. - - - - - Items are copied. - - - - - Items are moved to the target destination (items are deleted in the source location). - - - - - Specifies the behaviour of the . - - - - - All items (files and directories) are moved to the target destination deleting them in the source location. - - - - - Only files are moved to the target destination. Directories remain (not deleted) in the source location. - - - - - Specifies which date/time to restore. - - - - - Restore no date/time. - - - - - Restore CreationTime. - - - - - Restore LastWriteTime. - - - - - Restore LastAccessTime. - - - - - Restore all date and times. - - - - - Represents a file or directory on the local file system. - - - - - Initializes a new instance of the class. - - Path to a file or directory on the local file system. - - - - Gets the last modification time of the item. - - - - - Sets the last modification time of the item. - - The last modification time. - - - - Gets the last access time of the item. - - - - - Sets the last access time of the item. - - The last access time. - - - - Gets the creation time of the item. - - - - - Sets the creation time of the item. - - The creation time. - - - - Returns the full path of the item. - - The full path of the item. - - - - Deletes the local item. - - - - - Gets the list of file items in a directory represented by this object. - Fails if this object is not a directory. - - - This is only valid for directories. - - List of file items. - - - - Gets the list of directory items in a directory represented by this object. - Fails if this object is not a directory. - - - This is only valid for directories. - - List of directory items. - - - - Computes the CRC32 (Cyclic Redundancy Check) value of the file. - - - This is only valid for files. - - - CRC32 checksum value. - - - - - Calculates the checksum for the specified file. - - Path to the file. - Desired checksum algorithm. - Checksum of the specified file. - - - - Calculates the checksum of the specified part of the specified file. - - Path to the file. - Desired checksum algorithm. - The offset in the local file at which to start processing. - The maximum number of bytes to process. - /// Checksum of the specified file. - - - Gets a value indicating whether the file or directory exists. - - True if the file or directory exists; false otherwise. - - - - Gets file length. - - - - - Gets a value indicating whether the item is a file. - - True if the item is a file; false otherwise. - - - - Gets a value indicating whether the item is a directory. - - True if the archive item is directory; false otherwise. - - - - Gets a value indicating whether the item is a link. - - True if the archive item is a link; false otherwise. - - - - Gets the name of the file or directory. - - The name of the file or directory. - - - - Gets the relative path of the file or directory. - - The relative path of the file or directory. - - - - Gets the full path of the file or directory. - - The full path of the file or directory. - - - - Gets item attributes. - - - - - Provides a container for a collection of objects. - - - - - Initializes a new instance of the class. - - - - - Validates whether the item is correct and can be added. - - Item to add. - - - - Adds the item to the collection. - - The item to be added to the collection. - - - - Adds the item to the collection. - - The item to be added to the collection. - - - - Adds the elements of the specified collection to the end of the LocalItemCollection. - - The collection whose elements should be added to the end of the FtpItemCollection. - - - - Adds the elements of the specified collection to the end of the LocalItemCollection. - - The collection whose elements should be added to the end of the FtpItemCollection. - - - - Determines whether the item is in the collection. - - The item to locate in the collection. - True if the item is located in the collection; false otherwise. - - - - Determines whether the item is in the collection. - - The item to locate in the collection. - True if the item is located in the collection; false otherwise. - - - - Determines whether the item with the specified path is in the colleciton. - - The path to locate in the collection. - True if the item with the specified path is located in the collection; false otherwise. - - - - Copies the range of elements from the collection to a one-dimensional - array, starting at the specified index of the target array. - - One-dimensional zero-based array that is the destination of the elements copied from the collection. - A zero-based index in the destination array at which copying begins. - - - - Removes the specified item from the collection. - - The item to remove from the collection. - - True if item was successfully removed from the collection; false otherwise. - - - - - Removes the specified item from the collection. - - The item to remove from the collection. - - True if item was successfully removed from the collection; false otherwise. - - - - - Gets an for the collection. - - An for the collection. - - - - Gets the item at the specified index. - - A zero-based index of the item to get. - Item at the specified index. - - - - Gets the item of the specified path. - - The path of the item to get. - Item with the specified path, or null if not found. - - - - License key infrastructure for trial versions of Rebex components. - - - - - Gets or sets the license key. - - License key. - - - - Gets collection of license keys. - - - - - Class for chained comparison of objects. - - - - - Creates a new instance of MultiComparer. - - An array of comparers to use. - - - - IComparer interface implementation. Compares two instances of provided objects. - - The first object to compare. - The second object to compare. - - A signed integer that indicates the result of of x and y comparison. - Value Less than zero means x is less than y. Zero x equals y. Greater than zero x is greater than y. - - - - - SSPI data representation. - - - Only supported on Windows platforms. - - - - Native. - - - - SSPI requirements flag. - - - Only supported on Windows platforms. - - - - - Wrapper class for SSPI authentication. - - - Only supported on Windows platforms. - - - - - Creates a new SSPI session. - - Authentication package. - Data representation. - Target name. - Requirements. - User name. - Password. - User domain - - Only supported on Windows platforms. - - - - - Disposes the SSPI session. - - - - - Get next SSPI message. - - Challenge. - Receives a value indicating whether the SSPI has finished. - Next SSPI message. - - Only supported on Windows platforms. - - - - - The hash algorithm used to compute the hash for hash signing - and verification methods. - - - - - Unsupported hash algorithm. - - - - - MD5. - - - - - SHA1. - - - - - MD5SHA1. - - - - - SHA-256. - - - - - SHA-384. - - - - - SHA-512. - - - - - MD4. - - - - - The key algorithm for the certificate. - - - - - Unsupported key algorithm. - - - - - RSA. - - - - - DSA. - - - - - Elliptic Curve DSA. - - - - - ED25519. - - - - - Intended key usage. - - - - Digital signature. - - - Non-repudiation. - - - Key encipherment. - - - Data encipherment. - - - Key agreement. - - - Certificate signing. - - - CRL signing. - - - Key encipherment only. - - - Key decipherment only. - - - - Key set options. - - - - Imported keys are marked as exportable. - - - The user is to be notified through a dialog box or other method when certain attempts to use this key are made. - - - Private keys are stored under the local computer and not under the current user. - - - Private keys are stored under the current user and not under the local computer even if the PFX BLOB specifies that they should go into the local computer. - - - Private keys are persisted on disk when importing a certificate - - - Always load the key into CNG key storage provider. Only supported on Windows Vista or higher. - - - Load the key into CNG key storage provider if possible. Only supported on Windows Vista or higher. - - - - Specifies certificate file format. - - - - Binary DER encoded X.509 certificate. - - - Base-64 encoded DER X.509 certificate. - - - P12/PFX certificate with private key. - - - - Represents an X509 v3 certificate. - - - - - Loads a certificate from an array. - - An array containing DER encoded certificate data. - - - - Loads a DER encoded certificate from the specified file. - - Path to a file. - A certificate. - - - - Loads a DER encoded certificate from the specified stream. - - Stream to load a certificate from. - A certificate. - - - - Loads a DER encoded certificate and a private key (in PKCS #8, PuTTY or SSLeay format) from the specified files. - - Path to a certificate file. - Path to the private key file. - Private key password. - A certificate. - - - - Loads a DER encoded certificate and a private key (in PKCS #8, PuTTY or SSLeay format) from the specified streams. - - Stream with the certificate. - Stream with the private key. - Private key password. - A certificate. - - - - Associates the supplied private key with the certificate to perform operations that need a private key. - - An instance of RSA, DSA, RSACryptoServiceProvider or DSACryptoServiceProvider. - - - - Associates the supplied private key with the certificate to perform operations that need a private key. - - The private key. - - - - Associates the supplied private key with the certificate to perform operations that need a private key. - - The private key. - - - - Associates the supplied private key with the certificate to perform operations that need a private key. - - An instance of RSA, DSA, RSACryptoServiceProvider or DSACryptoServiceProvider. - Specifies whether to permanently bind the certificate to the specified CSP. - - - - Associates the supplied private key with the certificate to perform operations that need a private key. - - The private key. - Specifies whether to permanently bind the certificate to the specified CSP. - - - - Associates the supplied private key with the certificate to perform operations that need a private key. - - The private key. - Specifies whether to permanently bind the certificate to the specified CSP. - - - - Loads a certificate with a private key from a PKCS#12 (PFX) file. - - Path to a file. - Encryption password. - A certificate with private key. - - - - Loads a certificate with a private key from a PKCS#12 (PFX) array. - - An array containing DER encoded PKCS#12 data. - Encryption password. - A certificate with private key. - - - - Loads a certificate with a private key from a PKCS#12 (PFX) file. - - Path to a file. - Encryption password. - Key set options. - A certificate with private key. - - - - Loads a certificate with a private key from a PKCS#12 (PFX) array. - - An array containing DER encoded PKCS#12 data. - Encryption password. - Key set options. - A certificate with private key. - - - - Saves the certificate to the supplied file in DER format. - - Path to the file to save the certificate to. If the file exists, it is overwritten. - - - - Saves the certificate to the supplied stream in DER format. - - Stream to save the certificate to. - - - - Saves the certificate to the supplied file in specified format. - - Path to the file to save the certificate to. If the file exists, it is overwritten. - Certificate format. - - - - Saves the certificate to the supplied stream in specified format. - - Stream to save the certificate to. - Certificate format. - - - - Saves the certificate to the supplied file in specified format. - - Path to the file to save the certificate to. If the file exists, it is overwritten. - Certificate format. - Password (only used by PFX/P12 format). - On .NET Compact Framework, this is only supported in Windows CE 5.0 or later. - - - - Saves the certificate to the supplied stream in specified format. - - Stream to save the certificate to. - Certificate format. - Password (only used by PFX/P12 format). - On .NET Compact Framework, this is only supported in Windows CE 5.0 or later. - - - - Saves the certificate's private key to the supplied file. - - Path to the file to save the certificate to. If the file exists, it is overwritten. - Private key password. - Private key file format. - If set to true, the cryptographic provider should not display any user interface (UI) when exporting private key parameters. - - - - Saves the certificate's private key to the supplied stream. - - Stream to save the private key to. - Private key password. - Private key file format. - If set to true, the cryptographic provider should not display any user interface (UI) when exporting private key parameters. - - - - Creates a new instance of based on the specified certificate or . - - An instance of or . - - - - Converts an or to a . - - An instance of or . - A . - - - - Converts a to (or ). - - An instance of . - An . - - - - Returns the hash algorithm used to create the signature of this certificate. - - Hash algorithm. - - - - Returns the collection of CRL distribution points. - - Collection of CRL distribution points, or null if not available. - - - - Returns the DN of the certification authority that issued the X.509v3 certificate. - - DN of the certification authority that issued the X.509 certificate. - - - - Returns the name of the certification authority that issued the X.509v3 certificate. - - The name of the certification authority that issued the X.509 certificate. - - - - Returns DN of the principal to which the certificate was issued. - - DN of the principal to which the certificate was issued. - - - - Returns the name of the principal to which the certificate was issued. - - The name of the principal to which the certificate was issued. - - - - Returns the public key for the X.509v3 certificate. - - The public key for the X.509v3 certificate. - - - - Returns the key algorithm parameters for the X.509v3 certificate. - - The key algorithm parameters for the X.509v3 certificate. - - - - Returns the public key info for the X.509v3 certificate. - - The public key info for the X.509v3 certificate. - - - - Returns the certificate's subject key identifier (SKI). - - Subject key identifier. - - - - Returns the certificate's issuer key identifier (AKI). - - Issuer (authority) key identifier. - - - - Returns the certificate's common name, if available. - - Common name; or null if not available. - - - - Returns the list of certificate's common names. - - The list of common names. - - - - Returns the list of certificate's e-mail addresses. - - The list of addresses. - - - - Returns the serial number of the X.509v3 certificate. - - The serial number of the X.509 certificate as an array of bytes. - - - - Returns the expiration date of this X.509v3 certificate (in local time). - - The expiration date for this X.509 certificate. - The expiration date is the date after which the X.509 certificate is no longer considered valid. - - - - Returns the effective date of this X.509v3 certificate (in local time). - - The effective date for this X.509 certificate. - The effective date is the date after which the X.509 certificate is considered valid. - - - - Returns the hash value for the X.509v3 certificate as an array of bytes. - - The hash value for the X.509 certificate. - - - - Returns the raw data for the entire X.509v3 certificate. - - The raw data for the entire X.509v3 certificate. - - - - Checks whether a certificate is time valid. - - true if valid, false if not valid. - - - - Returns the intended key usage value. - - Intended key usage. - - - - This method is deprecated, use instead. - - An array of intended key usage identifiers. - - - - Returns an array of enhanced key usage identifiers. - - An array of enhanced key usage identifiers, or null if the certificate is valid for all uses. - - - - Returns the DSA parameters of certificate's public key. - - The DSA parameters of certificate's public key. - - - - Returns the RSA parameters of certificate's public key. - - The RSA parameters of certificate's public key. - - - - Returns the RSA parameters of certificate's public or private key. - - True if private key parameters are to be exported as well. - If set to true, the cryptographic provider should not display any user interface (UI) when exporting private key parameters. - The RSA parameters of certificate's public or private key. - - - - Returns the DSA parameters of certificate's public or private key. - True if private key parameters are to be exported as well.If set to true, the cryptographic provider should not display any user interface (UI) when exporting private key parameters. - The DSA parameters of certificate's public or private key. - - - - Checks whether a private key for this certificate is available. - - True if available, false if not available. - - - - Returns the size of the key in bits. - - Size of the key in bits. - - - - Verifies the specified signature data by comparing it to the signature computed for the specified hash value. - - The hash value of the signed data. - A hash algorithm used to create the hash value. - The signature for the specified hash value. - True if the signature verifies as valid; otherwise, false. - - - - Verifies the specified signature data by comparing it to the signature computed for the specified message. - - The message. - The signature for the specified message. - True if the signature verifies as valid; otherwise, false. - - - - Verifies the specified signature data by comparing it to the signature computed for the specified message. - - The message. - The signature for the specified message. - Signature parameters. - True if the signature verifies as valid; otherwise, false. - - - - Computes the signature for the specified hash value by encrypting it with the private key. - - The hash value of the data to be signed. - A hash algorithm used to create the hash value. - If set to true, the cryptographic should not display any user interface (UI). - The signature for the specified hash value. - -

- The private key for a certificate must be available for this method to succeed. -

-

- If silent operation is requested and the CSP must display UI to operate, this method will fail. -

-
-
- - - Computes the signature for the specified message by encrypting it with the private key. - - The message to be signed. - The signature for the specified message. - -

- The private key for a certificate must be available for this method to succeed. -

-
-
- - - Computes the signature for the specified message by encrypting it with the private key. - - The message to be signed. - Signature parameters. - The signature for the specified message. - -

- The private key for a certificate must be available for this method to succeed. -

-
-
- - - Encrypts data. - - Data to be encrypted. - Encrypted data. - - - - Decrypts data. - - Data to be decrypted. - If set to true, the cryptographic provider should not display any user interface (UI). - Decrypted data. - - If silent operation is requested and the cryptographic provider needs to display a UI to operate, this method will fail. - - - - - Verifies the validity of the certificate. - - Validation result. - - - - Verifies the validity of the certificate, including its compliance with the specified criteria. - - Validation options (not supported by CertificateChainEngine.Native engine on Xamarin.iOS and Xamarin.Android). - Validation result. - - - - Verifies the validity of the certificate, including its compliance with the specified criteria. - - The name of the server. - Validation options (not supported by CertificateChainEngine.Native engine on Xamarin.iOS and Xamarin.Android). - Validation result. - - - - Verifies the validity of the certificate, including its compliance with the specified criteria, - using the specified chain engine. - - The name of the server. - Validation options (not supported by CertificateChainEngine.Native engine on Xamarin.iOS and Xamarin.Android). - Certificate chain engine. - Validation result. - - - - Validates the specified certificate revocation list (issued by this certificate). - - Certificate revocation list to validate. - The date in which the validation takes effect; specify null (Nothing in VB.NET) to skip time validation check. - Status of the validation result. If the CRL is valid, the return value is 0. - - - - Disposes the object and releases resources. - - - Calling this method ensures that all resources are freed. - - - - - Gets the certificates extensions collection. - - Extensions collection. - - - - Returns the key algorithm for this certificate. - - The key algorithm for this certificate. - - - - Gets the thumbprint of the certificate. - - Certificate's thumbprint. - - - - Gets or sets the friendly name associated with the certificate. - - Friendly name associated with the certificate. - Not available in .NET CF. - - - - Gets or sets a custom object associated with this particular instance of . This value is not persisted. - - - - - A chain engine (name space and cache) to be used to build and validate certificate chains. - - - - - The chain engine of the current user. - - - - - The chain engine of the local machine. - - - - - Android / iOS native security policy. - - - - - Use current certificate engine if set; otherwise use engine (platform-specific). - - - - - Represents a chain of certificates. - - - A chain starts by the end certificate and each following certificate - must directly certify the one preceding it. - The last certificate in the list is a self-signed root certificate, and - may be optionally omitted under the assumption it must be known in any case. - - - - - Gets an for the collection. - - An for the collection. - - - - Adds a certificate to the end of the chain. - This certificate represents authority for the previous certificate in the chain - (Leaf certificate is at the beginning of the chain, Root certificate is at the end of the chain). - - The certificate to be added to the chain. - The position of the certificate in the chain. - - - - Creates an empty certificate chain. - - - - - Creates a certificate chain from an array of certificates. - - An array of certificates. - - - - Loads a certificate with a private key from a PKCS#12 (PFX) file. - - Path to a file. - Encryption password. - A certificate with private key. - - - - Loads a certificate with a private key from a PKCS#12 (PFX) array. - - An array containing DER encoded PKCS#12 data. - Encryption password. - A certificate with private key. - - - - Loads a certificate with a private key from a PKCS#12 (PFX) file. - - Path to a file. - Encryption password. - Key set options. - A certificate with private key. - - - - Loads a certificate with a private key from a PKCS #12 (.p12/.pfx) array. - - An array containing DER encoded PKCS #12 data. - Encryption password. - Key set options. - A certificate with private key. - - - - Loads from the specified PKCS #7 (.p7b) file. - - Path to the file. - Instance of , never null. - The PKCS #7 file can be saved using method. - - - - Loads a PKCS #7 (.p7b) encoded from the specified file. - - Stream to load a from. - Instance of , never null. - The PKCS #7 stream can be saved using method. - - - - Verifies the specified signature data by comparing it to the signature computed for the specified hash value. - - The hash value of the signed data. - A hash algorithm used to create the hash value. - The RSA signature for the specified hash value. - true if the signature verifies as valid; otherwise, false. - The hash algorithm parameter is ignored with managed RSA. - - - - Builds a certificate chain for a specified certificate. - - End certificate. - The chain for an end certificate. - - This function builds a certificate chain context starting from an end - certificate and going back, if possible, to a trusted root certificate. - - - - - Builds a certificate chain for a specified certificate. - - End certificate. - Certificate chain engine. - The chain for an end certificate. - - This function builds a certificate chain context starting from an end - certificate and going back, if possible, to a trusted root certificate. - - - - - Builds a certificate chain for a specified certificate. - - End certificate. - Additional store to search in addition to system stores. - The chain for an end certificate. - - This function builds a certificate chain context starting from an end - certificate and going back, if possible, to a trusted root certificate. - - - - - Builds a certificate chain for a specified certificate. - - End certificate. - Certificate chain engine. - Additional store to search in addition to system stores. - The chain for an end certificate. - - This function builds a certificate chain context starting from an end - certificate and going back, if possible, to a trusted root certificate. - - - - - Verifies the validity of the certificate chain. - - Validation result. - - - - Verifies the validity of the certificate chain, including its compliance with the specified criteria. - - Validation options (not supported by CertificateChainEngine.Native engine on Xamarin.iOS and Xamarin.Android). - Validation result. - - - - Verifies the validity of the certificate chain, including its compliance with the specified criteria. - - The name of the server. - Validation options (not supported by CertificateChainEngine.Native engine on Xamarin.iOS and Xamarin.Android). - Validation result. - - - - Verifies the validity of the certificate chain, including its compliance with the specified criteria, - using the specified chain engine. - - The name of the server. - Validation options (not supported by CertificateChainEngine.Native engine on Xamarin.iOS and Xamarin.Android). - Certificate chain engine. - Validation result. - - - - Saves the certificate chain to the specified path as a .P7B (PKCS #7) file. - - Path to save the certificate chain file to. - - - - Saves the certificate chain to the specified stream in .P7B (PKCS #7) format. - - Stream to write the certificate chain to. - - - - Loads a chain of Base-64-encoded X509 certificates from the specified file. - - Path to a file with the certificate chain. - A certificate chain. - - - - Gets the default certificate chain engine (platform-specific). - - - - - Gets the number of certificates in the chain. - - The number of certificates in the chain. - - - - Gets or sets the certificate at the specified position. - - The certificate at the specified position - The certificate at the specified position. - - - - Gets the certificate of the root certification authority, if available. - - Root CA certificate if available; null otherwise. - - - - Gets the first certificate in the chain, if not empty. - - Leaf certificate; null if the chain is empty. - - - - Represents a collection of X509 v3 certificates. - - - - - A base class for various collections of cryptographic objects. - - - - - A base class for various collections of cryptographic objects. - - - - - Gets an for the . - - An for the collection. - - - - Copies the range of elements from the to a compatible one-dimensional - , starting at the specified index of the target array. - - One-dimensional zero-based array that is the destination of the elements copied from . - A zero-based index in the destination array at which copying begins. - - - - Gets the number of items in the . - - The number of items in collection. - - - - Gets a value indicating whether access to the is synchronized. - - - - - Gets an object that can be used to synchronize access to the . - - - - - Adds an item to the collection. - - Item to add. - - - - Removes all elements from the collection. - - - - - Determines whether the collection contains the specified item. - - Item. - True if the collection contains the item; false if it does not. - - - - Returns a position of the specified item within the collection, or -1 if not found. - - Item to find. - Zero-based position of the item; or -1 if not found. - - - - Copies the range of elements from the collection to a compatible one-dimensional - array, starting at the specified index of the target array. - - One-dimensional zero-based array that is the destination of the elements copied from the collection. - A zero-based index in the destination array at which copying begins. - - - - Removes an item from the collection. - - An item to remove. - True if the item was removed; false if not removed. - - - - Removes an item at the specified position from the collection. - - An index of an item to remove. - - - - Adds an item to the collection at the specified position. - - Position at which to insert the item. - Item to add. - - - - Returns an enumerator that iterates through the collection. - - Enumerator. - - - - Returns a value indicating whether the collection is read-only. - - - - - Gets or sets an instance of an item at the specified index. - - The zero-based index of the item to get or set. - An item. - - - - Creates a new instance of . - - - - - Represents a certificate engine. - - - - - Initializes new instance of the class. - - - - - Validates given certificate chain using specified validation parameters. - - Certificate chain to validate. - Validation parameters. - Result of the validation. - - - - Builds a certificate chain from the specified certificate. - - A certificate to build the chain from. - The built certificate chain. - - - - Builds a certificate chain from the specified certificate. - - A certificate to build the chain from. - An extra store to search for intermediate and root CA certificates. - The built certificate chain. - - - - Gets the current certificate engine. - - The current certificate engine; null reference (Nothing in VB.NET) if no engine was set. - - - - Sets the current certificate engine. - - An engine to be used. - - - - Gets or sets the LogWriter used by this object. - - Log writer. - - - - Gets the default certificate engine which is used if no custom engine is set as current engine. - - - - - Certificate validation parameters for 's method. - - - - - Creates a new instance of . - - - - - Gets or sets validation options. - - - - - The exception that is thrown when a certificate-related error occurs. - - - - - Initializes a new instance of the Exception class - with a specified error message. - - The error message that explains the reason for the exception. - - - - Initializes a new instance of the Exception class - with a specified error message and a reference to the - inner exception that is the cause of this exception. - - The error message that explains the reason for the exception. - The exception that is the cause of the current exception. - - - - Represents a collection of X509 v3 certificate extensions. - - - - - Creates a certificate extension collection from an ASN.1 block. - - ASN.1 block. - - - - Gets the first with the specified object identifier. - - The object identifier, either friendly name or dotted string format. - A certificate extension, or null if not found. - - - - Represents an X509 v3 certificate extension. - - - - - Creates a new instance of . - - Extension object identifier. - Specifies whether the extension is critical. - Extension data. - - - - Create extended (enhanced) key usage extension (2.5.29.37). - - Specifies whether this extension is considered critical (not-critical extensions may be ignored by servers that don't support them). - Key usage OIDs. - An extension object. - - - - Creates a key usage extension (2.5.29.15). - - Key usage flags. - An extension object. - - - - Gets the object identifier that identifies the extension. - - The object identifier. - - - - Gets a value indicating whether the extension is critical. - - True if critical; false otherwise. - - - - Gets the extension value. - - An array of bytes in ASN.1 format. - - - - Options for methods. - - - - - No filter. - - - - - Only find certificates that have a private key. - - - - - Only find certificates that are time valid. - - - - - Only find certificates that can be used for client authentication. - - - - - Only find certificates that can be used for server authentication. - - - - - When searching by certificate issuer, include known subordinate CAs in the search as well. - - - - - The type of search for method. - - - - - Certificates whose subject key identifier (SKI) matches the specified value. - - - - - Specifies the location of the certificate store. - - - - None. - - - The store located at HKEY_CURRENT_USER\Software\Microsoft\SystemCertificates. - - - The store located at HKEY_LOCAL_MACHINE\Software\Microsoft\SystemCertificates. - - - The store located at HKEY_LOCAL_MACHINE\Software\Microsoft\Cryptography\Services\<ServiceName>>\SystemCertificates. - - - The store located at HKEY_LOCAL_MACHINE\Software\Microsoft\Cryptography\Services\<ServiceName>\SystemCertificates. - - - The store located at HKEY_USERS\<UserName>\Software\Microsoft\SystemCertificates. - - - The store located at HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates. - - - The store located at HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\SystemCertificates. - - - The store located at HKEY_LOCAL_MACHINE\Software\Microsoft\EnterpriseCertificates. - - - - Specifies the name of the certificate store. - - - - None. - - - Other users. - - - Third-party certificate authorities. - - - Intermediate certificate authorities. - - - Revoked certificates. - - - Personal certificates. - - - Trusted root certificate authorities. - - - Directly trusted people and resources. - - - Directly trusted publishers. - - - - Represents a certificate store. - - - - - Opens a system certificate store of the specified name a the specified location. - - The store name. - Specifies the location of the certificate store. - - Some example system stores are:
- "CA" - Certification authority certificates.
- "My" - A certificate store that holds certificates with associated private keys.
- "Root" - Root certificates.
- "SPC" - Software publisher certificate.
- "Trust"
- "Disallowed"
-
- - - Opens a system certificate store of the specified name a the specified location. - - The store name value. - Specifies the location of the certificate store. - - - - Opens a system certificate store of the specified name. - - The store name. - - Some example system stores are:
- "CA" - Certification authority certificates.
- "My" - A certificate store that holds certificates with associated private keys.
- "Root" - Root certificates.
- "SPC" - Software publisher certificate.
- "Trust"
- "Disallowed"
-
- - - Opens a system certificate store of the specified name. - - The store name value. - - - - Creates a temporary memory-based certificate store - and populates it with certificates from the specified collection. - - The certificate collection. - - - - Determines whether the specified certificate store exists. - - The store name. - Specifies the location of the certificate store. - True if the store exists; false otherwise. - - - - Determines whether the specified certificate store exists. - - The store name value. - Specifies the location of the certificate store. - True if the store exists; false otherwise. - - - - Determines whether the specified certificate store exists. - - The store name. - True if the store exists; false otherwise. - - - - Determines whether the specified certificate store exists. - - The store name value. - True if the store exists; false otherwise. - - - - Adds a certificate to this certificate store. - - Certificate to be added. - - On Windows, the certificate is added even if the same certificate is already present in the store. - If this is undesirable, use instead. - - - - - Adds a certificate to this certificate store. - - Certificate to be added. - - - - Removes a certificate from this certificate store. - - Certificate to be removed. - - - - Returns all certificates matching the specified criteria. - - Specifies the type of search being made. - A byte array whose meaning is defined by 'findType'. - Options. - An array of certificates. - - - - Returns all certificates issued by the specified issuer (or its subordinate issuer) and corresponding to the specified options. - - Issuer DN. - Options. - An array of certificates. - - - - Returns all certificates with the specified serial number issued by the specified issuer (or its subordinate issuer) - and corresponding to the specified options. - - Issuer DN. - Certificate serial number. - Options. - An array of certificates. - - - - Returns all certificates issued by one of specified issuers (or their subordinate issuer) and corresponding to the specified options. - - An array of issuers' DNs. - Options. - An array of certificates. - - - - Returns all certificates issued by one of specified issuers (or their subordinate issuer) and corresponding to the specified options. - - An array of issuers' DNs. - Certificate serial number. - Options. - An array of certificates. - - - - Returns all certificates matching the specified certificate and options. - - Certificate to find. - Options. - An array of certificates. - - - - Returns all certificates corresponding to the specified options. - - Options. - An array of certificates. - - - - Returns all certificates corresponding to the specified e-mail address. - - E-mail address. - An array of certificates. - - - - Returns all certificates corresponding to the specified e-mail address and options. - - E-mail address. - Options. - An array of certificates. - - - - Disposes the object and releases resources. - - - Calling this method ensures that all resources are freed. - - - - - Finalizer called by garbage collector. - - - - - Represents a distinguished name. - - - - - Creates an instance of distinguished name from an ASN.1 block. - - ASN.1 block. - - - - Creates an instance of distinguished name from a DN string. - - DN string. - - - - Returns the DN's common name, if available. - - Common name; or null if not available. - - - - Returns the list of DN's e-mail addresses. - - The list of addresses. - - - - Determines whether the specified object is equal to the current object. - - Object to compare with the current object. - True if equal; false if not equal. - - - - Servers as a hash function for a particular type. Suitable for use in hashing algorithms and hash tables. - - Hash code. - - - - Converts a distinguished name into a byte array. - - Byte array. - - - - Returns a string representation of the object. - - A DN string. - - - - Converts string DN to its BER-encoded representation. - - String DN. - BER-encoded DN. - - - - Converts BER-encoded representation of DB to its string representation. - - BER-encoded DN. - String DN. - - - - Represents a collection of CRL distribution points. - - - - - Creates a new instance of . - - - - - A CRL distribution point. - - - - - Create a new instance of a CRL distribution point that represents the specified URL. - - CRL URL. - - - - Gets distribution point URL, if available. - - Distribution point URL, or null if not available. - - - - Certificate validation method options. (Not supported by CertificateChainEngine.Native engine on Xamarin.iOS and Xamarin.Android). - - - - - No options specified. - - - - - Ignore an invalid time (such as expiration). - - - - - Ignore an invalid certificate trust list time. - - - - - Ignore an invalid time nesting. - - - - - Ignore all invalid time checks (such as expiration, nesting, CRL or CTL times). - - - - - Ignore invalid basic constraints. - - - - - Allow unknown certification authority. - - - - - Ignore wrong usage of the certificate. - - - - - Ignore invalid policy. - - - - - Ignore an unknown revocation status of the end certificate. - - Not supported in builds for .NET CF. - - - - Ignore an unknown revocation status of the certificate trust list signer. - - Not supported in builds for .NET CF. - - - - Ignore an unknown revocation status of the CA certificate. - - Not supported in builds for .NET CF. - - - - Ignore an unknown revocation status of a root certificate. - - Not supported in builds for .NET CF. - - - - Ignore all unknown revocation statuses. - - - - - Not supported. - - Not supported in builds for .NET CF. - - - - Not supported. - - Not supported in builds for .NET CF. - - - - Only use local cache, do not access the network. - - Not supported in builds for .NET CF. - - - - Ignore invalid common name. - - - - - Skip certificate revocation check. - - - - - Ignore invalid chain. - - - - - Certificate validation status. - - - - - This certificate or one of the certificates in the certificate chain is not time valid. - - - - - Certificates in the chain are not properly time nested. - - - - - Trust for this certificate or one of the certificates in the certificate chain has been revoked. - - - - - The certificate or one of the certificates in the certificate chain does not have a valid signature. - - - - - The certificate or certificate chain is not valid for its proposed usage. - - - - - The certificate or certificate chain is based on an untrusted root. - - - - - The revocation status of the certificate or one of the certificates in the certificate chain is unknown. - - - - - One of the certificates in the chain was issued by a certification authority that the original certificate had certified. - - - - - One of the certificates has an invalid extension. - - - - - The certificate or one of the certificates in the certificate chain has - a policy constraints extension, and one of the issued certificates has - a disallowed policy mapping extension or does not have a required issuance - policies extension. - - - - - The certificate or one of the certificates in the certificate chain has - a basic constraints extension and either the certificate cannot be used - to issue other certificates or the chain path length has been exceeded. - - - - - The certificate or one of the certificates in the certificate chain has - an invalid name constraints extension. - - - - - The certificate or one of the certificates in the certificate chain has a name constraints extension containing unsupported fields. - - - - - The certificate or one of the certificates in the certificate chain has a name constraints extension and a name constraint is missing for one of the name choices in the end certificate. - - - - - The certificate or one of the certificates in the certificate chain has a name constraints extension and there is not a permitted name constraint for one of the name choices in the end certificate. - - - - - The certificate or one of the certificates in the certificate chain has a name constraints extension and one of the name choices in the end certificate is explicitly excluded. - - - - - The certificate chain is not complete. - - - - - A CTL used to create this chain was not time valid. - - - - - A CTL used to create this chain did not have a valid signature. - - - - - A CTL used to create this chain is not valid for this usage. - - - - - The revocation status of the certificate or one of the certificates in the certificate chain is either off-line or stale. - - - - - The end certificate does not have any resultant issuance policies, and one of the issuing CA certificates has a policy constraints extension requiring it. - - - - - The certificate chain contains a certificate with unsupported signature hash algorithm (usually SHA-2) or unsupported key algorithm (usually ECDSA). - - - - - Unknown error. - - - - - A path length constraint in the certification chain has been violated. - - - - - A certificate contains an unknown extension that is marked critical. - - - - - A certificate chain is invalid, - such as an certificate's Issuer not matching the CA's Subject or - an certificate's AKI not matching the CA's SKI. - - - - - The certificate's CN name does not match the passed value. - - - - - The certificate was explicitly marked as untrusted by the user or CA. - - - - - A certificate or CRL is malformed. - - - - - There might be more errors apart from those reported. - - - - - Certificate uses algorithm which is not considered secure on this platform. - - - - - Certificate is not trusted. - - - - - Represents the result of certificate chain validation. - - - - - Initialize instance of the . - - A validation status (use zero for success). - - - - Gets the status mask. - - Status mask. - - - - Gets the certificate chain validity status. - - True if valid, false if not valid. - - - - Gets the native error code returned by the validation function (this property returns always zero). - - The error code returned by the validation function. - - - - Gets the native error code returned by the validation function or zero if the native error code is not available. - - The error code returned by the validation function. - - - - Specifies asymmetric algorithm. - - - - - RSA. - - - - - DSA. - - - - - Diffie-Hellman. - - - - - Elliptic Curve Digital Signature Algorithm (.NET >= 4.0 or through a plugin). - - - - - Elliptic Curve Diffie-Hellman algorithm (.NET >= 4.0 or through a plugin). - - - - - Twisted Edwards Curve DSA algorithm such as ED25519 (supported through a plugin). - - - - - Specifies key blob format. - - - - - ECPrivateKey (defined by RFC 5915). - - - - - Raw public key data. - - - - - Raw private key data. - - - - - A platform-independent asymmetric algorithm object. - - - - - Register custom asymmetric key algorithm. - - Factory function that accepts algorithm name and returns algorithm. - - - - Creates an instance of . - - - - - Frees the resources used by this object. - - - - - Creates an instance of from the specified asymmetric algorithm object. - - Asymmetric algorithm object. - True if the created object owns the asymmetric algorithm object. - An instance of . - - - - Exports a public key to the specified private key info object. - - Public key info object. - - - - Exports a private key to the specified private key info object. - - Private key info object. - - - - Imports a key from the specified public key info object. - - Public key info object. - - - - Imports a key from the specified private key info object. - - Private key info object. - - - - Imports a key from the specified RSA parameters. - - RSA key parameters. - - - - Imports a key from the specified DSA parameters. - - DSA key parameters. - - - - Imports a key from the specified Diffie-Hellman parameters. - - Diffie-Hellman key parameters. - - - - Imports a private key for the specified algorithm/curve. Only some algorithms/curves are supported. - - Key algorithm. - Key algorithm curve. - Key data. - Key format. - - - - Returns a value indicating whether the specified algorithm is supported. - - Asymmetric algorithm. - Curve name or OID (if needed). - Key size (specify 0 to indicate default key size). - True if supported; false if not supported. - - - - Generates Diffie-Hellman parameters corresponding to the specified key size. - - Key size. - Diffie-Hellman parameters. - - - - Generates a private key for the specified asymmetric algorithm with of the specified key size. - - Key algorithm. - Key size. Specify 0 to use default key size. - - - - Generates a private key for the specified asymmetric algorithm based on the specified curve. - - Key algorithm. - Curve name or OID. - - - - Computes the signature for the specified hash value. - - The hash value of the data to be signed. - A hash algorithm used to create the hash value. - The signature for the specified hash value. - -

- The private key must be available for this method to succeed. -

-
-
- - - Computes the signature for the specified message (using default parameters). - - Message to be signed. - Signature for the specified message. - -

- The private key must be available for this method to succeed. -

-
-
- - - Computes the signature for the specified message. - - Message to be signed. - Signature parameters. - Signature for the specified message. - -

- The private key must be available for this method to succeed. -

-
-
- - - Verifies the specified signature. - - The hash value of the signed data. - A hash algorithm used to create the hash value. - The signature for the specified hash value. - True if the signature verifies as valid; otherwise, false. - - - - Verifies the specified signature (using default parameters). - - Signed message. - The signature for the specified message. - True if the signature verifies as valid; otherwise, false. - - - - Verifies the specified signature. - - Signed message. - The signature for the specified message. - Signature parameters. - True if the signature verifies as valid; otherwise, false. - - - - Encrypts data. - - Data to be encrypted. - Encrypted data. - - - - Encrypts data. - - Data to be encrypted. - Encryption parameters. - Encrypted data. - - - - Decrypts data. - - Data to be decrypted. - Decrypted data. - - If silent operation is requested and the CSP must display UI to operate, this method will fail. - - - - - Decrypts data. - - Data to be decrypted. - Encryption parameters. - Decrypted data. - - - - Gets key material deriver. Only supported by Diffie-Hellman-like algorithms. - - Other side's public key in raw form. - Key material deriver. - - - - Gets the current key size. - - - - - Gets the current key algorithm. - - - - - Gets a value indicating whether this instance only contains the public key. - - - - - Provides various cryptography-related helper methods. - - - - - Creates an instance of default random number generator. - - - - - - Returns an array of bytes with a cryptographically strong random sequence of values. - - Array length. - Array filled with random data. - - - - Fills specified array of bytes with a cryptographically strong random sequence of values. - - Array to fill random data with. - - - - Decodes a signature from a PKCS #7 form. - - Signature. - Key algorithm. - Decoded signature. - - - - Encodes a signature to a PKCS #7 form. - - Signature. - Key algorithm. - Encoded signature. - - - - Sets internal option. - - Instance. - Name. - Value. - - - - Gets internal option. - - Instance. - Name. - Value. - - - - Returns a value indicating whether the cryptographic engine is available. - - - - - Forces RijndaelManaged to be used even when AesCryptoServiceProvider is available. - - True if RijndaelManaged is to be used instead of AesCryptoServiceProvider; false otherwise. - - - - Enables or disables an option that specifies whether only FIPS 140-2 compliant cryptographic algorithm providers are to be used. - - True if only FIPS 140-2 compliant algorithms are to be used; false to allow all supported algorithms. - - In .NET 2.0 and higher, this option reflects the Windows OS settings unless explicitly set to a different value. - - - - - Implements Diffie-Hellman key agreement protocol (also called exponential key agreement). - - - This algorithm was developed by Diffie and Hellman in 1976. It allows two users - to exchange a secret key over an insecure medium without any prior secrets. - - - - - Initializes a new instance of DiffieHellman. - - - You cannot create an instance of an abstract class. - Create an instance of class instead. - - - - - Returns the public key. - - The public key. - - - - Calculates the shared secret key from the other side's public key. - - Other side's public key. - The shared secret key. - - - - Imports the specified . - - The Diffie-Hellman parameters. - - - - Exports the . - - true to include private parameter; otherwise, false. - The Diffie-Hellman parameters. - - - - Returns Oakley generator value. - - Oakley generator. - - - - Returns Oakley group 2. - - Oakley group 2. - - - - Returns Oakley group 14. - - Oakley group 14. - - - - Managed implementation of Diffie-Hellman algorithm. - - - - - Initializes a new instance of the DiffieHellmanManaged class. - - - - - Initializes a new instance of the DiffieHellmanManaged class - with a specified key size. - - The size of the key to use in bits. - - - - Creates and returns an XML string representation of the current object. - - true to include private parameters; otherwise, false. - An XML string encoding of the current object. - - - - When overridden in a derived class, reconstructs a DiffieHellmanManaged object from an XML string. - - The XML string to use to reconstruct the DiffieHellmanManaged object. - - - - Returns the public key. - - The public key. - - - - Imports the specified . - - The Diffie-Hellman parameters. - - - - Exports the . - - true to include private parameter; otherwise, false. - The Diffie-Hellman parameters. - - - - Releases the unmanaged resources and optionally releases the managed resources. - - true to release both managed and unmanaged resources; false to release only unmanaged resources. - - - - Gets the name of the signature algorithm available with this implementation of DiffieHellman. - - The name of the signature algorithm. - DiffieHellman does not support signatures. This property will throw an exception. - - - - Gets the name of the key exchange algorithm available with this implementation of DiffieHellman. - - The name of the key exchange algorithm. - - - - Contains the parameters for Diffie-Hellman algorithm. - - - - - The prime modulus used for the operation. - - - - - The generator used for the operation. - - - - - The private key for the operation. - - - - - The public key for the operation. - - - - - Managed implementation of DSA signature algorithm. - - -

- The purpose of this class is to make it possible to verify - signatures without the need to use CryptoAPI, which is not available - in some scenarios. -

-

- Even though it is possible to generate DSA keys and sign data using - this class, but this process has not been optimized for speed and is - very slow. -

-
-
- - - Initializes a new instance of the DSAManaged class with the key size of 1024. - - - - - Initializes a new instance of the DSAManaged class with the specified key size. - - The size of the key to use in bits. - - - - Initializes a new instance of the DSAManaged class with the specified key size and seed. - - The size of the key to use in bits. - The initial seed to use for key generation. - - - - Creates and returns an XML string representation of the current object. - - true to include private parameters; otherwise, false. - An XML string encoding of the current object. - - - - When overridden in a derived class, reconstructs a DSAManaged object from an XML string. - - The XML string to use to reconstruct the DSAManaged object. - - - - Exports the . - - true to include private parameters; otherwise, false. - The DSA parameters. - - - - Imports the specified . - - The DSA parameters. - - - - Creates the DSA signature for the specified data. - - The SHA1 hash of data to be signed. - The DSA signature for the specified hash value. - - DSA signature is a pair of numbers r and s. - This method always returns an array of 40 bytes. - Bytes 0..19 contain the value of r, bytes 20..39 contain the value of s. - - - - - Verifies the DSA signature for the specified data. - - The SHA1 hash of signed data to be verified. - The signature to be verified for rgbData. - true if the signature verifies as valid; otherwise, false. - - DSA signature is a pair of numbers r and s. - The rgbSignature parameter must be 40 bytes long. - Bytes 0..19 must contain the value of r, bytes 20..39 must contain the value of s. - - - - - Computes the signature for the specified hash value by signing - it with the private key. - - The SHA1 hash of data to be signed. - The DSA signature for the specified hash value. - - - - Verifies the specified signature data by comparing it to the signature computed for the specified hash value. - - The hash value of the signed data. - The signature data to be verified. - true if the signature verifies as valid; otherwise, false. - - - - Computes the hash value of the specified byte array using the specified hash algorithm, and signs the resulting hash value. - - The input data for which to compute the hash. - The hash algorithm to use to create the hash value. - The DSA signature for the specified data. - - - - Verifies the specified signature data by comparing it to the signature computed for the specified data. - - The signed data. - The hash algorithm used to create the hash value of the data. - The signature data to be verified. - true if the signature verifies as valid; otherwise, false. - - - - Releases the unmanaged resources and optionally releases the managed resources. - - true to release both managed and unmanaged resources; false to release only unmanaged resources. - - - - Gets the name of the signature algorithm available with this implementation of DSA. - - The name of the signature algorithm. - - - - Gets the name of the key exchange algorithm available with this implementation of DSA. - - The name of the key exchange algorithm. - - - - Encryption schemes. - - - - - Default padding scheme (depends on key algorithm). - - - - - RSAES-PKCS1-v1_5 (RFC 3447). - - - - - RSAES-OAEP (RFC 3447). - - - - - Encryption parameters. - - - - - Initialize new instance of the . - - - - - Encryption scheme. - - - - - Hashing algorithm for padding generation. - - - - - Optional input parameter for . - - - - - If set to true (default), the cryptographic provider should not display any user interface (UI) when working with private keys. - Only used for decryption operations. - - - If silent operation is requested and the cryptographic provider needs to display a UI to operate, the requested method will fail. - - - - - Represents a hash transform. - - - - - Computes the hash value for the specified region of the input byte array. - - The input to compute the hash code for. - The offset into the input byte array from which to begin using data. - The number of bytes in the input byte array to use as data. - - - - Gets the value of the computed hash code. - - The computed hash value. - - - - Resets the transform. - - - - - Represents the size, in bits, of the computed hash code. - - - - - Specifies hash algorithm. - - - - - SHA-1. - - - - - SHA-256. - - - - - SHA-384. - - - - - SHA-512. - - - - - MD4. - - - - - MD5. - - - - - Specifies hash algorithm key mode. - - - - - No keyed hash. - - - - - HMAC. - - - - - Represents a hash algorithm. - - - - - Gets the current key. - - The current key. - - - - Sets the current key to the specified value. - - Key to be set. - - - - Creates an instance of for the specified algorithm. - - Algorithm. - - - - Gets a value indicating whether the specified algorithm is supported. - - Algorithm. - True if supported; false if not supported. - - - - Creates a hash transform object for this algorithm based on the currently set parameters. - - Hash transform object. - - - - Creates a hash transform object for this algorithm based on the currently set parameters. - - Hash transform object. - - - - Computes the hash value for the specified data. - - Input data. - Hash value. - - - - Computes the hash value for the specified data. - - Input data. - Input offset. - Input length. - Hash value. - - - - Computes the hash value for the specified data using the specified algorithm. - - Hash algorithm. - Input data. - Hash value. - - - - Computes the hash value for the specified data using the specified algorithm. - - Hash algorithm. - Input data. - Input offset. - Input length. - Hash value. - - - - Disposes the object. - - - - - Gets algorithm ID. - - - - - Gets the size of the computed hash code (in bits). - - - - - Gets or sets the algorithm's key mode. - - - - - Computes a Hash-based Message Authentication Code (HMAC) - for the input data using the specified hash function. - - - HMAC is defined by RFC 2104 and look like this: - alg(K XOR opad + alg(K XOR ipad + text))
- where alg is the base hash algorithm,
- K is an n byte key,
- ipad is the byte 0x36 repeated 64 times (or 128 times),
- opad is the byte 0x5c repeated 64 times (or 128 times),
- and text is the data being protected.
-
- - - Initializes a new instance of the HMAC class with the specified hash algorithm and key data. - - A type of hash algorithm to use. - The secret key for HMAC encryption. - - - - Initializes a new instance of the HMAC class with the specified hash algorithm and a randomly generated key. - - A type of hash algorithm to use. Must be a subclass of HashAlgorithm. - - - - Initializes an instance of HMAC. - - - - - Routes data written to the object into the hash algorithm for computing the HMAC. - - The input data. - The offset into the byte array from which to begin using data. - The number of bytes in the array to use as data. - - - - Returns the computed Hash-based Message Authentication Code (HMAC) after all data has been written to the object. - - The computed HMAC. - - - - Releases the unmanaged resources used by the HMAC and optionally releases the managed resources. - - true to release both managed and unmanaged resources; false to release only unmanaged resources. - - - - Gets or sets the key to be used in the hash algorithm. - - The key to be used in the hash algorithm. - - - - Key derivation options. - - - - - Key derivation parameters. - - - - - Gets or sets key derivation function ("HASH" or "HMAC"). - - - - - Hashing algorithm. - - - - - HMAC key. - - - - - Data to append to shared secret when hashing. - - - - - Data to prepend to shared secret when hashing. - - - - - Key material deriver. - - - - - Derives key material. - - Parameters that specify how to derive the key material.. - Key material. - - - - Finalizer. Called by garbage collector during object destruction. - - - - - Disposes the deriver object. - - - - - Represents the base class from which all implementations of the ArcFour algorithm must derive. - - - - - Initializes a new instance of ArcFour. - - - You cannot create an instance of an abstract class. - Create an instance of class instead. - - - - - Generates a random initialization vector (IV) to be used for the algorithm. - - ArcFour is a stream cipher, it does not use IV. - - - - Generates a random key to be used for the algorithm. - - Use this method to generate a random key when none is specified. - - - - Gets or sets the block size of the cryptographic operation in bits. - - The block size. - ArcFour is a stream cipher, blocks can be of any size. - - - - Gets or sets the initialization vector (IV) for the symmetric algorithm. - - Initialization vector. - ArcFour is a stream cipher, it does not use IV. - - - - Gets or sets the mode for operation of the symmetric algorithm. - - The mode for operation. - ArcFour is a stream cipher, the only mode supported is CipherMode.OFB. - - - - Gets or sets the padding mode used in the symmetric algorithm. - - The padding mode. - ArcFour is a stream cipher, no padding is done. - - - - The managed version of the ArcFour algorithm. - - - - - Initializes a new instance of ArcFourManaged class. - - - - - Creates a symmetric ArcFour decryptor object with the specified Key and initialization vector (IV). - - The secret key to be used for the symmetric algorithm. - The IV. Not used by ArcFour. - A symmetric ArcFour decryptor object. - - - - Creates a symmetric ArcFour encryptor object with the specified Key and initialization vector (IV). - - The secret key to be used for the symmetric algorithm. - The IV. Not used by ArcFour. - A symmetric ArcFour encryptor object. - - - - The managed version of the algorithm defined by RFC 2268. - - - - - Initializes a new instance of class. - - - - - Generates a random initialization vector (IV) to be used for the algorithm. - - Use this method to generate a random initialization vector (IV) when none is specified. - - - - Generates a random key to be used for the algorithm. - - Use this method to generate a random key when none is specified. - - - - Creates a RC2 encryptor object with the specified key. - - The secret key to be used for the symmetric algorithm. - The initialization vector for - . - A RC2 encryptor object. - - - - Creates a RC2 decryptor object with the specified key. - - The secret key to be used for the symmetric algorithm. - The initialization vector for . - A RC2 decryptor object. - - - - Gets or sets the mode for operation of the symmetric algorithm. - - The mode for operation of the symmetric algorithm. - - - - Gets or sets the padding mode used in the symmetric algorithm. - - The padding mode used in the symmetric algorithm. - - - - Represents the base class from which all implementations of Bruce Schneier's Blowfish algorithm must derive. - - - - - Initializes a new instance of Blowfish. - - - You cannot create an instance of an abstract class. - Create an instance of class instead. - - - - - The managed version of the Blowfish algorithm. - - - - - Initializes a new instance of class. - - - - - Generates a random initialization vector (IV) to be used for the algorithm. - - Use this method to generate a random initialization vector (IV) when none is specified. - - - - Generates a random key to be used for the algorithm. - - Use this method to generate a random key when none is specified. - - - - Creates a Blowfish encryptor object with the specified key. - - The secret key to be used for the symmetric algorithm. - The initialization vector for - . - A Blowfish encryptor object. - - - - Creates a Blowfish decryptor object with the specified key. - - The secret key to be used for the symmetric algorithm. - The initialization vector for - . - A Blowfish decryptor object. - - - - Gets or sets the mode for operation of the symmetric algorithm. - - The mode for operation of the symmetric algorithm. - - - - Gets or sets the padding mode used in the symmetric algorithm. - - The padding mode used in the symmetric algorithm. - - - - Computes the combined MD5/SHA1 hash for the input data. - - - The resulting hash value is 36 bytes long. - Bytes 0..15 contain the MD5 hash and bytes 16..35 contain the SHA1 hash. - - - - - Initializes a new instance of the MD5SHA1 class. - - - - - Initializes an instance of MD5SHA1. - - - - - Routes data written to the object into MD5 and SHA1 hash algorithms for computing the hash. - - The array of data bytes. - The offset into the byte array from which to begin using data. - The number of bytes in the array to use as data. - - - - Returns the computed MD5SHA1 hash as an array of bytes after all data has been written to the object. - - The computed hash value. - - - - Releases the unmanaged resources used by the MD5SHA1 and optionally releases the managed resources. - - true to release both managed and unmanaged resources; false to release only unmanaged resources. - - - - Returns the underlying instance of the MD5 object that is used to compute the MD5 part of the combined hash. - - - - - Returns the underlying instance of the SHA1 object that is used to compute the SHA1 part of the combined hash. - - - - - Represents the base class from which all implementations of Bruce Schneier's Twofish algorithm must derive. - - - - - Initializes a new instance of Twofish. - - - You cannot create an instance of an abstract class. - Create an instance of class instead. - - - - - The managed version of the Twofish algorithm. - - - - - Initializes a new instance of class. - - - - - Generates a random initialization vector (IV) to be used for the algorithm. - - Use this method to generate a random initialization vector (IV) when none is specified. - - - - Generates a random key to be used for the algorithm. - - Use this method to generate a random key when none is specified. - - - - Creates a Twofish encryptor object with the specified key. - - The secret key to be used for the symmetric algorithm. - The initialization vector for - . - A Twofish encryptor object. - - - - Creates a Twofish decryptor object with the specified key. - - The secret key to be used for the symmetric algorithm. - The initialization vector for - . - A Twofish decryptor object. - - - - Gets or sets the mode for operation of the symmetric algorithm. - - The mode for operation of the symmetric algorithm. - - - - Gets or sets the padding mode used in the symmetric algorithm. - - The padding mode used in the symmetric algorithm. - - - - Managed implementation of MD5 algorithm. - - - - - Initializes a new instance. - - - - - Initializes an instance of MD5. - - - - - Updates the MD5 hash code. - - The array of data bytes. - The zero based offset into the byte array from which to begin using data. - The number of bytes in the array to use as data. - - - - Returns the computed MD5 hash as an array of bytes. - - The computed MD5 hash value. - - - - Managed implementation of MD4 algorithm. - - - - - Initializes a new instance. - - - - - Initializes an instance of MD4. - - - - - Updates the MD4 hash code. - - The array of data bytes. - The zero based offset into the byte array from which to begin using data. - The number of bytes in the array to use as data. - - - - Returns the computed MD4 hash as an array of bytes. - - The computed MD4 hash value. - - - - Represents a cryptographic object identifier. - - - - - Initializes a new instance of the class using the specified object. - - The object identifier information to use to create the new object identifier. - - - - Initializes a new instance of the class using the specified OID dotted number string. - - An object identifier in dotted number format. - - - - Converts a OID to an . - - An object identifier in dotted number format. - An . - - - - Parses an OID from an ASN.1 encoded byte array. - - Byte array. - OID. - - - - Gets an ASN.1 encoded byte array representaion of this OID. - - Byte array. - - - - Gets an ASN.1 encoded byte array representaion of this OID. - - True if DER-formatting is to be used. - Byte array. - - - - Returns a string in dotted number format that represents the current . - - A string representation of the current Oid. - - - - Gets the dotted number representation of the object identifier. - - - - - PKCS #12 key derivation algorithm. - - - - - ID value for key material. - - - - - ID value for IV material. - - - - - ID value for MAC material. - - - - Resets the state of the operation. - - - Returns a pseudo-random key from a password, salt and iteration count. - A byte array filled with pseudo-random key bytes. - The number of pseudo-random key bytes to generate. - - - - Managed implementation of RSA algorithm. - -

- The purpose of this class is to make it possible to verify - signatures and encrypt data without the need to use CryptoAPI, which - is not available in some scenarios. -

-

- Even though it is possible to generate RSA keys and sign data using - this class, it is not recommended because the generated keys are not - being checked to ensure they are strong primes. -

-
- - - Initializes a new instance of the RSAManaged class with the key size of 1024. - - - - - Initializes a new instance of the RSAManaged class with the specified key size. - - The size of the key to use in bits. - - - - Exports the . - - true to include private parameters; otherwise, false. - The RSA parameters. - - - - Imports the specified . - - The RSA parameters. - - - - Decrypts data with the RSA algorithm. - - The data to be decrypted. - The decrypted data. - No processing of raw data is performed. - - - - Encrypts data with the RSA algorithm. - - The data to be encrypted. - The encrypted data. - No processing of raw data is performed. - - - - Decrypts data with the RSA algorithm. - - The data to be decrypted. - The decrypted data. - Uses PKCS#1 v1.5 padding. - - - - Encrypts data with the RSA algorithm. - - The data to be encrypted. - The encrypted data. - Uses PKCS#1 v1.5 padding. - - - - Verifies the specified signature data by comparing it to the signature computed for the specified hash value. - - RSA algorithm. - The hash value of the signed data. - A hash algorithm used to create the hash value. - The signature data to be verified. - true if the signature verifies as valid; otherwise, false. - - - - Verifies the specified signature data by comparing it to the signature computed for the specified hash value. - - The hash value of the signed data. - A hash algorithm used to create the hash value. - The signature data to be verified. - true if the signature verifies as valid; otherwise, false. - - - - Computes the signature for the specified hash value by signing - it with the private key. - - RSA algorithm. - The hash of data to be signed. - A hash algorithm used to create the hash value. - The RSA signature for the specified hash value. - - - - Computes the signature for the specified hash value by signing - it with the private key. - - The hash of data to be signed. - A hash algorithm used to create the hash value. - The RSA signature for the specified hash value. - - - - Releases the unmanaged resources and optionally releases the managed resources. - - true to release both managed and unmanaged resources; false to release only unmanaged resources. - - - - Gets the name of the signature algorithm available with this implementation of RSA. - - The name of the signature algorithm. - - - - Gets the name of the key exchange algorithm available with this implementation of RSA. - - The name of the key exchange algorithm. - - - - Signature format. - - - - - Raw signature data. - - - - - DER-encoded ASN.1 form of the signature formatted according to Cryptographic Message Syntax (PKCS #7). - - - - - Signature padding scheme. - - - - - Default padding scheme (depends on key algorithm). - - - - - PKCS #1 padding scheme (RSASSA-PKCS1-v1_5 defined by RFC 3447). - - - - - Probabilistic Signature Scheme (PSS) padding scheme (RSASSA-PSS defined by RFC 3447). - - - - - Signature parameters. - - - - - Creates a new instance of . - - - - - Hashing algorithm. - - - - - Signature format. - - - - - Signature padding scheme. - - - - - Salt length in bytes (only used for ). - - - - - If set to true (default), the cryptographic provider should not display any user interface (UI) when working with private keys. - Only used for signing operations. - - - If silent operation is requested and the cryptographic provider needs to display a UI to operate, the requested method will fail. - - - - - Specifies symmetric algorithm. - - - - - AES. - - - - - 3DES. - - - - - Twofish. - - - - - DES. - - - - - RC2. - - - - - An algorithm compatible with RC4. - - - - - Blowfish. - - - - - Represents a symmetric cipher algorithm. - - - - - Gets the current initialization vector. - - Initialization vector. - - - - Gets the current key. - - Key. - - - - Derives a key (of length) using the specified generator. - - Generator algorithm. - - - - Derives an initialization vector (of length) using the specified generator. - - Generator algorithm. - - - - Generates a random key (of length). - - - - - Generates a initialization vector (of length). - - - - - Sets the current key to the specified value and changes the accordingly. - - Key. Cannot be null. - - - - Sets the current initialization vector to the specified value. - - Initialization vector. - - - - Creates an encryptor object for this algorithm based on the currently set parameters. - - Encryptor object. - - - - Creates a decryptor object for this algorithm based on the currently set parameters. - - Decryptor object. - - - - Creates a symmetric algorithm object for this algorithm based on the currently set parameters. - - Symmetric algorithm object. - - - - Disposes the object. - - - - - Creates an instance of for the specified algorithm. - - Algorithm. - - - - Gets a value indicating whether the specified algorithm is supported. - - Algorithm. - True if supported; false if not supported. - - - - Gets algorithm ID. - - - - - Gets or sets the desired block size in bits. - - - - - Gets or sets the desired key size in bits. - - - - - Gets or sets the desired effective key size in bits. - - - - - Gets or sets the desired block cipher padding mode. - - - - - Gets or sets the desired block cipher mode. - - - - - The AlgorithmIdentifier class defines an algorithm used for a cryptographic operation. - - - - - Creates an instance of the class - with the specified algorithm identifier. - - An object identifier for the algorithm. - - - - Creates an instance of the class with - the specified algorithm identifier and parameters. - - An object identifier for the algorithm. - ASN.1 DER encoded parameters. - - - - Gets the object identifier for the algorithm. - - On that represents the algorithm. - - - - Gets the algorithm parameters. - - The algorithm parameters. - - - - A collection of values associated with a . - - - - - Copies the range of elements from the to a compatible one-dimensional - array, starting at the specified index of the target array. - - One-dimensional zero-based array that is the destination of the elements copied from . - A zero-based index in the destination array at which copying begins. - - - - Gets the value at the specified index. - - An array of bytes in ASN.1 format. - - - - A cryptographic attribute that contains a type and a collection of associated values. - - - - - Initializes an instance of a . - - The object identifier that identifies the attribute type. - Parameters in ASN.1 format, in a form of one or more byte arrays. - - - - Initializes an instance of a . - - The object identifier that identifies the attribute type. - Parameters in ASN.1 format. - Not supported in .NET 1.0, use instead. - - - - Gets the object identifier that identifies the attribute type. - - The object identifier. - - - - Gets the collection of values associated with the attribute. - - A . - - - - A collection of objects. - - - - - Gets or sets the at the specified index. - - The zero-based index of the to get or set. - A cryptographic attribute. - - - - Gets the first with the specified object identifier. - - The object identifier, either friendly name or dotted string format. - A cryptographic attribute if found, or null if not found. - - - - Contains string representations of common extended usage OIDs. - - - - Any purpose. - - - TLS Web server authentication. - - - TLS Web client authentication. - - - Code signing. - - - E-mail protection. - - - Timestamping. - - - OCSPstamping. - - - - A utility class that features a certificate issuer functionality. This can be used as a base of simple custom certification authority. - - - - - Issues a certificate signed by the specified certification authority using the specified signature hash algorithm. - - Certification authority certificate to issue and sign the certificate. - Certificate info. - Certificate public key. - A new certificate. - - - - Issues a self-signed certificate, signed using the specified algorithm. Also passes back the private key info. - - Certificate info. - Certificate private key. - A new certificate. - - - - Issues a certificate signed by the specified certification authority using the specified signature hash algorithm. - - Certification authority certificate to issue and sign the certificate. - Signature hash algorithm. - Certificate revocation list info. - A collection of objects. - A new certificate. - - - - Contains information describing the certificate for the .Issue method. - - - - - Creates an instance of class. - - - - - Gets the certificate serial number. - - Serial number. - - - - Sets the certificate serial number. - - Serial number. - - - - Sets the certificate serial number. - - Serial number. - - - - Gets the extended certificate usage. - - Extended certificate usage. - - - - Sets the extended certificate usage. - - Extended certificate usage. - - - - Sets alternative hostnames. - - Alternative hostnames. - - - - Sets alternative hostnames. - - Alternative hostnames. - - - - Gets or sets the certificate subject. - - Certificate subject. - - - - Gets or sets the basic certificate usage. - - Basic certificate usage. - - - - Gets or sets the certificate effective date. - - Certificate effective date. - - - - Gets or sets the certificate expiration date. - - Certificate expiration date. - - - - Gets the certificate extensions collection. - - Certificate extensions collection. - - - - Gets the CRL distribution points collection. - - CRL distribution points collection. - - - - Gets or sets the certificate owner's e-mail address. - - E-mail address. - - - - Gets or sets the hash algorithm to be used to create the signature of the certificate. - - The hash algorithm to be used to create the signature of the certificate. - - - - Contains information describing the certificate for the .IssueRevocationList method. - - - - - Creates an instance of class. - - - - - Gets or sets the datetime of this CRL update. - - Datetime of this CRL update. - - - - Gets or sets the datetime of the next CRL update. - - Datetime of the next CRL update. - - - - A SPKAC certificate request. This is used by Mozilla, Opera and other browsers except Internet Explorer. - For Internet Explorer, use . - - - - - Creates a SPKAC request from an ASN.1 block. - - ASN.1 block. - - - - Validates the SPKAC request's signature. - - Challenge string. - True if valid; false if not valid. - - - - Gets the SPKAC request's public key info. This includes the key itself. - - Public key info. - - - - PKCS #10 certification request. This is the standard certificate format. - It is used (for example) by Internet Explorer's XEnroll control, but non-IE browsers generally use instead. - - - - - Creates a new PKCS #10 request for the specified subject and public key. - - Request subject. - Request public key. - - - - Parses a PKCS #10 request from an ASN.1 block. - - ASN.1 block. - - - - Validates the PKCS #10 request's signature. - - True if valid; false if not valid. - - - - Validates the PKCS #10 request's signature. - - Subject - in practice, this is used in place of a challenge string. - True if valid; false if not valid. - - - - Signs the certification request using a private key corresponding to the request's public key. - - An instance of . - Hash algorithm to use for the signature. - - - - Signs the certification request using a private key corresponding to the request's public key. - - An instance of representing the private key. - Hash algorithm to use for the signature. - - - - Signs the certification request using a private key corresponding to the request's public key. - - An instance of asymmetric algorithm such as RSACryptoServiceProvider, DSACryptoServiceProvider, RSAManaged or DSAManaged. - Hash algorithm to use for the signature. - - - - Gets list of alternative hostnames. - - List of alternative hostnames. - - - - Gets ASN.1 encoded form of this object. - - Array of bytes. - - - - Gets the PKCS #10 request's public key info. This includes the key itself. - - Public key info. - - - - Gets the PKCS #10 request's subject. - - Request subject. - - - - Gets the PKCS #10 request's attributes. - - Request attributes. - - - - Gets the PKCS #10 request's certificate extension collection (represented by 1.2.840.113549.1.9.14 attribute in collection). - - - - - Specifies the reason for inclusion in the certificate revocation list. - - - - Unspecified. - - - Key was compromised. - - - CA was compromised. - - - Affiliation changed. - - - Certificate was superseded. - - - Operation was ceased. - - - Certificate hold. - - - Remove from CRL. - - - - The certificate revocation list. - - - - - Base class for various PKCS objects. - - - - - Loads a CMS/PKCS #7 signed or enveloped message from a stream. - Returns an instance of for signed message, for enveloped message, or null for - methods and properties. - - A stream from which to load the message. - Gets or sets the to be used to find certificates corresponding to a . - A value indicating whether cryptographic providers are permitted to display a user interface. - An instance of , or null. - - - - Creates a certificate revocation list from an ASN.1 block. - - ASN.1 block. - - - - Loads a certificate revocation list from given stream. - - Stream to load the certificate revocation list from. - - - - Converts a certificate revocation list into a byte array. - - Byte array. - - - - Returns the certificate revocation list hash. - - CRL hash. - - - - Returns the certificate revocation list signature. - - CRL signature. - - - - Returns distribution point URL from issuing distribution point extension, if both present. Otherwise returns null. - - Distribution point URL. - - - - Checks whether the certificate revocation list contains the specified certificate. - Also makes sure that the CRL is suitable for the certificate. - - Certificate to check. - Revocation check result. - - Please note that this method does not check the validity of the CRL itself. - Call on the issuer certificate - to perform this check. - - - - - Gets the DN of the issuer of this certificate revocation list. - - DN of the issuer of this certificate revocation list. - - - - Gets the datetime of this CRL update. - - Datetime of this CRL update. - - - - Gets the datetime of the next CRL update. - - Datetime of the next CRL update. - - - - Gets the CRL number if appropriate extension is present. - - CRL number or null (Nothing in VB.NET) if not specified. - - - - Gets the collection of CRL's extensions. - - Extensions collection. - - - - Gets the collection of revoked certificates. - - Revoked certificate collection. - - - - Returns the key algorithm used to sign this certificate revocation list. - - The key algorithm. - - - - Returns the hash algorithm used to create the signed hash value. - - Hash algorithm. - - - - Collection of information about revoked certificates. A part of . - - - - - Creates a new instance of . - - - - - Information about revoked certificate. - - - - - Creates a new instance of revoked certificate based on the supplied data. - - Serial number. - Revocation date. - Revocation reason. - - - - Creates a new instance of revoked certificate based on the supplied data. - - Serial number. - Revocation date. - Revocation reason. - - - - Gets the certificate's serial number. - - Serial number. - - - - Returns revocation reason of the revoked certificate. - - If the revocation reason extension is present, returns the reason from that extension; otherwise returns . - - - - Gets the revocation date. - - Revocation date. - - - - Gets the collection of revoked certificate info's extensions. - - Extensions collection. - - - - Represents revocation check outcome. - - - - - The issuer of the certificate does not match the issuer of the CRL. - - - - - This CRL is not supposed to be used to check the status of this certificate (try the next CRL). - - - - - The certificate has not been revoked according to this CRL. - - - - - The certificate has been revoked. - - - - - Represents the result of certificate revocation check. - - - - - Gets revocation check outcome. - - - - - Gets the revocation date. - - Revocation date. - - - - Gets revocation reason of the revoked certificate. - - If the revocation reason extension is present, returns the reason from that extension; otherwise returns null (Nothing in VB.NET). - - - - Certificate revocation list status. - - - - - The CRL is valid (make sure to check the issuer certificate for validity as well). - - - - - The CRL has expired or is not valid yet. - - - - - The CRL has not been issued by the specified issuer. - - - - - The CRL contains an unsupported critical extension. - - - - - The CRL update time is outside the issuer certificate's time validity range. - - - - - The CRL issuer is not intended to issue CRLs. - - - - - The CRL signature is not valid. - - - - - Malformed structure of the CRL or its extensions. - - - - - Collection of certificate revocation lists. - - - - - The class represents the CMS/PKCS #7 ContentInfo data structure. - It encapsulates the content of or messages. - - - - - Initializes a new instance of using the specified array of bytes - as content and an object identifier "data" as content type. - - The message content. - - - - Initializes a new instance of using the specified array of bytes - as content and the specified object identifier as content type. - - The message content type. - The message content. - - - - Gets the content of the CMS/PKCS #7 message. - - An array of bytes that represent the content data. - - - - Copies the content of the CMS/PKCS #7 message into the supplied stream. - - Stream into which the content will be written. - - - - Gets the object identifier of the CMS/PKCS #7 message content type. - - - - - Gets the content of the CMS/PKCS #7 message. - - An array of bytes that represent the content data. - - Please note that the array is a copy of the content. - If you modify it, the actual content will not change. - - - - - Represents a CMS/PKCS #7 encrypted data. - - - - - Tries acquiring a private key unless it is already available. - - True if the key has been acquired, false otherwise. - - - - Gets the symmetric key used to encrypt the message, - or null if it cannot be retrieved. - - The symmetric key used to encrypt the message, or null. - - - - Gets the symmetric algorithm used to encrypt or decrypt the content, - or null if it cannot be retrieved. - - The . - - - - Encrypts the contents of the CMS/PKCS #7 message. - - - - - Decrypts the contents of the CMS/PKCS #7 message. - - For a successful decryption, a symmetric key must be available. - - - - Decodes an encoded CMS/PKCS #7 encrypted message from raw data. - Upon successful decoding, information can be retrieved using - methods and properties. - - Arrays of bytes representing a CMS/PKCS #7 message. - - - - Encodes the object into CMS/PKCS #7 message data. - - Array of bytes representing a CMS/PKCS #7 message. - - - - Determines whether the specified content info ASN.1 sequence is an enveloped data sequence. - - Sequence data. - Offset. - Count. - True if yes; false if not. - - - - Loads a CMS/PKCS #7 encrypted message from a stream. - Upon successful decoding, information can be retrieved using - methods and properties. - - A stream from which to load the message. - - - - Saves into a stream. - - A stream to which to save the message. - - - - Creates a copy of this object. - - A new object. - - - - Creates an instance of class. - It must be initialized using or methods before - any other methods and properties can be accessed. - - - - - Creates an instance of class using the specified content - information as the inner content. - - The inner content of the encrypted message. - - - - Creates an instance of class using the specified content - information and encryption algorithm. - - The inner content of the encrypted message. - Encryption algorithm identifier (see remarks). Can be null for 3DES. - - Currently, 3DES ("1.2.840.113549.3.7"), - AES ("2.16.840.1.101.3.4.1.2" for 128-bit, "2.16.840.1.101.3.4.1.22" for 192-bit and "2.16.840.1.101.3.4.1.42" for 256-bit), - DES ("1.3.14.3.2.7") and RC2 ("1.2.840.113549.3.2") algorithms are supported. - - - - - Creates an instance of class using the specified content - information and encryption algorithm. - - The inner content of the encrypted message. - Encryption algorithm identifier (see remarks). Can be null for 3DES. - The effective key length in bits (only used by RC2 algorithm). - - Currently, 3DES ("1.2.840.113549.3.7"), - AES ("2.16.840.1.101.3.4.1.2" for 128-bit, "2.16.840.1.101.3.4.1.22" for 192-bit and "2.16.840.1.101.3.4.1.42" for 256-bit), - DES ("1.3.14.3.2.7") and RC2 ("1.2.840.113549.3.2") algorithms are supported. - - - - - Gets or sets the to be used to find certificates - corresponding to a . - - The certificate finder. - - - - Gets or sets a value indicating whether cryptographic providers - are allowed to display any user interface (UI) when working with private keys. - - A value indicating whether a cryptographic provider can display a UI. - - - - Gets a value indicating whether the content is encrypted. - - A value indicating whether the content is encrypted. - - - - Gets the collection of unprotected (unencrypted) attributes associated with this CMS/PKCS #7 message. - - Unprotected attribute collection. - - - - Gets the collection of certificates that are embedded in the message. - - Collection of certificates - - - - Gets the collection of certificate revocation lists (CRLs) that are embedded in the message. - - Collection of CRLs - - - - Gets the collection of recipients associated with this CMS/PKCS #7 message. - - A collection of recipients. - - - - Gets the inner content information for this CMS/PKCS #7 message. - It contains the content type identifier and content data. - - The inner content. - - This method returns the encrypted content for parsed messages - and unencrypted content for newly created messages. To encrypt or decrypt - the content, use and methods. - - - - - Gets the identifier of the algorithm used to encrypt the content. - - An object. - - - - Returns a value indicating whether the private key to decrypt the symmetric key - and encrypted content is available. - - True if the private key is available, false if it isn't. - - - - Defines the interface that certificate finder classes must implement. - - - - - Finds a certificate corresponding to the specified subject identifier. - - Identifier of the subject certificate. - A certificate store containing the certificates that were included with the message. - Certificate chain if found, or null (Nothing in Visual Basic). - - - - Provides a set of common certificate finders. - - - - - Certificate finder. - - CertificateChain array. - A new instance of ICertificateFinder. - - - - Default certificate finder. - - - Searches for certificates in the current user's "My", - "Trusted people" and "Other people" stores. - - - - - Specifies private key file format. - - - - Base64-encoded PKCS #8 format. - - - PuTTY PPKv2 format. - - - OpenSSH/OpenSSL SSLeay format. - - - Raw PKCS #8 format. - - - New OpenSSH format with bcrypt key expansion (Base64-encoded keys with "BEGIN OPENSSH PRIVATE KEY" header). - - - - Represents a private key. - - - - - Creates a new instance of . Use the method to load a private key. - - - - - Creates a new instance of based on the specified RSA parameters. - - RSA parameters including private keys. - - - - Creates a new instance of based on the specified DSA parameters. - - DSA parameters including private keys. - - - - Generates a private key using the specified algorithm and default key size. - - Key algorithm. - An instance of . - - - - Generates a private key using the specified algorithm and key size. - - Key algorithm. - Key size. Specify 0 to use default key size. - An instance of . - - - - Gets the raw form of the private key. - - Array of bytes. - - - - Gets the raw form of the private key. - - Array of bytes. - - - - Gets a public key corresponding to the private key. - - An instance of . - - - - Gets the DSA parameters for a DSA key. May only be used for DSA private keys. - - DSA paramaters. - - - - Gets the RSA parameters for a RSA key. May only be used for RSA private keys. - - RSA paramaters. - - - - Gets ASN.1 encoded form of this object. - - Array of bytes. - - - - Saves the private key into the supplied stream in the specified format. - - A stream to which to save the private key. - Password to encrypted the private key, or null if no encryption desired. - Private key file format. - - - - Saves the private key into the supplied stream in the specified format. - - A file to which to save the public key. - Password to encrypted the private key, or null if no encryption desired. - Private key file format. - - - - Saves the private key into the supplied stream in Base64-encoded PKCS #8 format. - - A stream to which to save the private key. - Password to encrypted the private key, or null if no encryption desired. - Encryption algorithm identifier. Ignored if password is null. - - Currently, 3DES ("1.2.840.113549.3.7"), DES ("1.3.14.3.2.7") and RC2 ("1.2.840.113549.3.2") algorithms are supported. - - - - - Loads a PKCS #8, PuTTY or SSLeay (OpenSSL/OpenSSH) format private key from a stream. - Upon successful decoding, information can be retrieved using - methods and properties. - - A stream from which to load the private key. - Password used to encrypted the private key, or null if no password needed. - - - - Loads a PKCS #8, PuTTY or SSLeay (OpenSSL/OpenSSH) format private key from a stream. - Upon successful decoding, information can be retrieved using - methods and properties. - - A file from which to load the private key. - Password used to encrypted the private key, or null if no password needed. - - - - Gets the key algorithm identifier. - - Key algorithm identifier. - - - - Gets or ets the key comment. The comment is used while saving in some formats. - - Key comment. - - - - Represents a public key. - - - - - Creates a new instance of . Use the method to load a public key. - - - - - Creates a new instance of based on the specified RSA parameters. - - RSA parameters. - - - - Creates a new instance of based on the specified DSA parameters. - - DSA parameters. - - - - Gets the raw form of the public key. - - Array of bytes. - - - - Gets the raw form of the public key. - - Array of bytes. - - - - Gets ASN.1 encoded form of this object. - - Array of bytes. - - - - Gets the DSA parameters for a DSA public key. May only be used for DSA public keys. - - DSA paramaters. - - - - Gets the RSA parameters for a RSA public key. May only be used for RSA public keys. - - RSA paramaters. - - - - Returns the size of the key in bits. - - Size of the key in bits. - - - - Returns the key algorithm. - - Key algorithm. - - - - Saves the public key into the supplied stream in Base64-encoded PKCS #8 format. - - A stream to which to save the public key. - - - - Saves the public key into the supplied stream in Base64-encoded PKCS #8 format. - - A file to which to save the public key. - - - - Loads a PKCS #8 public key from a stream. - Upon successful decoding, information can be retrieved using - methods and properties. - - A stream from which to load the public key. - - - - Loads a PKCS #8 public key from a file. - Upon successful decoding, information can be retrieved using - methods and properties. - - A file from which to load the public key. - - - - Gets the key algorithm identifier. - - Key algorithm identifier. - - - - Represents a CMS/PKCS #7 encrypted message recipient. - This class is inherited by and classes. - - - - - Gets signature parameters (if available). - - Signature parameters. - - - - Gets the identifier of the recipient. - - Identifier of the recipient. - - - - Gets the identifier of the algorithm used to encrypt the symmetric key. - - An object. - - - - Gets the encrypted key for the recipient. - - Encrypted key. - - - - Gets the certificate associated with the recipient, or null if not available. - - The recipient's certificate, or null. - - - - Gets the certificate chain associated with the recipient, or null if not available. - - The recipient's certificate chain, or null. - - - - Defines key transport recipient information, typically using the RSA algorithm to - encrypt the shared symmetric key to transport. - - - - - Creates a new instance of that defines the - key transport recipient information for the owner of the specified RSA certificate. - Use to specify RSAES-OAEP parameters. - - The recipient's certificate. - - - - Creates a new instance of that defines the - key transport recipient information for the owner of the specified RSA certificate. - Use to specify RSAES-OAEP parameters. - - The recipient's certificate. - Subject identifier type - only IssuerAndSerialNumber and SubjectKeyIdentifier values are accepted. - - - - Creates a new instance of that defines the - key transport recipient information for the owner of the specified RSA certificate. - - The recipient's certificate. - Encryption parameters (to specify RSAES-OAEP parameters). Can be null (for PKCS #1). - - - - Creates a new instance of that defines the - key transport recipient information for the owner of the specified RSA certificate. - - The recipient's certificate. - Subject identifier type - only IssuerAndSerialNumber and SubjectKeyIdentifier values are accepted. - Encryption parameters (to specify RSAES-OAEP parameters). Can be null (for PKCS #1). - - - - Gets signature parameters (if available). - - Signature parameters. - - - - Gets the identifier of the recipient. - - Identifier of the recipient. - - - - Gets the identifier of the algorithm used to encrypt the symmetric key. - - An object. - - - - Gets the encrypted key for the recipient. - - Encrypted key. - - - - Gets the certificate associated with the recipient, or null if not available. - - The recipient's certificate, or null. - - - - Gets the certificate chain associated with the recipient, or null if not available. - - The recipient's certificate chain, or null. - - - - Defines key agreement algorithm recipient information. The key itself is not transported - the two - parties that will be using a symmetric key both take part in its generation. Please note that - this method is not yet fully supported by Rebex Security library. - - - - - Gets the identifier of the key originator. - - Identifier of the key originator. - - - - Gets the identifier of the recipient. - - Identifier of the recipient. - - - - Gets the identifier of the algorithm used to encrypt the symmetric key. - - An object. - - - - Gets the encrypted key for the recipient. - - Encrypted key. - - - - Gets the certificate associated with the recipient, or null if not available. - - The recipient's certificate, or null. - - - - Gets the certificate chain associated with the recipient, or null if not available. - - The recipient's certificate chain, or null. - - - - A collection of objects. - - - - - Creates an empty and read-only instance of . - - - - - Represents a CMS/PKCS #7 signed data. - - - - - Creates a signatures for all signers that do not have one yet. - - - - - Creates a signatures for all signers that do not have one yet. - - Signature options. - - - - Validates all digital signatures on this CMS/PKCS #7 signed message - and validates all the signers' certificates. - - Validation result. - - - - Validates all digital signatures on this CMS/PKCS #7 signed message. - Optionally, signers' certificates are validated, and the specified validation - options are taken into account. - - Specifies whether to only verify the signatures, skipping the certificate validation. - Signature and certificate validation options. - Validation result. - - - - Validates all digital signatures on this CMS/PKCS #7 signed message. - Optionally, signers' certificates are validated, and the specified validation - options are taken into account. - - Specifies whether to only verify the signatures, skipping the certificate validation. - Signature and certificate validation options. - Certificate chain engine. - Validation result. - - - - Decodes an encoded CMS/PKCS #7 signed message from raw data. - Upon successful decoding, information can be retrieved using - methods and properties. - - Array of bytes representing a CMS/PKCS #7 message. - - - - Encodes the object into CMS/PKCS #7 message data. - - Array of bytes representing a CMS/PKCS #7 message. - - - - Determines whether the specified content info ASN.1 sequence is a signed data sequence. - - Sequence data. - Offset. - Count. - True if yes; false if not. - - - - Loads a CMS/PKCS #7 signed message from a stream. - Upon successful decoding, information can be retrieved using - methods and properties. - - A stream from which to load the message. - - - - Saves into a stream. - - A stream to which to save the message. - - - - Creates a copy of this object. - - A new object. - - - - Creates an instance of class. - - - - - Creates an instance of class using the specified content - information as the inner content. - - The inner content of the signed message. - - - - Creates an instance of class using the specified content - information as the inner content. - - The inner content of the signed message. - - Specifies whether the signature is detached. - If detached, the actual content is not included within the signed message. - - - - - Specifies what parts of the certificate chain should be included in the signed data. - - Certificate include option. - - - - Gets or sets the to be used to find certificates - corresponding to a . - - The certificate finder. - - - - Gets or sets a value indicating whether cryptographic providers - are allowed to display any user interface (UI) when working with private keys. - - A value indicating whether cryptographic providers can display a UI. - - In case of signing, the actual behavior is determined by the combination of this value and the value of - passed to associated objects. - Cryptographic providers are only permitted to display a UI if both Silent properties are set to true. - - - - - Gets the collection of certificates that are embedded in the message. - - Collection of certificates - - - - Gets the collection of certificate revocation lists (CRLs) that are embedded in the message. - - Collection of CRLs - - - - Gets the collection of signers associated with this CMS/PKCS #7 message. - - A collection of signers. - - - - Gets or sets the inner content information for this CMS/PKCS #7 message. - It contains the content type identifier and content data. - - The inner content. - - - - Gets or sets a value indicating whether the actual content is detached from the message. - - True if the content is detached; False if the content is embedded within the message. - - - - Specifies what parts of the certificate chain should be included in the message. - - - - Leave the existing certificate in the collection. - - - The certificate chain is not included. - - - The certificate chain is included, except for the root certificate. - - - Only the end certificate is included. - - - The certificate chain, including the root certificate, is included. - - - - Represents a CMS/PKCS #7 message signer. - - - - - Gets a value that identifies the digest algorithm. - - Digest algorithm. - - - - Gets signature parameters (if available). - - Signature parameters. - - - - Validates the signer's digital signature and validates the certificate. - - Validation result. - - - - Validates the signer's digital signatures. - Optionally, signers' certificates are validated, and the specified validation - options are taken into account. - - Specifies whether to only verify the signatures, skipping the certificate validation. - Signature and certificate validation options. - Validation result. - - - - Validates the signer's digital signatures. - Optionally, signers' certificates are validated, and the specified validation - options are taken into account. - - Specifies whether to only verify the signatures, skipping the certificate validation. - Signature and certificate validation options. - Certificate chain engine. - Validation result. - - - - Creates a signatures for the signer. - - - - - Creates a signature for the signer. - - Signature options. - - - - Creates a new instance of that defines - a signer corresponding to the specified certificate. An associated private - key for the certificate must be available. - Use to specify RSASSA-PSS parameters. - - The signer's certificate. - - - - Creates a new instance of that defines - a signer corresponding to the specified certificate. An associated private - key for the certificate must be available. - Use to specify RSASSA-PSS parameters. - - The signer's certificate. - Subject identifier type - only IssuerAndSerialNumber and SubjectKeyIdentifier values are accepted. - - - - Creates a new instance of that defines - a signer corresponding to the specified certificate. An associated private - key for the certificate must be available. - Use to specify RSASSA-PSS parameters. - - The signer's certificate. - Subject identifier type - only IssuerAndSerialNumber and SubjectKeyIdentifier values are accepted. - Digest algorithm. - - - - Creates a new instance of that defines - a signer corresponding to the specified certificate. An associated private - key for the certificate must be available. - - The signer's certificate. - Signature parameters (to specify RSASSA-PSS parameters). Can be null (for PKCS #1). - - - - Creates a new instance of that defines - a signer corresponding to the specified certificate using the - specified subject identifier type. An associated private - key for the certificate must be available. - - The signer's certificate. - Signature parameters (to specify RSASSA-PSS parameters). Can be null (for PKCS #1). - Subject identifier type - only IssuerAndSerialNumber and SubjectKeyIdentifier values are accepted. - - - - Gets the identifier of the signer. - - Identifier of the signer. - - - - Gets the identifier of the digest algorithm. - - An object. - - - - Gets the identifier of the signature algorithm. - - An object. - - - - Gets the signature, or null if it is not available yet. - - The signature. - - - - Gets the collection of signed attributes associated with this CMS/PKCS #7 message. - - Signed attribute collection. - - - - Gets the collection of unsigned attributes associated with this CMS/PKCS #7 message. - - Unsigned attribute collection. - - - - Gets the certificate associated with the signer, or null if not available. - - The signer's certificate, or null. - - - - Gets the certificate chain associated with the signer, or null if not available. - - The signer's certificate chain, or null. - - - - Gets the signing time, or 1970-01-01 if not available. - - Singing time. - - - - Gets the preferred subject identifier for key encryption. - - The preferred subject identifier. - - - - Gets the collection of S/MIME capabilities the signer supports. - - Collection of supported S/MIME capabilities. - - - - A collection of objects. - - - - - Creates an empty and read-only instance of . - - - - - Options for and methods. - - - - Don't include any signed attributes in the signature. Not recommended. - - - Don't include key Microsoft extensions in the signature attributes. - - - Don't include S/MIME capabilities extensions in the signature attributes. - - - Skip certificate usage check. - - - - Signature validation status. - - - - Certificate is not valid. - - - Certificate is not available. - - - A digest algorithm is not supported. - - - A signature algorithm is not supported. - - - A signature is invalid. - - - Invalid key usage. The certificate usage doesn't include message signing. - - - Content type mismatch. - - - - Represents the result of signature validation. - - - - - Gets the status mask. - - Status mask. - - - - Gets the certificate validation status mask. - - Certificate validation status mask. - - - - Gets the certificate chain validity status. - - True if valid, false if not valid. - - - - Represents an S/MIME capability. - - - - - Initializes an instance of a with no parameters. - - The object identifier that identifies the S//MIME capability. - - - - Initializes an instance of a . - - The object identifier that identifies the S//MIME capability. - Capability parameters in ASN.1 format. - - - - Gets the object identifier that identifies the S/MIME capability. - - The object identifier. - - - - Gets the S/MIME capability parameters. - - An array of bytes in ASN.1 format. - - - - A collection of objects. - - - - - Gets or sets the at the specified index. - - The zero-based index of the to get or set. - An S/MIME capability. - - - - Gets the first with the specified object identifier. - - The object identifier, either friendly name or dotted string format. - An S/MIME capability if found, or null if not found. - - - - Defines the type of subject identifier that identifies a subject and a certificate. - - - - - The type of subject identifier is unknown. - - - - - The subject is identified by the certificate issuer and serial number. - - - - - The subject is identified by the hash of the subject's public key. The hash algorithm used is determined by the signature algorithm suite in the subject's certificate. - - - - - The subject is identified by the subject's public key. - - - - - The class identifies a subject, either by certificate issuer - and serial number, by the subject key identifier or by a public key. - - - - - Gets the type of the subject identifier. - - The type of the subject identifier. - - - - Gets the of the certificate issuer if - this subject identifier is identified by the issuer name and serial number. - Otherwise, this property will return null. - - Certificate issuer. - - - - Gets the serial number of the certificate if - this subject identifier is identified by the issuer name and serial number. - Otherwise, this property will return null. - - Certificate serial number. - - - - Gets the subject key identifier of the certificate if - this subject identifier is identified by the subject key identifier. - Otherwise, this property will return null. - - Certificate subject key identifier. - - - - Gets the public algorithm of the certificate if - this subject identifier is identified by the public key. - Otherwise, this property will return null. - - Certificate public key algorithm. - - - - Gets the public of the certificate if - this subject identifier is identified by the public key. - Otherwise, this property will return null. - - Certificate public key. - - - - Represents sorting order. - - - - - Ascending sort order. - - - - - Descending sort order. - - - - - Log writer acting as a container that writes log messages to all inner writers. - - - - - Creates a new instance of a tee log writer over given set of individual . - - A non-empty collection of log writers. - - - - Creates a new instance of a tee log writer over given set of individual . - - A non-empty array of log writers. - - - - Write a message into all inner writers. - - Message level. - Logging object type. - Logging object ID. - Logging area. - Message. - - - - Write a message and data block into all inner writers. - - Message level. - Logging object type. - Logging object ID. - Logging area. - Message. - Data block. - Data offset. - Date length. - - - - Implements the interface method IDisposable.Dispose - Use this method to explicitly release all resources hold by the inner writers. - - - - - A cumulative log level.
- When getting, it returns the minimum level of inner writers' levels.
- When setting, the value is propagated to all inner writers. -
- Log level. -
- - - Specifies granularity for time comparisons. - - - - - Time is taken as is. - - - Useful when working with NTFS file system. - - - - - The smallest time unit is one second (milliseconds are ignored). - E.g. 11:33:55.999 is rounded to 11:33:55.000. - - - Useful when working with some UNIX FTP or SFTP servers. - - - - - The smallest time unit is two-second. So odd seconds are rounded to lower even value (milliseconds are ignored). - E.g. 11:33:55.999 is rounded to 11:33:54.000. - - - Useful when working with FAT file system (.NET CF, MS-DOS). - - - - - The smallest time unit is one day (time component is ignored). - E.g. 2012-12-12 11:33:55.999 is rounded to 2012-12-12 00:00:00.000. - - - Useful when working with some UNIX FTP or SFTP servers. - - - - Creates an instance of class. - - - Creates an instance of class. - - - Creates an instance of class. - - - Creates an instance of class. - - - Creates an instance of class. - - - Creates an instance of class. - -
-
\ No newline at end of file diff --git a/packages/Rebex.Common.2.5.6930/lib/xamarinmac20/Rebex.Common.dll b/packages/Rebex.Common.2.5.6930/lib/xamarinmac20/Rebex.Common.dll deleted file mode 100644 index 2610051b..00000000 Binary files a/packages/Rebex.Common.2.5.6930/lib/xamarinmac20/Rebex.Common.dll and /dev/null differ diff --git a/packages/Rebex.Common.2.5.6930/lib/xamarinmac20/Rebex.Common.xml b/packages/Rebex.Common.2.5.6930/lib/xamarinmac20/Rebex.Common.xml deleted file mode 100644 index 6bf2769e..00000000 --- a/packages/Rebex.Common.2.5.6930/lib/xamarinmac20/Rebex.Common.xml +++ /dev/null @@ -1,8608 +0,0 @@ - - - Rebex.Common - - - - - Console-based log writer that writes log messages to the console. - - - - - Common base class for log writers. A derived class must override either the method or both Write methods. - - - - - Defines methods and properties all log writers must implement. - - - - - Write a message into the log. - - Message level. - Logging object type. - Logging object ID. - Logging area. - Message. - - - - Write a message and data block into the log. - - Message level. - Logging object type. - Logging object ID. - Logging area. - Message. - Data block. - Data offset. - Date length. - - - - Get or set the log level - only log messages with log level equal to or greater than the specified one. - - Log level. - - - - Creates a new instance of . - - - - - Closes the log writer. - - - - - Releases unmanaged and managed resources (depending on the scenario). - If is false, the method has been called from - the finalizer and should not reference other objects (therefore only unmanaged resources can be disposed). - - True indicates that the method has been called via IDisposable.Dispose. - False indicates that it has been called by the finalizer. - - - - Writes a message into the log. - - Message level. - Logging object type. - Logging object ID. - Logging area. - Message. - - - - Writes a message and data block into the log. - - Message level. - Logging object type. - Logging object ID. - Logging area. - Message. - Data block. - Data offset. - Date length. - - - - Appends the specified message text into a text-based log. This method is only called by method - and is only used by text-based loggers. - - Full message info. - - - - Disposes the object. - - - - - Gets or sets the log level - only log messages with log level equal to or greater than the specified one. - - Log level. - - - - Get a value indicating whether the log writer is closed. - - True when log writer is closed. False if log writer is opened and ready for writing. - Implementation in this base class returns false, as the close method actually does not close any resource. - - - - Creates a new instance of console log writer with a log level of Info. - - - - - Creates a new instance of console log writer with the specified log level. - - Log level. - - - - Writes a message into the log. - - Message level. - Logging object type. - Logging object ID. - Logging area. - Message. - - - - Writes a message and data block into the log. - - Message level. - Logging object type. - Logging object ID. - Logging area. - Message. - Data block. - Data offset. - Date length. - - - - Appends the specified message text into a text-based log. - - Full message info. - - - - Gets or sets a value that indicates whether to use console colors. - - - - - Various methods related to encoding (charset) used by Rebex components. - - - - - Gets a list of supported encoding names. - - List of encoding names. - - - - Returns the encoding associated with the specified code page name. - - Code page name. - Encoding. - - - - Returns the encoding associated with the specified code page. - - Code page. - Encoding. - - - - ASCII encoding. - - - - - Default encoding. - - - - - UTF-8 encoding. - - - - - File-based log writer that saves log messages into a text file. - - - - - Creates a new instance of file log writer based on the specified file and the default "Info" log level. - - Path to log file. - - - - Creates a new instance of file log writer based on the specified file and log level. - - Path to log file. - Log level. - - - - Dispose(bool disposing) executes in two distinct scenarios. - If disposing equals true, the method has been called directly - or indirectly by a user's code. Managed and unmanaged resources - can be disposed. - If disposing equals false, the method has been called by the - runtime from inside the finalizer and you should not reference - other objects. Only unmanaged resources can be disposed. - - If true, is called by IDisposable.Dispose. - Otherwise it is called by finalizer. - - - - Appends the specified message text into a text-based log. - - Full message info. - - - - Finalizer. Called by garbage collector during object destruction. - - - - - Path to the log file. - - - - - Get a value indicating whether the log writer is closed. - - True when logfile is closed. False if logfile is opened and ready for writing. - - - - Log level - specifies the levels of severity. - - - - - Be verbose - log everything. - - - - - Log all messages useful for debugging purposes. - - - - - Only log informative messages. - - - - - Only log errors. - - - - - The Off level designates a higher level than all the rest. - - - - - Define properties and methods for logging providers. - - - - - Gets a to use for logging. - - - - - Represents mode for interval boundaries. - - - - - Include interval boundary. - - - - - Exclude interval boundary. - - - - - Represents a file or directory item. - - - - - Gets the last modification time of the item. - - - - - Gets the last access time of the item. - - - - - Gets the creation time of the item. - - - - - Gets file length. - - - - - Gets the last modification time of the item. - - - - - Gets the last access time of the item. - - - - - Gets the creation time of the item. - - - - - Gets a value indicating whether the item is a file. - - True if the item is a file; false otherwise. - - - - Gets a value indicating whether the item is a directory. - - True if the archive item is directory; false otherwise. - - - - Gets a value indicating whether the item is a link. - - True if the archive item is a link; false otherwise. - - - - Gets the name of the file or directory. - - The name of the file or directory. - - - - Gets the path of the file or directory. - It can be relative or absolute path depending on the way of use. - - It contains a full path if returned by the GetItems method or a file/directory name only if returned by the GetList method. - The path of the file or directory. - - - - Currently executed operation. - - - - Uploading files. - - - Downloading files. - - - Deleting files. - - - Getting item list. - - - - Current traversal state of the . - - - - - Retrieving of the file system hierarchy was started. - - - - - Retrieving of the file system hierarchy was successfully completed. - - - - - Retrieving of the particular directory hierarchy was started. - - - - - Retrieving of the particular directory hierarchy was successfully completed. - - - - - Current transfer state of the . - - - - - Directory processing was started. - - - - - Processing of a file was started. - - - - - File was successfully transferred. - - - - - A file data block was processed. - - - - - The transfer action was successfully completed. - Triggered only with multi-file operations. (For single-file operations, only is triggered.) - - - - - Current delete state of the . - - - - - File processing was started. - - - - - File was successfully deleted. - - - - - Directory processing was started. - - - - - Directory was successfully deleted. - - - - - The delete action was successfully completed. - - - - - Detailed specification of a problem that occurred during a multi-file operation. - - - - - A target file with the same name already exists. - - - - - A symbolic link was detected. - - - - - Symbolic link is probably a part of an infinite loop in the file system hierarchy. - - - - - Cannot create target directory. - - - - - Cannot transfer file. - - - - - Cannot read from a directory. - - - - - Cannot find the file which was found while retrieving file system hierarchy earlier. - - - - - Name of the file is invalid on the target file system. - For example, backslash is a valid filename character on Unix FTP servers, but invalid in local Windows file system. - - - - - Name of the directory is invalid on the target file system. - For example, backslash is a valid directory name character on Unix FTP servers, but invalid in local Windows file system. - - - - - Cannot find the directory which was found while retrieving file system hierarchy earlier. - - - - - Cannot find the link which was found while retrieving file system hierarchy earlier. - - - - - Link is corrupted or its target cannot be found. - - - - - Currently processed item is neither a file nor a directory. - - - - - Operation was canceled. - - - - - Feature required to complete the operation is not supported. - - - - - Cannot delete the file. - - - - - Cannot delete the directory. - - - - - Cannot calculate checksum. - - - - - Specifies the reaction to resolve the current problem that occurred during a multi-file operation. - - - - - Cancel the whole operation. An exception with the value is thrown. - - - - - Cancel the whole operation. An exception is thrown. - - - - - Skip the current problematic item. - - - - - Retry the current operation again. - - - - - Overwrite target file with the same name. - - - - - Transfer the source file to a different name. - - - - - Resume target file. - - - - - Resolve the symbolic link. - - - - - Specifies the condition for overwriting a file. - - - - - No condition = always overwrite. - - - - - Overwrite if size differs. - - - - - Overwrite if the target file is older than the source file. - If working with remote servers, this condition is strongly discouraged - because modification dates are often misreported by FTP servers, - making this mode highly unreliable. - - - - - Overwrite if checksum differs. - Available for ZIP and FTP; only some FTP servers support checksums.
- You can check availability of this condition using method. -
-
- - - Provides data for the ProblemDetected event. - - - - - Initializes a new instance of the class (for internal use only). - - Event data. - - - - Determines whether the specified reaction is currently possible - use this to determine which reactions can be applied. - - Desired reaction. - True if the specified reaction is possible; false otherwise. - - - - Determines whether the specified overwrite condition is currently possible - use this to determine which overwrite conditions can be applied. - - Desired condition. - True if the specified condition is possible; false otherwise. - - - - Indicate to the sender that the problematic item should be skipped. - - - - - Indicate to the sender that the operation should be canceled. - - - - - Indicate to the sender that an exception should be raised. - - - - - Indicate to the sender that the operation on the current item should be retired. - - - - - Indicate to the sender that the current item should be resumed. - - - - - Indicate to the sender that the current link should be resolved. - - - - - Indicate to the sender that the current item should be renamed. - New name is generated from the current item according the pattern "filename[number].extension". - - - - - Indicate to the sender that the current item should be renamed. - - New name of the item or null (Nothing in Visual Basic) to use generated name according the pattern "filename[number].extension". - - - - Indicate to the sender that the current item should be overwritten. - - - - - Indicate to the sender that the current item should be overwritten if the specified condition is met. - - Condition for the overwrite. - - - - Gets the current transfer action. - - Current transfer action. - - - - Gets the exception which will be raised if chosen Reaction is . - - Exception. - - - - Gets the type of the error that classifies the problem. - - Problem type. - - - - Gets the path of the local file or directory that is currently processed. - - Local path. - - - - Gets the local file or directory that is currently processed or null (Nothing in Visual Basic) if not available. - - Local item. - - - - Gets the path of the remote file or directory that is currently processed. - - Remote path. - - - - Gets the remote file or directory that is currently processed or null (Nothing in Visual Basic) if not available. - - Remote item. - - - - Gets the currently selected reaction to the current problem. - - The operation to be performed as the next step of the multi-file operation execution. - - - - Gets the condition to apply for the Overwrite reaction. - If the chosen reaction is not Overwrite, this property is ignored. - - Overwrite condition. - - - - Gets the new name for the currently processed file or directory. - If the chosen reaction is not Rename, this property is ignored. - - New name. - - - - Gets a user state object. - - User state object. - - - - Provides data for the Traversing event. - - - - - Initializes a new instance of the class (for internal use only). - - Event data. - - - - Gets the current transfer action. - - Current transfer action. - - - - Gets the current traversing state of the current . - - Current traversing state of the current . - - - - Gets the file or directory which is currently processed. - - Currently processed item. - - - - Gets the current total number of files to be processed (traversed so far). - - Current total number of files to be processed (traversed so far). - - - - Gets the current total number of bytes to be processed (traversed so far). - - Current total number of bytes (traversed so far). - - - - Gets a user state object. - - User state object. - - - - Provides data for the TransferProgressChanged event. - - - - - Initializes a new instance of the class (for internal use only). - - Event data. - - - - Gets the current transfer action. - - Current transfer action. - - - - Gets the current transfer state of the current . - - Current transfer state of the current . - - - - Gets the file or directory which is currently processed. - - Currently processed item. - - - - Gets the target path of the file or directory which is currently processed. - - Target path. - - - - Gets the total number of bytes transferred during the transfer of the current file. - - The number of bytes transferred. - - - - Gets the total number of files to be transferred. - - Number of files. - - - - Gets the number of files that were already processed (either transferred or skipped). - - Number of files. - - - - Gets the number of files that were already successfully transferred. - - Number of files. - - - - Gets the total number of bytes to be transferred. - - Number of bytes. - - - - Gets the total number of bytes transferred. - - Number of bytes. - - - - Gets the number of bytes transferred during the current transfer since the last time the event was raised. - - The number of bytes transferred since the last time the event was raised. - - - - Gets the current transfer speed in bytes transferred per second (or 0 if not available). - - An estimate of the current speed in number of bytes per second. - Value of 0 indicates that this information is not available. - - - - Gets a number between 0 and 100 representing the percentage of completeness of the operation. - - Percentage value (0..100). - - - - Gets a number between 0 and 100 representing the percentage of completeness of the current file transfer. - - Percentage value (0..100). - - - - Provides data for the DeleteProgressChanged event. - - - - - Initializes a new instance of the class (for internal use only). - - Event data. - - - - Gets the current delete state of the current . - - Current delete state of the current . - - - - Gets the file or directory which is currently processed. - - Remote item. - - - - Gets the total number of files to be deleted. - - Number of files. - - - - Gets the number of files that were already processed (either deleted or skipped). - - Number of files. - - - - Gets the number of files that were already successfully deleted. - - Number of files. - - - - Gets a number between 0 and 100 representing the percentage of completeness of the operation. - - Percentage value (0..100). - - - - Specifies checksum algorithm. - - - - - SHA-1 checksum. - - - - - SHA-256 checksum. - - - - - SHA-384 checksum. - - - - - SHA-512 checksum. - - - - - MD5 checksum. - - - - - SHA-224 checksum. - - - - - Request CRC32 checksum. - - - - - Represents data checksum. - - - - - Returns checksum data. - - - - - - Creates an instance of an object that represents data checksum. - - Checksum algorithm used to compute the checksum. - Checksum data. - - - - Implicit conversion from to string. - - Checksum to convert to string. - Hex string representation of the checksum. - - - - Comparest the checksum with another object of the same type and returns a value indicating whether - the current instance precedes, follows or occurs in the same position in the sort order. - - Object to compare with this instance. - A value that indicates the relative order of checksums being compared. - - - - Returns a value indicating whether the specified object is equal to this checksum. - - Object to compare with this instance. - True if the two instances are same type and represent the same checksum. - - - - Returns the hash code for this checksum. - - - - - - Returns a hex string representation of this checksum. - - Hex string representation of this checksum. - - - - Returns checksum algorithm. - - - - - Returns a hex string representation of the checksum. - - - - - Specifies modes of the method. - - - - - Specifies whether the specified regular file matches the the . - - - - - Specifies whether the specified directory matches the the . - - - - - Specifies whether the specified directory should be traversed to retrieve another matches. - - - - - Set of inclusion and exclusion patterns. - It doesn't depend on the order how the inclusion and exclusion patterns are added into the . - - - - - Initializes a new instance of the class. - - - - - Initializes a new instance of the class. - - A path to be considered as a base path of the set. - - - - Initializes a new instance of the class. - - Directory separators to be used in all paths. - - - - Initializes a new instance of the class. - - A path to be considered as a base path of the set. - Directory separators to be used in all paths. - - - - Initializes the object. - - A path to be considered as a base path of the set. - A path or mask relative to a base path which define an initial inclusion pattern. - - - - Initializes the object. - - A path to be considered as a base path of the set. - A path or mask relative to a base path which define an initial inclusion pattern. - Specifies traversal mode of directories for the . - - - - Adds a path or mask into collection of inclusion patterns. The supported wildcards are '?' and '*' and '**'. - For detailed specification with examples see the documentation. - - A path or mask (relative to the base path) which define an inclusion pattern. - - - - Adds a path or mask into collection of inclusion patterns. The supported wildcards are '?' and '*' and '**'. - For detailed specification with examples see the documentation. - - A path or mask (relative to the base path) which define an inclusion pattern. - Specifies traversal mode of directories for the . - - '?' matches any single character.
- '*' matches any number of any characters except the directory separators.
- '**' matches any number of any characters (directory separators can be reduced e.g. "a\**\b" is equivalent to "a\**\**\b" which matches "a\x\y\z\b" and also "a\b" but not "ab").
- - - - - - - - - - - - - - -
data\file-???.txtMatches files within the "data" directory e.g. "data\file-007.txt", but not "data\file-7.txt".
data\*.txtMatches any ".txt" file within the "data" directory (only within the "data" directory, not in subdirectories) e.g. "data\file.txt", but not "data\a\b\c\file.txt".
data\**\*.txtMatches any ".txt" file anywhere within the "data" directory and its subdirectories e.g. "data\file.txt" and also "data\a\b\c\file.txt".
-
-
- - - Adds a path or mask into collection of exclusion patterns. The supported wildcards are '?' and '*' and '**'. - For detailed specification with examples see the documentation. - - A path or mask (relative to the base path) which define an exclusion pattern. - - - - Adds a path or mask into collection of exclusion patterns. The supported wildcards are '?' and '*' and '**'. - For detailed specification with examples see the documentation. - - A path or mask (relative to the base path) which define an exclusion pattern. - Specifies traversal mode of directories for the . - - '?' matches any single character.
- '*' matches any number of any characters except the directory separators.
- '**' matches any number of any characters (directory separators can be reduced e.g. "a\**\b" is equivalent to "a\**\**\b" which matches "a\x\y\z\b" and also "a\b" but not "ab").
- - - - - - - - - - - - - - -
data\file-???.txtMatches files within the "data" directory e.g. "data\file-007.txt", but not "data\file-7.txt".
data\*.txtMatches any ".txt" file within the "data" directory (only within the "data" directory, not in subdirectories) e.g. "data\file.txt", but not "data\a\b\c\file.txt".
data\**\*.txtMatches any ".txt" file anywhere within the "data" directory and its subdirectories e.g. "data\file.txt" and also "data\a\b\c\file.txt".
-
-
- - - Returns a value indicating whether the specified relative path matches the . - This method is intended to be overwritten by descendants. - In this case please note that for optimization issues when called with parameters equal to "." and - this method should return false if no inclusion pattern was specified; true otherwise. - - A relative path to a base path to be tested for a match. - Specifies how the should be treated for match. - True if the path matches the set; false otherwise. - - - - Gets a collection of local file system items (files and directories) which matches this . - Only items which matches no exclusion pattern and matches at leas one inclusion pattern are included into result collection. - It doesn't depend on the order how the inclusion and exclusion patterns were added into the .
- If you don't want to include empty directories into result collection, please set the to false. -
- A collection of local file system items which matches this . -
- - - Gets or sets the base path of the set. - - A path to be considered as a base path of the set. - - - - Gets or sets a value indicating whether the is case sensitive. - - True if the is case sensitive; false otherwise. - - - - Gets or sets a value indicating whether a consumer of the should include empty directories or not. - Also used in the method. - - True if empty directories should not be included; false otherwise. - - - - Gets or sets a value indicating whether a consumer of the should also include directories where the files are located. - Also used in the method. - Example: Ftp.GetItems("DIR/*.txt") - this property determines whether item "DIR" should be also included in output collection. - - True if directories where the files are located should be included; false otherwise. - - - - Gets or sets a value indicating whether a consumer of the should flatten the output. - Flatten means to don't persist directory structure. - For example if used to upload files "A/a.txt" and "B/b.txt" to the "/data" directory on a FTP server, - files "a.txt" and "b.txt" are uploaded directly into the "/data" directory - (directories "A" and "B" are not created in the "/data" directory). - - True if flatten the output; false otherwise. - - - - The exception that is thrown when an error occurs while using Rebex FileSystem. - - - - - Initializes a new instance of the class. - - - - - Initializes a new instance of the class. - - - - - Initializes a new instance of the class. - - - - - Represents a file system provider. - - This type is not intended to be used directly from your code. To implement custom file system providers, - add reference to the Rebex.FileSystem assembly and use one of the following base classes. - - - - Constructor. - - - - - Performs application-defined tasks associated with freeing, releasing, or resetting resources. - - 2 - - - - Derived classes must create a child file system with the root path equals to the . - - Root path of the child file system. - Child file system with the root path equals to the . - - - - Releases the resources used by the . - - true to release both managed and unmanaged resources; false to release only unmanaged resources. - - - - Configuration options for the . - - - - - Initializes new instance of the . - - - - - Gets or sets value indicating - whether the method is called for directories. - - Default value is false. - - - - - Gets or sets value indicating - whether the strict checks for is enabled. - - Default value is false. - - Enable strict checks only for debugging purposes. Do not use strict checks in production. - - - - - Gets or sets value indicating - whether the method is called for directories. - - Default value is false. - - - - - Gets or sets value indicating - whether the method is called for directories. - - Default value is false. - - - - - Gets or sets used for logging. - - Default value is null. - - - - - Gets or sets default used by the classes - inherited from the - and . - - - - - Represents basic type of the Rebex file system. - - - - - Read only Rebex file system. - - - - - Read-write Rebex file system. - - - - - Represents an attributes of the node. - - - - - Initializes a new instance of the - - of the node - - - Indicates whether the current object is equal to another object of the same type. - true if the current object is equal to the parameter; otherwise, false. - An object to compare with this object. - - - - - - - - - - Determines whether two specified have the same value. - - The first to compare, or null. - The second to compare, or null. - true if the value of left is the same as the value of right, otherwise false. - - - - Determines whether two specified have different values. - - The first to compare, or null. - The second to compare, or null. - true if the value of left is different from the value of right; otherwise false. - - - Returns a string that represents the current . - A string that represents the current . - 2 - - - - Gets the file atttributes of the node. - - - - - Gets a value indicating whether the .ReadOnly flag is set. - - true if the the .ReadOnly flag is set, otherwise false. - - - - Represents a content of a file. - - - - Performs application-defined tasks associated with freeing, releasing, or resetting resources. - 2 - - - - Method creates read only content from the given . - - Stream containing the content of the node. - New read only content. - - - - - - Method creates read/delayed write content from the given stream. - Use this method when following is desired/acceptable behavior: -
  • Underlying stream does not support immediate writing to the file.
  • When previously returned from this method is disposed - and underlying stream has been changed, then - the method method - in the is called.
- Stream containing the content of the node. - New read/delayed write content. - - -
- - - Method creates read/immediate write content from the given stream. Use this method when following is desired/acceptable behavior: -
  • Stream supports immediate writing to the file (e. g. ).
  • SaveContent method in ReadWriteFileSystemProvider is NEVER called. All data are written immediately using the suitable write methods.
- Stream containing the content of the node. - New read/immediate write content. - - -
- - - Returns with the content of the file. - - Stream with the content of the file. - - - - Gets a value indicating whether underlying stream of this instance is read only. - - true if the content is read only, otherwise false. - - - - Returns a value indicating whether this node's stream was closed forcefully. - Forceful close occurs if the stream is not gracefully closed by the consumer. - - - - - Represents read, write or read/write access to the file. - - This enumeration has a attribute that allows a bitwise combination of its member values. - - - - - Read access to the file. - - - - - Write access to the file. - - - - - Read and write access to the file. - - - - - Represents retrieval parameters. - - - - - Represents read access requirement. - - - - - Represents write access requirement. - - - - - Represents read and write access requirement. - - - - - Initializes a new instance of the - Required access type to the file. - - - - - - - - - - - - - Determines whether two specified have the same value. - - The first to compare, or null. - The second to compare, or null. - true if the value of left is the same as the value of right, otherwise false. - - - - Determines whether two specified have different values. - - The first to compare, or null. - The second to compare, or null. - true if the value of left is different from the value of right; otherwise false. - - - Returns a string that represents the current . - A string that represents the current . - 2 - - - - Gets required access type to the file. - - - - - Representats a file system path. - - - - - Used directory separator. - - - - - Name of the root directory. - - - - - Represents the empty . - - - - - Initializes a new instance of the . - - Examples of the valid path: - - / - - /dir1 - - /dir1/ - - /dir1/dir2 - - /dir1/dir2/ - - /dir1/dir2/file.txt - - path in the string format - Exception is thrown when the is malformed. - - - - Returns an array of characters not allowed in . - - - - - Gets an enumerator that iterates through the elements of this path. - - - - Indicates whether the current is equal to another . - true if the current object is equal to the parameter; otherwise, false. - An to compare with this . - - - - Returns a subpath that is a subsequence of the parts of this path. - Subpath starts with the first part (on the index 0) of this path - and ends with the part on the index . - Root path ('/') does not have any subpath. - For the with the path '/dir1/dir2/file.txt'; - - GetSubPath(0) returns '/dir1'. - - GetSubPath(1) returns '/dir1/dir2'. - - GetSubPath(2) returns 'dir1/dir2/file.txt'. - - GetSubPath(3) throws . - - Zero based index of the end part of the subpath. - A subpath that is a subsequence of the parts of this path. - - - Determines whether the specified is equal to the current . - true if the specified is equal to the current ; otherwise, false. - The object to compare with the current object. - 2 - - - - Creates new with added to the end of this . - - New part of the path. - New with the added to the end of this . - - - - Creates new with added to this . - - The new extension. - New with the added to this . - - - - Creates new based on this and with the new . - - The new extension. - New based on this and with the new . - - - - Creates new based on this and with the extension deleted. - - New based on this and with the extension deleted. - - - - Tests if this starts with the given . - - Given . - True if this starts with the given , otherwise false. - - - - Determines whether two specified have the same value. - - The first path to compare, or null. - The second path to compare, or null. - true if the value of left is the same as the value of right, otherwise false. - - - - Determines whether two specified have different values. - - The first path to compare, or null. - The second path to compare, or null. - true if the value of left is different from the value of right, otherwise false. - - - Returns a string that represents the current . - A string that represents the current . - 2 - - - - Convert the value of the to the string representation. - - The to cast to . - - - - Convert the value of to the instance of the . - - The path to convert to the . - Exception is thrown when the is malformed. - - - - Combines strings in the array into a . - - - New combined from the strings in the array. - - - - Indicates whether the specified is null or an instance of the . - - The to test. - true if the parameter is null or an instance of the ; - otherwise false. - - - - - - - Gets the name of the - or the . - - - - - Gets the name without an extension. - - - - - Indicates whether a path contains file name extension. - - True if path contains file name extension, otherwise false. - - - - Gets an enumerator that iterates through the elements of this path. - - - - - Gets the parent path, or path if this path does not have parent. - - - - - Gets the file name extension, or if this path does not have extension. - - - - - Returns true if this path equals to path, otherwise returns false. - - - - - Returns this as a . - - - - - Indicates if this instance is the root path ('/'). - - True if this instance is the root path, otherwise false. - - - - Returns an element of this path. - - Index of the element to return. - An element of this path. - - - - Gets the IEqualityComparer that is used to determine equality of . - - - - - Returns the number of elements in the path. - - The number of elements in the path. - - - - The exception that is thrown when an error occurs while creating new . - - - - - Initializes a new instance of the class - - - - - Initializes a new instance of the class - - - - - Initializes a new instance of the class - - - - - Holds the last access time, the last write time and the creation time of the node. All dates are expressed as UTC. - - Immutable type. - - - - Initializes a new instance of the . - - Creation time of the node (expressed as UTC). - Last access time of the node (expressed as UTC). - Last write time of the node (expressed as UTC). - - Missing or null parameters will have default value . - Time values with 'local' or 'unspecified' kind are converted to UTC automatically. - - - - - - - - Creates new instance with all properties equals to the current - instance properties except the property , which is set to value. - - New creation time (expressed as UTC). - New instance with all properties equals to the current - instance properties except the property , which is set to value. - - - - Creates new instance with all properties equals to the current - instance properties except the property , which is set to value. - - New last access time (expressed as UTC). - New instance with all properties equals to the current - instance properties except the property , which is set to value. - - - - - Creates new instance with all properties equals to the current - instance properties except the property , which is set to value. - - New last write time (expressed as UTC). - New instance with all properties equals to the current - instance properties except the property , which is set to value. - - - - - Indicates whether the specified is null or an NodeTimeInfo. - - The to test. - true if the parameter is null or an NodeTimeInfo ("CreationTime=LastAccessTime=LastWriteTime=DateTim.MinValue"), - otherwise false. - - - - Determines whether two specified have the same value. - - The first to compare, or null. - The second to compare, or null. - true if the value of left is the same as the value of right, otherwise false. - - - - Determines whether two specified have different values. - - The first to compare, or null. - The second to compare, or null. - true if the value of left is different from the value of right; otherwise false. - - - - - - - - - - - - - Represents the empty . - - - Empty has - == - and - == - and - == . - > - - - - Creation time of the node (expressed as UTC). - - - - - Last access time of the node (expressed as UTC). - - - - - Last write time of the node (expressed as UTC). - - - - - The type of the file system node. - - - - - Invalid value. - - - - - File node. - - - - - Directory node. - - - - - Link node (unused). - - - - - Specifies all node types, including File, Directory and Link. - - - - - Provides a container for a collection of objects. - - - - - Initializes a new instance of the class. - - - - - Validates whether the item is correct and can be added. - - Item to add. - - - - Gets an for the collection. - - An for the collection. - - - - Adds the elements of the specified collection to the end of the FileSystemItemCollection. - - The collection whose elements should be added to the end of the FileSystemItemCollection. - - - - Adds the specified item to the collection. - - The item to be added to the collection. - - - - Removes the specified item from the collection. - - The item to remove from the collection. - - True if item was successfully removed from the collection; false otherwise. - - - - - Removes the item with the specified path from the collection. - - The path of an item to remove from the collection. - - - - Removes the item at the specified index from the collection. - - The zero-based index of the item to remove. - - - - Removes all items from the collection. - - - - - Copies the range of elements from the collection to a one-dimensional - array, starting at the specified index of the target array. - - One-dimensional zero-based array that is the destination of the elements copied from the collection. - A zero-based index in the destination array at which copying begins. - - - - Determines whether the item is in the collection. - - The item to locate in the collection. - True if the item is located in the collection; false otherwise. - - - - Determines whether the item with the specified path is in the collection. - - The path to locate in the collection. - True if the item with the specified path is located in the collection; false otherwise. - - - - Gets the total size of files contained in the collection. - - The total size of files contained it the collection. - - - - Returns the paths of files in the collection that match the specified search pattern. - - The regular expression to match the paths or filenames against. - A array containing the paths or names of files in the specified directory that match the specified search pattern. - - The method works in two different modes (determined by property): - Filenames without path are searched and returned. This mode is used by default for collections returned by GetList method.Filenames with path are searched and returned. This mode is used by default for collection returned by GetItems method. - - - - Returns the names of files in the collection that match the specified search pattern. - - The search string to match the items against. - If tree, perform unix-like case-sensitive matching. - A array containing the names of files in the specified directory that match the specified search pattern. - -

The following wildcards are permitted in searchPattern:
* - Zero or more characters.
? - Exactly one character.
- Characters other than the wildcards represent themselves. - For example, the searchPattern string "*.txt" searches for all names/paths - ending with the ".txt". The searchPattern string "s*" searches for all - names/paths beginning with the letter "s". -

-

- The method works in two different modes (determined by property): - Filenames without path are searched and returned. This mode is used by default for collections returned by GetList method.Filenames with path are searched and returned. This mode is used by default for collection returned by GetItems method.

-
-
- - - Returns the names of files in the collection that match the specified search pattern. - - The search string to match the items against. - A array containing the names of files in the specified directory that match the specified search pattern. - -

The following wildcard specifiers are permitted in searchPattern:
* - Zero or more characters.
? - Exactly one character.
- Characters other than the wild card specifiers represent themselves. - For example, the searchPattern string "*t" searches for all names in path - ending with the letter "t". The searchPattern string "s*" searches for all - names in path beginning with the letter "s". -

-

- The method works in two different modes (determined by property): - Filenames without path are searched and returned. This mode is used by default for collections returned by GetList method.Filenames with path are searched and returned. This mode is used by default for collection returned by GetItems method.

-
-
- - - Sorts the items in the entire collection alphabetically. - - - - - Sorts the elements in the entire collection using the specified comparer. - - The implementation to use when comparing elements, or a null reference to sort alphabetically. - - - - Sorts the elements in a section of the collection using the specified comparer. - - The zero-based starting index of the range to sort. - The length of the range to sort. - The implementation to use when comparing elements, or a null reference to sort alphabetically. - - - - Gets an object that can be used to synchronize access to the collection. - - An object that can be used to synchronize access to the collection. - - - - Gets the number of elements contained in the collection. - - The number of elements contained in the collection. - - - - Gets the item at the specified index. - - A zero-based index of the item to get. - Item at the specified index. - - - - Gets the item of the specified path. - - The path of the item to get. - Item with the specified path, or null if not found. - - - - Gets or sets a value that indicates whether to use a Path or Name for pattern matching - and return values in the method. - - - - - List of possible compare types for the FileSystemItemComparer class. - - - - - Compare by . - - - - - Compare by . - - - - - Compare by creation date and time of the item. - - - - - Compare by last modification date and time of the item. - - - - - Compare by last access date and time of the item. - - - - - Compare by type of the item (directory/file/link). - - - - - Class used to compare objects. - - - - - Creates a new instance of FileSystemItemComparer with default sorting by file name and with ascending sort mode. - - - - - Creates a new instance of FileSystemItemComparer with specified comparer type and ascending sort mode. - - Type of the comparer. - - - - Creates a new instance of FileSystemItemComparer with specified comparer type and sort mode. - - Type of the comparer. - Sorting order. - - - - IComparer interface implementation. Compares two instances of . - - First object to compare. - Second object to compare. - Value greater than zero when x is greater then y, zero when they are equal, or less than zero when x is lesser than y. - - - - Specifies how a search pattern is treated (how to traverse a hierarchy of directories). - - - See Using TraversalMode blog post for samples. - - - - - Performs shallow search for files and directories; do recursive transfer of matching directories.
- Shallow search means that items are searched only in the first level of given directory.
- If the pattern matches a file, the file is processed.
- If the pattern matches a directory, all files and subdirectories are processed. -
-
- - - Performs shallow search for files and directories; do non-recursive transfer of matching directories.
- Shallow search means that items are searched only in the first level of given directory.
- If the pattern matches a file, the file is processed.
- If the pattern matches a directory, only the directory itself is processed (without any content = empty directory will be created). -
-
- - - Performs shallow search for files only. This is the same as mode, but only files are processed.
- Shallow search means that files are searched only in the first level of given directory. -
-
- - - Performs deep search for files only. This is like DOS xcopy deep file search.
- Deep search means that files are searched in the given directory and also in all its subdirectories.
- However, if this mode is used in GetItems method, returned collection will also contains directories where the files were found. -
- - This behavior is useful in situations where you need to prepare the containing directory before the file is processed. - To get only files, just use Linq like this: collection.Where(item => !item.IsDirectory) -
- - - Specifies the default action to perform when a target file already exists. - However, the default action can still be changed using the ProblemDetected event. - - - - - Existing files are to cause the whole multi-file transfer to be canceled and an exception to be raised. - - - - - Existing files are to be always skipped. - - - - - Existing files are to be always overwritten. - - - - - Existing files are to be overwritten if they are older than source files. - This is strongly discouraged because modification dates are often misreported by FTP and SFTP servers, making this mode highly unreliable. - We strongly recommend to use a different mode or develop a custom solution using the ProblemDetected event. - - - - - Existing files with different sizes are to be overwritten. - - - - - Existing files are to be resumed if they are smaller than source files. - - - - - Existing files are to be renamed according the pattern "filename[number].extension". - You can still change the generated name using the ProblemDetected event and the method. - - - - - Existing files with different checksum are to be overwritten.
- Works on FTP and ZIP only. ZIP uses CRC-32 always; FTP uses checksums provided by the server (some FTP servers support no checksums). -
-
- - - Specifies behavior on links and reparse points in multi-file operations. - - - - - Detected links are to be resolved and processed - however, this can still be changed by ProblemDetected handler. - - - - - Detected links are to be skipped - however, this can still be changed by ProblemDetected handler. - - - - - Detected links cause an exception to be thrown - however, this can still be changed by ProblemDetected handler. - - - - - Specifies link type. - - - - - Symbolic link (symlink). - - - - - Hard link. - - - - - Specifies the method of the transfer. - - - - - Items are copied. - - - - - Items are moved to the target destination (items are deleted in the source location). - - - - - Specifies the behaviour of the . - - - - - All items (files and directories) are moved to the target destination deleting them in the source location. - - - - - Only files are moved to the target destination. Directories remain (not deleted) in the source location. - - - - - Specifies which date/time to restore. - - - - - Restore no date/time. - - - - - Restore CreationTime. - - - - - Restore LastWriteTime. - - - - - Restore LastAccessTime. - - - - - Restore all date and times. - - - - - Represents a file or directory on the local file system. - - - - - Initializes a new instance of the class. - - Path to a file or directory on the local file system. - - - - Gets the last modification time of the item. - - - - - Sets the last modification time of the item. - - The last modification time. - - - - Gets the last access time of the item. - - - - - Sets the last access time of the item. - - The last access time. - - - - Gets the creation time of the item. - - - - - Sets the creation time of the item. - - The creation time. - - - - Returns the full path of the item. - - The full path of the item. - - - - Deletes the local item. - - - - - Gets the list of file items in a directory represented by this object. - Fails if this object is not a directory. - - - This is only valid for directories. - - List of file items. - - - - Gets the list of directory items in a directory represented by this object. - Fails if this object is not a directory. - - - This is only valid for directories. - - List of directory items. - - - - Computes the CRC32 (Cyclic Redundancy Check) value of the file. - - - This is only valid for files. - - - CRC32 checksum value. - - - - - Calculates the checksum for the specified file. - - Path to the file. - Desired checksum algorithm. - Checksum of the specified file. - - - - Calculates the checksum of the specified part of the specified file. - - Path to the file. - Desired checksum algorithm. - The offset in the local file at which to start processing. - The maximum number of bytes to process. - /// Checksum of the specified file. - - - Gets a value indicating whether the file or directory exists. - - True if the file or directory exists; false otherwise. - - - - Gets file length. - - - - - Gets a value indicating whether the item is a file. - - True if the item is a file; false otherwise. - - - - Gets a value indicating whether the item is a directory. - - True if the archive item is directory; false otherwise. - - - - Gets a value indicating whether the item is a link. - - True if the archive item is a link; false otherwise. - - - - Gets the name of the file or directory. - - The name of the file or directory. - - - - Gets the relative path of the file or directory. - - The relative path of the file or directory. - - - - Gets the full path of the file or directory. - - The full path of the file or directory. - - - - Gets item attributes. - - - - - Provides a container for a collection of objects. - - - - - Initializes a new instance of the class. - - - - - Validates whether the item is correct and can be added. - - Item to add. - - - - Adds the item to the collection. - - The item to be added to the collection. - - - - Adds the item to the collection. - - The item to be added to the collection. - - - - Adds the elements of the specified collection to the end of the LocalItemCollection. - - The collection whose elements should be added to the end of the FtpItemCollection. - - - - Adds the elements of the specified collection to the end of the LocalItemCollection. - - The collection whose elements should be added to the end of the FtpItemCollection. - - - - Determines whether the item is in the collection. - - The item to locate in the collection. - True if the item is located in the collection; false otherwise. - - - - Determines whether the item is in the collection. - - The item to locate in the collection. - True if the item is located in the collection; false otherwise. - - - - Determines whether the item with the specified path is in the colleciton. - - The path to locate in the collection. - True if the item with the specified path is located in the collection; false otherwise. - - - - Copies the range of elements from the collection to a one-dimensional - array, starting at the specified index of the target array. - - One-dimensional zero-based array that is the destination of the elements copied from the collection. - A zero-based index in the destination array at which copying begins. - - - - Removes the specified item from the collection. - - The item to remove from the collection. - - True if item was successfully removed from the collection; false otherwise. - - - - - Removes the specified item from the collection. - - The item to remove from the collection. - - True if item was successfully removed from the collection; false otherwise. - - - - - Gets an for the collection. - - An for the collection. - - - - Gets the item at the specified index. - - A zero-based index of the item to get. - Item at the specified index. - - - - Gets the item of the specified path. - - The path of the item to get. - Item with the specified path, or null if not found. - - - - License key infrastructure for trial versions of Rebex components. - - - - - Gets or sets the license key. - - License key. - - - - Gets collection of license keys. - - - - - Class for chained comparison of objects. - - - - - Creates a new instance of MultiComparer. - - An array of comparers to use. - - - - IComparer interface implementation. Compares two instances of provided objects. - - The first object to compare. - The second object to compare. - - A signed integer that indicates the result of of x and y comparison. - Value Less than zero means x is less than y. Zero x equals y. Greater than zero x is greater than y. - - - - - SSPI data representation. - - - Only supported on Windows platforms. - - - - Native. - - - - SSPI requirements flag. - - - Only supported on Windows platforms. - - - - - Wrapper class for SSPI authentication. - - - Only supported on Windows platforms. - - - - - Creates a new SSPI session. - - Authentication package. - Data representation. - Target name. - Requirements. - User name. - Password. - User domain - - Only supported on Windows platforms. - - - - - Disposes the SSPI session. - - - - - Get next SSPI message. - - Challenge. - Receives a value indicating whether the SSPI has finished. - Next SSPI message. - - Only supported on Windows platforms. - - - - - The hash algorithm used to compute the hash for hash signing - and verification methods. - - - - - Unsupported hash algorithm. - - - - - MD5. - - - - - SHA1. - - - - - MD5SHA1. - - - - - SHA-256. - - - - - SHA-384. - - - - - SHA-512. - - - - - MD4. - - - - - The key algorithm for the certificate. - - - - - Unsupported key algorithm. - - - - - RSA. - - - - - DSA. - - - - - Elliptic Curve DSA. - - - - - ED25519. - - - - - Intended key usage. - - - - Digital signature. - - - Non-repudiation. - - - Key encipherment. - - - Data encipherment. - - - Key agreement. - - - Certificate signing. - - - CRL signing. - - - Key encipherment only. - - - Key decipherment only. - - - - Key set options. - - - - Imported keys are marked as exportable. - - - The user is to be notified through a dialog box or other method when certain attempts to use this key are made. - - - Private keys are stored under the local computer and not under the current user. - - - Private keys are stored under the current user and not under the local computer even if the PFX BLOB specifies that they should go into the local computer. - - - Private keys are persisted on disk when importing a certificate - - - Always load the key into CNG key storage provider. Only supported on Windows Vista or higher. - - - Load the key into CNG key storage provider if possible. Only supported on Windows Vista or higher. - - - - Specifies certificate file format. - - - - Binary DER encoded X.509 certificate. - - - Base-64 encoded DER X.509 certificate. - - - P12/PFX certificate with private key. - - - - Represents an X509 v3 certificate. - - - - - Loads a certificate from an array. - - An array containing DER encoded certificate data. - - - - Loads a DER encoded certificate from the specified file. - - Path to a file. - A certificate. - - - - Loads a DER encoded certificate from the specified stream. - - Stream to load a certificate from. - A certificate. - - - - Loads a DER encoded certificate and a private key (in PKCS #8, PuTTY or SSLeay format) from the specified files. - - Path to a certificate file. - Path to the private key file. - Private key password. - A certificate. - - - - Loads a DER encoded certificate and a private key (in PKCS #8, PuTTY or SSLeay format) from the specified streams. - - Stream with the certificate. - Stream with the private key. - Private key password. - A certificate. - - - - Associates the supplied private key with the certificate to perform operations that need a private key. - - An instance of RSA, DSA, RSACryptoServiceProvider or DSACryptoServiceProvider. - - - - Associates the supplied private key with the certificate to perform operations that need a private key. - - The private key. - - - - Associates the supplied private key with the certificate to perform operations that need a private key. - - The private key. - - - - Associates the supplied private key with the certificate to perform operations that need a private key. - - An instance of RSA, DSA, RSACryptoServiceProvider or DSACryptoServiceProvider. - Specifies whether to permanently bind the certificate to the specified CSP. - - - - Associates the supplied private key with the certificate to perform operations that need a private key. - - The private key. - Specifies whether to permanently bind the certificate to the specified CSP. - - - - Associates the supplied private key with the certificate to perform operations that need a private key. - - The private key. - Specifies whether to permanently bind the certificate to the specified CSP. - - - - Loads a certificate with a private key from a PKCS#12 (PFX) file. - - Path to a file. - Encryption password. - A certificate with private key. - - - - Loads a certificate with a private key from a PKCS#12 (PFX) array. - - An array containing DER encoded PKCS#12 data. - Encryption password. - A certificate with private key. - - - - Loads a certificate with a private key from a PKCS#12 (PFX) file. - - Path to a file. - Encryption password. - Key set options. - A certificate with private key. - - - - Loads a certificate with a private key from a PKCS#12 (PFX) array. - - An array containing DER encoded PKCS#12 data. - Encryption password. - Key set options. - A certificate with private key. - - - - Saves the certificate to the supplied file in DER format. - - Path to the file to save the certificate to. If the file exists, it is overwritten. - - - - Saves the certificate to the supplied stream in DER format. - - Stream to save the certificate to. - - - - Saves the certificate to the supplied file in specified format. - - Path to the file to save the certificate to. If the file exists, it is overwritten. - Certificate format. - - - - Saves the certificate to the supplied stream in specified format. - - Stream to save the certificate to. - Certificate format. - - - - Saves the certificate to the supplied file in specified format. - - Path to the file to save the certificate to. If the file exists, it is overwritten. - Certificate format. - Password (only used by PFX/P12 format). - On .NET Compact Framework, this is only supported in Windows CE 5.0 or later. - - - - Saves the certificate to the supplied stream in specified format. - - Stream to save the certificate to. - Certificate format. - Password (only used by PFX/P12 format). - On .NET Compact Framework, this is only supported in Windows CE 5.0 or later. - - - - Saves the certificate's private key to the supplied file. - - Path to the file to save the certificate to. If the file exists, it is overwritten. - Private key password. - Private key file format. - If set to true, the cryptographic provider should not display any user interface (UI) when exporting private key parameters. - - - - Saves the certificate's private key to the supplied stream. - - Stream to save the private key to. - Private key password. - Private key file format. - If set to true, the cryptographic provider should not display any user interface (UI) when exporting private key parameters. - - - - Creates a new instance of based on the specified certificate or . - - An instance of or . - - - - Converts an or to a . - - An instance of or . - A . - - - - Converts a to (or ). - - An instance of . - An . - - - - Returns the hash algorithm used to create the signature of this certificate. - - Hash algorithm. - - - - Returns the collection of CRL distribution points. - - Collection of CRL distribution points, or null if not available. - - - - Returns the DN of the certification authority that issued the X.509v3 certificate. - - DN of the certification authority that issued the X.509 certificate. - - - - Returns the name of the certification authority that issued the X.509v3 certificate. - - The name of the certification authority that issued the X.509 certificate. - - - - Returns DN of the principal to which the certificate was issued. - - DN of the principal to which the certificate was issued. - - - - Returns the name of the principal to which the certificate was issued. - - The name of the principal to which the certificate was issued. - - - - Returns the public key for the X.509v3 certificate. - - The public key for the X.509v3 certificate. - - - - Returns the key algorithm parameters for the X.509v3 certificate. - - The key algorithm parameters for the X.509v3 certificate. - - - - Returns the public key info for the X.509v3 certificate. - - The public key info for the X.509v3 certificate. - - - - Returns the certificate's subject key identifier (SKI). - - Subject key identifier. - - - - Returns the certificate's issuer key identifier (AKI). - - Issuer (authority) key identifier. - - - - Returns the certificate's common name, if available. - - Common name; or null if not available. - - - - Returns the list of certificate's common names. - - The list of common names. - - - - Returns the list of certificate's e-mail addresses. - - The list of addresses. - - - - Returns the serial number of the X.509v3 certificate. - - The serial number of the X.509 certificate as an array of bytes. - - - - Returns the expiration date of this X.509v3 certificate (in local time). - - The expiration date for this X.509 certificate. - The expiration date is the date after which the X.509 certificate is no longer considered valid. - - - - Returns the effective date of this X.509v3 certificate (in local time). - - The effective date for this X.509 certificate. - The effective date is the date after which the X.509 certificate is considered valid. - - - - Returns the hash value for the X.509v3 certificate as an array of bytes. - - The hash value for the X.509 certificate. - - - - Returns the raw data for the entire X.509v3 certificate. - - The raw data for the entire X.509v3 certificate. - - - - Checks whether a certificate is time valid. - - true if valid, false if not valid. - - - - Returns the intended key usage value. - - Intended key usage. - - - - This method is deprecated, use instead. - - An array of intended key usage identifiers. - - - - Returns an array of enhanced key usage identifiers. - - An array of enhanced key usage identifiers, or null if the certificate is valid for all uses. - - - - Returns the DSA parameters of certificate's public key. - - The DSA parameters of certificate's public key. - - - - Returns the RSA parameters of certificate's public key. - - The RSA parameters of certificate's public key. - - - - Returns the RSA parameters of certificate's public or private key. - - True if private key parameters are to be exported as well. - If set to true, the cryptographic provider should not display any user interface (UI) when exporting private key parameters. - The RSA parameters of certificate's public or private key. - - - - Returns the DSA parameters of certificate's public or private key. - True if private key parameters are to be exported as well.If set to true, the cryptographic provider should not display any user interface (UI) when exporting private key parameters. - The DSA parameters of certificate's public or private key. - - - - Checks whether a private key for this certificate is available. - - True if available, false if not available. - - - - Returns the size of the key in bits. - - Size of the key in bits. - - - - Verifies the specified signature data by comparing it to the signature computed for the specified hash value. - - The hash value of the signed data. - A hash algorithm used to create the hash value. - The signature for the specified hash value. - True if the signature verifies as valid; otherwise, false. - - - - Verifies the specified signature data by comparing it to the signature computed for the specified message. - - The message. - The signature for the specified message. - True if the signature verifies as valid; otherwise, false. - - - - Verifies the specified signature data by comparing it to the signature computed for the specified message. - - The message. - The signature for the specified message. - Signature parameters. - True if the signature verifies as valid; otherwise, false. - - - - Computes the signature for the specified hash value by encrypting it with the private key. - - The hash value of the data to be signed. - A hash algorithm used to create the hash value. - If set to true, the cryptographic should not display any user interface (UI). - The signature for the specified hash value. - -

- The private key for a certificate must be available for this method to succeed. -

-

- If silent operation is requested and the CSP must display UI to operate, this method will fail. -

-
-
- - - Computes the signature for the specified message by encrypting it with the private key. - - The message to be signed. - The signature for the specified message. - -

- The private key for a certificate must be available for this method to succeed. -

-
-
- - - Computes the signature for the specified message by encrypting it with the private key. - - The message to be signed. - Signature parameters. - The signature for the specified message. - -

- The private key for a certificate must be available for this method to succeed. -

-
-
- - - Encrypts data. - - Data to be encrypted. - Encrypted data. - - - - Decrypts data. - - Data to be decrypted. - If set to true, the cryptographic provider should not display any user interface (UI). - Decrypted data. - - If silent operation is requested and the cryptographic provider needs to display a UI to operate, this method will fail. - - - - - Verifies the validity of the certificate. - - Validation result. - - - - Verifies the validity of the certificate, including its compliance with the specified criteria. - - Validation options (not supported by CertificateChainEngine.Native engine on Xamarin.iOS and Xamarin.Android). - Validation result. - - - - Verifies the validity of the certificate, including its compliance with the specified criteria. - - The name of the server. - Validation options (not supported by CertificateChainEngine.Native engine on Xamarin.iOS and Xamarin.Android). - Validation result. - - - - Verifies the validity of the certificate, including its compliance with the specified criteria, - using the specified chain engine. - - The name of the server. - Validation options (not supported by CertificateChainEngine.Native engine on Xamarin.iOS and Xamarin.Android). - Certificate chain engine. - Validation result. - - - - Validates the specified certificate revocation list (issued by this certificate). - - Certificate revocation list to validate. - The date in which the validation takes effect; specify null (Nothing in VB.NET) to skip time validation check. - Status of the validation result. If the CRL is valid, the return value is 0. - - - - Disposes the object and releases resources. - - - Calling this method ensures that all resources are freed. - - - - - Gets the certificates extensions collection. - - Extensions collection. - - - - Returns the key algorithm for this certificate. - - The key algorithm for this certificate. - - - - Gets the thumbprint of the certificate. - - Certificate's thumbprint. - - - - Gets or sets the friendly name associated with the certificate. - - Friendly name associated with the certificate. - Not available in .NET CF. - - - - Gets or sets a custom object associated with this particular instance of . This value is not persisted. - - - - - A chain engine (name space and cache) to be used to build and validate certificate chains. - - - - - The chain engine of the current user. - - - - - The chain engine of the local machine. - - - - - Android / iOS native security policy. - - - - - Use current certificate engine if set; otherwise use engine (platform-specific). - - - - - Represents a chain of certificates. - - - A chain starts by the end certificate and each following certificate - must directly certify the one preceding it. - The last certificate in the list is a self-signed root certificate, and - may be optionally omitted under the assumption it must be known in any case. - - - - - Gets an for the collection. - - An for the collection. - - - - Adds a certificate to the end of the chain. - This certificate represents authority for the previous certificate in the chain - (Leaf certificate is at the beginning of the chain, Root certificate is at the end of the chain). - - The certificate to be added to the chain. - The position of the certificate in the chain. - - - - Creates an empty certificate chain. - - - - - Creates a certificate chain from an array of certificates. - - An array of certificates. - - - - Loads a certificate with a private key from a PKCS#12 (PFX) file. - - Path to a file. - Encryption password. - A certificate with private key. - - - - Loads a certificate with a private key from a PKCS#12 (PFX) array. - - An array containing DER encoded PKCS#12 data. - Encryption password. - A certificate with private key. - - - - Loads a certificate with a private key from a PKCS#12 (PFX) file. - - Path to a file. - Encryption password. - Key set options. - A certificate with private key. - - - - Loads a certificate with a private key from a PKCS #12 (.p12/.pfx) array. - - An array containing DER encoded PKCS #12 data. - Encryption password. - Key set options. - A certificate with private key. - - - - Loads from the specified PKCS #7 (.p7b) file. - - Path to the file. - Instance of , never null. - The PKCS #7 file can be saved using method. - - - - Loads a PKCS #7 (.p7b) encoded from the specified file. - - Stream to load a from. - Instance of , never null. - The PKCS #7 stream can be saved using method. - - - - Verifies the specified signature data by comparing it to the signature computed for the specified hash value. - - The hash value of the signed data. - A hash algorithm used to create the hash value. - The RSA signature for the specified hash value. - true if the signature verifies as valid; otherwise, false. - The hash algorithm parameter is ignored with managed RSA. - - - - Builds a certificate chain for a specified certificate. - - End certificate. - The chain for an end certificate. - - This function builds a certificate chain context starting from an end - certificate and going back, if possible, to a trusted root certificate. - - - - - Builds a certificate chain for a specified certificate. - - End certificate. - Certificate chain engine. - The chain for an end certificate. - - This function builds a certificate chain context starting from an end - certificate and going back, if possible, to a trusted root certificate. - - - - - Builds a certificate chain for a specified certificate. - - End certificate. - Additional store to search in addition to system stores. - The chain for an end certificate. - - This function builds a certificate chain context starting from an end - certificate and going back, if possible, to a trusted root certificate. - - - - - Builds a certificate chain for a specified certificate. - - End certificate. - Certificate chain engine. - Additional store to search in addition to system stores. - The chain for an end certificate. - - This function builds a certificate chain context starting from an end - certificate and going back, if possible, to a trusted root certificate. - - - - - Verifies the validity of the certificate chain. - - Validation result. - - - - Verifies the validity of the certificate chain, including its compliance with the specified criteria. - - Validation options (not supported by CertificateChainEngine.Native engine on Xamarin.iOS and Xamarin.Android). - Validation result. - - - - Verifies the validity of the certificate chain, including its compliance with the specified criteria. - - The name of the server. - Validation options (not supported by CertificateChainEngine.Native engine on Xamarin.iOS and Xamarin.Android). - Validation result. - - - - Verifies the validity of the certificate chain, including its compliance with the specified criteria, - using the specified chain engine. - - The name of the server. - Validation options (not supported by CertificateChainEngine.Native engine on Xamarin.iOS and Xamarin.Android). - Certificate chain engine. - Validation result. - - - - Saves the certificate chain to the specified path as a .P7B (PKCS #7) file. - - Path to save the certificate chain file to. - - - - Saves the certificate chain to the specified stream in .P7B (PKCS #7) format. - - Stream to write the certificate chain to. - - - - Loads a chain of Base-64-encoded X509 certificates from the specified file. - - Path to a file with the certificate chain. - A certificate chain. - - - - Gets the default certificate chain engine (platform-specific). - - - - - Gets the number of certificates in the chain. - - The number of certificates in the chain. - - - - Gets or sets the certificate at the specified position. - - The certificate at the specified position - The certificate at the specified position. - - - - Gets the certificate of the root certification authority, if available. - - Root CA certificate if available; null otherwise. - - - - Gets the first certificate in the chain, if not empty. - - Leaf certificate; null if the chain is empty. - - - - Represents a collection of X509 v3 certificates. - - - - - A base class for various collections of cryptographic objects. - - - - - A base class for various collections of cryptographic objects. - - - - - Gets an for the . - - An for the collection. - - - - Copies the range of elements from the to a compatible one-dimensional - , starting at the specified index of the target array. - - One-dimensional zero-based array that is the destination of the elements copied from . - A zero-based index in the destination array at which copying begins. - - - - Gets the number of items in the . - - The number of items in collection. - - - - Gets a value indicating whether access to the is synchronized. - - - - - Gets an object that can be used to synchronize access to the . - - - - - Adds an item to the collection. - - Item to add. - - - - Removes all elements from the collection. - - - - - Determines whether the collection contains the specified item. - - Item. - True if the collection contains the item; false if it does not. - - - - Returns a position of the specified item within the collection, or -1 if not found. - - Item to find. - Zero-based position of the item; or -1 if not found. - - - - Copies the range of elements from the collection to a compatible one-dimensional - array, starting at the specified index of the target array. - - One-dimensional zero-based array that is the destination of the elements copied from the collection. - A zero-based index in the destination array at which copying begins. - - - - Removes an item from the collection. - - An item to remove. - True if the item was removed; false if not removed. - - - - Removes an item at the specified position from the collection. - - An index of an item to remove. - - - - Adds an item to the collection at the specified position. - - Position at which to insert the item. - Item to add. - - - - Returns an enumerator that iterates through the collection. - - Enumerator. - - - - Returns a value indicating whether the collection is read-only. - - - - - Gets or sets an instance of an item at the specified index. - - The zero-based index of the item to get or set. - An item. - - - - Creates a new instance of . - - - - - Represents a certificate engine. - - - - - Initializes new instance of the class. - - - - - Validates given certificate chain using specified validation parameters. - - Certificate chain to validate. - Validation parameters. - Result of the validation. - - - - Builds a certificate chain from the specified certificate. - - A certificate to build the chain from. - The built certificate chain. - - - - Builds a certificate chain from the specified certificate. - - A certificate to build the chain from. - An extra store to search for intermediate and root CA certificates. - The built certificate chain. - - - - Gets the current certificate engine. - - The current certificate engine; null reference (Nothing in VB.NET) if no engine was set. - - - - Sets the current certificate engine. - - An engine to be used. - - - - Gets or sets the LogWriter used by this object. - - Log writer. - - - - Gets the default certificate engine which is used if no custom engine is set as current engine. - - - - - Certificate validation parameters for 's method. - - - - - Creates a new instance of . - - - - - Gets or sets validation options. - - - - - The exception that is thrown when a certificate-related error occurs. - - - - - Initializes a new instance of the Exception class - with a specified error message. - - The error message that explains the reason for the exception. - - - - Initializes a new instance of the Exception class - with a specified error message and a reference to the - inner exception that is the cause of this exception. - - The error message that explains the reason for the exception. - The exception that is the cause of the current exception. - - - - Represents a collection of X509 v3 certificate extensions. - - - - - Creates a certificate extension collection from an ASN.1 block. - - ASN.1 block. - - - - Gets the first with the specified object identifier. - - The object identifier, either friendly name or dotted string format. - A certificate extension, or null if not found. - - - - Represents an X509 v3 certificate extension. - - - - - Creates a new instance of . - - Extension object identifier. - Specifies whether the extension is critical. - Extension data. - - - - Create extended (enhanced) key usage extension (2.5.29.37). - - Specifies whether this extension is considered critical (not-critical extensions may be ignored by servers that don't support them). - Key usage OIDs. - An extension object. - - - - Creates a key usage extension (2.5.29.15). - - Key usage flags. - An extension object. - - - - Gets the object identifier that identifies the extension. - - The object identifier. - - - - Gets a value indicating whether the extension is critical. - - True if critical; false otherwise. - - - - Gets the extension value. - - An array of bytes in ASN.1 format. - - - - Options for methods. - - - - - No filter. - - - - - Only find certificates that have a private key. - - - - - Only find certificates that are time valid. - - - - - Only find certificates that can be used for client authentication. - - - - - Only find certificates that can be used for server authentication. - - - - - When searching by certificate issuer, include known subordinate CAs in the search as well. - - - - - The type of search for method. - - - - - Certificates whose subject key identifier (SKI) matches the specified value. - - - - - Specifies the location of the certificate store. - - - - None. - - - The store located at HKEY_CURRENT_USER\Software\Microsoft\SystemCertificates. - - - The store located at HKEY_LOCAL_MACHINE\Software\Microsoft\SystemCertificates. - - - The store located at HKEY_LOCAL_MACHINE\Software\Microsoft\Cryptography\Services\<ServiceName>>\SystemCertificates. - - - The store located at HKEY_LOCAL_MACHINE\Software\Microsoft\Cryptography\Services\<ServiceName>\SystemCertificates. - - - The store located at HKEY_USERS\<UserName>\Software\Microsoft\SystemCertificates. - - - The store located at HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates. - - - The store located at HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\SystemCertificates. - - - The store located at HKEY_LOCAL_MACHINE\Software\Microsoft\EnterpriseCertificates. - - - - Specifies the name of the certificate store. - - - - None. - - - Other users. - - - Third-party certificate authorities. - - - Intermediate certificate authorities. - - - Revoked certificates. - - - Personal certificates. - - - Trusted root certificate authorities. - - - Directly trusted people and resources. - - - Directly trusted publishers. - - - - Represents a certificate store. - - - - - Opens a system certificate store of the specified name a the specified location. - - The store name. - Specifies the location of the certificate store. - - Some example system stores are:
- "CA" - Certification authority certificates.
- "My" - A certificate store that holds certificates with associated private keys.
- "Root" - Root certificates.
- "SPC" - Software publisher certificate.
- "Trust"
- "Disallowed"
-
- - - Opens a system certificate store of the specified name a the specified location. - - The store name value. - Specifies the location of the certificate store. - - - - Opens a system certificate store of the specified name. - - The store name. - - Some example system stores are:
- "CA" - Certification authority certificates.
- "My" - A certificate store that holds certificates with associated private keys.
- "Root" - Root certificates.
- "SPC" - Software publisher certificate.
- "Trust"
- "Disallowed"
-
- - - Opens a system certificate store of the specified name. - - The store name value. - - - - Creates a temporary memory-based certificate store - and populates it with certificates from the specified collection. - - The certificate collection. - - - - Determines whether the specified certificate store exists. - - The store name. - Specifies the location of the certificate store. - True if the store exists; false otherwise. - - - - Determines whether the specified certificate store exists. - - The store name value. - Specifies the location of the certificate store. - True if the store exists; false otherwise. - - - - Determines whether the specified certificate store exists. - - The store name. - True if the store exists; false otherwise. - - - - Determines whether the specified certificate store exists. - - The store name value. - True if the store exists; false otherwise. - - - - Adds a certificate to this certificate store. - - Certificate to be added. - - On Windows, the certificate is added even if the same certificate is already present in the store. - If this is undesirable, use instead. - - - - - Adds a certificate to this certificate store. - - Certificate to be added. - - - - Removes a certificate from this certificate store. - - Certificate to be removed. - - - - Returns all certificates matching the specified criteria. - - Specifies the type of search being made. - A byte array whose meaning is defined by 'findType'. - Options. - An array of certificates. - - - - Returns all certificates issued by the specified issuer (or its subordinate issuer) and corresponding to the specified options. - - Issuer DN. - Options. - An array of certificates. - - - - Returns all certificates with the specified serial number issued by the specified issuer (or its subordinate issuer) - and corresponding to the specified options. - - Issuer DN. - Certificate serial number. - Options. - An array of certificates. - - - - Returns all certificates issued by one of specified issuers (or their subordinate issuer) and corresponding to the specified options. - - An array of issuers' DNs. - Options. - An array of certificates. - - - - Returns all certificates issued by one of specified issuers (or their subordinate issuer) and corresponding to the specified options. - - An array of issuers' DNs. - Certificate serial number. - Options. - An array of certificates. - - - - Returns all certificates matching the specified certificate and options. - - Certificate to find. - Options. - An array of certificates. - - - - Returns all certificates corresponding to the specified options. - - Options. - An array of certificates. - - - - Returns all certificates corresponding to the specified e-mail address. - - E-mail address. - An array of certificates. - - - - Returns all certificates corresponding to the specified e-mail address and options. - - E-mail address. - Options. - An array of certificates. - - - - Disposes the object and releases resources. - - - Calling this method ensures that all resources are freed. - - - - - Finalizer called by garbage collector. - - - - - Represents a distinguished name. - - - - - Creates an instance of distinguished name from an ASN.1 block. - - ASN.1 block. - - - - Creates an instance of distinguished name from a DN string. - - DN string. - - - - Returns the DN's common name, if available. - - Common name; or null if not available. - - - - Returns the list of DN's e-mail addresses. - - The list of addresses. - - - - Determines whether the specified object is equal to the current object. - - Object to compare with the current object. - True if equal; false if not equal. - - - - Servers as a hash function for a particular type. Suitable for use in hashing algorithms and hash tables. - - Hash code. - - - - Converts a distinguished name into a byte array. - - Byte array. - - - - Returns a string representation of the object. - - A DN string. - - - - Converts string DN to its BER-encoded representation. - - String DN. - BER-encoded DN. - - - - Converts BER-encoded representation of DB to its string representation. - - BER-encoded DN. - String DN. - - - - Represents a collection of CRL distribution points. - - - - - Creates a new instance of . - - - - - A CRL distribution point. - - - - - Create a new instance of a CRL distribution point that represents the specified URL. - - CRL URL. - - - - Gets distribution point URL, if available. - - Distribution point URL, or null if not available. - - - - Certificate validation method options. (Not supported by CertificateChainEngine.Native engine on Xamarin.iOS and Xamarin.Android). - - - - - No options specified. - - - - - Ignore an invalid time (such as expiration). - - - - - Ignore an invalid certificate trust list time. - - - - - Ignore an invalid time nesting. - - - - - Ignore all invalid time checks (such as expiration, nesting, CRL or CTL times). - - - - - Ignore invalid basic constraints. - - - - - Allow unknown certification authority. - - - - - Ignore wrong usage of the certificate. - - - - - Ignore invalid policy. - - - - - Ignore an unknown revocation status of the end certificate. - - Not supported in builds for .NET CF. - - - - Ignore an unknown revocation status of the certificate trust list signer. - - Not supported in builds for .NET CF. - - - - Ignore an unknown revocation status of the CA certificate. - - Not supported in builds for .NET CF. - - - - Ignore an unknown revocation status of a root certificate. - - Not supported in builds for .NET CF. - - - - Ignore all unknown revocation statuses. - - - - - Not supported. - - Not supported in builds for .NET CF. - - - - Not supported. - - Not supported in builds for .NET CF. - - - - Only use local cache, do not access the network. - - Not supported in builds for .NET CF. - - - - Ignore invalid common name. - - - - - Skip certificate revocation check. - - - - - Ignore invalid chain. - - - - - Certificate validation status. - - - - - This certificate or one of the certificates in the certificate chain is not time valid. - - - - - Certificates in the chain are not properly time nested. - - - - - Trust for this certificate or one of the certificates in the certificate chain has been revoked. - - - - - The certificate or one of the certificates in the certificate chain does not have a valid signature. - - - - - The certificate or certificate chain is not valid for its proposed usage. - - - - - The certificate or certificate chain is based on an untrusted root. - - - - - The revocation status of the certificate or one of the certificates in the certificate chain is unknown. - - - - - One of the certificates in the chain was issued by a certification authority that the original certificate had certified. - - - - - One of the certificates has an invalid extension. - - - - - The certificate or one of the certificates in the certificate chain has - a policy constraints extension, and one of the issued certificates has - a disallowed policy mapping extension or does not have a required issuance - policies extension. - - - - - The certificate or one of the certificates in the certificate chain has - a basic constraints extension and either the certificate cannot be used - to issue other certificates or the chain path length has been exceeded. - - - - - The certificate or one of the certificates in the certificate chain has - an invalid name constraints extension. - - - - - The certificate or one of the certificates in the certificate chain has a name constraints extension containing unsupported fields. - - - - - The certificate or one of the certificates in the certificate chain has a name constraints extension and a name constraint is missing for one of the name choices in the end certificate. - - - - - The certificate or one of the certificates in the certificate chain has a name constraints extension and there is not a permitted name constraint for one of the name choices in the end certificate. - - - - - The certificate or one of the certificates in the certificate chain has a name constraints extension and one of the name choices in the end certificate is explicitly excluded. - - - - - The certificate chain is not complete. - - - - - A CTL used to create this chain was not time valid. - - - - - A CTL used to create this chain did not have a valid signature. - - - - - A CTL used to create this chain is not valid for this usage. - - - - - The revocation status of the certificate or one of the certificates in the certificate chain is either off-line or stale. - - - - - The end certificate does not have any resultant issuance policies, and one of the issuing CA certificates has a policy constraints extension requiring it. - - - - - The certificate chain contains a certificate with unsupported signature hash algorithm (usually SHA-2) or unsupported key algorithm (usually ECDSA). - - - - - Unknown error. - - - - - A path length constraint in the certification chain has been violated. - - - - - A certificate contains an unknown extension that is marked critical. - - - - - A certificate chain is invalid, - such as an certificate's Issuer not matching the CA's Subject or - an certificate's AKI not matching the CA's SKI. - - - - - The certificate's CN name does not match the passed value. - - - - - The certificate was explicitly marked as untrusted by the user or CA. - - - - - A certificate or CRL is malformed. - - - - - There might be more errors apart from those reported. - - - - - Certificate uses algorithm which is not considered secure on this platform. - - - - - Certificate is not trusted. - - - - - Represents the result of certificate chain validation. - - - - - Initialize instance of the . - - A validation status (use zero for success). - - - - Gets the status mask. - - Status mask. - - - - Gets the certificate chain validity status. - - True if valid, false if not valid. - - - - Gets the native error code returned by the validation function (this property returns always zero). - - The error code returned by the validation function. - - - - Gets the native error code returned by the validation function or zero if the native error code is not available. - - The error code returned by the validation function. - - - - Specifies asymmetric algorithm. - - - - - RSA. - - - - - DSA. - - - - - Diffie-Hellman. - - - - - Elliptic Curve Digital Signature Algorithm (.NET >= 4.0 or through a plugin). - - - - - Elliptic Curve Diffie-Hellman algorithm (.NET >= 4.0 or through a plugin). - - - - - Twisted Edwards Curve DSA algorithm such as ED25519 (supported through a plugin). - - - - - Specifies key blob format. - - - - - ECPrivateKey (defined by RFC 5915). - - - - - Raw public key data. - - - - - Raw private key data. - - - - - A platform-independent asymmetric algorithm object. - - - - - Register custom asymmetric key algorithm. - - Factory function that accepts algorithm name and returns algorithm. - - - - Creates an instance of . - - - - - Frees the resources used by this object. - - - - - Creates an instance of from the specified asymmetric algorithm object. - - Asymmetric algorithm object. - True if the created object owns the asymmetric algorithm object. - An instance of . - - - - Exports a public key to the specified private key info object. - - Public key info object. - - - - Exports a private key to the specified private key info object. - - Private key info object. - - - - Imports a key from the specified public key info object. - - Public key info object. - - - - Imports a key from the specified private key info object. - - Private key info object. - - - - Imports a key from the specified RSA parameters. - - RSA key parameters. - - - - Imports a key from the specified DSA parameters. - - DSA key parameters. - - - - Imports a key from the specified Diffie-Hellman parameters. - - Diffie-Hellman key parameters. - - - - Imports a private key for the specified algorithm/curve. Only some algorithms/curves are supported. - - Key algorithm. - Key algorithm curve. - Key data. - Key format. - - - - Returns a value indicating whether the specified algorithm is supported. - - Asymmetric algorithm. - Curve name or OID (if needed). - Key size (specify 0 to indicate default key size). - True if supported; false if not supported. - - - - Generates Diffie-Hellman parameters corresponding to the specified key size. - - Key size. - Diffie-Hellman parameters. - - - - Generates a private key for the specified asymmetric algorithm with of the specified key size. - - Key algorithm. - Key size. Specify 0 to use default key size. - - - - Generates a private key for the specified asymmetric algorithm based on the specified curve. - - Key algorithm. - Curve name or OID. - - - - Computes the signature for the specified hash value. - - The hash value of the data to be signed. - A hash algorithm used to create the hash value. - The signature for the specified hash value. - -

- The private key must be available for this method to succeed. -

-
-
- - - Computes the signature for the specified message (using default parameters). - - Message to be signed. - Signature for the specified message. - -

- The private key must be available for this method to succeed. -

-
-
- - - Computes the signature for the specified message. - - Message to be signed. - Signature parameters. - Signature for the specified message. - -

- The private key must be available for this method to succeed. -

-
-
- - - Verifies the specified signature. - - The hash value of the signed data. - A hash algorithm used to create the hash value. - The signature for the specified hash value. - True if the signature verifies as valid; otherwise, false. - - - - Verifies the specified signature (using default parameters). - - Signed message. - The signature for the specified message. - True if the signature verifies as valid; otherwise, false. - - - - Verifies the specified signature. - - Signed message. - The signature for the specified message. - Signature parameters. - True if the signature verifies as valid; otherwise, false. - - - - Encrypts data. - - Data to be encrypted. - Encrypted data. - - - - Encrypts data. - - Data to be encrypted. - Encryption parameters. - Encrypted data. - - - - Decrypts data. - - Data to be decrypted. - Decrypted data. - - If silent operation is requested and the CSP must display UI to operate, this method will fail. - - - - - Decrypts data. - - Data to be decrypted. - Encryption parameters. - Decrypted data. - - - - Gets key material deriver. Only supported by Diffie-Hellman-like algorithms. - - Other side's public key in raw form. - Key material deriver. - - - - Gets the current key size. - - - - - Gets the current key algorithm. - - - - - Gets a value indicating whether this instance only contains the public key. - - - - - Provides various cryptography-related helper methods. - - - - - Creates an instance of default random number generator. - - - - - - Returns an array of bytes with a cryptographically strong random sequence of values. - - Array length. - Array filled with random data. - - - - Fills specified array of bytes with a cryptographically strong random sequence of values. - - Array to fill random data with. - - - - Decodes a signature from a PKCS #7 form. - - Signature. - Key algorithm. - Decoded signature. - - - - Encodes a signature to a PKCS #7 form. - - Signature. - Key algorithm. - Encoded signature. - - - - Sets internal option. - - Instance. - Name. - Value. - - - - Gets internal option. - - Instance. - Name. - Value. - - - - Returns a value indicating whether the cryptographic engine is available. - - - - - Forces RijndaelManaged to be used even when AesCryptoServiceProvider is available. - - True if RijndaelManaged is to be used instead of AesCryptoServiceProvider; false otherwise. - - - - Enables or disables an option that specifies whether only FIPS 140-2 compliant cryptographic algorithm providers are to be used. - - True if only FIPS 140-2 compliant algorithms are to be used; false to allow all supported algorithms. - - In .NET 2.0 and higher, this option reflects the Windows OS settings unless explicitly set to a different value. - - - - - Implements Diffie-Hellman key agreement protocol (also called exponential key agreement). - - - This algorithm was developed by Diffie and Hellman in 1976. It allows two users - to exchange a secret key over an insecure medium without any prior secrets. - - - - - Initializes a new instance of DiffieHellman. - - - You cannot create an instance of an abstract class. - Create an instance of class instead. - - - - - Returns the public key. - - The public key. - - - - Calculates the shared secret key from the other side's public key. - - Other side's public key. - The shared secret key. - - - - Imports the specified . - - The Diffie-Hellman parameters. - - - - Exports the . - - true to include private parameter; otherwise, false. - The Diffie-Hellman parameters. - - - - Returns Oakley generator value. - - Oakley generator. - - - - Returns Oakley group 2. - - Oakley group 2. - - - - Returns Oakley group 14. - - Oakley group 14. - - - - Managed implementation of Diffie-Hellman algorithm. - - - - - Initializes a new instance of the DiffieHellmanManaged class. - - - - - Initializes a new instance of the DiffieHellmanManaged class - with a specified key size. - - The size of the key to use in bits. - - - - Creates and returns an XML string representation of the current object. - - true to include private parameters; otherwise, false. - An XML string encoding of the current object. - - - - When overridden in a derived class, reconstructs a DiffieHellmanManaged object from an XML string. - - The XML string to use to reconstruct the DiffieHellmanManaged object. - - - - Returns the public key. - - The public key. - - - - Imports the specified . - - The Diffie-Hellman parameters. - - - - Exports the . - - true to include private parameter; otherwise, false. - The Diffie-Hellman parameters. - - - - Releases the unmanaged resources and optionally releases the managed resources. - - true to release both managed and unmanaged resources; false to release only unmanaged resources. - - - - Gets the name of the signature algorithm available with this implementation of DiffieHellman. - - The name of the signature algorithm. - DiffieHellman does not support signatures. This property will throw an exception. - - - - Gets the name of the key exchange algorithm available with this implementation of DiffieHellman. - - The name of the key exchange algorithm. - - - - Contains the parameters for Diffie-Hellman algorithm. - - - - - The prime modulus used for the operation. - - - - - The generator used for the operation. - - - - - The private key for the operation. - - - - - The public key for the operation. - - - - - Managed implementation of DSA signature algorithm. - - -

- The purpose of this class is to make it possible to verify - signatures without the need to use CryptoAPI, which is not available - in some scenarios. -

-

- Even though it is possible to generate DSA keys and sign data using - this class, but this process has not been optimized for speed and is - very slow. -

-
-
- - - Initializes a new instance of the DSAManaged class with the key size of 1024. - - - - - Initializes a new instance of the DSAManaged class with the specified key size. - - The size of the key to use in bits. - - - - Initializes a new instance of the DSAManaged class with the specified key size and seed. - - The size of the key to use in bits. - The initial seed to use for key generation. - - - - Creates and returns an XML string representation of the current object. - - true to include private parameters; otherwise, false. - An XML string encoding of the current object. - - - - When overridden in a derived class, reconstructs a DSAManaged object from an XML string. - - The XML string to use to reconstruct the DSAManaged object. - - - - Exports the . - - true to include private parameters; otherwise, false. - The DSA parameters. - - - - Imports the specified . - - The DSA parameters. - - - - Creates the DSA signature for the specified data. - - The SHA1 hash of data to be signed. - The DSA signature for the specified hash value. - - DSA signature is a pair of numbers r and s. - This method always returns an array of 40 bytes. - Bytes 0..19 contain the value of r, bytes 20..39 contain the value of s. - - - - - Verifies the DSA signature for the specified data. - - The SHA1 hash of signed data to be verified. - The signature to be verified for rgbData. - true if the signature verifies as valid; otherwise, false. - - DSA signature is a pair of numbers r and s. - The rgbSignature parameter must be 40 bytes long. - Bytes 0..19 must contain the value of r, bytes 20..39 must contain the value of s. - - - - - Computes the signature for the specified hash value by signing - it with the private key. - - The SHA1 hash of data to be signed. - The DSA signature for the specified hash value. - - - - Verifies the specified signature data by comparing it to the signature computed for the specified hash value. - - The hash value of the signed data. - The signature data to be verified. - true if the signature verifies as valid; otherwise, false. - - - - Computes the hash value of the specified byte array using the specified hash algorithm, and signs the resulting hash value. - - The input data for which to compute the hash. - The hash algorithm to use to create the hash value. - The DSA signature for the specified data. - - - - Verifies the specified signature data by comparing it to the signature computed for the specified data. - - The signed data. - The hash algorithm used to create the hash value of the data. - The signature data to be verified. - true if the signature verifies as valid; otherwise, false. - - - - Releases the unmanaged resources and optionally releases the managed resources. - - true to release both managed and unmanaged resources; false to release only unmanaged resources. - - - - Gets the name of the signature algorithm available with this implementation of DSA. - - The name of the signature algorithm. - - - - Gets the name of the key exchange algorithm available with this implementation of DSA. - - The name of the key exchange algorithm. - - - - Encryption schemes. - - - - - Default padding scheme (depends on key algorithm). - - - - - RSAES-PKCS1-v1_5 (RFC 3447). - - - - - RSAES-OAEP (RFC 3447). - - - - - Encryption parameters. - - - - - Initialize new instance of the . - - - - - Encryption scheme. - - - - - Hashing algorithm for padding generation. - - - - - Optional input parameter for . - - - - - If set to true (default), the cryptographic provider should not display any user interface (UI) when working with private keys. - Only used for decryption operations. - - - If silent operation is requested and the cryptographic provider needs to display a UI to operate, the requested method will fail. - - - - - Represents a hash transform. - - - - - Computes the hash value for the specified region of the input byte array. - - The input to compute the hash code for. - The offset into the input byte array from which to begin using data. - The number of bytes in the input byte array to use as data. - - - - Gets the value of the computed hash code. - - The computed hash value. - - - - Resets the transform. - - - - - Represents the size, in bits, of the computed hash code. - - - - - Specifies hash algorithm. - - - - - SHA-1. - - - - - SHA-256. - - - - - SHA-384. - - - - - SHA-512. - - - - - MD4. - - - - - MD5. - - - - - Specifies hash algorithm key mode. - - - - - No keyed hash. - - - - - HMAC. - - - - - Represents a hash algorithm. - - - - - Gets the current key. - - The current key. - - - - Sets the current key to the specified value. - - Key to be set. - - - - Creates an instance of for the specified algorithm. - - Algorithm. - - - - Gets a value indicating whether the specified algorithm is supported. - - Algorithm. - True if supported; false if not supported. - - - - Creates a hash transform object for this algorithm based on the currently set parameters. - - Hash transform object. - - - - Creates a hash transform object for this algorithm based on the currently set parameters. - - Hash transform object. - - - - Computes the hash value for the specified data. - - Input data. - Hash value. - - - - Computes the hash value for the specified data. - - Input data. - Input offset. - Input length. - Hash value. - - - - Computes the hash value for the specified data using the specified algorithm. - - Hash algorithm. - Input data. - Hash value. - - - - Computes the hash value for the specified data using the specified algorithm. - - Hash algorithm. - Input data. - Input offset. - Input length. - Hash value. - - - - Disposes the object. - - - - - Gets algorithm ID. - - - - - Gets the size of the computed hash code (in bits). - - - - - Gets or sets the algorithm's key mode. - - - - - Computes a Hash-based Message Authentication Code (HMAC) - for the input data using the specified hash function. - - - HMAC is defined by RFC 2104 and look like this: - alg(K XOR opad + alg(K XOR ipad + text))
- where alg is the base hash algorithm,
- K is an n byte key,
- ipad is the byte 0x36 repeated 64 times (or 128 times),
- opad is the byte 0x5c repeated 64 times (or 128 times),
- and text is the data being protected.
-
- - - Initializes a new instance of the HMAC class with the specified hash algorithm and key data. - - A type of hash algorithm to use. - The secret key for HMAC encryption. - - - - Initializes a new instance of the HMAC class with the specified hash algorithm and a randomly generated key. - - A type of hash algorithm to use. Must be a subclass of HashAlgorithm. - - - - Initializes an instance of HMAC. - - - - - Routes data written to the object into the hash algorithm for computing the HMAC. - - The input data. - The offset into the byte array from which to begin using data. - The number of bytes in the array to use as data. - - - - Returns the computed Hash-based Message Authentication Code (HMAC) after all data has been written to the object. - - The computed HMAC. - - - - Releases the unmanaged resources used by the HMAC and optionally releases the managed resources. - - true to release both managed and unmanaged resources; false to release only unmanaged resources. - - - - Gets or sets the key to be used in the hash algorithm. - - The key to be used in the hash algorithm. - - - - Key derivation options. - - - - - Key derivation parameters. - - - - - Gets or sets key derivation function ("HASH" or "HMAC"). - - - - - Hashing algorithm. - - - - - HMAC key. - - - - - Data to append to shared secret when hashing. - - - - - Data to prepend to shared secret when hashing. - - - - - Key material deriver. - - - - - Derives key material. - - Parameters that specify how to derive the key material.. - Key material. - - - - Finalizer. Called by garbage collector during object destruction. - - - - - Disposes the deriver object. - - - - - Represents the base class from which all implementations of the ArcFour algorithm must derive. - - - - - Initializes a new instance of ArcFour. - - - You cannot create an instance of an abstract class. - Create an instance of class instead. - - - - - Generates a random initialization vector (IV) to be used for the algorithm. - - ArcFour is a stream cipher, it does not use IV. - - - - Generates a random key to be used for the algorithm. - - Use this method to generate a random key when none is specified. - - - - Gets or sets the block size of the cryptographic operation in bits. - - The block size. - ArcFour is a stream cipher, blocks can be of any size. - - - - Gets or sets the initialization vector (IV) for the symmetric algorithm. - - Initialization vector. - ArcFour is a stream cipher, it does not use IV. - - - - Gets or sets the mode for operation of the symmetric algorithm. - - The mode for operation. - ArcFour is a stream cipher, the only mode supported is CipherMode.OFB. - - - - Gets or sets the padding mode used in the symmetric algorithm. - - The padding mode. - ArcFour is a stream cipher, no padding is done. - - - - The managed version of the ArcFour algorithm. - - - - - Initializes a new instance of ArcFourManaged class. - - - - - Creates a symmetric ArcFour decryptor object with the specified Key and initialization vector (IV). - - The secret key to be used for the symmetric algorithm. - The IV. Not used by ArcFour. - A symmetric ArcFour decryptor object. - - - - Creates a symmetric ArcFour encryptor object with the specified Key and initialization vector (IV). - - The secret key to be used for the symmetric algorithm. - The IV. Not used by ArcFour. - A symmetric ArcFour encryptor object. - - - - The managed version of the algorithm defined by RFC 2268. - - - - - Initializes a new instance of class. - - - - - Generates a random initialization vector (IV) to be used for the algorithm. - - Use this method to generate a random initialization vector (IV) when none is specified. - - - - Generates a random key to be used for the algorithm. - - Use this method to generate a random key when none is specified. - - - - Creates a RC2 encryptor object with the specified key. - - The secret key to be used for the symmetric algorithm. - The initialization vector for - . - A RC2 encryptor object. - - - - Creates a RC2 decryptor object with the specified key. - - The secret key to be used for the symmetric algorithm. - The initialization vector for . - A RC2 decryptor object. - - - - Gets or sets the mode for operation of the symmetric algorithm. - - The mode for operation of the symmetric algorithm. - - - - Gets or sets the padding mode used in the symmetric algorithm. - - The padding mode used in the symmetric algorithm. - - - - Represents the base class from which all implementations of Bruce Schneier's Blowfish algorithm must derive. - - - - - Initializes a new instance of Blowfish. - - - You cannot create an instance of an abstract class. - Create an instance of class instead. - - - - - The managed version of the Blowfish algorithm. - - - - - Initializes a new instance of class. - - - - - Generates a random initialization vector (IV) to be used for the algorithm. - - Use this method to generate a random initialization vector (IV) when none is specified. - - - - Generates a random key to be used for the algorithm. - - Use this method to generate a random key when none is specified. - - - - Creates a Blowfish encryptor object with the specified key. - - The secret key to be used for the symmetric algorithm. - The initialization vector for - . - A Blowfish encryptor object. - - - - Creates a Blowfish decryptor object with the specified key. - - The secret key to be used for the symmetric algorithm. - The initialization vector for - . - A Blowfish decryptor object. - - - - Gets or sets the mode for operation of the symmetric algorithm. - - The mode for operation of the symmetric algorithm. - - - - Gets or sets the padding mode used in the symmetric algorithm. - - The padding mode used in the symmetric algorithm. - - - - Computes the combined MD5/SHA1 hash for the input data. - - - The resulting hash value is 36 bytes long. - Bytes 0..15 contain the MD5 hash and bytes 16..35 contain the SHA1 hash. - - - - - Initializes a new instance of the MD5SHA1 class. - - - - - Initializes an instance of MD5SHA1. - - - - - Routes data written to the object into MD5 and SHA1 hash algorithms for computing the hash. - - The array of data bytes. - The offset into the byte array from which to begin using data. - The number of bytes in the array to use as data. - - - - Returns the computed MD5SHA1 hash as an array of bytes after all data has been written to the object. - - The computed hash value. - - - - Releases the unmanaged resources used by the MD5SHA1 and optionally releases the managed resources. - - true to release both managed and unmanaged resources; false to release only unmanaged resources. - - - - Returns the underlying instance of the MD5 object that is used to compute the MD5 part of the combined hash. - - - - - Returns the underlying instance of the SHA1 object that is used to compute the SHA1 part of the combined hash. - - - - - Represents the base class from which all implementations of Bruce Schneier's Twofish algorithm must derive. - - - - - Initializes a new instance of Twofish. - - - You cannot create an instance of an abstract class. - Create an instance of class instead. - - - - - The managed version of the Twofish algorithm. - - - - - Initializes a new instance of class. - - - - - Generates a random initialization vector (IV) to be used for the algorithm. - - Use this method to generate a random initialization vector (IV) when none is specified. - - - - Generates a random key to be used for the algorithm. - - Use this method to generate a random key when none is specified. - - - - Creates a Twofish encryptor object with the specified key. - - The secret key to be used for the symmetric algorithm. - The initialization vector for - . - A Twofish encryptor object. - - - - Creates a Twofish decryptor object with the specified key. - - The secret key to be used for the symmetric algorithm. - The initialization vector for - . - A Twofish decryptor object. - - - - Gets or sets the mode for operation of the symmetric algorithm. - - The mode for operation of the symmetric algorithm. - - - - Gets or sets the padding mode used in the symmetric algorithm. - - The padding mode used in the symmetric algorithm. - - - - Managed implementation of MD5 algorithm. - - - - - Initializes a new instance. - - - - - Initializes an instance of MD5. - - - - - Updates the MD5 hash code. - - The array of data bytes. - The zero based offset into the byte array from which to begin using data. - The number of bytes in the array to use as data. - - - - Returns the computed MD5 hash as an array of bytes. - - The computed MD5 hash value. - - - - Managed implementation of MD4 algorithm. - - - - - Initializes a new instance. - - - - - Initializes an instance of MD4. - - - - - Updates the MD4 hash code. - - The array of data bytes. - The zero based offset into the byte array from which to begin using data. - The number of bytes in the array to use as data. - - - - Returns the computed MD4 hash as an array of bytes. - - The computed MD4 hash value. - - - - Represents a cryptographic object identifier. - - - - - Initializes a new instance of the class using the specified object. - - The object identifier information to use to create the new object identifier. - - - - Initializes a new instance of the class using the specified OID dotted number string. - - An object identifier in dotted number format. - - - - Converts a OID to an . - - An object identifier in dotted number format. - An . - - - - Parses an OID from an ASN.1 encoded byte array. - - Byte array. - OID. - - - - Gets an ASN.1 encoded byte array representaion of this OID. - - Byte array. - - - - Gets an ASN.1 encoded byte array representaion of this OID. - - True if DER-formatting is to be used. - Byte array. - - - - Returns a string in dotted number format that represents the current . - - A string representation of the current Oid. - - - - Gets the dotted number representation of the object identifier. - - - - - PKCS #12 key derivation algorithm. - - - - - ID value for key material. - - - - - ID value for IV material. - - - - - ID value for MAC material. - - - - Resets the state of the operation. - - - Returns a pseudo-random key from a password, salt and iteration count. - A byte array filled with pseudo-random key bytes. - The number of pseudo-random key bytes to generate. - - - - Managed implementation of RSA algorithm. - -

- The purpose of this class is to make it possible to verify - signatures and encrypt data without the need to use CryptoAPI, which - is not available in some scenarios. -

-

- Even though it is possible to generate RSA keys and sign data using - this class, it is not recommended because the generated keys are not - being checked to ensure they are strong primes. -

-
- - - Initializes a new instance of the RSAManaged class with the key size of 1024. - - - - - Initializes a new instance of the RSAManaged class with the specified key size. - - The size of the key to use in bits. - - - - Exports the . - - true to include private parameters; otherwise, false. - The RSA parameters. - - - - Imports the specified . - - The RSA parameters. - - - - Decrypts data with the RSA algorithm. - - The data to be decrypted. - The decrypted data. - No processing of raw data is performed. - - - - Encrypts data with the RSA algorithm. - - The data to be encrypted. - The encrypted data. - No processing of raw data is performed. - - - - Decrypts data with the RSA algorithm. - - The data to be decrypted. - The decrypted data. - Uses PKCS#1 v1.5 padding. - - - - Encrypts data with the RSA algorithm. - - The data to be encrypted. - The encrypted data. - Uses PKCS#1 v1.5 padding. - - - - Verifies the specified signature data by comparing it to the signature computed for the specified hash value. - - RSA algorithm. - The hash value of the signed data. - A hash algorithm used to create the hash value. - The signature data to be verified. - true if the signature verifies as valid; otherwise, false. - - - - Verifies the specified signature data by comparing it to the signature computed for the specified hash value. - - The hash value of the signed data. - A hash algorithm used to create the hash value. - The signature data to be verified. - true if the signature verifies as valid; otherwise, false. - - - - Computes the signature for the specified hash value by signing - it with the private key. - - RSA algorithm. - The hash of data to be signed. - A hash algorithm used to create the hash value. - The RSA signature for the specified hash value. - - - - Computes the signature for the specified hash value by signing - it with the private key. - - The hash of data to be signed. - A hash algorithm used to create the hash value. - The RSA signature for the specified hash value. - - - - Releases the unmanaged resources and optionally releases the managed resources. - - true to release both managed and unmanaged resources; false to release only unmanaged resources. - - - - Gets the name of the signature algorithm available with this implementation of RSA. - - The name of the signature algorithm. - - - - Gets the name of the key exchange algorithm available with this implementation of RSA. - - The name of the key exchange algorithm. - - - - Signature format. - - - - - Raw signature data. - - - - - DER-encoded ASN.1 form of the signature formatted according to Cryptographic Message Syntax (PKCS #7). - - - - - Signature padding scheme. - - - - - Default padding scheme (depends on key algorithm). - - - - - PKCS #1 padding scheme (RSASSA-PKCS1-v1_5 defined by RFC 3447). - - - - - Probabilistic Signature Scheme (PSS) padding scheme (RSASSA-PSS defined by RFC 3447). - - - - - Signature parameters. - - - - - Creates a new instance of . - - - - - Hashing algorithm. - - - - - Signature format. - - - - - Signature padding scheme. - - - - - Salt length in bytes (only used for ). - - - - - If set to true (default), the cryptographic provider should not display any user interface (UI) when working with private keys. - Only used for signing operations. - - - If silent operation is requested and the cryptographic provider needs to display a UI to operate, the requested method will fail. - - - - - Specifies symmetric algorithm. - - - - - AES. - - - - - 3DES. - - - - - Twofish. - - - - - DES. - - - - - RC2. - - - - - An algorithm compatible with RC4. - - - - - Blowfish. - - - - - Represents a symmetric cipher algorithm. - - - - - Gets the current initialization vector. - - Initialization vector. - - - - Gets the current key. - - Key. - - - - Derives a key (of length) using the specified generator. - - Generator algorithm. - - - - Derives an initialization vector (of length) using the specified generator. - - Generator algorithm. - - - - Generates a random key (of length). - - - - - Generates a initialization vector (of length). - - - - - Sets the current key to the specified value and changes the accordingly. - - Key. Cannot be null. - - - - Sets the current initialization vector to the specified value. - - Initialization vector. - - - - Creates an encryptor object for this algorithm based on the currently set parameters. - - Encryptor object. - - - - Creates a decryptor object for this algorithm based on the currently set parameters. - - Decryptor object. - - - - Creates a symmetric algorithm object for this algorithm based on the currently set parameters. - - Symmetric algorithm object. - - - - Disposes the object. - - - - - Creates an instance of for the specified algorithm. - - Algorithm. - - - - Gets a value indicating whether the specified algorithm is supported. - - Algorithm. - True if supported; false if not supported. - - - - Gets algorithm ID. - - - - - Gets or sets the desired block size in bits. - - - - - Gets or sets the desired key size in bits. - - - - - Gets or sets the desired effective key size in bits. - - - - - Gets or sets the desired block cipher padding mode. - - - - - Gets or sets the desired block cipher mode. - - - - - The AlgorithmIdentifier class defines an algorithm used for a cryptographic operation. - - - - - Creates an instance of the class - with the specified algorithm identifier. - - An object identifier for the algorithm. - - - - Creates an instance of the class with - the specified algorithm identifier and parameters. - - An object identifier for the algorithm. - ASN.1 DER encoded parameters. - - - - Gets the object identifier for the algorithm. - - On that represents the algorithm. - - - - Gets the algorithm parameters. - - The algorithm parameters. - - - - A collection of values associated with a . - - - - - Copies the range of elements from the to a compatible one-dimensional - array, starting at the specified index of the target array. - - One-dimensional zero-based array that is the destination of the elements copied from . - A zero-based index in the destination array at which copying begins. - - - - Gets the value at the specified index. - - An array of bytes in ASN.1 format. - - - - A cryptographic attribute that contains a type and a collection of associated values. - - - - - Initializes an instance of a . - - The object identifier that identifies the attribute type. - Parameters in ASN.1 format, in a form of one or more byte arrays. - - - - Initializes an instance of a . - - The object identifier that identifies the attribute type. - Parameters in ASN.1 format. - Not supported in .NET 1.0, use instead. - - - - Gets the object identifier that identifies the attribute type. - - The object identifier. - - - - Gets the collection of values associated with the attribute. - - A . - - - - A collection of objects. - - - - - Gets or sets the at the specified index. - - The zero-based index of the to get or set. - A cryptographic attribute. - - - - Gets the first with the specified object identifier. - - The object identifier, either friendly name or dotted string format. - A cryptographic attribute if found, or null if not found. - - - - Contains string representations of common extended usage OIDs. - - - - Any purpose. - - - TLS Web server authentication. - - - TLS Web client authentication. - - - Code signing. - - - E-mail protection. - - - Timestamping. - - - OCSPstamping. - - - - A utility class that features a certificate issuer functionality. This can be used as a base of simple custom certification authority. - - - - - Issues a certificate signed by the specified certification authority using the specified signature hash algorithm. - - Certification authority certificate to issue and sign the certificate. - Certificate info. - Certificate public key. - A new certificate. - - - - Issues a self-signed certificate, signed using the specified algorithm. Also passes back the private key info. - - Certificate info. - Certificate private key. - A new certificate. - - - - Issues a certificate signed by the specified certification authority using the specified signature hash algorithm. - - Certification authority certificate to issue and sign the certificate. - Signature hash algorithm. - Certificate revocation list info. - A collection of objects. - A new certificate. - - - - Contains information describing the certificate for the .Issue method. - - - - - Creates an instance of class. - - - - - Gets the certificate serial number. - - Serial number. - - - - Sets the certificate serial number. - - Serial number. - - - - Sets the certificate serial number. - - Serial number. - - - - Gets the extended certificate usage. - - Extended certificate usage. - - - - Sets the extended certificate usage. - - Extended certificate usage. - - - - Sets alternative hostnames. - - Alternative hostnames. - - - - Sets alternative hostnames. - - Alternative hostnames. - - - - Gets or sets the certificate subject. - - Certificate subject. - - - - Gets or sets the basic certificate usage. - - Basic certificate usage. - - - - Gets or sets the certificate effective date. - - Certificate effective date. - - - - Gets or sets the certificate expiration date. - - Certificate expiration date. - - - - Gets the certificate extensions collection. - - Certificate extensions collection. - - - - Gets the CRL distribution points collection. - - CRL distribution points collection. - - - - Gets or sets the certificate owner's e-mail address. - - E-mail address. - - - - Gets or sets the hash algorithm to be used to create the signature of the certificate. - - The hash algorithm to be used to create the signature of the certificate. - - - - Contains information describing the certificate for the .IssueRevocationList method. - - - - - Creates an instance of class. - - - - - Gets or sets the datetime of this CRL update. - - Datetime of this CRL update. - - - - Gets or sets the datetime of the next CRL update. - - Datetime of the next CRL update. - - - - A SPKAC certificate request. This is used by Mozilla, Opera and other browsers except Internet Explorer. - For Internet Explorer, use . - - - - - Creates a SPKAC request from an ASN.1 block. - - ASN.1 block. - - - - Validates the SPKAC request's signature. - - Challenge string. - True if valid; false if not valid. - - - - Gets the SPKAC request's public key info. This includes the key itself. - - Public key info. - - - - PKCS #10 certification request. This is the standard certificate format. - It is used (for example) by Internet Explorer's XEnroll control, but non-IE browsers generally use instead. - - - - - Creates a new PKCS #10 request for the specified subject and public key. - - Request subject. - Request public key. - - - - Parses a PKCS #10 request from an ASN.1 block. - - ASN.1 block. - - - - Validates the PKCS #10 request's signature. - - True if valid; false if not valid. - - - - Validates the PKCS #10 request's signature. - - Subject - in practice, this is used in place of a challenge string. - True if valid; false if not valid. - - - - Signs the certification request using a private key corresponding to the request's public key. - - An instance of . - Hash algorithm to use for the signature. - - - - Signs the certification request using a private key corresponding to the request's public key. - - An instance of representing the private key. - Hash algorithm to use for the signature. - - - - Signs the certification request using a private key corresponding to the request's public key. - - An instance of asymmetric algorithm such as RSACryptoServiceProvider, DSACryptoServiceProvider, RSAManaged or DSAManaged. - Hash algorithm to use for the signature. - - - - Gets list of alternative hostnames. - - List of alternative hostnames. - - - - Gets ASN.1 encoded form of this object. - - Array of bytes. - - - - Gets the PKCS #10 request's public key info. This includes the key itself. - - Public key info. - - - - Gets the PKCS #10 request's subject. - - Request subject. - - - - Gets the PKCS #10 request's attributes. - - Request attributes. - - - - Gets the PKCS #10 request's certificate extension collection (represented by 1.2.840.113549.1.9.14 attribute in collection). - - - - - Specifies the reason for inclusion in the certificate revocation list. - - - - Unspecified. - - - Key was compromised. - - - CA was compromised. - - - Affiliation changed. - - - Certificate was superseded. - - - Operation was ceased. - - - Certificate hold. - - - Remove from CRL. - - - - The certificate revocation list. - - - - - Base class for various PKCS objects. - - - - - Loads a CMS/PKCS #7 signed or enveloped message from a stream. - Returns an instance of for signed message, for enveloped message, or null for - methods and properties. - - A stream from which to load the message. - Gets or sets the to be used to find certificates corresponding to a . - A value indicating whether cryptographic providers are permitted to display a user interface. - An instance of , or null. - - - - Creates a certificate revocation list from an ASN.1 block. - - ASN.1 block. - - - - Loads a certificate revocation list from given stream. - - Stream to load the certificate revocation list from. - - - - Converts a certificate revocation list into a byte array. - - Byte array. - - - - Returns the certificate revocation list hash. - - CRL hash. - - - - Returns the certificate revocation list signature. - - CRL signature. - - - - Returns distribution point URL from issuing distribution point extension, if both present. Otherwise returns null. - - Distribution point URL. - - - - Checks whether the certificate revocation list contains the specified certificate. - Also makes sure that the CRL is suitable for the certificate. - - Certificate to check. - Revocation check result. - - Please note that this method does not check the validity of the CRL itself. - Call on the issuer certificate - to perform this check. - - - - - Gets the DN of the issuer of this certificate revocation list. - - DN of the issuer of this certificate revocation list. - - - - Gets the datetime of this CRL update. - - Datetime of this CRL update. - - - - Gets the datetime of the next CRL update. - - Datetime of the next CRL update. - - - - Gets the CRL number if appropriate extension is present. - - CRL number or null (Nothing in VB.NET) if not specified. - - - - Gets the collection of CRL's extensions. - - Extensions collection. - - - - Gets the collection of revoked certificates. - - Revoked certificate collection. - - - - Returns the key algorithm used to sign this certificate revocation list. - - The key algorithm. - - - - Returns the hash algorithm used to create the signed hash value. - - Hash algorithm. - - - - Collection of information about revoked certificates. A part of . - - - - - Creates a new instance of . - - - - - Information about revoked certificate. - - - - - Creates a new instance of revoked certificate based on the supplied data. - - Serial number. - Revocation date. - Revocation reason. - - - - Creates a new instance of revoked certificate based on the supplied data. - - Serial number. - Revocation date. - Revocation reason. - - - - Gets the certificate's serial number. - - Serial number. - - - - Returns revocation reason of the revoked certificate. - - If the revocation reason extension is present, returns the reason from that extension; otherwise returns . - - - - Gets the revocation date. - - Revocation date. - - - - Gets the collection of revoked certificate info's extensions. - - Extensions collection. - - - - Represents revocation check outcome. - - - - - The issuer of the certificate does not match the issuer of the CRL. - - - - - This CRL is not supposed to be used to check the status of this certificate (try the next CRL). - - - - - The certificate has not been revoked according to this CRL. - - - - - The certificate has been revoked. - - - - - Represents the result of certificate revocation check. - - - - - Gets revocation check outcome. - - - - - Gets the revocation date. - - Revocation date. - - - - Gets revocation reason of the revoked certificate. - - If the revocation reason extension is present, returns the reason from that extension; otherwise returns null (Nothing in VB.NET). - - - - Certificate revocation list status. - - - - - The CRL is valid (make sure to check the issuer certificate for validity as well). - - - - - The CRL has expired or is not valid yet. - - - - - The CRL has not been issued by the specified issuer. - - - - - The CRL contains an unsupported critical extension. - - - - - The CRL update time is outside the issuer certificate's time validity range. - - - - - The CRL issuer is not intended to issue CRLs. - - - - - The CRL signature is not valid. - - - - - Malformed structure of the CRL or its extensions. - - - - - Collection of certificate revocation lists. - - - - - The class represents the CMS/PKCS #7 ContentInfo data structure. - It encapsulates the content of or messages. - - - - - Initializes a new instance of using the specified array of bytes - as content and an object identifier "data" as content type. - - The message content. - - - - Initializes a new instance of using the specified array of bytes - as content and the specified object identifier as content type. - - The message content type. - The message content. - - - - Gets the content of the CMS/PKCS #7 message. - - An array of bytes that represent the content data. - - - - Copies the content of the CMS/PKCS #7 message into the supplied stream. - - Stream into which the content will be written. - - - - Gets the object identifier of the CMS/PKCS #7 message content type. - - - - - Gets the content of the CMS/PKCS #7 message. - - An array of bytes that represent the content data. - - Please note that the array is a copy of the content. - If you modify it, the actual content will not change. - - - - - Represents a CMS/PKCS #7 encrypted data. - - - - - Tries acquiring a private key unless it is already available. - - True if the key has been acquired, false otherwise. - - - - Gets the symmetric key used to encrypt the message, - or null if it cannot be retrieved. - - The symmetric key used to encrypt the message, or null. - - - - Gets the symmetric algorithm used to encrypt or decrypt the content, - or null if it cannot be retrieved. - - The . - - - - Encrypts the contents of the CMS/PKCS #7 message. - - - - - Decrypts the contents of the CMS/PKCS #7 message. - - For a successful decryption, a symmetric key must be available. - - - - Decodes an encoded CMS/PKCS #7 encrypted message from raw data. - Upon successful decoding, information can be retrieved using - methods and properties. - - Arrays of bytes representing a CMS/PKCS #7 message. - - - - Encodes the object into CMS/PKCS #7 message data. - - Array of bytes representing a CMS/PKCS #7 message. - - - - Determines whether the specified content info ASN.1 sequence is an enveloped data sequence. - - Sequence data. - Offset. - Count. - True if yes; false if not. - - - - Loads a CMS/PKCS #7 encrypted message from a stream. - Upon successful decoding, information can be retrieved using - methods and properties. - - A stream from which to load the message. - - - - Saves into a stream. - - A stream to which to save the message. - - - - Creates a copy of this object. - - A new object. - - - - Creates an instance of class. - It must be initialized using or methods before - any other methods and properties can be accessed. - - - - - Creates an instance of class using the specified content - information as the inner content. - - The inner content of the encrypted message. - - - - Creates an instance of class using the specified content - information and encryption algorithm. - - The inner content of the encrypted message. - Encryption algorithm identifier (see remarks). Can be null for 3DES. - - Currently, 3DES ("1.2.840.113549.3.7"), - AES ("2.16.840.1.101.3.4.1.2" for 128-bit, "2.16.840.1.101.3.4.1.22" for 192-bit and "2.16.840.1.101.3.4.1.42" for 256-bit), - DES ("1.3.14.3.2.7") and RC2 ("1.2.840.113549.3.2") algorithms are supported. - - - - - Creates an instance of class using the specified content - information and encryption algorithm. - - The inner content of the encrypted message. - Encryption algorithm identifier (see remarks). Can be null for 3DES. - The effective key length in bits (only used by RC2 algorithm). - - Currently, 3DES ("1.2.840.113549.3.7"), - AES ("2.16.840.1.101.3.4.1.2" for 128-bit, "2.16.840.1.101.3.4.1.22" for 192-bit and "2.16.840.1.101.3.4.1.42" for 256-bit), - DES ("1.3.14.3.2.7") and RC2 ("1.2.840.113549.3.2") algorithms are supported. - - - - - Gets or sets the to be used to find certificates - corresponding to a . - - The certificate finder. - - - - Gets or sets a value indicating whether cryptographic providers - are allowed to display any user interface (UI) when working with private keys. - - A value indicating whether a cryptographic provider can display a UI. - - - - Gets a value indicating whether the content is encrypted. - - A value indicating whether the content is encrypted. - - - - Gets the collection of unprotected (unencrypted) attributes associated with this CMS/PKCS #7 message. - - Unprotected attribute collection. - - - - Gets the collection of certificates that are embedded in the message. - - Collection of certificates - - - - Gets the collection of certificate revocation lists (CRLs) that are embedded in the message. - - Collection of CRLs - - - - Gets the collection of recipients associated with this CMS/PKCS #7 message. - - A collection of recipients. - - - - Gets the inner content information for this CMS/PKCS #7 message. - It contains the content type identifier and content data. - - The inner content. - - This method returns the encrypted content for parsed messages - and unencrypted content for newly created messages. To encrypt or decrypt - the content, use and methods. - - - - - Gets the identifier of the algorithm used to encrypt the content. - - An object. - - - - Returns a value indicating whether the private key to decrypt the symmetric key - and encrypted content is available. - - True if the private key is available, false if it isn't. - - - - Defines the interface that certificate finder classes must implement. - - - - - Finds a certificate corresponding to the specified subject identifier. - - Identifier of the subject certificate. - A certificate store containing the certificates that were included with the message. - Certificate chain if found, or null (Nothing in Visual Basic). - - - - Provides a set of common certificate finders. - - - - - Certificate finder. - - CertificateChain array. - A new instance of ICertificateFinder. - - - - Default certificate finder. - - - Searches for certificates in the current user's "My", - "Trusted people" and "Other people" stores. - - - - - Specifies private key file format. - - - - Base64-encoded PKCS #8 format. - - - PuTTY PPKv2 format. - - - OpenSSH/OpenSSL SSLeay format. - - - Raw PKCS #8 format. - - - New OpenSSH format with bcrypt key expansion (Base64-encoded keys with "BEGIN OPENSSH PRIVATE KEY" header). - - - - Represents a private key. - - - - - Creates a new instance of . Use the method to load a private key. - - - - - Creates a new instance of based on the specified RSA parameters. - - RSA parameters including private keys. - - - - Creates a new instance of based on the specified DSA parameters. - - DSA parameters including private keys. - - - - Generates a private key using the specified algorithm and default key size. - - Key algorithm. - An instance of . - - - - Generates a private key using the specified algorithm and key size. - - Key algorithm. - Key size. Specify 0 to use default key size. - An instance of . - - - - Gets the raw form of the private key. - - Array of bytes. - - - - Gets the raw form of the private key. - - Array of bytes. - - - - Gets a public key corresponding to the private key. - - An instance of . - - - - Gets the DSA parameters for a DSA key. May only be used for DSA private keys. - - DSA paramaters. - - - - Gets the RSA parameters for a RSA key. May only be used for RSA private keys. - - RSA paramaters. - - - - Gets ASN.1 encoded form of this object. - - Array of bytes. - - - - Saves the private key into the supplied stream in the specified format. - - A stream to which to save the private key. - Password to encrypted the private key, or null if no encryption desired. - Private key file format. - - - - Saves the private key into the supplied stream in the specified format. - - A file to which to save the public key. - Password to encrypted the private key, or null if no encryption desired. - Private key file format. - - - - Saves the private key into the supplied stream in Base64-encoded PKCS #8 format. - - A stream to which to save the private key. - Password to encrypted the private key, or null if no encryption desired. - Encryption algorithm identifier. Ignored if password is null. - - Currently, 3DES ("1.2.840.113549.3.7"), DES ("1.3.14.3.2.7") and RC2 ("1.2.840.113549.3.2") algorithms are supported. - - - - - Loads a PKCS #8, PuTTY or SSLeay (OpenSSL/OpenSSH) format private key from a stream. - Upon successful decoding, information can be retrieved using - methods and properties. - - A stream from which to load the private key. - Password used to encrypted the private key, or null if no password needed. - - - - Loads a PKCS #8, PuTTY or SSLeay (OpenSSL/OpenSSH) format private key from a stream. - Upon successful decoding, information can be retrieved using - methods and properties. - - A file from which to load the private key. - Password used to encrypted the private key, or null if no password needed. - - - - Gets the key algorithm identifier. - - Key algorithm identifier. - - - - Gets or ets the key comment. The comment is used while saving in some formats. - - Key comment. - - - - Represents a public key. - - - - - Creates a new instance of . Use the method to load a public key. - - - - - Creates a new instance of based on the specified RSA parameters. - - RSA parameters. - - - - Creates a new instance of based on the specified DSA parameters. - - DSA parameters. - - - - Gets the raw form of the public key. - - Array of bytes. - - - - Gets the raw form of the public key. - - Array of bytes. - - - - Gets ASN.1 encoded form of this object. - - Array of bytes. - - - - Gets the DSA parameters for a DSA public key. May only be used for DSA public keys. - - DSA paramaters. - - - - Gets the RSA parameters for a RSA public key. May only be used for RSA public keys. - - RSA paramaters. - - - - Returns the size of the key in bits. - - Size of the key in bits. - - - - Returns the key algorithm. - - Key algorithm. - - - - Saves the public key into the supplied stream in Base64-encoded PKCS #8 format. - - A stream to which to save the public key. - - - - Saves the public key into the supplied stream in Base64-encoded PKCS #8 format. - - A file to which to save the public key. - - - - Loads a PKCS #8 public key from a stream. - Upon successful decoding, information can be retrieved using - methods and properties. - - A stream from which to load the public key. - - - - Loads a PKCS #8 public key from a file. - Upon successful decoding, information can be retrieved using - methods and properties. - - A file from which to load the public key. - - - - Gets the key algorithm identifier. - - Key algorithm identifier. - - - - Represents a CMS/PKCS #7 encrypted message recipient. - This class is inherited by and classes. - - - - - Gets signature parameters (if available). - - Signature parameters. - - - - Gets the identifier of the recipient. - - Identifier of the recipient. - - - - Gets the identifier of the algorithm used to encrypt the symmetric key. - - An object. - - - - Gets the encrypted key for the recipient. - - Encrypted key. - - - - Gets the certificate associated with the recipient, or null if not available. - - The recipient's certificate, or null. - - - - Gets the certificate chain associated with the recipient, or null if not available. - - The recipient's certificate chain, or null. - - - - Defines key transport recipient information, typically using the RSA algorithm to - encrypt the shared symmetric key to transport. - - - - - Creates a new instance of that defines the - key transport recipient information for the owner of the specified RSA certificate. - Use to specify RSAES-OAEP parameters. - - The recipient's certificate. - - - - Creates a new instance of that defines the - key transport recipient information for the owner of the specified RSA certificate. - Use to specify RSAES-OAEP parameters. - - The recipient's certificate. - Subject identifier type - only IssuerAndSerialNumber and SubjectKeyIdentifier values are accepted. - - - - Creates a new instance of that defines the - key transport recipient information for the owner of the specified RSA certificate. - - The recipient's certificate. - Encryption parameters (to specify RSAES-OAEP parameters). Can be null (for PKCS #1). - - - - Creates a new instance of that defines the - key transport recipient information for the owner of the specified RSA certificate. - - The recipient's certificate. - Subject identifier type - only IssuerAndSerialNumber and SubjectKeyIdentifier values are accepted. - Encryption parameters (to specify RSAES-OAEP parameters). Can be null (for PKCS #1). - - - - Gets signature parameters (if available). - - Signature parameters. - - - - Gets the identifier of the recipient. - - Identifier of the recipient. - - - - Gets the identifier of the algorithm used to encrypt the symmetric key. - - An object. - - - - Gets the encrypted key for the recipient. - - Encrypted key. - - - - Gets the certificate associated with the recipient, or null if not available. - - The recipient's certificate, or null. - - - - Gets the certificate chain associated with the recipient, or null if not available. - - The recipient's certificate chain, or null. - - - - Defines key agreement algorithm recipient information. The key itself is not transported - the two - parties that will be using a symmetric key both take part in its generation. Please note that - this method is not yet fully supported by Rebex Security library. - - - - - Gets the identifier of the key originator. - - Identifier of the key originator. - - - - Gets the identifier of the recipient. - - Identifier of the recipient. - - - - Gets the identifier of the algorithm used to encrypt the symmetric key. - - An object. - - - - Gets the encrypted key for the recipient. - - Encrypted key. - - - - Gets the certificate associated with the recipient, or null if not available. - - The recipient's certificate, or null. - - - - Gets the certificate chain associated with the recipient, or null if not available. - - The recipient's certificate chain, or null. - - - - A collection of objects. - - - - - Creates an empty and read-only instance of . - - - - - Represents a CMS/PKCS #7 signed data. - - - - - Creates a signatures for all signers that do not have one yet. - - - - - Creates a signatures for all signers that do not have one yet. - - Signature options. - - - - Validates all digital signatures on this CMS/PKCS #7 signed message - and validates all the signers' certificates. - - Validation result. - - - - Validates all digital signatures on this CMS/PKCS #7 signed message. - Optionally, signers' certificates are validated, and the specified validation - options are taken into account. - - Specifies whether to only verify the signatures, skipping the certificate validation. - Signature and certificate validation options. - Validation result. - - - - Validates all digital signatures on this CMS/PKCS #7 signed message. - Optionally, signers' certificates are validated, and the specified validation - options are taken into account. - - Specifies whether to only verify the signatures, skipping the certificate validation. - Signature and certificate validation options. - Certificate chain engine. - Validation result. - - - - Decodes an encoded CMS/PKCS #7 signed message from raw data. - Upon successful decoding, information can be retrieved using - methods and properties. - - Array of bytes representing a CMS/PKCS #7 message. - - - - Encodes the object into CMS/PKCS #7 message data. - - Array of bytes representing a CMS/PKCS #7 message. - - - - Determines whether the specified content info ASN.1 sequence is a signed data sequence. - - Sequence data. - Offset. - Count. - True if yes; false if not. - - - - Loads a CMS/PKCS #7 signed message from a stream. - Upon successful decoding, information can be retrieved using - methods and properties. - - A stream from which to load the message. - - - - Saves into a stream. - - A stream to which to save the message. - - - - Creates a copy of this object. - - A new object. - - - - Creates an instance of class. - - - - - Creates an instance of class using the specified content - information as the inner content. - - The inner content of the signed message. - - - - Creates an instance of class using the specified content - information as the inner content. - - The inner content of the signed message. - - Specifies whether the signature is detached. - If detached, the actual content is not included within the signed message. - - - - - Specifies what parts of the certificate chain should be included in the signed data. - - Certificate include option. - - - - Gets or sets the to be used to find certificates - corresponding to a . - - The certificate finder. - - - - Gets or sets a value indicating whether cryptographic providers - are allowed to display any user interface (UI) when working with private keys. - - A value indicating whether cryptographic providers can display a UI. - - In case of signing, the actual behavior is determined by the combination of this value and the value of - passed to associated objects. - Cryptographic providers are only permitted to display a UI if both Silent properties are set to true. - - - - - Gets the collection of certificates that are embedded in the message. - - Collection of certificates - - - - Gets the collection of certificate revocation lists (CRLs) that are embedded in the message. - - Collection of CRLs - - - - Gets the collection of signers associated with this CMS/PKCS #7 message. - - A collection of signers. - - - - Gets or sets the inner content information for this CMS/PKCS #7 message. - It contains the content type identifier and content data. - - The inner content. - - - - Gets or sets a value indicating whether the actual content is detached from the message. - - True if the content is detached; False if the content is embedded within the message. - - - - Specifies what parts of the certificate chain should be included in the message. - - - - Leave the existing certificate in the collection. - - - The certificate chain is not included. - - - The certificate chain is included, except for the root certificate. - - - Only the end certificate is included. - - - The certificate chain, including the root certificate, is included. - - - - Represents a CMS/PKCS #7 message signer. - - - - - Gets a value that identifies the digest algorithm. - - Digest algorithm. - - - - Gets signature parameters (if available). - - Signature parameters. - - - - Validates the signer's digital signature and validates the certificate. - - Validation result. - - - - Validates the signer's digital signatures. - Optionally, signers' certificates are validated, and the specified validation - options are taken into account. - - Specifies whether to only verify the signatures, skipping the certificate validation. - Signature and certificate validation options. - Validation result. - - - - Validates the signer's digital signatures. - Optionally, signers' certificates are validated, and the specified validation - options are taken into account. - - Specifies whether to only verify the signatures, skipping the certificate validation. - Signature and certificate validation options. - Certificate chain engine. - Validation result. - - - - Creates a signatures for the signer. - - - - - Creates a signature for the signer. - - Signature options. - - - - Creates a new instance of that defines - a signer corresponding to the specified certificate. An associated private - key for the certificate must be available. - Use to specify RSASSA-PSS parameters. - - The signer's certificate. - - - - Creates a new instance of that defines - a signer corresponding to the specified certificate. An associated private - key for the certificate must be available. - Use to specify RSASSA-PSS parameters. - - The signer's certificate. - Subject identifier type - only IssuerAndSerialNumber and SubjectKeyIdentifier values are accepted. - - - - Creates a new instance of that defines - a signer corresponding to the specified certificate. An associated private - key for the certificate must be available. - Use to specify RSASSA-PSS parameters. - - The signer's certificate. - Subject identifier type - only IssuerAndSerialNumber and SubjectKeyIdentifier values are accepted. - Digest algorithm. - - - - Creates a new instance of that defines - a signer corresponding to the specified certificate. An associated private - key for the certificate must be available. - - The signer's certificate. - Signature parameters (to specify RSASSA-PSS parameters). Can be null (for PKCS #1). - - - - Creates a new instance of that defines - a signer corresponding to the specified certificate using the - specified subject identifier type. An associated private - key for the certificate must be available. - - The signer's certificate. - Signature parameters (to specify RSASSA-PSS parameters). Can be null (for PKCS #1). - Subject identifier type - only IssuerAndSerialNumber and SubjectKeyIdentifier values are accepted. - - - - Gets the identifier of the signer. - - Identifier of the signer. - - - - Gets the identifier of the digest algorithm. - - An object. - - - - Gets the identifier of the signature algorithm. - - An object. - - - - Gets the signature, or null if it is not available yet. - - The signature. - - - - Gets the collection of signed attributes associated with this CMS/PKCS #7 message. - - Signed attribute collection. - - - - Gets the collection of unsigned attributes associated with this CMS/PKCS #7 message. - - Unsigned attribute collection. - - - - Gets the certificate associated with the signer, or null if not available. - - The signer's certificate, or null. - - - - Gets the certificate chain associated with the signer, or null if not available. - - The signer's certificate chain, or null. - - - - Gets the signing time, or 1970-01-01 if not available. - - Singing time. - - - - Gets the preferred subject identifier for key encryption. - - The preferred subject identifier. - - - - Gets the collection of S/MIME capabilities the signer supports. - - Collection of supported S/MIME capabilities. - - - - A collection of objects. - - - - - Creates an empty and read-only instance of . - - - - - Options for and methods. - - - - Don't include any signed attributes in the signature. Not recommended. - - - Don't include key Microsoft extensions in the signature attributes. - - - Don't include S/MIME capabilities extensions in the signature attributes. - - - Skip certificate usage check. - - - - Signature validation status. - - - - Certificate is not valid. - - - Certificate is not available. - - - A digest algorithm is not supported. - - - A signature algorithm is not supported. - - - A signature is invalid. - - - Invalid key usage. The certificate usage doesn't include message signing. - - - Content type mismatch. - - - - Represents the result of signature validation. - - - - - Gets the status mask. - - Status mask. - - - - Gets the certificate validation status mask. - - Certificate validation status mask. - - - - Gets the certificate chain validity status. - - True if valid, false if not valid. - - - - Represents an S/MIME capability. - - - - - Initializes an instance of a with no parameters. - - The object identifier that identifies the S//MIME capability. - - - - Initializes an instance of a . - - The object identifier that identifies the S//MIME capability. - Capability parameters in ASN.1 format. - - - - Gets the object identifier that identifies the S/MIME capability. - - The object identifier. - - - - Gets the S/MIME capability parameters. - - An array of bytes in ASN.1 format. - - - - A collection of objects. - - - - - Gets or sets the at the specified index. - - The zero-based index of the to get or set. - An S/MIME capability. - - - - Gets the first with the specified object identifier. - - The object identifier, either friendly name or dotted string format. - An S/MIME capability if found, or null if not found. - - - - Defines the type of subject identifier that identifies a subject and a certificate. - - - - - The type of subject identifier is unknown. - - - - - The subject is identified by the certificate issuer and serial number. - - - - - The subject is identified by the hash of the subject's public key. The hash algorithm used is determined by the signature algorithm suite in the subject's certificate. - - - - - The subject is identified by the subject's public key. - - - - - The class identifies a subject, either by certificate issuer - and serial number, by the subject key identifier or by a public key. - - - - - Gets the type of the subject identifier. - - The type of the subject identifier. - - - - Gets the of the certificate issuer if - this subject identifier is identified by the issuer name and serial number. - Otherwise, this property will return null. - - Certificate issuer. - - - - Gets the serial number of the certificate if - this subject identifier is identified by the issuer name and serial number. - Otherwise, this property will return null. - - Certificate serial number. - - - - Gets the subject key identifier of the certificate if - this subject identifier is identified by the subject key identifier. - Otherwise, this property will return null. - - Certificate subject key identifier. - - - - Gets the public algorithm of the certificate if - this subject identifier is identified by the public key. - Otherwise, this property will return null. - - Certificate public key algorithm. - - - - Gets the public of the certificate if - this subject identifier is identified by the public key. - Otherwise, this property will return null. - - Certificate public key. - - - - Represents sorting order. - - - - - Ascending sort order. - - - - - Descending sort order. - - - - - Log writer acting as a container that writes log messages to all inner writers. - - - - - Creates a new instance of a tee log writer over given set of individual . - - A non-empty collection of log writers. - - - - Creates a new instance of a tee log writer over given set of individual . - - A non-empty array of log writers. - - - - Write a message into all inner writers. - - Message level. - Logging object type. - Logging object ID. - Logging area. - Message. - - - - Write a message and data block into all inner writers. - - Message level. - Logging object type. - Logging object ID. - Logging area. - Message. - Data block. - Data offset. - Date length. - - - - Implements the interface method IDisposable.Dispose - Use this method to explicitly release all resources hold by the inner writers. - - - - - A cumulative log level.
- When getting, it returns the minimum level of inner writers' levels.
- When setting, the value is propagated to all inner writers. -
- Log level. -
- - - Specifies granularity for time comparisons. - - - - - Time is taken as is. - - - Useful when working with NTFS file system. - - - - - The smallest time unit is one second (milliseconds are ignored). - E.g. 11:33:55.999 is rounded to 11:33:55.000. - - - Useful when working with some UNIX FTP or SFTP servers. - - - - - The smallest time unit is two-second. So odd seconds are rounded to lower even value (milliseconds are ignored). - E.g. 11:33:55.999 is rounded to 11:33:54.000. - - - Useful when working with FAT file system (.NET CF, MS-DOS). - - - - - The smallest time unit is one day (time component is ignored). - E.g. 2012-12-12 11:33:55.999 is rounded to 2012-12-12 00:00:00.000. - - - Useful when working with some UNIX FTP or SFTP servers. - - - - Creates an instance of class. - - - Creates an instance of class. - - - Creates an instance of class. - - - Creates an instance of class. - - - Creates an instance of class. - - - Creates an instance of class. - -
-
\ No newline at end of file diff --git a/packages/SharpZipLib.1.1.0/.signature.p7s b/packages/SharpZipLib.1.1.0/.signature.p7s deleted file mode 100644 index 19633d70..00000000 Binary files a/packages/SharpZipLib.1.1.0/.signature.p7s and /dev/null differ diff --git a/packages/SharpZipLib.1.1.0/SharpZipLib.1.1.0.nupkg b/packages/SharpZipLib.1.1.0/SharpZipLib.1.1.0.nupkg deleted file mode 100644 index 1f97ef27..00000000 Binary files a/packages/SharpZipLib.1.1.0/SharpZipLib.1.1.0.nupkg and /dev/null differ diff --git a/packages/SharpZipLib.1.1.0/lib/net45/ICSharpCode.SharpZipLib.dll b/packages/SharpZipLib.1.1.0/lib/net45/ICSharpCode.SharpZipLib.dll deleted file mode 100644 index eef50c2c..00000000 Binary files a/packages/SharpZipLib.1.1.0/lib/net45/ICSharpCode.SharpZipLib.dll and /dev/null differ diff --git a/packages/SharpZipLib.1.1.0/lib/net45/ICSharpCode.SharpZipLib.pdb b/packages/SharpZipLib.1.1.0/lib/net45/ICSharpCode.SharpZipLib.pdb deleted file mode 100644 index 6e3081b3..00000000 Binary files a/packages/SharpZipLib.1.1.0/lib/net45/ICSharpCode.SharpZipLib.pdb and /dev/null differ diff --git a/packages/SharpZipLib.1.1.0/lib/net45/ICSharpCode.SharpZipLib.xml b/packages/SharpZipLib.1.1.0/lib/net45/ICSharpCode.SharpZipLib.xml deleted file mode 100644 index b206f175..00000000 --- a/packages/SharpZipLib.1.1.0/lib/net45/ICSharpCode.SharpZipLib.xml +++ /dev/null @@ -1,10121 +0,0 @@ - - - - ICSharpCode.SharpZipLib - - - - - An example class to demonstrate compression and decompression of BZip2 streams. - - - - - Decompress the input writing - uncompressed data to the output stream - - The readable stream containing data to decompress. - The output stream to receive the decompressed data. - Both streams are closed on completion if true. - - - - Compress the input stream sending - result data to output stream - - The readable stream to compress. - The output stream to receive the compressed data. - Both streams are closed on completion if true. - Block size acts as compression level (1 to 9) with 1 giving - the lowest compression and 9 the highest. - - - - Defines internal values for both compression and decompression - - - - - Random numbers used to randomise repetitive blocks - - - - - When multiplied by compression parameter (1-9) gives the block size for compression - 9 gives the best compression but uses the most memory. - - - - - Backend constant - - - - - Backend constant - - - - - Backend constant - - - - - Backend constant - - - - - Backend constant - - - - - Backend constant - - - - - Backend constant - - - - - Backend constant - - - - - Backend constant - - - - - BZip2Exception represents exceptions specific to BZip2 classes and code. - - - - - Initialise a new instance of . - - - - - Initialise a new instance of with its message string. - - A that describes the error. - - - - Initialise a new instance of . - - A that describes the error. - The that caused this exception. - - - - An input stream that decompresses files in the BZip2 format - - - - - Construct instance for reading from stream - - Data source - - - - Get/set flag indicating ownership of underlying stream. - When the flag is true will close the underlying stream also. - - - - - Gets a value indicating if the stream supports reading - - - - - Gets a value indicating whether the current stream supports seeking. - - - - - Gets a value indicating whether the current stream supports writing. - This property always returns false - - - - - Gets the length in bytes of the stream. - - - - - Gets the current position of the stream. - Setting the position is not supported and will throw a NotSupportException. - - Any attempt to set the position. - - - - Flushes the stream. - - - - - Set the streams position. This operation is not supported and will throw a NotSupportedException - - A byte offset relative to the parameter. - A value of type indicating the reference point used to obtain the new position. - The new position of the stream. - Any access - - - - Sets the length of this stream to the given value. - This operation is not supported and will throw a NotSupportedExceptionortedException - - The new length for the stream. - Any access - - - - Writes a block of bytes to this stream using data from a buffer. - This operation is not supported and will throw a NotSupportedException - - The buffer to source data from. - The offset to start obtaining data from. - The number of bytes of data to write. - Any access - - - - Writes a byte to the current position in the file stream. - This operation is not supported and will throw a NotSupportedException - - The value to write. - Any access - - - - Read a sequence of bytes and advances the read position by one byte. - - Array of bytes to store values in - Offset in array to begin storing data - The maximum number of bytes to read - The total number of bytes read into the buffer. This might be less - than the number of bytes requested if that number of bytes are not - currently available or zero if the end of the stream is reached. - - - - - Closes the stream, releasing any associated resources. - - - - - Read a byte from stream advancing position - - byte read or -1 on end of stream - - - - An output stream that compresses into the BZip2 format - including file header chars into another stream. - - - - - Construct a default output stream with maximum block size - - The stream to write BZip data onto. - - - - Initialise a new instance of the - for the specified stream, using the given blocksize. - - The stream to write compressed data to. - The block size to use. - - Valid block sizes are in the range 1..9, with 1 giving - the lowest compression and 9 the highest. - - - - - Ensures that resources are freed and other cleanup operations - are performed when the garbage collector reclaims the BZip2OutputStream. - - - - - Gets or sets a flag indicating ownership of underlying stream. - When the flag is true will close the underlying stream also. - - The default value is true. - - - - Gets a value indicating whether the current stream supports reading - - - - - Gets a value indicating whether the current stream supports seeking - - - - - Gets a value indicating whether the current stream supports writing - - - - - Gets the length in bytes of the stream - - - - - Gets or sets the current position of this stream. - - - - - Sets the current position of this stream to the given value. - - The point relative to the offset from which to being seeking. - The reference point from which to begin seeking. - The new position in the stream. - - - - Sets the length of this stream to the given value. - - The new stream length. - - - - Read a byte from the stream advancing the position. - - The byte read cast to an int; -1 if end of stream. - - - - Read a block of bytes - - The buffer to read into. - The offset in the buffer to start storing data at. - The maximum number of bytes to read. - The total number of bytes read. This might be less than the number of bytes - requested if that number of bytes are not currently available, or zero - if the end of the stream is reached. - - - - Write a block of bytes to the stream - - The buffer containing data to write. - The offset of the first byte to write. - The number of bytes to write. - - - - Write a byte to the stream. - - The byte to write to the stream. - - - - Get the number of bytes written to output. - - - - - Get the number of bytes written to the output. - - - - - Releases the unmanaged resources used by the and optionally releases the managed resources. - - true to release both managed and unmanaged resources; false to release only unmanaged resources. - - - - Flush output buffers - - - - - Computes Adler32 checksum for a stream of data. An Adler32 - checksum is not as reliable as a CRC32 checksum, but a lot faster to - compute. - - The specification for Adler32 may be found in RFC 1950. - ZLIB Compressed Data Format Specification version 3.3) - - - From that document: - - "ADLER32 (Adler-32 checksum) - This contains a checksum value of the uncompressed data - (excluding any dictionary data) computed according to Adler-32 - algorithm. This algorithm is a 32-bit extension and improvement - of the Fletcher algorithm, used in the ITU-T X.224 / ISO 8073 - standard. - - Adler-32 is composed of two sums accumulated per byte: s1 is - the sum of all bytes, s2 is the sum of all s1 values. Both sums - are done modulo 65521. s1 is initialized to 1, s2 to zero. The - Adler-32 checksum is stored as s2*65536 + s1 in most- - significant-byte first (network) order." - - "8.2. The Adler-32 algorithm - - The Adler-32 algorithm is much faster than the CRC32 algorithm yet - still provides an extremely low probability of undetected errors. - - The modulo on unsigned long accumulators can be delayed for 5552 - bytes, so the modulo operation time is negligible. If the bytes - are a, b, c, the second sum is 3a + 2b + c + 3, and so is position - and order sensitive, unlike the first sum, which is just a - checksum. That 65521 is prime is important to avoid a possible - large class of two-byte errors that leave the check unchanged. - (The Fletcher checksum uses 255, which is not prime and which also - makes the Fletcher check insensitive to single byte changes 0 - - 255.) - - The sum s1 is initialized to 1 instead of zero to make the length - of the sequence part of s2, so that the length does not have to be - checked separately. (Any sequence of zeroes has a Fletcher - checksum of zero.)" - - - - - - - largest prime smaller than 65536 - - - - - The CRC data checksum so far. - - - - - Initialise a default instance of - - - - - Resets the Adler32 data checksum as if no update was ever called. - - - - - Returns the Adler32 data checksum computed so far. - - - - - Updates the checksum with the byte b. - - - The data value to add. The high byte of the int is ignored. - - - - - Updates the Adler32 data checksum with the bytes taken from - a block of data. - - Contains the data to update the checksum with. - - - - Update Adler32 data checksum based on a portion of a block of data - - - The chunk of data to add - - - - - CRC-32 with unreversed data and reversed output - - - Generate a table for a byte-wise 32-bit CRC calculation on the polynomial: - x^32+x^26+x^23+x^22+x^16+x^12+x^11+x^10+x^8+x^7+x^5+x^4+x^2+x^1+x^0. - - Polynomials over GF(2) are represented in binary, one bit per coefficient, - with the lowest powers in the most significant bit. Then adding polynomials - is just exclusive-or, and multiplying a polynomial by x is a right shift by - one. If we call the above polynomial p, and represent a byte as the - polynomial q, also with the lowest power in the most significant bit (so the - byte 0xb1 is the polynomial x^7+x^3+x+1), then the CRC is (q*x^32) mod p, - where a mod b means the remainder after dividing a by b. - - This calculation is done using the shift-register method of multiplying and - taking the remainder. The register is initialized to zero, and for each - incoming bit, x^32 is added mod p to the register if the bit is a one (where - x^32 mod p is p+x^32 = x^26+...+1), and the register is multiplied mod p by - x (which is shifting right by one and adding x^32 mod p if the bit shifted - out is a one). We start with the highest power (least significant bit) of - q and repeat for all eight bits of q. - - The table is simply the CRC of all possible eight bit values. This is all - the information needed to generate CRC's on data a byte at a time for all - combinations of CRC register values and incoming bytes. - - - - - The CRC data checksum so far. - - - - - Initialise a default instance of - - - - - Resets the CRC data checksum as if no update was ever called. - - - - - Returns the CRC data checksum computed so far. - - Reversed Out = true - - - - Updates the checksum with the int bval. - - - the byte is taken as the lower 8 bits of bval - - Reversed Data = false - - - - Updates the CRC data checksum with the bytes taken from - a block of data. - - Contains the data to update the CRC with. - - - - Update CRC data checksum based on a portion of a block of data - - - The chunk of data to add - - - - - CRC-32 with reversed data and unreversed output - - - Generate a table for a byte-wise 32-bit CRC calculation on the polynomial: - x^32+x^26+x^23+x^22+x^16+x^12+x^11+x^10+x^8+x^7+x^5+x^4+x^2+x^1+x^0. - - Polynomials over GF(2) are represented in binary, one bit per coefficient, - with the lowest powers in the most significant bit. Then adding polynomials - is just exclusive-or, and multiplying a polynomial by x is a right shift by - one. If we call the above polynomial p, and represent a byte as the - polynomial q, also with the lowest power in the most significant bit (so the - byte 0xb1 is the polynomial x^7+x^3+x+1), then the CRC is (q*x^32) mod p, - where a mod b means the remainder after dividing a by b. - - This calculation is done using the shift-register method of multiplying and - taking the remainder. The register is initialized to zero, and for each - incoming bit, x^32 is added mod p to the register if the bit is a one (where - x^32 mod p is p+x^32 = x^26+...+1), and the register is multiplied mod p by - x (which is shifting right by one and adding x^32 mod p if the bit shifted - out is a one). We start with the highest power (least significant bit) of - q and repeat for all eight bits of q. - - The table is simply the CRC of all possible eight bit values. This is all - the information needed to generate CRC's on data a byte at a time for all - combinations of CRC register values and incoming bytes. - - - - - The CRC data checksum so far. - - - - - Initialise a default instance of - - - - - Resets the CRC data checksum as if no update was ever called. - - - - - Returns the CRC data checksum computed so far. - - Reversed Out = false - - - - Updates the checksum with the int bval. - - - the byte is taken as the lower 8 bits of bval - - Reversed Data = true - - - - Updates the CRC data checksum with the bytes taken from - a block of data. - - Contains the data to update the CRC with. - - - - Update CRC data checksum based on a portion of a block of data - - - The chunk of data to add - - - - - Interface to compute a data checksum used by checked input/output streams. - A data checksum can be updated by one byte or with a byte array. After each - update the value of the current checksum can be returned by calling - getValue. The complete checksum object can also be reset - so it can be used again with new data. - - - - - Resets the data checksum as if no update was ever called. - - - - - Returns the data checksum computed so far. - - - - - Adds one byte to the data checksum. - - - the data value to add. The high byte of the int is ignored. - - - - - Updates the data checksum with the bytes taken from the array. - - - buffer an array of bytes - - - - - Adds the byte array to the data checksum. - - - The chunk of data to add - - - - - SharpZipBaseException is the base exception class for SharpZipLib. - All library exceptions are derived from this. - - NOTE: Not all exceptions thrown will be derived from this class. - A variety of other exceptions are possible for example - - - - Initializes a new instance of the SharpZipBaseException class. - - - - - Initializes a new instance of the SharpZipBaseException class with a specified error message. - - A message describing the exception. - - - - Initializes a new instance of the SharpZipBaseException class with a specified - error message and a reference to the inner exception that is the cause of this exception. - - A message describing the exception. - The inner exception - - - - Indicates that an error occured during decoding of a input stream due to corrupt - data or (unintentional) library incompability. - - - - - Initializes a new instance of the StreamDecodingException with a generic message - - - - - Initializes a new instance of the StreamDecodingException class with a specified error message. - - A message describing the exception. - - - - Initializes a new instance of the StreamDecodingException class with a specified - error message and a reference to the inner exception that is the cause of this exception. - - A message describing the exception. - The inner exception - - - - Indicates that the input stream could not decoded due to known library incompability or missing features - - - - - Initializes a new instance of the StreamUnsupportedException with a generic message - - - - - Initializes a new instance of the StreamUnsupportedException class with a specified error message. - - A message describing the exception. - - - - Initializes a new instance of the StreamUnsupportedException class with a specified - error message and a reference to the inner exception that is the cause of this exception. - - A message describing the exception. - The inner exception - - - - Indicates that the input stream could not decoded due to the stream ending before enough data had been provided - - - - - Initializes a new instance of the UnexpectedEndOfStreamException with a generic message - - - - - Initializes a new instance of the UnexpectedEndOfStreamException class with a specified error message. - - A message describing the exception. - - - - Initializes a new instance of the UnexpectedEndOfStreamException class with a specified - error message and a reference to the inner exception that is the cause of this exception. - - A message describing the exception. - The inner exception - - - - Indicates that a value was outside of the expected range when decoding an input stream - - - - - Initializes a new instance of the ValueOutOfRangeException class naming the the causing variable - - Name of the variable, use: nameof() - - - - Initializes a new instance of the ValueOutOfRangeException class naming the the causing variable, - it's current value and expected range. - - Name of the variable, use: nameof() - The invalid value - Expected maximum value - Expected minimum value - - - - Initializes a new instance of the ValueOutOfRangeException class naming the the causing variable, - it's current value and expected range. - - Name of the variable, use: nameof() - The invalid value - Expected maximum value - Expected minimum value - - - - Event arguments for scanning. - - - - - Initialise a new instance of - - The file or directory name. - - - - The file or directory name for this event. - - - - - Get set a value indicating if scanning should continue or not. - - - - - Event arguments during processing of a single file or directory. - - - - - Initialise a new instance of - - The file or directory name if known. - The number of bytes processed so far - The total number of bytes to process, 0 if not known - - - - The name for this event if known. - - - - - Get set a value indicating wether scanning should continue or not. - - - - - Get a percentage representing how much of the has been processed - - 0.0 to 100.0 percent; 0 if target is not known. - - - - The number of bytes processed so far - - - - - The number of bytes to process. - - Target may be 0 or negative if the value isnt known. - - - - Event arguments for directories. - - - - - Initialize an instance of . - - The name for this directory. - Flag value indicating if any matching files are contained in this directory. - - - - Get a value indicating if the directory contains any matching files or not. - - - - - Arguments passed when scan failures are detected. - - - - - Initialise a new instance of - - The name to apply. - The exception to use. - - - - The applicable name. - - - - - The applicable exception. - - - - - Get / set a value indicating wether scanning should continue. - - - - - Delegate invoked before starting to process a file. - - The source of the event - The event arguments. - - - - Delegate invoked during processing of a file or directory - - The source of the event - The event arguments. - - - - Delegate invoked when a file has been completely processed. - - The source of the event - The event arguments. - - - - Delegate invoked when a directory failure is detected. - - The source of the event - The event arguments. - - - - Delegate invoked when a file failure is detected. - - The source of the event - The event arguments. - - - - FileSystemScanner provides facilities scanning of files and directories. - - - - - Initialise a new instance of - - The file filter to apply when scanning. - - - - Initialise a new instance of - - The file filter to apply. - The directory filter to apply. - - - - Initialise a new instance of - - The file filter to apply. - - - - Initialise a new instance of - - The file filter to apply. - The directory filter to apply. - - - - Delegate to invoke when a directory is processed. - - - - - Delegate to invoke when a file is processed. - - - - - Delegate to invoke when processing for a file has finished. - - - - - Delegate to invoke when a directory failure is detected. - - - - - Delegate to invoke when a file failure is detected. - - - - - Raise the DirectoryFailure event. - - The directory name. - The exception detected. - - - - Raise the FileFailure event. - - The file name. - The exception detected. - - - - Raise the ProcessFile event. - - The file name. - - - - Raise the complete file event - - The file name - - - - Raise the ProcessDirectory event. - - The directory name. - Flag indicating if the directory has matching files. - - - - Scan a directory. - - The base directory to scan. - True to recurse subdirectories, false to scan a single directory. - - - - The file filter currently in use. - - - - - The directory filter currently in use. - - - - - Flag indicating if scanning should continue running. - - - - - INameTransform defines how file system names are transformed for use with archives, or vice versa. - - - - - Given a file name determine the transformed value. - - The name to transform. - The transformed file name. - - - - Given a directory name determine the transformed value. - - The name to transform. - The transformed directory name - - - - InvalidNameException is thrown for invalid names such as directory traversal paths and names with invalid characters - - - - - Initializes a new instance of the InvalidNameException class with a default error message. - - - - - Initializes a new instance of the InvalidNameException class with a specified error message. - - A message describing the exception. - - - - Initializes a new instance of the InvalidNameException class with a specified - error message and a reference to the inner exception that is the cause of this exception. - - A message describing the exception. - The inner exception - - - - Scanning filters support filtering of names. - - - - - Test a name to see if it 'matches' the filter. - - The name to test. - Returns true if the name matches the filter, false if it does not match. - - - - NameFilter is a string matching class which allows for both positive and negative - matching. - A filter is a sequence of independant regular expressions separated by semi-colons ';'. - To include a semi-colon it may be quoted as in \;. Each expression can be prefixed by a plus '+' sign or - a minus '-' sign to denote the expression is intended to include or exclude names. - If neither a plus or minus sign is found include is the default. - A given name is tested for inclusion before checking exclusions. Only names matching an include spec - and not matching an exclude spec are deemed to match the filter. - An empty filter matches any name. - - The following expression includes all name ending in '.dat' with the exception of 'dummy.dat' - "+\.dat$;-^dummy\.dat$" - - - - - Construct an instance based on the filter expression passed - - The filter expression. - - - - Test a string to see if it is a valid regular expression. - - The expression to test. - True if expression is a valid false otherwise. - - - - Test an expression to see if it is valid as a filter. - - The filter expression to test. - True if the expression is valid, false otherwise. - - - - Split a string into its component pieces - - The original string - Returns an array of values containing the individual filter elements. - - - - Convert this filter to its string equivalent. - - The string equivalent for this filter. - - - - Test a value to see if it is included by the filter. - - The value to test. - True if the value is included, false otherwise. - - - - Test a value to see if it is excluded by the filter. - - The value to test. - True if the value is excluded, false otherwise. - - - - Test a value to see if it matches the filter. - - The value to test. - True if the value matches, false otherwise. - - - - Compile this filter. - - - - - PathFilter filters directories and files using a form of regular expressions - by full path name. - See NameFilter for more detail on filtering. - - - - - Initialise a new instance of . - - The filter expression to apply. - - - - Test a name to see if it matches the filter. - - The name to test. - True if the name matches, false otherwise. - is used to get the full path before matching. - - - - ExtendedPathFilter filters based on name, file size, and the last write time of the file. - - Provides an example of how to customise filtering. - - - - Initialise a new instance of ExtendedPathFilter. - - The filter to apply. - The minimum file size to include. - The maximum file size to include. - - - - Initialise a new instance of ExtendedPathFilter. - - The filter to apply. - The minimum to include. - The maximum to include. - - - - Initialise a new instance of ExtendedPathFilter. - - The filter to apply. - The minimum file size to include. - The maximum file size to include. - The minimum to include. - The maximum to include. - - - - Test a filename to see if it matches the filter. - - The filename to test. - True if the filter matches, false otherwise. - The doesnt exist - - - - Get/set the minimum size/length for a file that will match this filter. - - The default value is zero. - value is less than zero; greater than - - - - Get/set the maximum size/length for a file that will match this filter. - - The default value is - value is less than zero or less than - - - - Get/set the minimum value that will match for this filter. - - Files with a LastWrite time less than this value are excluded by the filter. - - - - Get/set the maximum value that will match for this filter. - - Files with a LastWrite time greater than this value are excluded by the filter. - - - - NameAndSizeFilter filters based on name and file size. - - A sample showing how filters might be extended. - - - - Initialise a new instance of NameAndSizeFilter. - - The filter to apply. - The minimum file size to include. - The maximum file size to include. - - - - Test a filename to see if it matches the filter. - - The filename to test. - True if the filter matches, false otherwise. - - - - Get/set the minimum size for a file that will match this filter. - - - - - Get/set the maximum size for a file that will match this filter. - - - - - Provides simple " utilities. - - - - - Read from a ensuring all the required data is read. - - The stream to read. - The buffer to fill. - - - - - Read from a " ensuring all the required data is read. - - The stream to read data from. - The buffer to store data in. - The offset at which to begin storing data. - The number of bytes of data to store. - Required parameter is null - and or are invalid. - End of stream is encountered before all the data has been read. - - - - Copy the contents of one to another. - - The stream to source data from. - The stream to write data to. - The buffer to use during copying. - - - - Copy the contents of one to another. - - The stream to source data from. - The stream to write data to. - The buffer to use during copying. - The progress handler delegate to use. - The minimum between progress updates. - The source for this event. - The name to use with the event. - This form is specialised for use within #Zip to support events during archive operations. - - - - Copy the contents of one to another. - - The stream to source data from. - The stream to write data to. - The buffer to use during copying. - The progress handler delegate to use. - The minimum between progress updates. - The source for this event. - The name to use with the event. - A predetermined fixed target value to use with progress updates. - If the value is negative the target is calculated by looking at the stream. - This form is specialised for use within #Zip to support events during archive operations. - - - - Initialise an instance of - - - - - WindowsPathUtils provides simple utilities for handling windows paths. - - - - - Initializes a new instance of the class. - - - - - Remove any path root present in the path - - A containing path information. - The path with the root removed if it was present; path otherwise. - Unlike the class the path isnt otherwise checked for validity. - - - - PkzipClassic embodies the classic or original encryption facilities used in Pkzip archives. - While it has been superceded by more recent and more powerful algorithms, its still in use and - is viable for preventing casual snooping - - - - - Generates new encryption keys based on given seed - - The seed value to initialise keys with. - A new key value. - - - - PkzipClassicCryptoBase provides the low level facilities for encryption - and decryption using the PkzipClassic algorithm. - - - - - Transform a single byte - - - The transformed value - - - - - Set the key schedule for encryption/decryption. - - The data use to set the keys from. - - - - Update encryption keys - - - - - Reset the internal state. - - - - - PkzipClassic CryptoTransform for encryption. - - - - - Initialise a new instance of - - The key block to use. - - - - Transforms the specified region of the specified byte array. - - The input for which to compute the transform. - The offset into the byte array from which to begin using data. - The number of bytes in the byte array to use as data. - The computed transform. - - - - Transforms the specified region of the input byte array and copies - the resulting transform to the specified region of the output byte array. - - The input for which to compute the transform. - The offset into the input byte array from which to begin using data. - The number of bytes in the input byte array to use as data. - The output to which to write the transform. - The offset into the output byte array from which to begin writing data. - The number of bytes written. - - - - Gets a value indicating whether the current transform can be reused. - - - - - Gets the size of the input data blocks in bytes. - - - - - Gets the size of the output data blocks in bytes. - - - - - Gets a value indicating whether multiple blocks can be transformed. - - - - - Cleanup internal state. - - - - - PkzipClassic CryptoTransform for decryption. - - - - - Initialise a new instance of . - - The key block to decrypt with. - - - - Transforms the specified region of the specified byte array. - - The input for which to compute the transform. - The offset into the byte array from which to begin using data. - The number of bytes in the byte array to use as data. - The computed transform. - - - - Transforms the specified region of the input byte array and copies - the resulting transform to the specified region of the output byte array. - - The input for which to compute the transform. - The offset into the input byte array from which to begin using data. - The number of bytes in the input byte array to use as data. - The output to which to write the transform. - The offset into the output byte array from which to begin writing data. - The number of bytes written. - - - - Gets a value indicating whether the current transform can be reused. - - - - - Gets the size of the input data blocks in bytes. - - - - - Gets the size of the output data blocks in bytes. - - - - - Gets a value indicating whether multiple blocks can be transformed. - - - - - Cleanup internal state. - - - - - Defines a wrapper object to access the Pkzip algorithm. - This class cannot be inherited. - - - - - Get / set the applicable block size in bits. - - The only valid block size is 8. - - - - Get an array of legal key sizes. - - - - - Generate an initial vector. - - - - - Get an array of legal block sizes. - - - - - Get / set the key value applicable. - - - - - Generate a new random key. - - - - - Create an encryptor. - - The key to use for this encryptor. - Initialisation vector for the new encryptor. - Returns a new PkzipClassic encryptor - - - - Create a decryptor. - - Keys to use for this new decryptor. - Initialisation vector for the new decryptor. - Returns a new decryptor. - - - - Encrypts and decrypts AES ZIP - - - Based on information from http://www.winzip.com/aes_info.htm - and http://www.gladman.me.uk/cryptography_technology/fileencrypt/ - - - - - Constructor - - The stream on which to perform the cryptographic transformation. - Instance of ZipAESTransform - Read or Write - - - - Reads a sequence of bytes from the current CryptoStream into buffer, - and advances the position within the stream by the number of bytes read. - - - - - Writes a sequence of bytes to the current stream and advances the current position within this stream by the number of bytes written. - - An array of bytes. This method copies count bytes from buffer to the current stream. - The byte offset in buffer at which to begin copying bytes to the current stream. - The number of bytes to be written to the current stream. - - - - Transforms stream using AES in CTR mode - - - - - Constructor. - - Password string - Random bytes, length depends on encryption strength. - 128 bits = 8 bytes, 192 bits = 12 bytes, 256 bits = 16 bytes. - The encryption strength, in bytes eg 16 for 128 bits. - True when creating a zip, false when reading. For the AuthCode. - - - - - Implement the ICryptoTransform method. - - - - - Returns the 2 byte password verifier - - - - - Returns the 10 byte AUTH CODE to be checked or appended immediately following the AES data stream. - - - - - Not implemented. - - - - - Gets the size of the input data blocks in bytes. - - - - - Gets the size of the output data blocks in bytes. - - - - - Gets a value indicating whether multiple blocks can be transformed. - - - - - Gets a value indicating whether the current transform can be reused. - - - - - Cleanup internal state. - - - - - An example class to demonstrate compression and decompression of GZip streams. - - - - - Decompress the input writing - uncompressed data to the output stream - - The readable stream containing data to decompress. - The output stream to receive the decompressed data. - Both streams are closed on completion if true. - Input or output stream is null - - - - Compress the input stream sending - result data to output stream - - The readable stream to compress. - The output stream to receive the compressed data. - Both streams are closed on completion if true. - Deflate buffer size, minimum 512 - Deflate compression level, 0-9 - Input or output stream is null - Buffer Size is smaller than 512 - Compression level outside 0-9 - - - - This class contains constants used for gzip. - - - - - Magic number found at start of GZIP header - - - - - Flag bit mask for text - - - - - Flag bitmask for Crc - - - - - Flag bit mask for extra - - - - - flag bitmask for name - - - - - flag bit mask indicating comment is present - - - - - Initialise default instance. - - Constructor is private to prevent instances being created. - - - - GZipException represents exceptions specific to GZip classes and code. - - - - - Initialise a new instance of . - - - - - Initialise a new instance of with its message string. - - A that describes the error. - - - - Initialise a new instance of . - - A that describes the error. - The that caused this exception. - - - - This filter stream is used to decompress a "GZIP" format stream. - The "GZIP" format is described baseInputStream RFC 1952. - - author of the original java version : John Leuner - - This sample shows how to unzip a gzipped file - - using System; - using System.IO; - - using ICSharpCode.SharpZipLib.Core; - using ICSharpCode.SharpZipLib.GZip; - - class MainClass - { - public static void Main(string[] args) - { - using (Stream inStream = new GZipInputStream(File.OpenRead(args[0]))) - using (FileStream outStream = File.Create(Path.GetFileNameWithoutExtension(args[0]))) { - byte[] buffer = new byte[4096]; - StreamUtils.Copy(inStream, outStream, buffer); - } - } - } - - - - - - CRC-32 value for uncompressed data - - - - - Flag to indicate if we've read the GZIP header yet for the current member (block of compressed data). - This is tracked per-block as the file is parsed. - - - - - Flag to indicate if at least one block in a stream with concatenated blocks was read successfully. - This allows us to exit gracefully if downstream data is not in gzip format. - - - - - Creates a GZipInputStream with the default buffer size - - - The stream to read compressed data from (baseInputStream GZIP format) - - - - - Creates a GZIPInputStream with the specified buffer size - - - The stream to read compressed data from (baseInputStream GZIP format) - - - Size of the buffer to use - - - - - Reads uncompressed data into an array of bytes - - - The buffer to read uncompressed data into - - - The offset indicating where the data should be placed - - - The number of uncompressed bytes to be read - - Returns the number of bytes actually read. - - - - This filter stream is used to compress a stream into a "GZIP" stream. - The "GZIP" format is described in RFC 1952. - - author of the original java version : John Leuner - - This sample shows how to gzip a file - - using System; - using System.IO; - - using ICSharpCode.SharpZipLib.GZip; - using ICSharpCode.SharpZipLib.Core; - - class MainClass - { - public static void Main(string[] args) - { - using (Stream s = new GZipOutputStream(File.Create(args[0] + ".gz"))) - using (FileStream fs = File.OpenRead(args[0])) { - byte[] writeData = new byte[4096]; - Streamutils.Copy(s, fs, writeData); - } - } - } - } - - - - - - CRC-32 value for uncompressed data - - - - - Creates a GzipOutputStream with the default buffer size - - - The stream to read data (to be compressed) from - - - - - Creates a GZipOutputStream with the specified buffer size - - - The stream to read data (to be compressed) from - - - Size of the buffer to use - - - - - Sets the active compression level (0-9). The new level will be activated - immediately. - - The compression level to set. - - Level specified is not supported. - - - - - - Get the current compression level. - - The current compression level. - - - - Write given buffer to output updating crc - - Buffer to write - Offset of first byte in buf to write - Number of bytes to write - - - - Writes remaining compressed output data to the output stream - and closes it. - - - - - Finish compression and write any footer information required to stream - - - - - This class contains constants used for LZW - - - - - Magic number found at start of LZW header: 0x1f 0x9d - - - - - Maximum number of bits per code - - - - - Mask for 'number of compression bits' - - - - - Indicates the presence of a fourth header byte - - - - - Reserved bits - - - - - Block compression: if table is full and compression rate is dropping, - clear the dictionary. - - - - - LZW file header size (in bytes) - - - - - Initial number of bits per code - - - - - LzwException represents exceptions specific to LZW classes and code. - - - - - Initialise a new instance of . - - - - - Initialise a new instance of with its message string. - - A that describes the error. - - - - Initialise a new instance of . - - A that describes the error. - The that caused this exception. - - - - This filter stream is used to decompress a LZW format stream. - Specifically, a stream that uses the LZC compression method. - This file format is usually associated with the .Z file extension. - - See http://en.wikipedia.org/wiki/Compress - See http://wiki.wxwidgets.org/Development:_Z_File_Format - - The file header consists of 3 (or optionally 4) bytes. The first two bytes - contain the magic marker "0x1f 0x9d", followed by a byte of flags. - - Based on Java code by Ronald Tschalar, which in turn was based on the unlzw.c - code in the gzip package. - - This sample shows how to unzip a compressed file - - using System; - using System.IO; - - using ICSharpCode.SharpZipLib.Core; - using ICSharpCode.SharpZipLib.LZW; - - class MainClass - { - public static void Main(string[] args) - { - using (Stream inStream = new LzwInputStream(File.OpenRead(args[0]))) - using (FileStream outStream = File.Create(Path.GetFileNameWithoutExtension(args[0]))) { - byte[] buffer = new byte[4096]; - StreamUtils.Copy(inStream, outStream, buffer); - // OR - inStream.Read(buffer, 0, buffer.Length); - // now do something with the buffer - } - } - } - - - - - - Gets or sets a flag indicating ownership of underlying stream. - When the flag is true will close the underlying stream also. - - The default value is true. - - - - Creates a LzwInputStream - - - The stream to read compressed data from (baseInputStream LZW format) - - - - - See - - - - - - Reads decompressed data into the provided buffer byte array - - - The array to read and decompress data into - - - The offset indicating where the data should be placed - - - The number of bytes to decompress - - The number of bytes read. Zero signals the end of stream - - - - Moves the unread data in the buffer to the beginning and resets - the pointers. - - - - - - - Gets a value indicating whether the current stream supports reading - - - - - Gets a value of false indicating seeking is not supported for this stream. - - - - - Gets a value of false indicating that this stream is not writeable. - - - - - A value representing the length of the stream in bytes. - - - - - The current position within the stream. - Throws a NotSupportedException when attempting to set the position - - Attempting to set the position - - - - Flushes the baseInputStream - - - - - Sets the position within the current stream - Always throws a NotSupportedException - - The relative offset to seek to. - The defining where to seek from. - The new position in the stream. - Any access - - - - Set the length of the current stream - Always throws a NotSupportedException - - The new length value for the stream. - Any access - - - - Writes a sequence of bytes to stream and advances the current position - This method always throws a NotSupportedException - - Thew buffer containing data to write. - The offset of the first byte to write. - The number of bytes to write. - Any access - - - - Writes one byte to the current stream and advances the current position - Always throws a NotSupportedException - - The byte to write. - Any access - - - - Closes the input stream. When - is true the underlying stream is also closed. - - - - - Flag indicating wether this instance has been closed or not. - - - - - This exception is used to indicate that there is a problem - with a TAR archive header. - - - - - Initialise a new instance of the InvalidHeaderException class. - - - - - Initialises a new instance of the InvalidHeaderException class with a specified message. - - Message describing the exception cause. - - - - Initialise a new instance of InvalidHeaderException - - Message describing the problem. - The exception that is the cause of the current exception. - - - - Used to advise clients of 'events' while processing archives - - - - - The TarArchive class implements the concept of a - 'Tape Archive'. A tar archive is a series of entries, each of - which represents a file system object. Each entry in - the archive consists of a header block followed by 0 or more data blocks. - Directory entries consist only of the header block, and are followed by entries - for the directory's contents. File entries consist of a - header followed by the number of blocks needed to - contain the file's contents. All entries are written on - block boundaries. Blocks are 512 bytes long. - - TarArchives are instantiated in either read or write mode, - based upon whether they are instantiated with an InputStream - or an OutputStream. Once instantiated TarArchives read/write - mode can not be changed. - - There is currently no support for random access to tar archives. - However, it seems that subclassing TarArchive, and using the - TarBuffer.CurrentRecord and TarBuffer.CurrentBlock - properties, this would be rather trivial. - - - - - Client hook allowing detailed information to be reported during processing - - - - - Raises the ProgressMessage event - - The TarEntry for this event - message for this event. Null is no message - - - - Constructor for a default . - - - - - Initalise a TarArchive for input. - - The to use for input. - - - - Initialise a TarArchive for output. - - The to use for output. - - - - The InputStream based constructors create a TarArchive for the - purposes of extracting or listing a tar archive. Thus, use - these constructors when you wish to extract files from or list - the contents of an existing tar archive. - - The stream to retrieve archive data from. - Returns a new suitable for reading from. - - - - Create TarArchive for reading setting block factor - - A stream containing the tar archive contents - The blocking factor to apply - Returns a suitable for reading. - - - - Create a TarArchive for writing to, using the default blocking factor - - The to write to - Returns a suitable for writing. - - - - Create a tar archive for writing. - - The stream to write to - The blocking factor to use for buffering. - Returns a suitable for writing. - - - - Set the flag that determines whether existing files are - kept, or overwritten during extraction. - - - If true, do not overwrite existing files. - - - - - Get/set the ascii file translation flag. If ascii file translation - is true, then the file is checked to see if it a binary file or not. - If the flag is true and the test indicates it is ascii text - file, it will be translated. The translation converts the local - operating system's concept of line ends into the UNIX line end, - '\n', which is the defacto standard for a TAR archive. This makes - text files compatible with UNIX. - - - - - Set the ascii file translation flag. - - - If true, translate ascii text files. - - - - - PathPrefix is added to entry names as they are written if the value is not null. - A slash character is appended after PathPrefix - - - - - RootPath is removed from entry names if it is found at the - beginning of the name. - - - - - Set user and group information that will be used to fill in the - tar archive's entry headers. This information is based on that available - for the linux operating system, which is not always available on other - operating systems. TarArchive allows the programmer to specify values - to be used in their place. - is set to true by this call. - - - The user id to use in the headers. - - - The user name to use in the headers. - - - The group id to use in the headers. - - - The group name to use in the headers. - - - - - Get or set a value indicating if overrides defined by SetUserInfo should be applied. - - If overrides are not applied then the values as set in each header will be used. - - - - Get the archive user id. - See ApplyUserInfoOverrides for detail - on how to allow setting values on a per entry basis. - - - The current user id. - - - - - Get the archive user name. - See ApplyUserInfoOverrides for detail - on how to allow setting values on a per entry basis. - - - The current user name. - - - - - Get the archive group id. - See ApplyUserInfoOverrides for detail - on how to allow setting values on a per entry basis. - - - The current group id. - - - - - Get the archive group name. - See ApplyUserInfoOverrides for detail - on how to allow setting values on a per entry basis. - - - The current group name. - - - - - Get the archive's record size. Tar archives are composed of - a series of RECORDS each containing a number of BLOCKS. - This allowed tar archives to match the IO characteristics of - the physical device being used. Archives are expected - to be properly "blocked". - - - The record size this archive is using. - - - - - Sets the IsStreamOwner property on the underlying stream. - Set this to false to prevent the Close of the TarArchive from closing the stream. - - - - - Close the archive. - - - - - Perform the "list" command for the archive contents. - - NOTE That this method uses the progress event to actually list - the contents. If the progress display event is not set, nothing will be listed! - - - - - Perform the "extract" command and extract the contents of the archive. - - - The destination directory into which to extract. - - - - - Extract an entry from the archive. This method assumes that the - tarIn stream has been properly set with a call to GetNextEntry(). - - - The destination directory into which to extract. - - - The TarEntry returned by tarIn.GetNextEntry(). - - - - - Write an entry to the archive. This method will call the putNextEntry - and then write the contents of the entry, and finally call closeEntry() - for entries that are files. For directories, it will call putNextEntry(), - and then, if the recurse flag is true, process each entry that is a - child of the directory. - - - The TarEntry representing the entry to write to the archive. - - - If true, process the children of directory entries. - - - - - Write an entry to the archive. This method will call the putNextEntry - and then write the contents of the entry, and finally call closeEntry() - for entries that are files. For directories, it will call putNextEntry(), - and then, if the recurse flag is true, process each entry that is a - child of the directory. - - - The TarEntry representing the entry to write to the archive. - - - If true, process the children of directory entries. - - - - - Performs application-defined tasks associated with freeing, releasing, or resetting unmanaged resources. - - - - - Releases the unmanaged resources used by the FileStream and optionally releases the managed resources. - - true to release both managed and unmanaged resources; - false to release only unmanaged resources. - - - - Closes the archive and releases any associated resources. - - - - - Ensures that resources are freed and other cleanup operations are performed - when the garbage collector reclaims the . - - - - - The TarBuffer class implements the tar archive concept - of a buffered input stream. This concept goes back to the - days of blocked tape drives and special io devices. In the - C# universe, the only real function that this class - performs is to ensure that files have the correct "record" - size, or other tars will complain. -

- You should never have a need to access this class directly. - TarBuffers are created by Tar IO Streams. -

-
-
- - - The size of a block in a tar archive in bytes. - - This is 512 bytes. - - - - The number of blocks in a default record. - - - The default value is 20 blocks per record. - - - - - The size in bytes of a default record. - - - The default size is 10KB. - - - - - Get the record size for this buffer - - The record size in bytes. - This is equal to the multiplied by the - - - - Get the TAR Buffer's record size. - - The record size in bytes. - This is equal to the multiplied by the - - - - Get the Blocking factor for the buffer - - This is the number of blocks in each record. - - - - Get the TAR Buffer's block factor - - The block factor; the number of blocks per record. - - - - Construct a default TarBuffer - - - - - Create TarBuffer for reading with default BlockFactor - - Stream to buffer - A new suitable for input. - - - - Construct TarBuffer for reading inputStream setting BlockFactor - - Stream to buffer - Blocking factor to apply - A new suitable for input. - - - - Construct TarBuffer for writing with default BlockFactor - - output stream for buffer - A new suitable for output. - - - - Construct TarBuffer for writing Tar output to streams. - - Output stream to write to. - Blocking factor to apply - A new suitable for output. - - - - Initialization common to all constructors. - - - - - Determine if an archive block indicates End of Archive. End of - archive is indicated by a block that consists entirely of null bytes. - All remaining blocks for the record should also be null's - However some older tars only do a couple of null blocks (Old GNU tar for one) - and also partial records - - The data block to check. - Returns true if the block is an EOF block; false otherwise. - - - - Determine if an archive block indicates the End of an Archive has been reached. - End of archive is indicated by a block that consists entirely of null bytes. - All remaining blocks for the record should also be null's - However some older tars only do a couple of null blocks (Old GNU tar for one) - and also partial records - - The data block to check. - Returns true if the block is an EOF block; false otherwise. - - - - Skip over a block on the input stream. - - - - - Read a block from the input stream. - - - The block of data read. - - - - - Read a record from data stream. - - - false if End-Of-File, else true. - - - - - Get the current block number, within the current record, zero based. - - Block numbers are zero based values - - - - - Gets or sets a flag indicating ownership of underlying stream. - When the flag is true will close the underlying stream also. - - The default value is true. - - - - Get the current block number, within the current record, zero based. - - - The current zero based block number. - - - The absolute block number = (record number * block factor) + block number. - - - - - Get the current record number. - - - The current zero based record number. - - - - - Get the current record number. - - - The current zero based record number. - - - - - Write a block of data to the archive. - - - The data to write to the archive. - - - - - Write an archive record to the archive, where the record may be - inside of a larger array buffer. The buffer must be "offset plus - record size" long. - - - The buffer containing the record data to write. - - - The offset of the record data within buffer. - - - - - Write a TarBuffer record to the archive. - - - - - WriteFinalRecord writes the current record buffer to output any unwritten data is present. - - Any trailing bytes are set to zero which is by definition correct behaviour - for the end of a tar stream. - - - - Close the TarBuffer. If this is an output buffer, also flush the - current block before closing. - - - - - This class represents an entry in a Tar archive. It consists - of the entry's header, as well as the entry's File. Entries - can be instantiated in one of three ways, depending on how - they are to be used. -

- TarEntries that are created from the header bytes read from - an archive are instantiated with the TarEntry( byte[] ) - constructor. These entries will be used when extracting from - or listing the contents of an archive. These entries have their - header filled in using the header bytes. They also set the File - to null, since they reference an archive entry not a file.

-

- TarEntries that are created from files that are to be written - into an archive are instantiated with the CreateEntryFromFile(string) - pseudo constructor. These entries have their header filled in using - the File's information. They also keep a reference to the File - for convenience when writing entries.

-

- Finally, TarEntries can be constructed from nothing but a name. - This allows the programmer to construct the entry by hand, for - instance when only an InputStream is available for writing to - the archive, and the header information is constructed from - other information. In this case the header fields are set to - defaults and the File is set to null.

- -
-
- - - Initialise a default instance of . - - - - - Construct an entry from an archive's header bytes. File is set - to null. - - - The header bytes from a tar archive entry. - - - - - Construct a TarEntry using the header provided - - Header details for entry - - - - Clone this tar entry. - - Returns a clone of this entry. - - - - Construct an entry with only a name. - This allows the programmer to construct the entry's header "by hand". - - The name to use for the entry - Returns the newly created - - - - Construct an entry for a file. File is set to file, and the - header is constructed from information from the file. - - The file name that the entry represents. - Returns the newly created - - - - Determine if the two entries are equal. Equality is determined - by the header names being equal. - - The to compare with the current Object. - - True if the entries are equal; false if not. - - - - - Derive a Hash value for the current - - A Hash code for the current - - - - Determine if the given entry is a descendant of this entry. - Descendancy is determined by the name of the descendant - starting with this entry's name. - - - Entry to be checked as a descendent of this. - - - True if entry is a descendant of this. - - - - - Get this entry's header. - - - This entry's TarHeader. - - - - - Get/Set this entry's name. - - - - - Get/set this entry's user id. - - - - - Get/set this entry's group id. - - - - - Get/set this entry's user name. - - - - - Get/set this entry's group name. - - - - - Convenience method to set this entry's group and user ids. - - - This entry's new user id. - - - This entry's new group id. - - - - - Convenience method to set this entry's group and user names. - - - This entry's new user name. - - - This entry's new group name. - - - - - Get/Set the modification time for this entry - - - - - Get this entry's file. - - - This entry's file. - - - - - Get/set this entry's recorded file size. - - - - - Return true if this entry represents a directory, false otherwise - - - True if this entry is a directory. - - - - - Fill in a TarHeader with information from a File. - - - The TarHeader to fill in. - - - The file from which to get the header information. - - - - - Get entries for all files present in this entries directory. - If this entry doesnt represent a directory zero entries are returned. - - - An array of TarEntry's for this entry's children. - - - - - Write an entry's header information to a header buffer. - - - The tar entry header buffer to fill in. - - - - - Convenience method that will modify an entry's name directly - in place in an entry header buffer byte array. - - - The buffer containing the entry header to modify. - - - The new name to place into the header buffer. - - - - - Fill in a TarHeader given only the entry's name. - - - The TarHeader to fill in. - - - The tar entry name. - - - - - The name of the file this entry represents or null if the entry is not based on a file. - - - - - The entry's header information. - - - - - TarException represents exceptions specific to Tar classes and code. - - - - - Initialise a new instance of . - - - - - Initialise a new instance of with its message string. - - A that describes the error. - - - - Initialise a new instance of . - - A that describes the error. - The that caused this exception. - - - - Reads the extended header of a Tar stream - - - - - Creates a new . - - - - - Read bytes from - - - - - - - Returns the parsed headers as key-value strings - - - - - This class encapsulates the Tar Entry Header used in Tar Archives. - The class also holds a number of tar constants, used mostly in headers. - - - The tar format and its POSIX successor PAX have a long history which makes for compatability - issues when creating and reading files. - - This is further complicated by a large number of programs with variations on formats - One common issue is the handling of names longer than 100 characters. - GNU style long names are currently supported. - - This is the ustar (Posix 1003.1) header. - - struct header - { - char t_name[100]; // 0 Filename - char t_mode[8]; // 100 Permissions - char t_uid[8]; // 108 Numerical User ID - char t_gid[8]; // 116 Numerical Group ID - char t_size[12]; // 124 Filesize - char t_mtime[12]; // 136 st_mtime - char t_chksum[8]; // 148 Checksum - char t_typeflag; // 156 Type of File - char t_linkname[100]; // 157 Target of Links - char t_magic[6]; // 257 "ustar" or other... - char t_version[2]; // 263 Version fixed to 00 - char t_uname[32]; // 265 User Name - char t_gname[32]; // 297 Group Name - char t_devmajor[8]; // 329 Major for devices - char t_devminor[8]; // 337 Minor for devices - char t_prefix[155]; // 345 Prefix for t_name - char t_mfill[12]; // 500 Filler up to 512 - }; - - - - - The length of the name field in a header buffer. - - - - - The length of the mode field in a header buffer. - - - - - The length of the user id field in a header buffer. - - - - - The length of the group id field in a header buffer. - - - - - The length of the checksum field in a header buffer. - - - - - Offset of checksum in a header buffer. - - - - - The length of the size field in a header buffer. - - - - - The length of the magic field in a header buffer. - - - - - The length of the version field in a header buffer. - - - - - The length of the modification time field in a header buffer. - - - - - The length of the user name field in a header buffer. - - - - - The length of the group name field in a header buffer. - - - - - The length of the devices field in a header buffer. - - - - - The length of the name prefix field in a header buffer. - - - - - The "old way" of indicating a normal file. - - - - - Normal file type. - - - - - Link file type. - - - - - Symbolic link file type. - - - - - Character device file type. - - - - - Block device file type. - - - - - Directory file type. - - - - - FIFO (pipe) file type. - - - - - Contiguous file type. - - - - - Posix.1 2001 global extended header - - - - - Posix.1 2001 extended header - - - - - Solaris access control list file type - - - - - GNU dir dump file type - This is a dir entry that contains the names of files that were in the - dir at the time the dump was made - - - - - Solaris Extended Attribute File - - - - - Inode (metadata only) no file content - - - - - Identifies the next file on the tape as having a long link name - - - - - Identifies the next file on the tape as having a long name - - - - - Continuation of a file that began on another volume - - - - - For storing filenames that dont fit in the main header (old GNU) - - - - - GNU Sparse file - - - - - GNU Tape/volume header ignore on extraction - - - - - The magic tag representing a POSIX tar archive. (would be written with a trailing NULL) - - - - - The magic tag representing an old GNU tar archive where version is included in magic and overwrites it - - - - - Initialise a default TarHeader instance - - - - - Get/set the name for this tar entry. - - Thrown when attempting to set the property to null. - - - - Get the name of this entry. - - The entry's name. - - - - Get/set the entry's Unix style permission mode. - - - - - The entry's user id. - - - This is only directly relevant to unix systems. - The default is zero. - - - - - Get/set the entry's group id. - - - This is only directly relevant to linux/unix systems. - The default value is zero. - - - - - Get/set the entry's size. - - Thrown when setting the size to less than zero. - - - - Get/set the entry's modification time. - - - The modification time is only accurate to within a second. - - Thrown when setting the date time to less than 1/1/1970. - - - - Get the entry's checksum. This is only valid/updated after writing or reading an entry. - - - - - Get value of true if the header checksum is valid, false otherwise. - - - - - Get/set the entry's type flag. - - - - - The entry's link name. - - Thrown when attempting to set LinkName to null. - - - - Get/set the entry's magic tag. - - Thrown when attempting to set Magic to null. - - - - The entry's version. - - Thrown when attempting to set Version to null. - - - - The entry's user name. - - - - - Get/set the entry's group name. - - - This is only directly relevant to unix systems. - - - - - Get/set the entry's major device number. - - - - - Get/set the entry's minor device number. - - - - - Create a new that is a copy of the current instance. - - A new that is a copy of the current instance. - - - - Parse TarHeader information from a header buffer. - - - The tar entry header buffer to get information from. - - - - - 'Write' header information to buffer provided, updating the check sum. - - output buffer for header information - - - - Get a hash code for the current object. - - A hash code for the current object. - - - - Determines if this instance is equal to the specified object. - - The object to compare with. - true if the objects are equal, false otherwise. - - - - Set defaults for values used when constructing a TarHeader instance. - - Value to apply as a default for userId. - Value to apply as a default for userName. - Value to apply as a default for groupId. - Value to apply as a default for groupName. - - - - Parse an octal string from a header buffer. - - The header buffer from which to parse. - The offset into the buffer from which to parse. - The number of header bytes to parse. - The long equivalent of the octal string. - - - - Parse a name from a header buffer. - - - The header buffer from which to parse. - - - The offset into the buffer from which to parse. - - - The number of header bytes to parse. - - - The name parsed. - - - - - Add name to the buffer as a collection of bytes - - The name to add - The offset of the first character - The buffer to add to - The index of the first byte to add - The number of characters/bytes to add - The next free index in the - - - - Add name to the buffer as a collection of bytes - - The name to add - The offset of the first character - The buffer to add to - The index of the first byte to add - The number of characters/bytes to add - The next free index in the - - - - Add an entry name to the buffer - - - The name to add - - - The buffer to add to - - - The offset into the buffer from which to start adding - - - The number of header bytes to add - - - The index of the next free byte in the buffer - - - - - Add an entry name to the buffer - - The name to add - The buffer to add to - The offset into the buffer from which to start adding - The number of header bytes to add - The index of the next free byte in the buffer - - - - Add a string to a buffer as a collection of ascii bytes. - - The string to add - The offset of the first character to add. - The buffer to add to. - The offset to start adding at. - The number of ascii characters to add. - The next free index in the buffer. - - - - Put an octal representation of a value into a buffer - - - the value to be converted to octal - - - buffer to store the octal string - - - The offset into the buffer where the value starts - - - The length of the octal string to create - - - The offset of the character next byte after the octal string - - - - - Put an octal or binary representation of a value into a buffer - - Value to be convert to octal - The buffer to update - The offset into the buffer to store the value - The length of the octal string. Must be 12. - Index of next byte - - - - Add the checksum integer to header buffer. - - - The header buffer to set the checksum for - The offset into the buffer for the checksum - The number of header bytes to update. - It's formatted differently from the other fields: it has 6 digits, a - null, then a space -- rather than digits, a space, then a null. - The final space is already there, from checksumming - - The modified buffer offset - - - - Compute the checksum for a tar entry header. - The checksum field must be all spaces prior to this happening - - The tar entry's header buffer. - The computed checksum. - - - - Make a checksum for a tar entry ignoring the checksum contents. - - The tar entry's header buffer. - The checksum for the buffer - - - - The TarInputStream reads a UNIX tar archive as an InputStream. - methods are provided to position at each successive entry in - the archive, and the read each entry as a normal input stream - using read(). - - - - - Construct a TarInputStream with default block factor - - stream to source data from - - - - Construct a TarInputStream with user specified block factor - - stream to source data from - block factor to apply to archive - - - - Gets or sets a flag indicating ownership of underlying stream. - When the flag is true will close the underlying stream also. - - The default value is true. - - - - Gets a value indicating whether the current stream supports reading - - - - - Gets a value indicating whether the current stream supports seeking - This property always returns false. - - - - - Gets a value indicating if the stream supports writing. - This property always returns false. - - - - - The length in bytes of the stream - - - - - Gets or sets the position within the stream. - Setting the Position is not supported and throws a NotSupportedExceptionNotSupportedException - - Any attempt to set position - - - - Flushes the baseInputStream - - - - - Set the streams position. This operation is not supported and will throw a NotSupportedException - - The offset relative to the origin to seek to. - The to start seeking from. - The new position in the stream. - Any access - - - - Sets the length of the stream - This operation is not supported and will throw a NotSupportedException - - The new stream length. - Any access - - - - Writes a block of bytes to this stream using data from a buffer. - This operation is not supported and will throw a NotSupportedException - - The buffer containing bytes to write. - The offset in the buffer of the frist byte to write. - The number of bytes to write. - Any access - - - - Writes a byte to the current position in the file stream. - This operation is not supported and will throw a NotSupportedException - - The byte value to write. - Any access - - - - Reads a byte from the current tar archive entry. - - A byte cast to an int; -1 if the at the end of the stream. - - - - Reads bytes from the current tar archive entry. - - This method is aware of the boundaries of the current - entry in the archive and will deal with them appropriately - - - The buffer into which to place bytes read. - - - The offset at which to place bytes read. - - - The number of bytes to read. - - - The number of bytes read, or 0 at end of stream/EOF. - - - - - Closes this stream. Calls the TarBuffer's close() method. - The underlying stream is closed by the TarBuffer. - - - - - Set the entry factory for this instance. - - The factory for creating new entries - - - - Get the record size being used by this stream's TarBuffer. - - - - - Get the record size being used by this stream's TarBuffer. - - - TarBuffer record size. - - - - - Get the available data that can be read from the current - entry in the archive. This does not indicate how much data - is left in the entire archive, only in the current entry. - This value is determined from the entry's size header field - and the amount of data already read from the current entry. - - - The number of available bytes for the current entry. - - - - - Skip bytes in the input buffer. This skips bytes in the - current entry's data, not the entire archive, and will - stop at the end of the current entry's data if the number - to skip extends beyond that point. - - - The number of bytes to skip. - - - - - Return a value of true if marking is supported; false otherwise. - - Currently marking is not supported, the return value is always false. - - - - Since we do not support marking just yet, we do nothing. - - - The limit to mark. - - - - - Since we do not support marking just yet, we do nothing. - - - - - Get the next entry in this tar archive. This will skip - over any remaining data in the current entry, if there - is one, and place the input stream at the header of the - next entry, and read the header and instantiate a new - TarEntry from the header bytes and return that entry. - If there are no more entries in the archive, null will - be returned to indicate that the end of the archive has - been reached. - - - The next TarEntry in the archive, or null. - - - - - Copies the contents of the current tar archive entry directly into - an output stream. - - - The OutputStream into which to write the entry's data. - - - - - This interface is provided, along with the method , to allow - the programmer to have their own subclass instantiated for the - entries return from . - - - - - Create an entry based on name alone - - - Name of the new EntryPointNotFoundException to create - - created TarEntry or descendant class - - - - Create an instance based on an actual file - - - Name of file to represent in the entry - - - Created TarEntry or descendant class - - - - - Create a tar entry based on the header information passed - - - Buffer containing header information to create an an entry from. - - - Created TarEntry or descendant class - - - - - Standard entry factory class creating instances of the class TarEntry - - - - - Create a based on named - - The name to use for the entry - A new - - - - Create a tar entry with details obtained from file - - The name of the file to retrieve details from. - A new - - - - Create an entry based on details in header - - The buffer containing entry details. - A new - - - - Flag set when last block has been read - - - - - Size of this entry as recorded in header - - - - - Number of bytes read for this entry so far - - - - - Buffer used with calls to Read() - - - - - Working buffer - - - - - Current entry being read - - - - - Factory used to create TarEntry or descendant class instance - - - - - Stream used as the source of input data. - - - - - The TarOutputStream writes a UNIX tar archive as an OutputStream. - Methods are provided to put entries, and then write their contents - by writing to this stream using write(). - - public - - - - Construct TarOutputStream using default block factor - - stream to write to - - - - Construct TarOutputStream with user specified block factor - - stream to write to - blocking factor - - - - Gets or sets a flag indicating ownership of underlying stream. - When the flag is true will close the underlying stream also. - - The default value is true. - - - - true if the stream supports reading; otherwise, false. - - - - - true if the stream supports seeking; otherwise, false. - - - - - true if stream supports writing; otherwise, false. - - - - - length of stream in bytes - - - - - gets or sets the position within the current stream. - - - - - set the position within the current stream - - The offset relative to the to seek to - The to seek from. - The new position in the stream. - - - - Set the length of the current stream - - The new stream length. - - - - Read a byte from the stream and advance the position within the stream - by one byte or returns -1 if at the end of the stream. - - The byte value or -1 if at end of stream - - - - read bytes from the current stream and advance the position within the - stream by the number of bytes read. - - The buffer to store read bytes in. - The index into the buffer to being storing bytes at. - The desired number of bytes to read. - The total number of bytes read, or zero if at the end of the stream. - The number of bytes may be less than the count - requested if data is not avialable. - - - - All buffered data is written to destination - - - - - Ends the TAR archive without closing the underlying OutputStream. - The result is that the EOF block of nulls is written. - - - - - Ends the TAR archive and closes the underlying OutputStream. - - This means that Finish() is called followed by calling the - TarBuffer's Close(). - - - - Get the record size being used by this stream's TarBuffer. - - - - - Get the record size being used by this stream's TarBuffer. - - - The TarBuffer record size. - - - - - Get a value indicating wether an entry is open, requiring more data to be written. - - - - - Put an entry on the output stream. This writes the entry's - header and positions the output stream for writing - the contents of the entry. Once this method is called, the - stream is ready for calls to write() to write the entry's - contents. Once the contents are written, closeEntry() - MUST be called to ensure that all buffered data - is completely written to the output stream. - - - The TarEntry to be written to the archive. - - - - - Close an entry. This method MUST be called for all file - entries that contain data. The reason is that we must - buffer data written to the stream in order to satisfy - the buffer's block based writes. Thus, there may be - data fragments still being assembled that must be written - to the output stream before this entry is closed and the - next entry written. - - - - - Writes a byte to the current tar archive entry. - This method simply calls Write(byte[], int, int). - - - The byte to be written. - - - - - Writes bytes to the current tar archive entry. This method - is aware of the current entry and will throw an exception if - you attempt to write bytes past the length specified for the - current entry. The method is also (painfully) aware of the - record buffering required by TarBuffer, and manages buffers - that are not a multiple of recordsize in length, including - assembling records from small buffers. - - - The buffer to write to the archive. - - - The offset in the buffer from which to get bytes. - - - The number of bytes to write. - - - - - Write an EOF (end of archive) block to the tar archive. - The end of the archive is indicated by two blocks consisting entirely of zero bytes. - - - - - bytes written for this entry so far - - - - - current 'Assembly' buffer length - - - - - Flag indicating wether this instance has been closed or not. - - - - - Size for the current entry - - - - - single block working buffer - - - - - 'Assembly' buffer used to assemble data before writing - - - - - TarBuffer used to provide correct blocking factor - - - - - the destination stream for the archive contents - - - - - This is the Deflater class. The deflater class compresses input - with the deflate algorithm described in RFC 1951. It has several - compression levels and three different strategies described below. - - This class is not thread safe. This is inherent in the API, due - to the split of deflate and setInput. - - author of the original java version : Jochen Hoenicke - - - - - The best and slowest compression level. This tries to find very - long and distant string repetitions. - - - - - The worst but fastest compression level. - - - - - The default compression level. - - - - - This level won't compress at all but output uncompressed blocks. - - - - - The compression method. This is the only method supported so far. - There is no need to use this constant at all. - - - - - Compression Level as an enum for safer use - - - - - The best and slowest compression level. This tries to find very - long and distant string repetitions. - - - - - The worst but fastest compression level. - - - - - The default compression level. - - - - - This level won't compress at all but output uncompressed blocks. - - - - - The compression method. This is the only method supported so far. - There is no need to use this constant at all. - - - - - Creates a new deflater with default compression level. - - - - - Creates a new deflater with given compression level. - - - the compression level, a value between NO_COMPRESSION - and BEST_COMPRESSION, or DEFAULT_COMPRESSION. - - if lvl is out of range. - - - - Creates a new deflater with given compression level. - - - the compression level, a value between NO_COMPRESSION - and BEST_COMPRESSION. - - - true, if we should suppress the Zlib/RFC1950 header at the - beginning and the adler checksum at the end of the output. This is - useful for the GZIP/PKZIP formats. - - if lvl is out of range. - - - - Resets the deflater. The deflater acts afterwards as if it was - just created with the same compression level and strategy as it - had before. - - - - - Gets the current adler checksum of the data that was processed so far. - - - - - Gets the number of input bytes processed so far. - - - - - Gets the number of output bytes so far. - - - - - Flushes the current input block. Further calls to deflate() will - produce enough output to inflate everything in the current input - block. This is not part of Sun's JDK so I have made it package - private. It is used by DeflaterOutputStream to implement - flush(). - - - - - Finishes the deflater with the current input block. It is an error - to give more input after this method was called. This method must - be called to force all bytes to be flushed. - - - - - Returns true if the stream was finished and no more output bytes - are available. - - - - - Returns true, if the input buffer is empty. - You should then call setInput(). - NOTE: This method can also return true when the stream - was finished. - - - - - Sets the data which should be compressed next. This should be only - called when needsInput indicates that more input is needed. - If you call setInput when needsInput() returns false, the - previous input that is still pending will be thrown away. - The given byte array should not be changed, before needsInput() returns - true again. - This call is equivalent to setInput(input, 0, input.length). - - - the buffer containing the input data. - - - if the buffer was finished() or ended(). - - - - - Sets the data which should be compressed next. This should be - only called when needsInput indicates that more input is needed. - The given byte array should not be changed, before needsInput() returns - true again. - - - the buffer containing the input data. - - - the start of the data. - - - the number of data bytes of input. - - - if the buffer was Finish()ed or if previous input is still pending. - - - - - Sets the compression level. There is no guarantee of the exact - position of the change, but if you call this when needsInput is - true the change of compression level will occur somewhere near - before the end of the so far given input. - - - the new compression level. - - - - - Get current compression level - - Returns the current compression level - - - - Sets the compression strategy. Strategy is one of - DEFAULT_STRATEGY, HUFFMAN_ONLY and FILTERED. For the exact - position where the strategy is changed, the same as for - SetLevel() applies. - - - The new compression strategy. - - - - - Deflates the current input block with to the given array. - - - The buffer where compressed data is stored - - - The number of compressed bytes added to the output, or 0 if either - IsNeedingInput() or IsFinished returns true or length is zero. - - - - - Deflates the current input block to the given array. - - - Buffer to store the compressed data. - - - Offset into the output array. - - - The maximum number of bytes that may be stored. - - - The number of compressed bytes added to the output, or 0 if either - needsInput() or finished() returns true or length is zero. - - - If Finish() was previously called. - - - If offset or length don't match the array length. - - - - - Sets the dictionary which should be used in the deflate process. - This call is equivalent to setDictionary(dict, 0, dict.Length). - - - the dictionary. - - - if SetInput () or Deflate () were already called or another dictionary was already set. - - - - - Sets the dictionary which should be used in the deflate process. - The dictionary is a byte array containing strings that are - likely to occur in the data which should be compressed. The - dictionary is not stored in the compressed output, only a - checksum. To decompress the output you need to supply the same - dictionary again. - - - The dictionary data - - - The index where dictionary information commences. - - - The number of bytes in the dictionary. - - - If SetInput () or Deflate() were already called or another dictionary was already set. - - - - - Compression level. - - - - - If true no Zlib/RFC1950 headers or footers are generated - - - - - The current state. - - - - - The total bytes of output written. - - - - - The pending output. - - - - - The deflater engine. - - - - - This class contains constants used for deflation. - - - - - Set to true to enable debugging - - - - - Written to Zip file to identify a stored block - - - - - Identifies static tree in Zip file - - - - - Identifies dynamic tree in Zip file - - - - - Header flag indicating a preset dictionary for deflation - - - - - Sets internal buffer sizes for Huffman encoding - - - - - Internal compression engine constant - - - - - Internal compression engine constant - - - - - Internal compression engine constant - - - - - Internal compression engine constant - - - - - Internal compression engine constant - - - - - Internal compression engine constant - - - - - Internal compression engine constant - - - - - Internal compression engine constant - - - - - Internal compression engine constant - - - - - Internal compression engine constant - - - - - Internal compression engine constant - - - - - Internal compression engine constant - - - - - Internal compression engine constant - - - - - Internal compression engine constant - - - - - Internal compression engine constant - - - - - Internal compression engine constant - - - - - Internal compression engine constant - - - - - Internal compression engine constant - - - - - Internal compression engine constant - - - - - Internal compression engine constant - - - - - Internal compression engine constant - - - - - Strategies for deflater - - - - - The default strategy - - - - - This strategy will only allow longer string repetitions. It is - useful for random data with a small character set. - - - - - This strategy will not look for string repetitions at all. It - only encodes with Huffman trees (which means, that more common - characters get a smaller encoding. - - - - - Low level compression engine for deflate algorithm which uses a 32K sliding window - with secondary compression from Huffman/Shannon-Fano codes. - - - - - Construct instance with pending buffer - Adler calculation will be peformed - - - Pending buffer to use - - - - - Construct instance with pending buffer - - - Pending buffer to use - - - If no adler calculation should be performed - - - - - Deflate drives actual compression of data - - True to flush input buffers - Finish deflation with the current input. - Returns true if progress has been made. - - - - Sets input data to be deflated. Should only be called when NeedsInput() - returns true - - The buffer containing input data. - The offset of the first byte of data. - The number of bytes of data to use as input. - - - - Determines if more input is needed. - - Return true if input is needed via SetInput - - - - Set compression dictionary - - The buffer containing the dictionary data - The offset in the buffer for the first byte of data - The length of the dictionary data. - - - - Reset internal state - - - - - Reset Adler checksum - - - - - Get current value of Adler checksum - - - - - Total data processed - - - - - Get/set the deflate strategy - - - - - Set the deflate level (0-9) - - The value to set the level to. - - - - Fill the window - - - - - Inserts the current string in the head hash and returns the previous - value for this hash. - - The previous hash value - - - - Find the best (longest) string in the window matching the - string starting at strstart. - - Preconditions: - - strstart + DeflaterConstants.MAX_MATCH <= window.length. - - - True if a match greater than the minimum length is found - - - - Hashtable, hashing three characters to an index for window, so - that window[index]..window[index+2] have this hash code. - Note that the array should really be unsigned short, so you need - to and the values with 0xffff. - - - - - prev[index & WMASK] points to the previous index that has the - same hash code as the string starting at index. This way - entries with the same hash code are in a linked list. - Note that the array should really be unsigned short, so you need - to and the values with 0xffff. - - - - - Points to the current character in the window. - - - - - lookahead is the number of characters starting at strstart in - window that are valid. - So window[strstart] until window[strstart+lookahead-1] are valid - characters. - - - - - This array contains the part of the uncompressed stream that - is of relevance. The current character is indexed by strstart. - - - - - The current compression function. - - - - - The input data for compression. - - - - - The total bytes of input read. - - - - - The offset into inputBuf, where input data starts. - - - - - The end offset of the input data. - - - - - The adler checksum - - - - - This is the DeflaterHuffman class. - - This class is not thread safe. This is inherent in the API, due - to the split of Deflate and SetInput. - - author of the original java version : Jochen Hoenicke - - - - - Resets the internal state of the tree - - - - - Check that all frequencies are zero - - - At least one frequency is non-zero - - - - - Set static codes and length - - new codes - length for new codes - - - - Build dynamic codes and lengths - - - - - Get encoded length - - Encoded length, the sum of frequencies * lengths - - - - Scan a literal or distance tree to determine the frequencies of the codes - in the bit length tree. - - - - - Write tree values - - Tree to write - - - - Pending buffer to use - - - - - Construct instance with pending buffer - - Pending buffer to use - - - - Reset internal state - - - - - Write all trees to pending buffer - - The number/rank of treecodes to send. - - - - Compress current buffer writing data to pending buffer - - - - - Flush block to output with no compression - - Data to write - Index of first byte to write - Count of bytes to write - True if this is the last block - - - - Flush block to output with compression - - Data to flush - Index of first byte to flush - Count of bytes to flush - True if this is the last block - - - - Get value indicating if internal buffer is full - - true if buffer is full - - - - Add literal to buffer - - Literal value to add to buffer. - Value indicating internal buffer is full - - - - Add distance code and length to literal and distance trees - - Distance code - Length - Value indicating if internal buffer is full - - - - Reverse the bits of a 16 bit value. - - Value to reverse bits - Value with bits reversed - - - - This class stores the pending output of the Deflater. - - author of the original java version : Jochen Hoenicke - - - - - Construct instance with default buffer size - - - - - Inflater is used to decompress data that has been compressed according - to the "deflate" standard described in rfc1951. - - By default Zlib (rfc1950) headers and footers are expected in the input. - You can use constructor public Inflater(bool noHeader) passing true - if there is no Zlib header information - - The usage is as following. First you have to set some input with - SetInput(), then Inflate() it. If inflate doesn't - inflate any bytes there may be three reasons: -
    -
  • IsNeedingInput() returns true because the input buffer is empty. - You have to provide more input with SetInput(). - NOTE: IsNeedingInput() also returns true when, the stream is finished. -
  • -
  • IsNeedingDictionary() returns true, you have to provide a preset - dictionary with SetDictionary().
  • -
  • IsFinished returns true, the inflater has finished.
  • -
- Once the first output byte is produced, a dictionary will not be - needed at a later stage. - - author of the original java version : John Leuner, Jochen Hoenicke -
-
- - - Copy lengths for literal codes 257..285 - - - - - Extra bits for literal codes 257..285 - - - - - Copy offsets for distance codes 0..29 - - - - - Extra bits for distance codes - - - - - These are the possible states for an inflater - - - - - This variable contains the current state. - - - - - The adler checksum of the dictionary or of the decompressed - stream, as it is written in the header resp. footer of the - compressed stream. - Only valid if mode is DECODE_DICT or DECODE_CHKSUM. - - - - - The number of bits needed to complete the current state. This - is valid, if mode is DECODE_DICT, DECODE_CHKSUM, - DECODE_HUFFMAN_LENBITS or DECODE_HUFFMAN_DISTBITS. - - - - - True, if the last block flag was set in the last block of the - inflated stream. This means that the stream ends after the - current block. - - - - - The total number of inflated bytes. - - - - - The total number of bytes set with setInput(). This is not the - value returned by the TotalIn property, since this also includes the - unprocessed input. - - - - - This variable stores the noHeader flag that was given to the constructor. - True means, that the inflated stream doesn't contain a Zlib header or - footer. - - - - - Creates a new inflater or RFC1951 decompressor - RFC1950/Zlib headers and footers will be expected in the input data - - - - - Creates a new inflater. - - - True if no RFC1950/Zlib header and footer fields are expected in the input data - - This is used for GZIPed/Zipped input. - - For compatibility with - Sun JDK you should provide one byte of input more than needed in - this case. - - - - - Resets the inflater so that a new stream can be decompressed. All - pending input and output will be discarded. - - - - - Decodes a zlib/RFC1950 header. - - - False if more input is needed. - - - The header is invalid. - - - - - Decodes the dictionary checksum after the deflate header. - - - False if more input is needed. - - - - - Decodes the huffman encoded symbols in the input stream. - - - false if more input is needed, true if output window is - full or the current block ends. - - - if deflated stream is invalid. - - - - - Decodes the adler checksum after the deflate stream. - - - false if more input is needed. - - - If checksum doesn't match. - - - - - Decodes the deflated stream. - - - false if more input is needed, or if finished. - - - if deflated stream is invalid. - - - - - Sets the preset dictionary. This should only be called, if - needsDictionary() returns true and it should set the same - dictionary, that was used for deflating. The getAdler() - function returns the checksum of the dictionary needed. - - - The dictionary. - - - - - Sets the preset dictionary. This should only be called, if - needsDictionary() returns true and it should set the same - dictionary, that was used for deflating. The getAdler() - function returns the checksum of the dictionary needed. - - - The dictionary. - - - The index into buffer where the dictionary starts. - - - The number of bytes in the dictionary. - - - No dictionary is needed. - - - The adler checksum for the buffer is invalid - - - - - Sets the input. This should only be called, if needsInput() - returns true. - - - the input. - - - - - Sets the input. This should only be called, if needsInput() - returns true. - - - The source of input data - - - The index into buffer where the input starts. - - - The number of bytes of input to use. - - - No input is needed. - - - The index and/or count are wrong. - - - - - Inflates the compressed stream to the output buffer. If this - returns 0, you should check, whether IsNeedingDictionary(), - IsNeedingInput() or IsFinished() returns true, to determine why no - further output is produced. - - - the output buffer. - - - The number of bytes written to the buffer, 0 if no further - output can be produced. - - - if buffer has length 0. - - - if deflated stream is invalid. - - - - - Inflates the compressed stream to the output buffer. If this - returns 0, you should check, whether needsDictionary(), - needsInput() or finished() returns true, to determine why no - further output is produced. - - - the output buffer. - - - the offset in buffer where storing starts. - - - the maximum number of bytes to output. - - - the number of bytes written to the buffer, 0 if no further output can be produced. - - - if count is less than 0. - - - if the index and / or count are wrong. - - - if deflated stream is invalid. - - - - - Returns true, if the input buffer is empty. - You should then call setInput(). - NOTE: This method also returns true when the stream is finished. - - - - - Returns true, if a preset dictionary is needed to inflate the input. - - - - - Returns true, if the inflater has finished. This means, that no - input is needed and no output can be produced. - - - - - Gets the adler checksum. This is either the checksum of all - uncompressed bytes returned by inflate(), or if needsDictionary() - returns true (and thus no output was yet produced) this is the - adler checksum of the expected dictionary. - - - the adler checksum. - - - - - Gets the total number of output bytes returned by Inflate(). - - - the total number of output bytes. - - - - - Gets the total number of processed compressed input bytes. - - - The total number of bytes of processed input bytes. - - - - - Gets the number of unprocessed input bytes. Useful, if the end of the - stream is reached and you want to further process the bytes after - the deflate stream. - - - The number of bytes of the input which have not been processed. - - - - - Continue decoding header from until more bits are needed or decoding has been completed - - Returns whether decoding could be completed - - - - Get literal/length huffman tree, must not be used before has returned true - - If hader has not been successfully read by the state machine - - - - Get distance huffman tree, must not be used before has returned true - - If hader has not been successfully read by the state machine - - - - Huffman tree used for inflation - - - - - Literal length tree - - - - - Distance tree - - - - - Constructs a Huffman tree from the array of code lengths. - - - the array of code lengths - - - - - Reads the next symbol from input. The symbol is encoded using the - huffman tree. - - - input the input source. - - - the next symbol, or -1 if not enough input is available. - - - - - This class is general purpose class for writing data to a buffer. - - It allows you to write bits as well as bytes - Based on DeflaterPending.java - - author of the original java version : Jochen Hoenicke - - - - - Internal work buffer - - - - - construct instance using default buffer size of 4096 - - - - - construct instance using specified buffer size - - - size to use for internal buffer - - - - - Clear internal state/buffers - - - - - Write a byte to buffer - - - The value to write - - - - - Write a short value to buffer LSB first - - - The value to write. - - - - - write an integer LSB first - - The value to write. - - - - Write a block of data to buffer - - data to write - offset of first byte to write - number of bytes to write - - - - The number of bits written to the buffer - - - - - Align internal buffer on a byte boundary - - - - - Write bits to internal buffer - - source of bits - number of bits to write - - - - Write a short value to internal buffer most significant byte first - - value to write - - - - Indicates if buffer has been flushed - - - - - Flushes the pending buffer into the given output array. If the - output array is to small, only a partial flush is done. - - The output array. - The offset into output array. - The maximum number of bytes to store. - The number of bytes flushed. - - - - Convert internal buffer to byte array. - Buffer is empty on completion - - - The internal buffer contents converted to a byte array. - - - - - A special stream deflating or compressing the bytes that are - written to it. It uses a Deflater to perform actual deflating.
- Authors of the original java version : Tom Tromey, Jochen Hoenicke -
-
- - - Creates a new DeflaterOutputStream with a default Deflater and default buffer size. - - - the output stream where deflated output should be written. - - - - - Creates a new DeflaterOutputStream with the given Deflater and - default buffer size. - - - the output stream where deflated output should be written. - - - the underlying deflater. - - - - - Creates a new DeflaterOutputStream with the given Deflater and - buffer size. - - - The output stream where deflated output is written. - - - The underlying deflater to use - - - The buffer size in bytes to use when deflating (minimum value 512) - - - bufsize is less than or equal to zero. - - - baseOutputStream does not support writing - - - deflater instance is null - - - - - Finishes the stream by calling finish() on the deflater. - - - Not all input is deflated - - - - - Gets or sets a flag indicating ownership of underlying stream. - When the flag is true will close the underlying stream also. - - The default value is true. - - - - Allows client to determine if an entry can be patched after its added - - - - - Returns the 10 byte AUTH CODE to be appended immediately following the AES data stream. - - - - - Get/set the password used for encryption. - - When set to null or if the password is empty no encryption is performed - - - - Encrypt a block of data - - - Data to encrypt. NOTE the original contents of the buffer are lost - - - Offset of first byte in buffer to encrypt - - - Number of bytes in buffer to encrypt - - - - - Initializes encryption keys based on given . - - The password. - - - - Initializes encryption keys based on given password. - - - - - Deflates everything in the input buffers. This will call - def.deflate() until all bytes from the input buffers - are processed. - - - - - Gets value indicating stream can be read from - - - - - Gets a value indicating if seeking is supported for this stream - This property always returns false - - - - - Get value indicating if this stream supports writing - - - - - Get current length of stream - - - - - Gets the current position within the stream. - - Any attempt to set position - - - - Sets the current position of this stream to the given value. Not supported by this class! - - The offset relative to the to seek. - The to seek from. - The new position in the stream. - Any access - - - - Sets the length of this stream to the given value. Not supported by this class! - - The new stream length. - Any access - - - - Read a byte from stream advancing position by one - - The byte read cast to an int. THe value is -1 if at the end of the stream. - Any access - - - - Read a block of bytes from stream - - The buffer to store read data in. - The offset to start storing at. - The maximum number of bytes to read. - The actual number of bytes read. Zero if end of stream is detected. - Any access - - - - Flushes the stream by calling Flush on the deflater and then - on the underlying stream. This ensures that all bytes are flushed. - - - - - Calls and closes the underlying - stream when is true. - - - - - Writes a single byte to the compressed output stream. - - - The byte value. - - - - - Writes bytes from an array to the compressed stream. - - - The byte array - - - The offset into the byte array where to start. - - - The number of bytes to write. - - - - - This buffer is used temporarily to retrieve the bytes from the - deflater and write them to the underlying output stream. - - - - - The deflater which is used to deflate the stream. - - - - - Base stream the deflater depends on. - - - - - An input buffer customised for use by - - - The buffer supports decryption of incoming data. - - - - - Initialise a new instance of with a default buffer size - - The stream to buffer. - - - - Initialise a new instance of - - The stream to buffer. - The size to use for the buffer - A minimum buffer size of 1KB is permitted. Lower sizes are treated as 1KB. - - - - Get the length of bytes bytes in the - - - - - Get the contents of the raw data buffer. - - This may contain encrypted data. - - - - Get the number of useable bytes in - - - - - Get the contents of the clear text buffer. - - - - - Get/set the number of bytes available - - - - - Call passing the current clear text buffer contents. - - The inflater to set input for. - - - - Fill the buffer from the underlying input stream. - - - - - Read a buffer directly from the input stream - - The buffer to fill - Returns the number of bytes read. - - - - Read a buffer directly from the input stream - - The buffer to read into - The offset to start reading data into. - The number of bytes to read. - Returns the number of bytes read. - - - - Read clear text data from the input stream. - - The buffer to add data to. - The offset to start adding data at. - The number of bytes to read. - Returns the number of bytes actually read. - - - - Read a from the input stream. - - Returns the byte read. - - - - Read an in little endian byte order. - - The short value read case to an int. - - - - Read an in little endian byte order. - - The int value read. - - - - Read a in little endian byte order. - - The long value read. - - - - Get/set the to apply to any data. - - Set this value to null to have no transform applied. - - - - This filter stream is used to decompress data compressed using the "deflate" - format. The "deflate" format is described in RFC 1951. - - This stream may form the basis for other decompression filters, such - as the GZipInputStream. - - Author of the original java version : John Leuner. - - - - - Create an InflaterInputStream with the default decompressor - and a default buffer size of 4KB. - - - The InputStream to read bytes from - - - - - Create an InflaterInputStream with the specified decompressor - and a default buffer size of 4KB. - - - The source of input data - - - The decompressor used to decompress data read from baseInputStream - - - - - Create an InflaterInputStream with the specified decompressor - and the specified buffer size. - - - The InputStream to read bytes from - - - The decompressor to use - - - Size of the buffer to use - - - - - Gets or sets a flag indicating ownership of underlying stream. - When the flag is true will close the underlying stream also. - - The default value is true. - - - - Skip specified number of bytes of uncompressed data - - - Number of bytes to skip - - - The number of bytes skipped, zero if the end of - stream has been reached - - - The number of bytes to skip is less than or equal to zero. - - - - - Clear any cryptographic state. - - - - - Returns 0 once the end of the stream (EOF) has been reached. - Otherwise returns 1. - - - - - Fills the buffer with more data to decompress. - - - Stream ends early - - - - - Gets a value indicating whether the current stream supports reading - - - - - Gets a value of false indicating seeking is not supported for this stream. - - - - - Gets a value of false indicating that this stream is not writeable. - - - - - A value representing the length of the stream in bytes. - - - - - The current position within the stream. - Throws a NotSupportedException when attempting to set the position - - Attempting to set the position - - - - Flushes the baseInputStream - - - - - Sets the position within the current stream - Always throws a NotSupportedException - - The relative offset to seek to. - The defining where to seek from. - The new position in the stream. - Any access - - - - Set the length of the current stream - Always throws a NotSupportedException - - The new length value for the stream. - Any access - - - - Writes a sequence of bytes to stream and advances the current position - This method always throws a NotSupportedException - - Thew buffer containing data to write. - The offset of the first byte to write. - The number of bytes to write. - Any access - - - - Writes one byte to the current stream and advances the current position - Always throws a NotSupportedException - - The byte to write. - Any access - - - - Closes the input stream. When - is true the underlying stream is also closed. - - - - - Reads decompressed data into the provided buffer byte array - - - The array to read and decompress data into - - - The offset indicating where the data should be placed - - - The number of bytes to decompress - - The number of bytes read. Zero signals the end of stream - - Inflater needs a dictionary - - - - - Decompressor for this stream - - - - - Input buffer for this stream. - - - - - Base stream the inflater reads from. - - - - - The compressed size - - - - - Flag indicating wether this instance has been closed or not. - - - - - Contains the output from the Inflation process. - We need to have a window so that we can refer backwards into the output stream - to repeat stuff.
- Author of the original java version : John Leuner -
-
- - - Write a byte to this output window - - value to write - - if window is full - - - - - Append a byte pattern already in the window itself - - length of pattern to copy - distance from end of window pattern occurs - - If the repeated data overflows the window - - - - - Copy from input manipulator to internal window - - source of data - length of data to copy - the number of bytes copied - - - - Copy dictionary to window - - source dictionary - offset of start in source dictionary - length of dictionary - - If window isnt empty - - - - - Get remaining unfilled space in window - - Number of bytes left in window - - - - Get bytes available for output in window - - Number of bytes filled - - - - Copy contents of window to output - - buffer to copy to - offset to start at - number of bytes to count - The number of bytes copied - - If a window underflow occurs - - - - - Reset by clearing window so GetAvailable returns 0 - - - - - This class allows us to retrieve a specified number of bits from - the input buffer, as well as copy big byte blocks. - - It uses an int buffer to store up to 31 bits for direct - manipulation. This guarantees that we can get at least 16 bits, - but we only need at most 15, so this is all safe. - - There are some optimizations in this class, for example, you must - never peek more than 8 bits more than needed, and you must first - peek bits before you may drop them. This is not a general purpose - class but optimized for the behaviour of the Inflater. - - authors of the original java version : John Leuner, Jochen Hoenicke - - - - - Get the next sequence of bits but don't increase input pointer. bitCount must be - less or equal 16 and if this call succeeds, you must drop - at least n - 8 bits in the next call. - - The number of bits to peek. - - the value of the bits, or -1 if not enough bits available. */ - - - - - Tries to grab the next bits from the input and - sets to the value, adding . - - true if enough bits could be read, otherwise false - - - - Tries to grab the next bits from the input and - sets of to the value. - - true if enough bits could be read, otherwise false - - - - Drops the next n bits from the input. You should have called PeekBits - with a bigger or equal n before, to make sure that enough bits are in - the bit buffer. - - The number of bits to drop. - - - - Gets the next n bits and increases input pointer. This is equivalent - to followed by , except for correct error handling. - - The number of bits to retrieve. - - the value of the bits, or -1 if not enough bits available. - - - - - Gets the number of bits available in the bit buffer. This must be - only called when a previous PeekBits() returned -1. - - - the number of bits available. - - - - - Gets the number of bytes available. - - - The number of bytes available. - - - - - Skips to the next byte boundary. - - - - - Returns true when SetInput can be called - - - - - Copies bytes from input buffer to output buffer starting - at output[offset]. You have to make sure, that the buffer is - byte aligned. If not enough bytes are available, copies fewer - bytes. - - - The buffer to copy bytes to. - - - The offset in the buffer at which copying starts - - - The length to copy, 0 is allowed. - - - The number of bytes copied, 0 if no bytes were available. - - - Length is less than zero - - - Bit buffer isnt byte aligned - - - - - Resets state and empties internal buffers - - - - - Add more input for consumption. - Only call when IsNeedingInput returns true - - data to be input - offset of first byte of input - number of bytes of input to add. - - - - FastZipEvents supports all events applicable to FastZip operations. - - - - - Delegate to invoke when processing directories. - - - - - Delegate to invoke when processing files. - - - - - Delegate to invoke during processing of files. - - - - - Delegate to invoke when processing for a file has been completed. - - - - - Delegate to invoke when processing directory failures. - - - - - Delegate to invoke when processing file failures. - - - - - Raise the directory failure event. - - The directory causing the failure. - The exception for this event. - A boolean indicating if execution should continue or not. - - - - Fires the file failure handler delegate. - - The file causing the failure. - The exception for this failure. - A boolean indicating if execution should continue or not. - - - - Fires the ProcessFile delegate. - - The file being processed. - A boolean indicating if execution should continue or not. - - - - Fires the delegate - - The file whose processing has been completed. - A boolean indicating if execution should continue or not. - - - - Fires the process directory delegate. - - The directory being processed. - Flag indicating if the directory has matching files as determined by the current filter. - A of true if the operation should continue; false otherwise. - - - - The minimum timespan between events. - - The minimum period of time between events. - - The default interval is three seconds. - - - - FastZip provides facilities for creating and extracting zip files. - - - - - Defines the desired handling when overwriting files during extraction. - - - - - Prompt the user to confirm overwriting - - - - - Never overwrite files. - - - - - Always overwrite files. - - - - - Initialise a default instance of . - - - - - Initialise a new instance of - - The events to use during operations. - - - - Get/set a value indicating wether empty directories should be created. - - - - - Get / set the password value. - - - - - Get or set the active when creating Zip files. - - - - - - Get or set the active when creating Zip files. - - - - - Gets or sets the setting for Zip64 handling when writing. - - - The default value is dynamic which is not backwards compatible with old - programs and can cause problems with XP's built in compression which cant - read Zip64 archives. However it does avoid the situation were a large file - is added and cannot be completed correctly. - NOTE: Setting the size for entries before they are added is the best solution! - By default the EntryFactory used by FastZip will set fhe file size. - - - - - Get/set a value indicating wether file dates and times should - be restored when extracting files from an archive. - - The default value is false. - - - - Get/set a value indicating whether file attributes should - be restored during extract operations - - - - - Get/set the Compression Level that will be used - when creating the zip - - - - - Delegate called when confirming overwriting of files. - - - - - Create a zip file. - - The name of the zip file to create. - The directory to source files from. - True to recurse directories, false for no recursion. - The file filter to apply. - The directory filter to apply. - - - - Create a zip file/archive. - - The name of the zip file to create. - The directory to obtain files and directories from. - True to recurse directories, false for no recursion. - The file filter to apply. - - - - Create a zip archive sending output to the passed. - - The stream to write archive data to. - The directory to source files from. - True to recurse directories, false for no recursion. - The file filter to apply. - The directory filter to apply. - The is closed after creation. - - - - Extract the contents of a zip file. - - The zip file to extract from. - The directory to save extracted information in. - A filter to apply to files. - - - - Extract the contents of a zip file. - - The zip file to extract from. - The directory to save extracted information in. - The style of overwriting to apply. - A delegate to invoke when confirming overwriting. - A filter to apply to files. - A filter to apply to directories. - Flag indicating whether to restore the date and time for extracted files. - Allow parent directory traversal in file paths (e.g. ../file) - - - - Extract the contents of a zip file held in a stream. - - The seekable input stream containing the zip to extract from. - The directory to save extracted information in. - The style of overwriting to apply. - A delegate to invoke when confirming overwriting. - A filter to apply to files. - A filter to apply to directories. - Flag indicating whether to restore the date and time for extracted files. - Flag indicating whether the inputStream will be closed by this method. - Allow parent directory traversal in file paths (e.g. ../file) - - - - Defines factory methods for creating new values. - - - - - Create a for a file given its name - - The name of the file to create an entry for. - Returns a file entry based on the passed. - - - - Create a for a file given its name - - The name of the file to create an entry for. - If true get details from the file system if the file exists. - Returns a file entry based on the passed. - - - - Create a for a file given its actual name and optional override name - - The name of the file to create an entry for. - An alternative name to be used for the new entry. Null if not applicable. - If true get details from the file system if the file exists. - Returns a file entry based on the passed. - - - - Create a for a directory given its name - - The name of the directory to create an entry for. - Returns a directory entry based on the passed. - - - - Create a for a directory given its name - - The name of the directory to create an entry for. - If true get details from the file system for this directory if it exists. - Returns a directory entry based on the passed. - - - - Get/set the applicable. - - - - - WindowsNameTransform transforms names to windows compatible ones. - - - - - The maximum windows path name permitted. - - This may not valid for all windows systems - CE?, etc but I cant find the equivalent in the CLR. - - - - In this case we need Windows' invalid path characters. - Path.GetInvalidPathChars() only returns a subset invalid on all platforms. - - - - - Initialises a new instance of - - - Allow parent directory traversal in file paths (e.g. ../file) - - - - Initialise a default instance of - - - - - Gets or sets a value containing the target directory to prefix values with. - - - - - Allow parent directory traversal in file paths (e.g. ../file) - - - - - Gets or sets a value indicating wether paths on incoming values should be removed. - - - - - Transform a Zip directory name to a windows directory name. - - The directory name to transform. - The transformed name. - - - - Transform a Zip format file name to a windows style one. - - The file name to transform. - The transformed name. - - - - Test a name to see if it is a valid name for a windows filename as extracted from a Zip archive. - - The name to test. - Returns true if the name is a valid zip name; false otherwise. - The filename isnt a true windows path in some fundamental ways like no absolute paths, no rooted paths etc. - - - - Force a name to be valid by replacing invalid characters with a fixed value - - The name to make valid - The replacement character to use for any invalid characters. - Returns a valid name - - - - Gets or set the character to replace invalid characters during transformations. - - - - - Determines how entries are tested to see if they should use Zip64 extensions or not. - - - - - Zip64 will not be forced on entries during processing. - - An entry can have this overridden if required - - - - Zip64 should always be used. - - - - - #ZipLib will determine use based on entry values when added to archive. - - - - - The kind of compression used for an entry in an archive - - - - - A direct copy of the file contents is held in the archive - - - - - Common Zip compression method using a sliding dictionary - of up to 32KB and secondary compression from Huffman/Shannon-Fano trees - - - - - An extension to deflate with a 64KB window. Not supported by #Zip currently - - - - - BZip2 compression. Not supported by #Zip. - - - - - WinZip special for AES encryption, Now supported by #Zip. - - - - - Identifies the encryption algorithm used for an entry - - - - - No encryption has been used. - - - - - Encrypted using PKZIP 2.0 or 'classic' encryption. - - - - - DES encryption has been used. - - - - - RC2 encryption has been used for encryption. - - - - - Triple DES encryption with 168 bit keys has been used for this entry. - - - - - Triple DES with 112 bit keys has been used for this entry. - - - - - AES 128 has been used for encryption. - - - - - AES 192 has been used for encryption. - - - - - AES 256 has been used for encryption. - - - - - RC2 corrected has been used for encryption. - - - - - Blowfish has been used for encryption. - - - - - Twofish has been used for encryption. - - - - - RC4 has been used for encryption. - - - - - An unknown algorithm has been used for encryption. - - - - - Defines the contents of the general bit flags field for an archive entry. - - - - - Bit 0 if set indicates that the file is encrypted - - - - - Bits 1 and 2 - Two bits defining the compression method (only for Method 6 Imploding and 8,9 Deflating) - - - - - Bit 3 if set indicates a trailing data desciptor is appended to the entry data - - - - - Bit 4 is reserved for use with method 8 for enhanced deflation - - - - - Bit 5 if set indicates the file contains Pkzip compressed patched data. - Requires version 2.7 or greater. - - - - - Bit 6 if set indicates strong encryption has been used for this entry. - - - - - Bit 7 is currently unused - - - - - Bit 8 is currently unused - - - - - Bit 9 is currently unused - - - - - Bit 10 is currently unused - - - - - Bit 11 if set indicates the filename and - comment fields for this file must be encoded using UTF-8. - - - - - Bit 12 is documented as being reserved by PKware for enhanced compression. - - - - - Bit 13 if set indicates that values in the local header are masked to hide - their actual values, and the central directory is encrypted. - - - Used when encrypting the central directory contents. - - - - - Bit 14 is documented as being reserved for use by PKware - - - - - Bit 15 is documented as being reserved for use by PKware - - - - - This class contains constants used for Zip format files - - - - - The version made by field for entries in the central header when created by this library - - - This is also the Zip version for the library when comparing against the version required to extract - for an entry. See . - - - - - The version made by field for entries in the central header when created by this library - - - This is also the Zip version for the library when comparing against the version required to extract - for an entry. See ZipInputStream.CanDecompressEntry. - - - - - The minimum version required to support strong encryption - - - - - The minimum version required to support strong encryption - - - - - Version indicating AES encryption - - - - - The version required for Zip64 extensions (4.5 or higher) - - - - - Size of local entry header (excluding variable length fields at end) - - - - - Size of local entry header (excluding variable length fields at end) - - - - - Size of Zip64 data descriptor - - - - - Size of data descriptor - - - - - Size of data descriptor - - - - - Size of central header entry (excluding variable fields) - - - - - Size of central header entry - - - - - Size of end of central record (excluding variable fields) - - - - - Size of end of central record (excluding variable fields) - - - - - Size of 'classic' cryptographic header stored before any entry data - - - - - Size of cryptographic header stored before entry data - - - - - Signature for local entry header - - - - - Signature for local entry header - - - - - Signature for spanning entry - - - - - Signature for spanning entry - - - - - Signature for temporary spanning entry - - - - - Signature for temporary spanning entry - - - - - Signature for data descriptor - - - This is only used where the length, Crc, or compressed size isnt known when the - entry is created and the output stream doesnt support seeking. - The local entry cannot be 'patched' with the correct values in this case - so the values are recorded after the data prefixed by this header, as well as in the central directory. - - - - - Signature for data descriptor - - - This is only used where the length, Crc, or compressed size isnt known when the - entry is created and the output stream doesnt support seeking. - The local entry cannot be 'patched' with the correct values in this case - so the values are recorded after the data prefixed by this header, as well as in the central directory. - - - - - Signature for central header - - - - - Signature for central header - - - - - Signature for Zip64 central file header - - - - - Signature for Zip64 central file header - - - - - Signature for Zip64 central directory locator - - - - - Signature for archive extra data signature (were headers are encrypted). - - - - - Central header digitial signature - - - - - Central header digitial signature - - - - - End of central directory record signature - - - - - End of central directory record signature - - - - - Default encoding used for string conversion. 0 gives the default system OEM code page. - Using the default code page isnt the full solution neccessarily - there are many variable factors, codepage 850 is often a good choice for - European users, however be careful about compatability. - - - - Depracated wrapper for - - - Depracated wrapper for - - - Depracated wrapper for - - - Depracated wrapper for - - - Depracated wrapper for - - - Depracated wrapper for - - - - Defines known values for the property. - - - - - Host system = MSDOS - - - - - Host system = Amiga - - - - - Host system = Open VMS - - - - - Host system = Unix - - - - - Host system = VMCms - - - - - Host system = Atari ST - - - - - Host system = OS2 - - - - - Host system = Macintosh - - - - - Host system = ZSystem - - - - - Host system = Cpm - - - - - Host system = Windows NT - - - - - Host system = MVS - - - - - Host system = VSE - - - - - Host system = Acorn RISC - - - - - Host system = VFAT - - - - - Host system = Alternate MVS - - - - - Host system = BEOS - - - - - Host system = Tandem - - - - - Host system = OS400 - - - - - Host system = OSX - - - - - Host system = WinZIP AES - - - - - This class represents an entry in a zip archive. This can be a file - or a directory - ZipFile and ZipInputStream will give you instances of this class as - information about the members in an archive. ZipOutputStream - uses an instance of this class when creating an entry in a Zip file. -
-
Author of the original java version : Jochen Hoenicke -
-
- - - Creates a zip entry with the given name. - - - The name for this entry. Can include directory components. - The convention for names is 'unix' style paths with relative names only. - There are with no device names and path elements are separated by '/' characters. - - - The name passed is null - - - - - Creates a zip entry with the given name and version required to extract - - - The name for this entry. Can include directory components. - The convention for names is 'unix' style paths with no device names and - path elements separated by '/' characters. This is not enforced see CleanName - on how to ensure names are valid if this is desired. - - - The minimum 'feature version' required this entry - - - The name passed is null - - - - - Initializes an entry with the given name and made by information - - Name for this entry - Version and HostSystem Information - Minimum required zip feature version required to extract this entry - Compression method for this entry. - - The name passed is null - - - versionRequiredToExtract should be 0 (auto-calculate) or > 10 - - - This constructor is used by the ZipFile class when reading from the central header - It is not generally useful, use the constructor specifying the name only. - - - - - Creates a deep copy of the given zip entry. - - - The entry to copy. - - - - - Get a value indicating wether the entry has a CRC value available. - - - - - Get/Set flag indicating if entry is encrypted. - A simple helper routine to aid interpretation of flags - - This is an assistant that interprets the flags property. - - - - Get / set a flag indicating wether entry name and comment text are - encoded in unicode UTF8. - - This is an assistant that interprets the flags property. - - - - Value used during password checking for PKZIP 2.0 / 'classic' encryption. - - - - - Get/Set general purpose bit flag for entry - - - General purpose bit flag
-
- Bit 0: If set, indicates the file is encrypted
- Bit 1-2 Only used for compression type 6 Imploding, and 8, 9 deflating
- Imploding:
- Bit 1 if set indicates an 8K sliding dictionary was used. If clear a 4k dictionary was used
- Bit 2 if set indicates 3 Shannon-Fanno trees were used to encode the sliding dictionary, 2 otherwise
-
- Deflating:
- Bit 2 Bit 1
- 0 0 Normal compression was used
- 0 1 Maximum compression was used
- 1 0 Fast compression was used
- 1 1 Super fast compression was used
-
- Bit 3: If set, the fields crc-32, compressed size - and uncompressed size are were not able to be written during zip file creation - The correct values are held in a data descriptor immediately following the compressed data.
- Bit 4: Reserved for use by PKZIP for enhanced deflating
- Bit 5: If set indicates the file contains compressed patch data
- Bit 6: If set indicates strong encryption was used.
- Bit 7-10: Unused or reserved
- Bit 11: If set the name and comments for this entry are in unicode.
- Bit 12-15: Unused or reserved
-
- - -
- - - Get/Set index of this entry in Zip file - - This is only valid when the entry is part of a - - - - Get/set offset for use in central header - - - - - Get/Set external file attributes as an integer. - The values of this are operating system dependant see - HostSystem for details - - - - - Get the version made by for this entry or zero if unknown. - The value / 10 indicates the major version number, and - the value mod 10 is the minor version number - - - - - Get a value indicating this entry is for a DOS/Windows system. - - - - - Test the external attributes for this to - see if the external attributes are Dos based (including WINNT and variants) - and match the values - - The attributes to test. - Returns true if the external attributes are known to be DOS/Windows - based and have the same attributes set as the value passed. - - - - Gets the compatability information for the external file attribute - If the external file attributes are compatible with MS-DOS and can be read - by PKZIP for DOS version 2.04g then this value will be zero. Otherwise the value - will be non-zero and identify the host system on which the attributes are compatible. - - - - The values for this as defined in the Zip File format and by others are shown below. The values are somewhat - misleading in some cases as they are not all used as shown. You should consult the relevant documentation - to obtain up to date and correct information. The modified appnote by the infozip group is - particularly helpful as it documents a lot of peculiarities. The document is however a little dated. - - 0 - MS-DOS and OS/2 (FAT / VFAT / FAT32 file systems) - 1 - Amiga - 2 - OpenVMS - 3 - Unix - 4 - VM/CMS - 5 - Atari ST - 6 - OS/2 HPFS - 7 - Macintosh - 8 - Z-System - 9 - CP/M - 10 - Windows NTFS - 11 - MVS (OS/390 - Z/OS) - 12 - VSE - 13 - Acorn Risc - 14 - VFAT - 15 - Alternate MVS - 16 - BeOS - 17 - Tandem - 18 - OS/400 - 19 - OS/X (Darwin) - 99 - WinZip AES - remainder - unused - - - - - - Get minimum Zip feature version required to extract this entry - - - Minimum features are defined as:
- 1.0 - Default value
- 1.1 - File is a volume label
- 2.0 - File is a folder/directory
- 2.0 - File is compressed using Deflate compression
- 2.0 - File is encrypted using traditional encryption
- 2.1 - File is compressed using Deflate64
- 2.5 - File is compressed using PKWARE DCL Implode
- 2.7 - File is a patch data set
- 4.5 - File uses Zip64 format extensions
- 4.6 - File is compressed using BZIP2 compression
- 5.0 - File is encrypted using DES
- 5.0 - File is encrypted using 3DES
- 5.0 - File is encrypted using original RC2 encryption
- 5.0 - File is encrypted using RC4 encryption
- 5.1 - File is encrypted using AES encryption
- 5.1 - File is encrypted using corrected RC2 encryption
- 5.1 - File is encrypted using corrected RC2-64 encryption
- 6.1 - File is encrypted using non-OAEP key wrapping
- 6.2 - Central directory encryption (not confirmed yet)
- 6.3 - File is compressed using LZMA
- 6.3 - File is compressed using PPMD+
- 6.3 - File is encrypted using Blowfish
- 6.3 - File is encrypted using Twofish
-
- -
- - - Get a value indicating whether this entry can be decompressed by the library. - - This is based on the and - wether the compression method is supported. - - - - Force this entry to be recorded using Zip64 extensions. - - - - - Get a value indicating wether Zip64 extensions were forced. - - A value of true if Zip64 extensions have been forced on; false if not. - - - - Gets a value indicating if the entry requires Zip64 extensions - to store the full entry values. - - A value of true if a local header requires Zip64 extensions; false if not. - - - - Get a value indicating wether the central directory entry requires Zip64 extensions to be stored. - - - - - Get/Set DosTime value. - - - The MS-DOS date format can only represent dates between 1/1/1980 and 12/31/2107. - - - - - Gets/Sets the time of last modification of the entry. - - - The property is updated to match this as far as possible. - - - - - Returns the entry name. - - - The unix naming convention is followed. - Path components in the entry should always separated by forward slashes ('/'). - Dos device names like C: should also be removed. - See the class, or - - - - - Gets/Sets the size of the uncompressed data. - - - The size or -1 if unknown. - - Setting the size before adding an entry to an archive can help - avoid compatability problems with some archivers which dont understand Zip64 extensions. - - - - Gets/Sets the size of the compressed data. - - - The compressed entry size or -1 if unknown. - - - - - Gets/Sets the crc of the uncompressed data. - - - Crc is not in the range 0..0xffffffffL - - - The crc value or -1 if unknown. - - - - - Gets/Sets the compression method. Only Deflated and Stored are supported. - - - The compression method for this entry - - - - - - - Gets the compression method for outputting to the local or central header. - Returns same value as CompressionMethod except when AES encrypting, which - places 99 in the method and places the real method in the extra data. - - - - - Gets/Sets the extra data. - - - Extra data is longer than 64KB (0xffff) bytes. - - - Extra data or null if not set. - - - - - For AES encrypted files returns or sets the number of bits of encryption (128, 192 or 256). - When setting, only 0 (off), 128 or 256 is supported. - - - - - AES Encryption strength for storage in extra data in entry header. - 1 is 128 bit, 2 is 192 bit, 3 is 256 bit. - - - - - Returns the length of the salt, in bytes - - - - - Number of extra bytes required to hold the AES Header fields (Salt, Pwd verify, AuthCode) - - - - - Process extra data fields updating the entry based on the contents. - - True if the extra data fields should be handled - for a local header, rather than for a central header. - - - - - Gets/Sets the entry comment. - - - If comment is longer than 0xffff. - - - The comment or null if not set. - - - A comment is only available for entries when read via the class. - The class doesnt have the comment data available. - - - - - Gets a value indicating if the entry is a directory. - however. - - - A directory is determined by an entry name with a trailing slash '/'. - The external file attributes can also indicate an entry is for a directory. - Currently only dos/windows attributes are tested in this manner. - The trailing slash convention should always be followed. - - - - - Get a value of true if the entry appears to be a file; false otherwise - - - This only takes account of DOS/Windows attributes. Other operating systems are ignored. - For linux and others the result may be incorrect. - - - - - Test entry to see if data can be extracted. - - Returns true if data can be extracted for this entry; false otherwise. - - - - Creates a copy of this zip entry. - - An that is a copy of the current instance. - - - - Gets a string representation of this ZipEntry. - - A readable textual representation of this - - - - Test a compression method to see if this library - supports extracting data compressed with that method - - The compression method to test. - Returns true if the compression method is supported; false otherwise - - - - Cleans a name making it conform to Zip file conventions. - Devices names ('c:\') and UNC share names ('\\server\share') are removed - and forward slashes ('\') are converted to back slashes ('/'). - Names are made relative by trimming leading slashes which is compatible - with the ZIP naming convention. - - The name to clean - The 'cleaned' name. - - The Zip name transform class is more flexible. - - - - - Basic implementation of - - - - - Defines the possible values to be used for the . - - - - - Use the recorded LastWriteTime value for the file. - - - - - Use the recorded LastWriteTimeUtc value for the file - - - - - Use the recorded CreateTime value for the file. - - - - - Use the recorded CreateTimeUtc value for the file. - - - - - Use the recorded LastAccessTime value for the file. - - - - - Use the recorded LastAccessTimeUtc value for the file. - - - - - Use a fixed value. - - The actual value used can be - specified via the constructor or - using the with the setting set - to which will use the when this class was constructed. - The property can also be used to set this value. - - - - Initialise a new instance of the class. - - A default , and the LastWriteTime for files is used. - - - - Initialise a new instance of using the specified - - The time setting to use when creating Zip entries. - - - - Initialise a new instance of using the specified - - The time to set all values to. - - - - Get / set the to be used when creating new values. - - - Setting this property to null will cause a default name transform to be used. - - - - - Get / set the in use. - - - - - Get / set the value to use when is set to - - - - - A bitmask defining the attributes to be retrieved from the actual file. - - The default is to get all possible attributes from the actual file. - - - - A bitmask defining which attributes are to be set on. - - By default no attributes are set on. - - - - Get set a value indicating wether unidoce text should be set on. - - - - - Make a new for a file. - - The name of the file to create a new entry for. - Returns a new based on the . - - - - Make a new for a file. - - The name of the file to create a new entry for. - If true entry detail is retrieved from the file system if the file exists. - Returns a new based on the . - - - - Make a new from a name. - - The name of the file to create a new entry for. - An alternative name to be used for the new entry. Null if not applicable. - If true entry detail is retrieved from the file system if the file exists. - Returns a new based on the . - - - - Make a new for a directory. - - The raw untransformed name for the new directory - Returns a new representing a directory. - - - - Make a new for a directory. - - The raw untransformed name for the new directory - If true entry detail is retrieved from the file system if the file exists. - Returns a new representing a directory. - - - - ZipException represents exceptions specific to Zip classes and code. - - - - - Initialise a new instance of . - - - - - Initialise a new instance of with its message string. - - A that describes the error. - - - - Initialise a new instance of . - - A that describes the error. - The that caused this exception. - - - - ExtraData tagged value interface. - - - - - Get the ID for this tagged data value. - - - - - Set the contents of this instance from the data passed. - - The data to extract contents from. - The offset to begin extracting data from. - The number of bytes to extract. - - - - Get the data representing this instance. - - Returns the data for this instance. - - - - A raw binary tagged value - - - - - Initialise a new instance. - - The tag ID. - - - - Get the ID for this tagged data value. - - - - - Set the data from the raw values provided. - - The raw data to extract values from. - The index to start extracting values from. - The number of bytes available. - - - - Get the binary data representing this instance. - - The raw binary data representing this instance. - - - - Get /set the binary data representing this instance. - - The raw binary data representing this instance. - - - - The tag ID for this instance. - - - - - Class representing extended unix date time values. - - - - - Flags indicate which values are included in this instance. - - - - - The modification time is included - - - - - The access time is included - - - - - The create time is included. - - - - - Get the ID - - - - - Set the data from the raw values provided. - - The raw data to extract values from. - The index to start extracting values from. - The number of bytes available. - - - - Get the binary data representing this instance. - - The raw binary data representing this instance. - - - - Test a value to see if is valid and can be represented here. - - The value to test. - Returns true if the value is valid and can be represented; false if not. - The standard Unix time is a signed integer data type, directly encoding the Unix time number, - which is the number of seconds since 1970-01-01. - Being 32 bits means the values here cover a range of about 136 years. - The minimum representable time is 1901-12-13 20:45:52, - and the maximum representable time is 2038-01-19 03:14:07. - - - - - Get /set the Modification Time - - - - - - - Get / set the Access Time - - - - - - - Get / Set the Create Time - - - - - - - Get/set the values to include. - - - - - Class handling NT date time values. - - - - - Get the ID for this tagged data value. - - - - - Set the data from the raw values provided. - - The raw data to extract values from. - The index to start extracting values from. - The number of bytes available. - - - - Get the binary data representing this instance. - - The raw binary data representing this instance. - - - - Test a valuie to see if is valid and can be represented here. - - The value to test. - Returns true if the value is valid and can be represented; false if not. - - NTFS filetimes are 64-bit unsigned integers, stored in Intel - (least significant byte first) byte order. They determine the - number of 1.0E-07 seconds (1/10th microseconds!) past WinNT "epoch", - which is "01-Jan-1601 00:00:00 UTC". 28 May 60056 is the upper limit - - - - - Get/set the last modification time. - - - - - Get /set the create time - - - - - Get /set the last access time. - - - - - A factory that creates tagged data instances. - - - - - Get data for a specific tag value. - - The tag ID to find. - The data to search. - The offset to begin extracting data from. - The number of bytes to extract. - The located value found, or null if not found. - - - - - A class to handle the extra data field for Zip entries - - - Extra data contains 0 or more values each prefixed by a header tag and length. - They contain zero or more bytes of actual data. - The data is held internally using a copy on write strategy. This is more efficient but - means that for extra data created by passing in data can have the values modified by the caller - in some circumstances. - - - - - Initialise a default instance. - - - - - Initialise with known extra data. - - The extra data. - - - - Get the raw extra data value - - Returns the raw byte[] extra data this instance represents. - - - - Clear the stored data. - - - - - Gets the current extra data length. - - - - - Get a read-only for the associated tag. - - The tag to locate data for. - Returns a containing tag data or null if no tag was found. - - - - Get the tagged data for a tag. - - The tag to search for. - Returns a tagged value or null if none found. - - - - Get the length of the last value found by - - This is only valid if has previously returned true. - - - - Get the index for the current read value. - - This is only valid if has previously returned true. - Initially the result will be the index of the first byte of actual data. The value is updated after calls to - , and . - - - - Get the number of bytes remaining to be read for the current value; - - - - - Find an extra data value - - The identifier for the value to find. - Returns true if the value was found; false otherwise. - - - - Add a new entry to extra data. - - The value to add. - - - - Add a new entry to extra data - - The ID for this entry. - The data to add. - If the ID already exists its contents are replaced. - - - - Start adding a new entry. - - Add data using , , , or . - The new entry is completed and actually added by calling - - - - - Add entry data added since using the ID passed. - - The identifier to use for this entry. - - - - Add a byte of data to the pending new entry. - - The byte to add. - - - - - Add data to a pending new entry. - - The data to add. - - - - - Add a short value in little endian order to the pending new entry. - - The data to add. - - - - - Add an integer value in little endian order to the pending new entry. - - The data to add. - - - - - Add a long value in little endian order to the pending new entry. - - The data to add. - - - - - Delete an extra data field. - - The identifier of the field to delete. - Returns true if the field was found and deleted. - - - - Read a long in little endian form from the last found data value - - Returns the long value read. - - - - Read an integer in little endian form from the last found data value. - - Returns the integer read. - - - - Read a short value in little endian form from the last found data value. - - Returns the short value read. - - - - Read a byte from an extra data - - The byte value read or -1 if the end of data has been reached. - - - - Skip data during reading. - - The number of bytes to skip. - - - - Internal form of that reads data at any location. - - Returns the short value read. - - - - Dispose of this instance. - - - - - Arguments used with KeysRequiredEvent - - - - - Initialise a new instance of - - The name of the file for which keys are required. - - - - Initialise a new instance of - - The name of the file for which keys are required. - The current key value. - - - - Gets the name of the file for which keys are required. - - - - - Gets or sets the key value - - - - - The strategy to apply to testing. - - - - - Find the first error only. - - - - - Find all possible errors. - - - - - The operation in progress reported by a during testing. - - TestArchive - - - - Setting up testing. - - - - - Testing an individual entries header - - - - - Testing an individual entries data - - - - - Testing an individual entry has completed. - - - - - Running miscellaneous tests - - - - - Testing is complete - - - - - Status returned returned by during testing. - - TestArchive - - - - Initialise a new instance of - - The this status applies to. - - - - Get the current in progress. - - - - - Get the this status is applicable to. - - - - - Get the current/last entry tested. - - - - - Get the number of errors detected so far. - - - - - Get the number of bytes tested so far for the current entry. - - - - - Get a value indicating wether the last entry test was valid. - - - - - Delegate invoked during testing if supplied indicating current progress and status. - - If the message is non-null an error has occured. If the message is null - the operation as found in status has started. - - - - The possible ways of applying updates to an archive. - - - - - Perform all updates on temporary files ensuring that the original file is saved. - - - - - Update the archive directly, which is faster but less safe. - - - - - This class represents a Zip archive. You can ask for the contained - entries, or get an input stream for a file entry. The entry is - automatically decompressed. - - You can also update the archive adding or deleting entries. - - This class is thread safe for input: You can open input streams for arbitrary - entries in different threads. -
-
Author of the original java version : Jochen Hoenicke -
- - - using System; - using System.Text; - using System.Collections; - using System.IO; - - using ICSharpCode.SharpZipLib.Zip; - - class MainClass - { - static public void Main(string[] args) - { - using (ZipFile zFile = new ZipFile(args[0])) { - Console.WriteLine("Listing of : " + zFile.Name); - Console.WriteLine(""); - Console.WriteLine("Raw Size Size Date Time Name"); - Console.WriteLine("-------- -------- -------- ------ ---------"); - foreach (ZipEntry e in zFile) { - if ( e.IsFile ) { - DateTime d = e.DateTime; - Console.WriteLine("{0, -10}{1, -10}{2} {3} {4}", e.Size, e.CompressedSize, - d.ToString("dd-MM-yy"), d.ToString("HH:mm"), - e.Name); - } - } - } - } - } - - -
- - - Delegate for handling keys/password setting during compresion/decompression. - - - - - Event handler for handling encryption keys. - - - - - Handles getting of encryption keys when required. - - The file for which encryption keys are required. - - - - Get/set the encryption key value. - - - - - Password to be used for encrypting/decrypting files. - - Set to null if no password is required. - - - - Get a value indicating wether encryption keys are currently available. - - - - - Opens a Zip file with the given name for reading. - - The name of the file to open. - The argument supplied is null. - - An i/o error occurs - - - The file doesn't contain a valid zip archive. - - - - - Opens a Zip file reading the given . - - The to read archive data from. - The supplied argument is null. - - An i/o error occurs. - - - The file doesn't contain a valid zip archive. - - - - - Opens a Zip file reading the given . - - The to read archive data from. - - An i/o error occurs - - - The stream doesn't contain a valid zip archive.
-
- - The stream doesnt support seeking. - - - The stream argument is null. - -
- - - Initialises a default instance with no entries and no file storage. - - - - - Finalize this instance. - - - - - Closes the ZipFile. If the stream is owned then this also closes the underlying input stream. - Once closed, no further instance methods should be called. - - - An i/o error occurs. - - - - - Create a new whose data will be stored in a file. - - The name of the archive to create. - Returns the newly created - is null - - - - Create a new whose data will be stored on a stream. - - The stream providing data storage. - Returns the newly created - is null - doesnt support writing. - - - - Get/set a flag indicating if the underlying stream is owned by the ZipFile instance. - If the flag is true then the stream will be closed when Close is called. - - - The default value is true in all cases. - - - - - Get a value indicating wether - this archive is embedded in another file or not. - - - - - Get a value indicating that this archive is a new one. - - - - - Gets the comment for the zip file. - - - - - Gets the name of this zip file. - - - - - Gets the number of entries in this zip file. - - - The Zip file has been closed. - - - - - Get the number of entries contained in this . - - - - - Indexer property for ZipEntries - - - - - Gets an enumerator for the Zip entries in this Zip file. - - Returns an for this archive. - - The Zip file has been closed. - - - - - Return the index of the entry with a matching name - - Entry name to find - If true the comparison is case insensitive - The index position of the matching entry or -1 if not found - - The Zip file has been closed. - - - - - Searches for a zip entry in this archive with the given name. - String comparisons are case insensitive - - - The name to find. May contain directory components separated by slashes ('/'). - - - A clone of the zip entry, or null if no entry with that name exists. - - - The Zip file has been closed. - - - - - Gets an input stream for reading the given zip entry data in an uncompressed form. - Normally the should be an entry returned by GetEntry(). - - The to obtain a data for - An input containing data for this - - The ZipFile has already been closed - - - The compression method for the entry is unknown - - - The entry is not found in the ZipFile - - - - - Creates an input stream reading a zip entry - - The index of the entry to obtain an input stream for. - - An input containing data for this - - - The ZipFile has already been closed - - - The compression method for the entry is unknown - - - The entry is not found in the ZipFile - - - - - Test an archive for integrity/validity - - Perform low level data Crc check - true if all tests pass, false otherwise - Testing will terminate on the first error found. - - - - Test an archive for integrity/validity - - Perform low level data Crc check - The to apply. - The handler to call during testing. - true if all tests pass, false otherwise - The object has already been closed. - - - - Test a local header against that provided from the central directory - - - The entry to test against - - The type of tests to carry out. - The offset of the entries data in the file - - - - The kind of update to apply. - - - - - Get / set the to apply to names when updating. - - - - - Get/set the used to generate values - during updates. - - - - - Get /set the buffer size to be used when updating this zip file. - - - - - Get a value indicating an update has been started. - - - - - Get / set a value indicating how Zip64 Extension usage is determined when adding entries. - - - - - Begin updating this archive. - - The archive storage for use during the update. - The data source to utilise during updating. - ZipFile has been closed. - One of the arguments provided is null - ZipFile has been closed. - - - - Begin updating to this archive. - - The storage to use during the update. - - - - Begin updating this archive. - - - - - - - - Commit current updates, updating this archive. - - - - ZipFile has been closed. - - - - Abort updating leaving the archive unchanged. - - - - - - - Set the file comment to be recorded when the current update is commited. - - The comment to record. - ZipFile has been closed. - - - - Add a new entry to the archive. - - The name of the file to add. - The compression method to use. - Ensure Unicode text is used for name and comment for this entry. - Argument supplied is null. - ZipFile has been closed. - Compression method is not supported. - - - - Add a new entry to the archive. - - The name of the file to add. - The compression method to use. - ZipFile has been closed. - The compression method is not supported. - - - - Add a file to the archive. - - The name of the file to add. - Argument supplied is null. - - - - Add a file to the archive. - - The name of the file to add. - The name to use for the on the Zip file created. - Argument supplied is null. - - - - Add a file entry with data. - - The source of the data for this entry. - The name to give to the entry. - - - - Add a file entry with data. - - The source of the data for this entry. - The name to give to the entry. - The compression method to use. - - - - Add a file entry with data. - - The source of the data for this entry. - The name to give to the entry. - The compression method to use. - Ensure Unicode text is used for name and comments for this entry. - - - - Add a that contains no data. - - The entry to add. - This can be used to add directories, volume labels, or empty file entries. - - - - Add a directory entry to the archive. - - The directory to add. - - - - Delete an entry by name - - The filename to delete - True if the entry was found and deleted; false otherwise. - - - - Delete a from the archive. - - The entry to delete. - - - - Write an unsigned short in little endian byte order. - - - - - Write an int in little endian byte order. - - - - - Write an unsigned int in little endian byte order. - - - - - Write a long in little endian byte order. - - - - - Get a raw memory buffer. - - Returns a raw memory buffer. - - - - Get the size of the source descriptor for a . - - The update to get the size for. - The descriptor size, zero if there isnt one. - - - - Get an output stream for the specified - - The entry to get an output stream for. - The output stream obtained for the entry. - - - - Class used to sort updates. - - - - - Compares two objects and returns a value indicating whether one is - less than, equal to or greater than the other. - - First object to compare - Second object to compare. - Compare result. - - - - Represents a pending update to a Zip file. - - - - - Copy an existing entry. - - The existing entry to copy. - - - - Get the for this update. - - This is the source or original entry. - - - - Get the that will be written to the updated/new file. - - - - - Get the command for this update. - - - - - Get the filename if any for this update. Null if none exists. - - - - - Get/set the location of the size patch for this update. - - - - - Get /set the location of the crc patch for this update. - - - - - Get/set the size calculated by offset. - Specifically, the difference between this and next entry's starting offset. - - - - - Releases the unmanaged resources used by the this instance and optionally releases the managed resources. - - true to release both managed and unmanaged resources; - false to release only unmanaged resources. - - - - Read an unsigned short in little endian byte order. - - Returns the value read. - - The stream ends prematurely - - - - - Read a uint in little endian byte order. - - Returns the value read. - - An i/o error occurs. - - - The file ends prematurely - - - - - Search for and read the central directory of a zip file filling the entries array. - - - An i/o error occurs. - - - The central directory is malformed or cannot be found - - - - - Locate the data for a given entry. - - - The start offset of the data. - - - The stream ends prematurely - - - The local header signature is invalid, the entry and central header file name lengths are different - or the local and entry compression methods dont match - - - - - Represents a string from a which is stored as an array of bytes. - - - - - Initialise a with a string. - - The textual string form. - - - - Initialise a using a string in its binary 'raw' form. - - - - - - Get a value indicating the original source of data for this instance. - True if the source was a string; false if the source was binary data. - - - - - Get the length of the comment when represented as raw bytes. - - - - - Get the comment in its 'raw' form as plain bytes. - - - - - Reset the comment to its initial state. - - - - - Implicit conversion of comment to a string. - - The to convert to a string. - The textual equivalent for the input value. - - - - An enumerator for Zip entries - - - - - An is a stream that you can write uncompressed data - to and flush, but cannot read, seek or do anything else to. - - - - - Gets a value indicating whether the current stream supports reading. - - - - - Write any buffered data to underlying storage. - - - - - Gets a value indicating whether the current stream supports writing. - - - - - Gets a value indicating whether the current stream supports seeking. - - - - - Get the length in bytes of the stream. - - - - - Gets or sets the position within the current stream. - - - - - Reads a sequence of bytes from the current stream and advances the position within the stream by the number of bytes read. - - An array of bytes. When this method returns, the buffer contains the specified byte array with the values between offset and (offset + count - 1) replaced by the bytes read from the current source. - The zero-based byte offset in buffer at which to begin storing the data read from the current stream. - The maximum number of bytes to be read from the current stream. - - The total number of bytes read into the buffer. This can be less than the number of bytes requested if that many bytes are not currently available, or zero (0) if the end of the stream has been reached. - - The sum of offset and count is larger than the buffer length. - Methods were called after the stream was closed. - The stream does not support reading. - buffer is null. - An I/O error occurs. - offset or count is negative. - - - - Sets the position within the current stream. - - A byte offset relative to the origin parameter. - A value of type indicating the reference point used to obtain the new position. - - The new position within the current stream. - - An I/O error occurs. - The stream does not support seeking, such as if the stream is constructed from a pipe or console output. - Methods were called after the stream was closed. - - - - Sets the length of the current stream. - - The desired length of the current stream in bytes. - The stream does not support both writing and seeking, such as if the stream is constructed from a pipe or console output. - An I/O error occurs. - Methods were called after the stream was closed. - - - - Writes a sequence of bytes to the current stream and advances the current position within this stream by the number of bytes written. - - An array of bytes. This method copies count bytes from buffer to the current stream. - The zero-based byte offset in buffer at which to begin copying bytes to the current stream. - The number of bytes to be written to the current stream. - An I/O error occurs. - The stream does not support writing. - Methods were called after the stream was closed. - buffer is null. - The sum of offset and count is greater than the buffer length. - offset or count is negative. - - - - A is an - whose data is only a part or subsection of a file. - - - - - Initialise a new instance of the class. - - The containing the underlying stream to use for IO. - The start of the partial data. - The length of the partial data. - - - - Read a byte from this stream. - - Returns the byte read or -1 on end of stream. - - - - Reads a sequence of bytes from the current stream and advances the position within the stream by the number of bytes read. - - An array of bytes. When this method returns, the buffer contains the specified byte array with the values between offset and (offset + count - 1) replaced by the bytes read from the current source. - The zero-based byte offset in buffer at which to begin storing the data read from the current stream. - The maximum number of bytes to be read from the current stream. - - The total number of bytes read into the buffer. This can be less than the number of bytes requested if that many bytes are not currently available, or zero (0) if the end of the stream has been reached. - - The sum of offset and count is larger than the buffer length. - Methods were called after the stream was closed. - The stream does not support reading. - buffer is null. - An I/O error occurs. - offset or count is negative. - - - - Writes a sequence of bytes to the current stream and advances the current position within this stream by the number of bytes written. - - An array of bytes. This method copies count bytes from buffer to the current stream. - The zero-based byte offset in buffer at which to begin copying bytes to the current stream. - The number of bytes to be written to the current stream. - An I/O error occurs. - The stream does not support writing. - Methods were called after the stream was closed. - buffer is null. - The sum of offset and count is greater than the buffer length. - offset or count is negative. - - - - When overridden in a derived class, sets the length of the current stream. - - The desired length of the current stream in bytes. - The stream does not support both writing and seeking, such as if the stream is constructed from a pipe or console output. - An I/O error occurs. - Methods were called after the stream was closed. - - - - When overridden in a derived class, sets the position within the current stream. - - A byte offset relative to the origin parameter. - A value of type indicating the reference point used to obtain the new position. - - The new position within the current stream. - - An I/O error occurs. - The stream does not support seeking, such as if the stream is constructed from a pipe or console output. - Methods were called after the stream was closed. - - - - Clears all buffers for this stream and causes any buffered data to be written to the underlying device. - - An I/O error occurs. - - - - Gets or sets the position within the current stream. - - - The current position within the stream. - An I/O error occurs. - The stream does not support seeking. - Methods were called after the stream was closed. - - - - Gets the length in bytes of the stream. - - - A long value representing the length of the stream in bytes. - A class derived from Stream does not support seeking. - Methods were called after the stream was closed. - - - - Gets a value indicating whether the current stream supports writing. - - false - true if the stream supports writing; otherwise, false. - - - - Gets a value indicating whether the current stream supports seeking. - - true - true if the stream supports seeking; otherwise, false. - - - - Gets a value indicating whether the current stream supports reading. - - true. - true if the stream supports reading; otherwise, false. - - - - Gets a value that determines whether the current stream can time out. - - - A value that determines whether the current stream can time out. - - - - Provides a static way to obtain a source of data for an entry. - - - - - Get a source of data by creating a new stream. - - Returns a to use for compression input. - Ideally a new stream is created and opened to achieve this, to avoid locking problems. - - - - Represents a source of data that can dynamically provide - multiple data sources based on the parameters passed. - - - - - Get a data source. - - The to get a source for. - The name for data if known. - Returns a to use for compression input. - Ideally a new stream is created and opened to achieve this, to avoid locking problems. - - - - Default implementation of a for use with files stored on disk. - - - - - Initialise a new instnace of - - The name of the file to obtain data from. - - - - Get a providing data. - - Returns a provising data. - - - - Default implementation of for files stored on disk. - - - - - Get a providing data for an entry. - - The entry to provide data for. - The file name for data if known. - Returns a stream providing data; or null if not available - - - - Defines facilities for data storage when updating Zip Archives. - - - - - Get the to apply during updates. - - - - - Get an empty that can be used for temporary output. - - Returns a temporary output - - - - - Convert a temporary output stream to a final stream. - - The resulting final - - - - - Make a temporary copy of the original stream. - - The to copy. - Returns a temporary output that is a copy of the input. - - - - Return a stream suitable for performing direct updates on the original source. - - The current stream. - Returns a stream suitable for direct updating. - This may be the current stream passed. - - - - Dispose of this instance. - - - - - An abstract suitable for extension by inheritance. - - - - - Initializes a new instance of the class. - - The update mode. - - - - Gets a temporary output - - Returns the temporary output stream. - - - - - Converts the temporary to its final form. - - Returns a that can be used to read - the final storage for the archive. - - - - - Make a temporary copy of a . - - The to make a copy of. - Returns a temporary output that is a copy of the input. - - - - Return a stream suitable for performing direct updates on the original source. - - The to open for direct update. - Returns a stream suitable for direct updating. - - - - Disposes this instance. - - - - - Gets the update mode applicable. - - The update mode. - - - - An implementation suitable for hard disks. - - - - - Initializes a new instance of the class. - - The file. - The update mode. - - - - Initializes a new instance of the class. - - The file. - - - - Gets a temporary output for performing updates on. - - Returns the temporary output stream. - - - - Converts a temporary to its final form. - - Returns a that can be used to read - the final storage for the archive. - - - - Make a temporary copy of a stream. - - The to copy. - Returns a temporary output that is a copy of the input. - - - - Return a stream suitable for performing direct updates on the original source. - - The current stream. - Returns a stream suitable for direct updating. - If the is not null this is used as is. - - - - Disposes this instance. - - - - - An implementation suitable for in memory streams. - - - - - Initializes a new instance of the class. - - - - - Initializes a new instance of the class. - - The to use - This constructor is for testing as memory streams dont really require safe mode. - - - - Get the stream returned by if this was in fact called. - - - - - Gets the temporary output - - Returns the temporary output stream. - - - - Converts the temporary to its final form. - - Returns a that can be used to read - the final storage for the archive. - - - - Make a temporary copy of the original stream. - - The to copy. - Returns a temporary output that is a copy of the input. - - - - Return a stream suitable for performing direct updates on the original source. - - The original source stream - Returns a stream suitable for direct updating. - If the passed is not null this is used; - otherwise a new is returned. - - - - Disposes this instance. - - - - - Holds data pertinent to a data descriptor. - - - - - Get /set the compressed size of data. - - - - - Get / set the uncompressed size of data - - - - - Get /set the crc value. - - - - - This class assists with writing/reading from Zip files. - - - - - Initialise an instance of this class. - - The name of the file to open. - - - - Initialise a new instance of . - - The stream to use. - - - - Get / set a value indicating wether the the underlying stream is owned or not. - - If the stream is owned it is closed when this instance is closed. - - - - Close the stream. - - - The underlying stream is closed only if is true. - - - - - Locates a block with the desired . - - The signature to find. - Location, marking the end of block. - Minimum size of the block. - The maximum variable data. - Eeturns the offset of the first byte after the signature; -1 if not found - - - - Write Zip64 end of central directory records (File header and locator). - - The number of entries in the central directory. - The size of entries in the central directory. - The offset of the dentral directory. - - - - Write the required records to end the central directory. - - The number of entries in the directory. - The size of the entries in the directory. - The start of the central directory. - The archive comment. (This can be null). - - - - Read an unsigned short in little endian byte order. - - Returns the value read. - - An i/o error occurs. - - - The file ends prematurely - - - - - Read an int in little endian byte order. - - Returns the value read. - - An i/o error occurs. - - - The file ends prematurely - - - - - Read a long in little endian byte order. - - The value read. - - - - Write an unsigned short in little endian byte order. - - The value to write. - - - - Write a ushort in little endian byte order. - - The value to write. - - - - Write an int in little endian byte order. - - The value to write. - - - - Write a uint in little endian byte order. - - The value to write. - - - - Write a long in little endian byte order. - - The value to write. - - - - Write a ulong in little endian byte order. - - The value to write. - - - - Write a data descriptor. - - The entry to write a descriptor for. - Returns the number of descriptor bytes written. - - - - Read data descriptor at the end of compressed data. - - if set to true [zip64]. - The data to fill in. - Returns the number of bytes read in the descriptor. - - - - This is an InflaterInputStream that reads the files baseInputStream an zip archive - one after another. It has a special method to get the zip entry of - the next file. The zip entry contains information about the file name - size, compressed size, Crc, etc. - It includes support for Stored and Deflated entries. -
-
Author of the original java version : Jochen Hoenicke -
- - This sample shows how to read a zip file - - using System; - using System.Text; - using System.IO; - - using ICSharpCode.SharpZipLib.Zip; - - class MainClass - { - public static void Main(string[] args) - { - using ( ZipInputStream s = new ZipInputStream(File.OpenRead(args[0]))) { - - ZipEntry theEntry; - const int size = 2048; - byte[] data = new byte[2048]; - - while ((theEntry = s.GetNextEntry()) != null) { - if ( entry.IsFile ) { - Console.Write("Show contents (y/n) ?"); - if (Console.ReadLine() == "y") { - while (true) { - size = s.Read(data, 0, data.Length); - if (size > 0) { - Console.Write(new ASCIIEncoding().GetString(data, 0, size)); - } else { - break; - } - } - } - } - } - } - } - } - - -
- - - Delegate for reading bytes from a stream. - - - - - The current reader this instance. - - - - - Creates a new Zip input stream, for reading a zip archive. - - The underlying providing data. - - - - Creates a new Zip input stream, for reading a zip archive. - - The underlying providing data. - Size of the buffer. - - - - Optional password used for encryption when non-null - - A password for all encrypted entries in this - - - - Gets a value indicating if there is a current entry and it can be decompressed - - - The entry can only be decompressed if the library supports the zip features required to extract it. - See the ZipEntry Version property for more details. - - - - - Advances to the next entry in the archive - - - The next entry in the archive or null if there are no more entries. - - - If the previous entry is still open CloseEntry is called. - - - Input stream is closed - - - Password is not set, password is invalid, compression method is invalid, - version required to extract is not supported - - - - - Read data descriptor at the end of compressed data. - - - - - Complete cleanup as the final part of closing. - - True if the crc value should be tested - - - - Closes the current zip entry and moves to the next one. - - - The stream is closed - - - The Zip stream ends early - - - - - Returns 1 if there is an entry available - Otherwise returns 0. - - - - - Returns the current size that can be read from the current entry if available - - Thrown if the entry size is not known. - Thrown if no entry is currently available. - - - - Reads a byte from the current zip entry. - - - The byte or -1 if end of stream is reached. - - - - - Handle attempts to read by throwing an . - - The destination array to store data in. - The offset at which data read should be stored. - The maximum number of bytes to read. - Returns the number of bytes actually read. - - - - Handle attempts to read from this entry by throwing an exception - - - - - Perform the initial read on an entry which may include - reading encryption headers and setting up inflation. - - The destination to fill with data read. - The offset to start reading at. - The maximum number of bytes to read. - The actual number of bytes read. - - - - Read a block of bytes from the stream. - - The destination for the bytes. - The index to start storing data. - The number of bytes to attempt to read. - Returns the number of bytes read. - Zero bytes read means end of stream. - - - - Reads a block of bytes from the current zip entry. - - - The number of bytes read (this may be less than the length requested, even before the end of stream), or 0 on end of stream. - - - An i/o error occured. - - - The deflated stream is corrupted. - - - The stream is not open. - - - - - Closes the zip input stream - - - - - ZipNameTransform transforms names as per the Zip file naming convention. - - The use of absolute names is supported although its use is not valid - according to Zip naming conventions, and should not be used if maximum compatability is desired. - - - - Initialize a new instance of - - - - - Initialize a new instance of - - The string to trim from the front of paths if found. - - - - Static constructor. - - - - - Transform a windows directory name according to the Zip file naming conventions. - - The directory name to transform. - The transformed name. - - - - Transform a windows file name according to the Zip file naming conventions. - - The file name to transform. - The transformed name. - - - - Get/set the path prefix to be trimmed from paths if present. - - The prefix is trimmed before any conversion from - a windows path is done. - - - - Force a name to be valid by replacing invalid characters with a fixed value - - The name to force valid - The replacement character to use. - Returns a valid name - - - - Test a name to see if it is a valid name for a zip entry. - - The name to test. - If true checking is relaxed about windows file names and absolute paths. - Returns true if the name is a valid zip name; false otherwise. - Zip path names are actually in Unix format, and should only contain relative paths. - This means that any path stored should not contain a drive or - device letter, or a leading slash. All slashes should forward slashes '/'. - An empty name is valid for a file where the input comes from standard input. - A null name is not considered valid. - - - - - Test a name to see if it is a valid name for a zip entry. - - The name to test. - Returns true if the name is a valid zip name; false otherwise. - Zip path names are actually in unix format, - and should only contain relative paths if a path is present. - This means that the path stored should not contain a drive or - device letter, or a leading slash. All slashes should forward slashes '/'. - An empty name is valid where the input comes from standard input. - A null name is not considered valid. - - - - - This is a DeflaterOutputStream that writes the files into a zip - archive one after another. It has a special method to start a new - zip entry. The zip entries contains information about the file name - size, compressed size, CRC, etc. - - It includes support for Stored and Deflated entries. - This class is not thread safe. -
-
Author of the original java version : Jochen Hoenicke -
- This sample shows how to create a zip file - - using System; - using System.IO; - - using ICSharpCode.SharpZipLib.Core; - using ICSharpCode.SharpZipLib.Zip; - - class MainClass - { - public static void Main(string[] args) - { - string[] filenames = Directory.GetFiles(args[0]); - byte[] buffer = new byte[4096]; - - using ( ZipOutputStream s = new ZipOutputStream(File.Create(args[1])) ) { - - s.SetLevel(9); // 0 - store only to 9 - means best compression - - foreach (string file in filenames) { - ZipEntry entry = new ZipEntry(file); - s.PutNextEntry(entry); - - using (FileStream fs = File.OpenRead(file)) { - StreamUtils.Copy(fs, s, buffer); - } - } - } - } - } - - -
- - - Creates a new Zip output stream, writing a zip archive. - - - The output stream to which the archive contents are written. - - - - - Creates a new Zip output stream, writing a zip archive. - - The output stream to which the archive contents are written. - Size of the buffer to use. - - - - Gets a flag value of true if the central header has been added for this archive; false if it has not been added. - - No further entries can be added once this has been done. - - - - Set the zip file comment. - - - The comment text for the entire archive. - - - The converted comment is longer than 0xffff bytes. - - - - - Sets the compression level. The new level will be activated - immediately. - - The new compression level (1 to 9). - - Level specified is not supported. - - - - - - Get the current deflater compression level - - The current compression level - - - - Get / set a value indicating how Zip64 Extension usage is determined when adding entries. - - Older archivers may not understand Zip64 extensions. - If backwards compatability is an issue be careful when adding entries to an archive. - Setting this property to off is workable but less desirable as in those circumstances adding a file - larger then 4GB will fail. - - - - Write an unsigned short in little endian byte order. - - - - - Write an int in little endian byte order. - - - - - Write an int in little endian byte order. - - - - - Starts a new Zip entry. It automatically closes the previous - entry if present. - All entry elements bar name are optional, but must be correct if present. - If the compression method is stored and the output is not patchable - the compression for that entry is automatically changed to deflate level 0 - - - the entry. - - - if entry passed is null. - - - if an I/O error occured. - - - if stream was finished - - - Too many entries in the Zip file
- Entry name is too long
- Finish has already been called
-
-
- - - Closes the current entry, updating header and footer information as required - - - An I/O error occurs. - - - No entry is active. - - - - - Writes the given buffer to the current entry. - - The buffer containing data to write. - The offset of the first byte to write. - The number of bytes to write. - Archive size is invalid - No entry is active. - - - - Finishes the stream. This will write the central directory at the - end of the zip file and flush the stream. - - - This is automatically called when the stream is closed. - - - An I/O error occurs. - - - Comment exceeds the maximum length
- Entry name exceeds the maximum length -
-
- - - The entries for the archive. - - - - - Used to track the crc of data added to entries. - - - - - The current entry being added. - - - - - Used to track the size of data for an entry during writing. - - - - - Offset to be recorded for each entry in the central header. - - - - - Comment for the entire archive recorded in central header. - - - - - Flag indicating that header patching is required for the current entry. - - - - - Position to patch crc - - - - - Position to patch size. - - - - - This static class contains functions for encoding and decoding zip file strings - - - - Code page backing field - - The original Zip specification (https://pkware.cachefly.net/webdocs/casestudies/APPNOTE.TXT) states - that file names should only be encoded with IBM Code Page 437 or UTF-8. - In practice, most zip apps use OEM or system encoding (typically cp437 on Windows). - Let's be good citizens and default to UTF-8 http://utf8everywhere.org/ - - - - Automatically select codepage while opening archive - see https://github.com/icsharpcode/SharpZipLib/pull/280#issuecomment-433608324 - - - - - Encoding used for string conversion. Setting this to 65001 (UTF-8) will - also set the Language encoding flag to indicate UTF-8 encoded file names. - - - - - Attempt to get the operating system default codepage, or failing that, to - the fallback code page IBM 437. - - - - - Get wether the default codepage is set to UTF-8. Setting this property to false will - set the to - - - /// Get OEM codepage from NetFX, which parses the NLP file with culture info table etc etc. - But sometimes it yields the special value of 1 which is nicknamed CodePageNoOEM in sources (might also mean CP_OEMCP, but Encoding puts it so). - This was observed on Ukranian and Hindu systems. - Given this value, throws an . - So replace it with , (IBM 437 which is the default code page in a default Windows installation console. - - - - - Convert a portion of a byte array to a string using - - - Data to convert to string - - - Number of bytes to convert starting from index 0 - - - data[0]..data[count - 1] converted to a string - - - - - Convert a byte array to a string using - - - Byte array to convert - - - dataconverted to a string - - - - - Convert a byte array to a string using - - The applicable general purpose bits flags - - Byte array to convert - - The number of bytes to convert. - - dataconverted to a string - - - - - Convert a byte array to a string using - - - Byte array to convert - - The applicable general purpose bits flags - - dataconverted to a string - - - - - Convert a string to a byte array using - - - String to convert to an array - - Converted array - - - - Convert a string to a byte array using - - The applicable general purpose bits flags - - String to convert to an array - - Converted array - -
-
diff --git a/packages/SharpZipLib.1.1.0/lib/netstandard2.0/ICSharpCode.SharpZipLib.dll b/packages/SharpZipLib.1.1.0/lib/netstandard2.0/ICSharpCode.SharpZipLib.dll deleted file mode 100644 index f8eb57dd..00000000 Binary files a/packages/SharpZipLib.1.1.0/lib/netstandard2.0/ICSharpCode.SharpZipLib.dll and /dev/null differ diff --git a/packages/SharpZipLib.1.1.0/lib/netstandard2.0/ICSharpCode.SharpZipLib.pdb b/packages/SharpZipLib.1.1.0/lib/netstandard2.0/ICSharpCode.SharpZipLib.pdb deleted file mode 100644 index 7410c39b..00000000 Binary files a/packages/SharpZipLib.1.1.0/lib/netstandard2.0/ICSharpCode.SharpZipLib.pdb and /dev/null differ diff --git a/packages/SharpZipLib.1.1.0/lib/netstandard2.0/ICSharpCode.SharpZipLib.xml b/packages/SharpZipLib.1.1.0/lib/netstandard2.0/ICSharpCode.SharpZipLib.xml deleted file mode 100644 index b206f175..00000000 --- a/packages/SharpZipLib.1.1.0/lib/netstandard2.0/ICSharpCode.SharpZipLib.xml +++ /dev/null @@ -1,10121 +0,0 @@ - - - - ICSharpCode.SharpZipLib - - - - - An example class to demonstrate compression and decompression of BZip2 streams. - - - - - Decompress the input writing - uncompressed data to the output stream - - The readable stream containing data to decompress. - The output stream to receive the decompressed data. - Both streams are closed on completion if true. - - - - Compress the input stream sending - result data to output stream - - The readable stream to compress. - The output stream to receive the compressed data. - Both streams are closed on completion if true. - Block size acts as compression level (1 to 9) with 1 giving - the lowest compression and 9 the highest. - - - - Defines internal values for both compression and decompression - - - - - Random numbers used to randomise repetitive blocks - - - - - When multiplied by compression parameter (1-9) gives the block size for compression - 9 gives the best compression but uses the most memory. - - - - - Backend constant - - - - - Backend constant - - - - - Backend constant - - - - - Backend constant - - - - - Backend constant - - - - - Backend constant - - - - - Backend constant - - - - - Backend constant - - - - - Backend constant - - - - - BZip2Exception represents exceptions specific to BZip2 classes and code. - - - - - Initialise a new instance of . - - - - - Initialise a new instance of with its message string. - - A that describes the error. - - - - Initialise a new instance of . - - A that describes the error. - The that caused this exception. - - - - An input stream that decompresses files in the BZip2 format - - - - - Construct instance for reading from stream - - Data source - - - - Get/set flag indicating ownership of underlying stream. - When the flag is true will close the underlying stream also. - - - - - Gets a value indicating if the stream supports reading - - - - - Gets a value indicating whether the current stream supports seeking. - - - - - Gets a value indicating whether the current stream supports writing. - This property always returns false - - - - - Gets the length in bytes of the stream. - - - - - Gets the current position of the stream. - Setting the position is not supported and will throw a NotSupportException. - - Any attempt to set the position. - - - - Flushes the stream. - - - - - Set the streams position. This operation is not supported and will throw a NotSupportedException - - A byte offset relative to the parameter. - A value of type indicating the reference point used to obtain the new position. - The new position of the stream. - Any access - - - - Sets the length of this stream to the given value. - This operation is not supported and will throw a NotSupportedExceptionortedException - - The new length for the stream. - Any access - - - - Writes a block of bytes to this stream using data from a buffer. - This operation is not supported and will throw a NotSupportedException - - The buffer to source data from. - The offset to start obtaining data from. - The number of bytes of data to write. - Any access - - - - Writes a byte to the current position in the file stream. - This operation is not supported and will throw a NotSupportedException - - The value to write. - Any access - - - - Read a sequence of bytes and advances the read position by one byte. - - Array of bytes to store values in - Offset in array to begin storing data - The maximum number of bytes to read - The total number of bytes read into the buffer. This might be less - than the number of bytes requested if that number of bytes are not - currently available or zero if the end of the stream is reached. - - - - - Closes the stream, releasing any associated resources. - - - - - Read a byte from stream advancing position - - byte read or -1 on end of stream - - - - An output stream that compresses into the BZip2 format - including file header chars into another stream. - - - - - Construct a default output stream with maximum block size - - The stream to write BZip data onto. - - - - Initialise a new instance of the - for the specified stream, using the given blocksize. - - The stream to write compressed data to. - The block size to use. - - Valid block sizes are in the range 1..9, with 1 giving - the lowest compression and 9 the highest. - - - - - Ensures that resources are freed and other cleanup operations - are performed when the garbage collector reclaims the BZip2OutputStream. - - - - - Gets or sets a flag indicating ownership of underlying stream. - When the flag is true will close the underlying stream also. - - The default value is true. - - - - Gets a value indicating whether the current stream supports reading - - - - - Gets a value indicating whether the current stream supports seeking - - - - - Gets a value indicating whether the current stream supports writing - - - - - Gets the length in bytes of the stream - - - - - Gets or sets the current position of this stream. - - - - - Sets the current position of this stream to the given value. - - The point relative to the offset from which to being seeking. - The reference point from which to begin seeking. - The new position in the stream. - - - - Sets the length of this stream to the given value. - - The new stream length. - - - - Read a byte from the stream advancing the position. - - The byte read cast to an int; -1 if end of stream. - - - - Read a block of bytes - - The buffer to read into. - The offset in the buffer to start storing data at. - The maximum number of bytes to read. - The total number of bytes read. This might be less than the number of bytes - requested if that number of bytes are not currently available, or zero - if the end of the stream is reached. - - - - Write a block of bytes to the stream - - The buffer containing data to write. - The offset of the first byte to write. - The number of bytes to write. - - - - Write a byte to the stream. - - The byte to write to the stream. - - - - Get the number of bytes written to output. - - - - - Get the number of bytes written to the output. - - - - - Releases the unmanaged resources used by the and optionally releases the managed resources. - - true to release both managed and unmanaged resources; false to release only unmanaged resources. - - - - Flush output buffers - - - - - Computes Adler32 checksum for a stream of data. An Adler32 - checksum is not as reliable as a CRC32 checksum, but a lot faster to - compute. - - The specification for Adler32 may be found in RFC 1950. - ZLIB Compressed Data Format Specification version 3.3) - - - From that document: - - "ADLER32 (Adler-32 checksum) - This contains a checksum value of the uncompressed data - (excluding any dictionary data) computed according to Adler-32 - algorithm. This algorithm is a 32-bit extension and improvement - of the Fletcher algorithm, used in the ITU-T X.224 / ISO 8073 - standard. - - Adler-32 is composed of two sums accumulated per byte: s1 is - the sum of all bytes, s2 is the sum of all s1 values. Both sums - are done modulo 65521. s1 is initialized to 1, s2 to zero. The - Adler-32 checksum is stored as s2*65536 + s1 in most- - significant-byte first (network) order." - - "8.2. The Adler-32 algorithm - - The Adler-32 algorithm is much faster than the CRC32 algorithm yet - still provides an extremely low probability of undetected errors. - - The modulo on unsigned long accumulators can be delayed for 5552 - bytes, so the modulo operation time is negligible. If the bytes - are a, b, c, the second sum is 3a + 2b + c + 3, and so is position - and order sensitive, unlike the first sum, which is just a - checksum. That 65521 is prime is important to avoid a possible - large class of two-byte errors that leave the check unchanged. - (The Fletcher checksum uses 255, which is not prime and which also - makes the Fletcher check insensitive to single byte changes 0 - - 255.) - - The sum s1 is initialized to 1 instead of zero to make the length - of the sequence part of s2, so that the length does not have to be - checked separately. (Any sequence of zeroes has a Fletcher - checksum of zero.)" - - - - - - - largest prime smaller than 65536 - - - - - The CRC data checksum so far. - - - - - Initialise a default instance of - - - - - Resets the Adler32 data checksum as if no update was ever called. - - - - - Returns the Adler32 data checksum computed so far. - - - - - Updates the checksum with the byte b. - - - The data value to add. The high byte of the int is ignored. - - - - - Updates the Adler32 data checksum with the bytes taken from - a block of data. - - Contains the data to update the checksum with. - - - - Update Adler32 data checksum based on a portion of a block of data - - - The chunk of data to add - - - - - CRC-32 with unreversed data and reversed output - - - Generate a table for a byte-wise 32-bit CRC calculation on the polynomial: - x^32+x^26+x^23+x^22+x^16+x^12+x^11+x^10+x^8+x^7+x^5+x^4+x^2+x^1+x^0. - - Polynomials over GF(2) are represented in binary, one bit per coefficient, - with the lowest powers in the most significant bit. Then adding polynomials - is just exclusive-or, and multiplying a polynomial by x is a right shift by - one. If we call the above polynomial p, and represent a byte as the - polynomial q, also with the lowest power in the most significant bit (so the - byte 0xb1 is the polynomial x^7+x^3+x+1), then the CRC is (q*x^32) mod p, - where a mod b means the remainder after dividing a by b. - - This calculation is done using the shift-register method of multiplying and - taking the remainder. The register is initialized to zero, and for each - incoming bit, x^32 is added mod p to the register if the bit is a one (where - x^32 mod p is p+x^32 = x^26+...+1), and the register is multiplied mod p by - x (which is shifting right by one and adding x^32 mod p if the bit shifted - out is a one). We start with the highest power (least significant bit) of - q and repeat for all eight bits of q. - - The table is simply the CRC of all possible eight bit values. This is all - the information needed to generate CRC's on data a byte at a time for all - combinations of CRC register values and incoming bytes. - - - - - The CRC data checksum so far. - - - - - Initialise a default instance of - - - - - Resets the CRC data checksum as if no update was ever called. - - - - - Returns the CRC data checksum computed so far. - - Reversed Out = true - - - - Updates the checksum with the int bval. - - - the byte is taken as the lower 8 bits of bval - - Reversed Data = false - - - - Updates the CRC data checksum with the bytes taken from - a block of data. - - Contains the data to update the CRC with. - - - - Update CRC data checksum based on a portion of a block of data - - - The chunk of data to add - - - - - CRC-32 with reversed data and unreversed output - - - Generate a table for a byte-wise 32-bit CRC calculation on the polynomial: - x^32+x^26+x^23+x^22+x^16+x^12+x^11+x^10+x^8+x^7+x^5+x^4+x^2+x^1+x^0. - - Polynomials over GF(2) are represented in binary, one bit per coefficient, - with the lowest powers in the most significant bit. Then adding polynomials - is just exclusive-or, and multiplying a polynomial by x is a right shift by - one. If we call the above polynomial p, and represent a byte as the - polynomial q, also with the lowest power in the most significant bit (so the - byte 0xb1 is the polynomial x^7+x^3+x+1), then the CRC is (q*x^32) mod p, - where a mod b means the remainder after dividing a by b. - - This calculation is done using the shift-register method of multiplying and - taking the remainder. The register is initialized to zero, and for each - incoming bit, x^32 is added mod p to the register if the bit is a one (where - x^32 mod p is p+x^32 = x^26+...+1), and the register is multiplied mod p by - x (which is shifting right by one and adding x^32 mod p if the bit shifted - out is a one). We start with the highest power (least significant bit) of - q and repeat for all eight bits of q. - - The table is simply the CRC of all possible eight bit values. This is all - the information needed to generate CRC's on data a byte at a time for all - combinations of CRC register values and incoming bytes. - - - - - The CRC data checksum so far. - - - - - Initialise a default instance of - - - - - Resets the CRC data checksum as if no update was ever called. - - - - - Returns the CRC data checksum computed so far. - - Reversed Out = false - - - - Updates the checksum with the int bval. - - - the byte is taken as the lower 8 bits of bval - - Reversed Data = true - - - - Updates the CRC data checksum with the bytes taken from - a block of data. - - Contains the data to update the CRC with. - - - - Update CRC data checksum based on a portion of a block of data - - - The chunk of data to add - - - - - Interface to compute a data checksum used by checked input/output streams. - A data checksum can be updated by one byte or with a byte array. After each - update the value of the current checksum can be returned by calling - getValue. The complete checksum object can also be reset - so it can be used again with new data. - - - - - Resets the data checksum as if no update was ever called. - - - - - Returns the data checksum computed so far. - - - - - Adds one byte to the data checksum. - - - the data value to add. The high byte of the int is ignored. - - - - - Updates the data checksum with the bytes taken from the array. - - - buffer an array of bytes - - - - - Adds the byte array to the data checksum. - - - The chunk of data to add - - - - - SharpZipBaseException is the base exception class for SharpZipLib. - All library exceptions are derived from this. - - NOTE: Not all exceptions thrown will be derived from this class. - A variety of other exceptions are possible for example - - - - Initializes a new instance of the SharpZipBaseException class. - - - - - Initializes a new instance of the SharpZipBaseException class with a specified error message. - - A message describing the exception. - - - - Initializes a new instance of the SharpZipBaseException class with a specified - error message and a reference to the inner exception that is the cause of this exception. - - A message describing the exception. - The inner exception - - - - Indicates that an error occured during decoding of a input stream due to corrupt - data or (unintentional) library incompability. - - - - - Initializes a new instance of the StreamDecodingException with a generic message - - - - - Initializes a new instance of the StreamDecodingException class with a specified error message. - - A message describing the exception. - - - - Initializes a new instance of the StreamDecodingException class with a specified - error message and a reference to the inner exception that is the cause of this exception. - - A message describing the exception. - The inner exception - - - - Indicates that the input stream could not decoded due to known library incompability or missing features - - - - - Initializes a new instance of the StreamUnsupportedException with a generic message - - - - - Initializes a new instance of the StreamUnsupportedException class with a specified error message. - - A message describing the exception. - - - - Initializes a new instance of the StreamUnsupportedException class with a specified - error message and a reference to the inner exception that is the cause of this exception. - - A message describing the exception. - The inner exception - - - - Indicates that the input stream could not decoded due to the stream ending before enough data had been provided - - - - - Initializes a new instance of the UnexpectedEndOfStreamException with a generic message - - - - - Initializes a new instance of the UnexpectedEndOfStreamException class with a specified error message. - - A message describing the exception. - - - - Initializes a new instance of the UnexpectedEndOfStreamException class with a specified - error message and a reference to the inner exception that is the cause of this exception. - - A message describing the exception. - The inner exception - - - - Indicates that a value was outside of the expected range when decoding an input stream - - - - - Initializes a new instance of the ValueOutOfRangeException class naming the the causing variable - - Name of the variable, use: nameof() - - - - Initializes a new instance of the ValueOutOfRangeException class naming the the causing variable, - it's current value and expected range. - - Name of the variable, use: nameof() - The invalid value - Expected maximum value - Expected minimum value - - - - Initializes a new instance of the ValueOutOfRangeException class naming the the causing variable, - it's current value and expected range. - - Name of the variable, use: nameof() - The invalid value - Expected maximum value - Expected minimum value - - - - Event arguments for scanning. - - - - - Initialise a new instance of - - The file or directory name. - - - - The file or directory name for this event. - - - - - Get set a value indicating if scanning should continue or not. - - - - - Event arguments during processing of a single file or directory. - - - - - Initialise a new instance of - - The file or directory name if known. - The number of bytes processed so far - The total number of bytes to process, 0 if not known - - - - The name for this event if known. - - - - - Get set a value indicating wether scanning should continue or not. - - - - - Get a percentage representing how much of the has been processed - - 0.0 to 100.0 percent; 0 if target is not known. - - - - The number of bytes processed so far - - - - - The number of bytes to process. - - Target may be 0 or negative if the value isnt known. - - - - Event arguments for directories. - - - - - Initialize an instance of . - - The name for this directory. - Flag value indicating if any matching files are contained in this directory. - - - - Get a value indicating if the directory contains any matching files or not. - - - - - Arguments passed when scan failures are detected. - - - - - Initialise a new instance of - - The name to apply. - The exception to use. - - - - The applicable name. - - - - - The applicable exception. - - - - - Get / set a value indicating wether scanning should continue. - - - - - Delegate invoked before starting to process a file. - - The source of the event - The event arguments. - - - - Delegate invoked during processing of a file or directory - - The source of the event - The event arguments. - - - - Delegate invoked when a file has been completely processed. - - The source of the event - The event arguments. - - - - Delegate invoked when a directory failure is detected. - - The source of the event - The event arguments. - - - - Delegate invoked when a file failure is detected. - - The source of the event - The event arguments. - - - - FileSystemScanner provides facilities scanning of files and directories. - - - - - Initialise a new instance of - - The file filter to apply when scanning. - - - - Initialise a new instance of - - The file filter to apply. - The directory filter to apply. - - - - Initialise a new instance of - - The file filter to apply. - - - - Initialise a new instance of - - The file filter to apply. - The directory filter to apply. - - - - Delegate to invoke when a directory is processed. - - - - - Delegate to invoke when a file is processed. - - - - - Delegate to invoke when processing for a file has finished. - - - - - Delegate to invoke when a directory failure is detected. - - - - - Delegate to invoke when a file failure is detected. - - - - - Raise the DirectoryFailure event. - - The directory name. - The exception detected. - - - - Raise the FileFailure event. - - The file name. - The exception detected. - - - - Raise the ProcessFile event. - - The file name. - - - - Raise the complete file event - - The file name - - - - Raise the ProcessDirectory event. - - The directory name. - Flag indicating if the directory has matching files. - - - - Scan a directory. - - The base directory to scan. - True to recurse subdirectories, false to scan a single directory. - - - - The file filter currently in use. - - - - - The directory filter currently in use. - - - - - Flag indicating if scanning should continue running. - - - - - INameTransform defines how file system names are transformed for use with archives, or vice versa. - - - - - Given a file name determine the transformed value. - - The name to transform. - The transformed file name. - - - - Given a directory name determine the transformed value. - - The name to transform. - The transformed directory name - - - - InvalidNameException is thrown for invalid names such as directory traversal paths and names with invalid characters - - - - - Initializes a new instance of the InvalidNameException class with a default error message. - - - - - Initializes a new instance of the InvalidNameException class with a specified error message. - - A message describing the exception. - - - - Initializes a new instance of the InvalidNameException class with a specified - error message and a reference to the inner exception that is the cause of this exception. - - A message describing the exception. - The inner exception - - - - Scanning filters support filtering of names. - - - - - Test a name to see if it 'matches' the filter. - - The name to test. - Returns true if the name matches the filter, false if it does not match. - - - - NameFilter is a string matching class which allows for both positive and negative - matching. - A filter is a sequence of independant regular expressions separated by semi-colons ';'. - To include a semi-colon it may be quoted as in \;. Each expression can be prefixed by a plus '+' sign or - a minus '-' sign to denote the expression is intended to include or exclude names. - If neither a plus or minus sign is found include is the default. - A given name is tested for inclusion before checking exclusions. Only names matching an include spec - and not matching an exclude spec are deemed to match the filter. - An empty filter matches any name. - - The following expression includes all name ending in '.dat' with the exception of 'dummy.dat' - "+\.dat$;-^dummy\.dat$" - - - - - Construct an instance based on the filter expression passed - - The filter expression. - - - - Test a string to see if it is a valid regular expression. - - The expression to test. - True if expression is a valid false otherwise. - - - - Test an expression to see if it is valid as a filter. - - The filter expression to test. - True if the expression is valid, false otherwise. - - - - Split a string into its component pieces - - The original string - Returns an array of values containing the individual filter elements. - - - - Convert this filter to its string equivalent. - - The string equivalent for this filter. - - - - Test a value to see if it is included by the filter. - - The value to test. - True if the value is included, false otherwise. - - - - Test a value to see if it is excluded by the filter. - - The value to test. - True if the value is excluded, false otherwise. - - - - Test a value to see if it matches the filter. - - The value to test. - True if the value matches, false otherwise. - - - - Compile this filter. - - - - - PathFilter filters directories and files using a form of regular expressions - by full path name. - See NameFilter for more detail on filtering. - - - - - Initialise a new instance of . - - The filter expression to apply. - - - - Test a name to see if it matches the filter. - - The name to test. - True if the name matches, false otherwise. - is used to get the full path before matching. - - - - ExtendedPathFilter filters based on name, file size, and the last write time of the file. - - Provides an example of how to customise filtering. - - - - Initialise a new instance of ExtendedPathFilter. - - The filter to apply. - The minimum file size to include. - The maximum file size to include. - - - - Initialise a new instance of ExtendedPathFilter. - - The filter to apply. - The minimum to include. - The maximum to include. - - - - Initialise a new instance of ExtendedPathFilter. - - The filter to apply. - The minimum file size to include. - The maximum file size to include. - The minimum to include. - The maximum to include. - - - - Test a filename to see if it matches the filter. - - The filename to test. - True if the filter matches, false otherwise. - The doesnt exist - - - - Get/set the minimum size/length for a file that will match this filter. - - The default value is zero. - value is less than zero; greater than - - - - Get/set the maximum size/length for a file that will match this filter. - - The default value is - value is less than zero or less than - - - - Get/set the minimum value that will match for this filter. - - Files with a LastWrite time less than this value are excluded by the filter. - - - - Get/set the maximum value that will match for this filter. - - Files with a LastWrite time greater than this value are excluded by the filter. - - - - NameAndSizeFilter filters based on name and file size. - - A sample showing how filters might be extended. - - - - Initialise a new instance of NameAndSizeFilter. - - The filter to apply. - The minimum file size to include. - The maximum file size to include. - - - - Test a filename to see if it matches the filter. - - The filename to test. - True if the filter matches, false otherwise. - - - - Get/set the minimum size for a file that will match this filter. - - - - - Get/set the maximum size for a file that will match this filter. - - - - - Provides simple " utilities. - - - - - Read from a ensuring all the required data is read. - - The stream to read. - The buffer to fill. - - - - - Read from a " ensuring all the required data is read. - - The stream to read data from. - The buffer to store data in. - The offset at which to begin storing data. - The number of bytes of data to store. - Required parameter is null - and or are invalid. - End of stream is encountered before all the data has been read. - - - - Copy the contents of one to another. - - The stream to source data from. - The stream to write data to. - The buffer to use during copying. - - - - Copy the contents of one to another. - - The stream to source data from. - The stream to write data to. - The buffer to use during copying. - The progress handler delegate to use. - The minimum between progress updates. - The source for this event. - The name to use with the event. - This form is specialised for use within #Zip to support events during archive operations. - - - - Copy the contents of one to another. - - The stream to source data from. - The stream to write data to. - The buffer to use during copying. - The progress handler delegate to use. - The minimum between progress updates. - The source for this event. - The name to use with the event. - A predetermined fixed target value to use with progress updates. - If the value is negative the target is calculated by looking at the stream. - This form is specialised for use within #Zip to support events during archive operations. - - - - Initialise an instance of - - - - - WindowsPathUtils provides simple utilities for handling windows paths. - - - - - Initializes a new instance of the class. - - - - - Remove any path root present in the path - - A containing path information. - The path with the root removed if it was present; path otherwise. - Unlike the class the path isnt otherwise checked for validity. - - - - PkzipClassic embodies the classic or original encryption facilities used in Pkzip archives. - While it has been superceded by more recent and more powerful algorithms, its still in use and - is viable for preventing casual snooping - - - - - Generates new encryption keys based on given seed - - The seed value to initialise keys with. - A new key value. - - - - PkzipClassicCryptoBase provides the low level facilities for encryption - and decryption using the PkzipClassic algorithm. - - - - - Transform a single byte - - - The transformed value - - - - - Set the key schedule for encryption/decryption. - - The data use to set the keys from. - - - - Update encryption keys - - - - - Reset the internal state. - - - - - PkzipClassic CryptoTransform for encryption. - - - - - Initialise a new instance of - - The key block to use. - - - - Transforms the specified region of the specified byte array. - - The input for which to compute the transform. - The offset into the byte array from which to begin using data. - The number of bytes in the byte array to use as data. - The computed transform. - - - - Transforms the specified region of the input byte array and copies - the resulting transform to the specified region of the output byte array. - - The input for which to compute the transform. - The offset into the input byte array from which to begin using data. - The number of bytes in the input byte array to use as data. - The output to which to write the transform. - The offset into the output byte array from which to begin writing data. - The number of bytes written. - - - - Gets a value indicating whether the current transform can be reused. - - - - - Gets the size of the input data blocks in bytes. - - - - - Gets the size of the output data blocks in bytes. - - - - - Gets a value indicating whether multiple blocks can be transformed. - - - - - Cleanup internal state. - - - - - PkzipClassic CryptoTransform for decryption. - - - - - Initialise a new instance of . - - The key block to decrypt with. - - - - Transforms the specified region of the specified byte array. - - The input for which to compute the transform. - The offset into the byte array from which to begin using data. - The number of bytes in the byte array to use as data. - The computed transform. - - - - Transforms the specified region of the input byte array and copies - the resulting transform to the specified region of the output byte array. - - The input for which to compute the transform. - The offset into the input byte array from which to begin using data. - The number of bytes in the input byte array to use as data. - The output to which to write the transform. - The offset into the output byte array from which to begin writing data. - The number of bytes written. - - - - Gets a value indicating whether the current transform can be reused. - - - - - Gets the size of the input data blocks in bytes. - - - - - Gets the size of the output data blocks in bytes. - - - - - Gets a value indicating whether multiple blocks can be transformed. - - - - - Cleanup internal state. - - - - - Defines a wrapper object to access the Pkzip algorithm. - This class cannot be inherited. - - - - - Get / set the applicable block size in bits. - - The only valid block size is 8. - - - - Get an array of legal key sizes. - - - - - Generate an initial vector. - - - - - Get an array of legal block sizes. - - - - - Get / set the key value applicable. - - - - - Generate a new random key. - - - - - Create an encryptor. - - The key to use for this encryptor. - Initialisation vector for the new encryptor. - Returns a new PkzipClassic encryptor - - - - Create a decryptor. - - Keys to use for this new decryptor. - Initialisation vector for the new decryptor. - Returns a new decryptor. - - - - Encrypts and decrypts AES ZIP - - - Based on information from http://www.winzip.com/aes_info.htm - and http://www.gladman.me.uk/cryptography_technology/fileencrypt/ - - - - - Constructor - - The stream on which to perform the cryptographic transformation. - Instance of ZipAESTransform - Read or Write - - - - Reads a sequence of bytes from the current CryptoStream into buffer, - and advances the position within the stream by the number of bytes read. - - - - - Writes a sequence of bytes to the current stream and advances the current position within this stream by the number of bytes written. - - An array of bytes. This method copies count bytes from buffer to the current stream. - The byte offset in buffer at which to begin copying bytes to the current stream. - The number of bytes to be written to the current stream. - - - - Transforms stream using AES in CTR mode - - - - - Constructor. - - Password string - Random bytes, length depends on encryption strength. - 128 bits = 8 bytes, 192 bits = 12 bytes, 256 bits = 16 bytes. - The encryption strength, in bytes eg 16 for 128 bits. - True when creating a zip, false when reading. For the AuthCode. - - - - - Implement the ICryptoTransform method. - - - - - Returns the 2 byte password verifier - - - - - Returns the 10 byte AUTH CODE to be checked or appended immediately following the AES data stream. - - - - - Not implemented. - - - - - Gets the size of the input data blocks in bytes. - - - - - Gets the size of the output data blocks in bytes. - - - - - Gets a value indicating whether multiple blocks can be transformed. - - - - - Gets a value indicating whether the current transform can be reused. - - - - - Cleanup internal state. - - - - - An example class to demonstrate compression and decompression of GZip streams. - - - - - Decompress the input writing - uncompressed data to the output stream - - The readable stream containing data to decompress. - The output stream to receive the decompressed data. - Both streams are closed on completion if true. - Input or output stream is null - - - - Compress the input stream sending - result data to output stream - - The readable stream to compress. - The output stream to receive the compressed data. - Both streams are closed on completion if true. - Deflate buffer size, minimum 512 - Deflate compression level, 0-9 - Input or output stream is null - Buffer Size is smaller than 512 - Compression level outside 0-9 - - - - This class contains constants used for gzip. - - - - - Magic number found at start of GZIP header - - - - - Flag bit mask for text - - - - - Flag bitmask for Crc - - - - - Flag bit mask for extra - - - - - flag bitmask for name - - - - - flag bit mask indicating comment is present - - - - - Initialise default instance. - - Constructor is private to prevent instances being created. - - - - GZipException represents exceptions specific to GZip classes and code. - - - - - Initialise a new instance of . - - - - - Initialise a new instance of with its message string. - - A that describes the error. - - - - Initialise a new instance of . - - A that describes the error. - The that caused this exception. - - - - This filter stream is used to decompress a "GZIP" format stream. - The "GZIP" format is described baseInputStream RFC 1952. - - author of the original java version : John Leuner - - This sample shows how to unzip a gzipped file - - using System; - using System.IO; - - using ICSharpCode.SharpZipLib.Core; - using ICSharpCode.SharpZipLib.GZip; - - class MainClass - { - public static void Main(string[] args) - { - using (Stream inStream = new GZipInputStream(File.OpenRead(args[0]))) - using (FileStream outStream = File.Create(Path.GetFileNameWithoutExtension(args[0]))) { - byte[] buffer = new byte[4096]; - StreamUtils.Copy(inStream, outStream, buffer); - } - } - } - - - - - - CRC-32 value for uncompressed data - - - - - Flag to indicate if we've read the GZIP header yet for the current member (block of compressed data). - This is tracked per-block as the file is parsed. - - - - - Flag to indicate if at least one block in a stream with concatenated blocks was read successfully. - This allows us to exit gracefully if downstream data is not in gzip format. - - - - - Creates a GZipInputStream with the default buffer size - - - The stream to read compressed data from (baseInputStream GZIP format) - - - - - Creates a GZIPInputStream with the specified buffer size - - - The stream to read compressed data from (baseInputStream GZIP format) - - - Size of the buffer to use - - - - - Reads uncompressed data into an array of bytes - - - The buffer to read uncompressed data into - - - The offset indicating where the data should be placed - - - The number of uncompressed bytes to be read - - Returns the number of bytes actually read. - - - - This filter stream is used to compress a stream into a "GZIP" stream. - The "GZIP" format is described in RFC 1952. - - author of the original java version : John Leuner - - This sample shows how to gzip a file - - using System; - using System.IO; - - using ICSharpCode.SharpZipLib.GZip; - using ICSharpCode.SharpZipLib.Core; - - class MainClass - { - public static void Main(string[] args) - { - using (Stream s = new GZipOutputStream(File.Create(args[0] + ".gz"))) - using (FileStream fs = File.OpenRead(args[0])) { - byte[] writeData = new byte[4096]; - Streamutils.Copy(s, fs, writeData); - } - } - } - } - - - - - - CRC-32 value for uncompressed data - - - - - Creates a GzipOutputStream with the default buffer size - - - The stream to read data (to be compressed) from - - - - - Creates a GZipOutputStream with the specified buffer size - - - The stream to read data (to be compressed) from - - - Size of the buffer to use - - - - - Sets the active compression level (0-9). The new level will be activated - immediately. - - The compression level to set. - - Level specified is not supported. - - - - - - Get the current compression level. - - The current compression level. - - - - Write given buffer to output updating crc - - Buffer to write - Offset of first byte in buf to write - Number of bytes to write - - - - Writes remaining compressed output data to the output stream - and closes it. - - - - - Finish compression and write any footer information required to stream - - - - - This class contains constants used for LZW - - - - - Magic number found at start of LZW header: 0x1f 0x9d - - - - - Maximum number of bits per code - - - - - Mask for 'number of compression bits' - - - - - Indicates the presence of a fourth header byte - - - - - Reserved bits - - - - - Block compression: if table is full and compression rate is dropping, - clear the dictionary. - - - - - LZW file header size (in bytes) - - - - - Initial number of bits per code - - - - - LzwException represents exceptions specific to LZW classes and code. - - - - - Initialise a new instance of . - - - - - Initialise a new instance of with its message string. - - A that describes the error. - - - - Initialise a new instance of . - - A that describes the error. - The that caused this exception. - - - - This filter stream is used to decompress a LZW format stream. - Specifically, a stream that uses the LZC compression method. - This file format is usually associated with the .Z file extension. - - See http://en.wikipedia.org/wiki/Compress - See http://wiki.wxwidgets.org/Development:_Z_File_Format - - The file header consists of 3 (or optionally 4) bytes. The first two bytes - contain the magic marker "0x1f 0x9d", followed by a byte of flags. - - Based on Java code by Ronald Tschalar, which in turn was based on the unlzw.c - code in the gzip package. - - This sample shows how to unzip a compressed file - - using System; - using System.IO; - - using ICSharpCode.SharpZipLib.Core; - using ICSharpCode.SharpZipLib.LZW; - - class MainClass - { - public static void Main(string[] args) - { - using (Stream inStream = new LzwInputStream(File.OpenRead(args[0]))) - using (FileStream outStream = File.Create(Path.GetFileNameWithoutExtension(args[0]))) { - byte[] buffer = new byte[4096]; - StreamUtils.Copy(inStream, outStream, buffer); - // OR - inStream.Read(buffer, 0, buffer.Length); - // now do something with the buffer - } - } - } - - - - - - Gets or sets a flag indicating ownership of underlying stream. - When the flag is true will close the underlying stream also. - - The default value is true. - - - - Creates a LzwInputStream - - - The stream to read compressed data from (baseInputStream LZW format) - - - - - See - - - - - - Reads decompressed data into the provided buffer byte array - - - The array to read and decompress data into - - - The offset indicating where the data should be placed - - - The number of bytes to decompress - - The number of bytes read. Zero signals the end of stream - - - - Moves the unread data in the buffer to the beginning and resets - the pointers. - - - - - - - Gets a value indicating whether the current stream supports reading - - - - - Gets a value of false indicating seeking is not supported for this stream. - - - - - Gets a value of false indicating that this stream is not writeable. - - - - - A value representing the length of the stream in bytes. - - - - - The current position within the stream. - Throws a NotSupportedException when attempting to set the position - - Attempting to set the position - - - - Flushes the baseInputStream - - - - - Sets the position within the current stream - Always throws a NotSupportedException - - The relative offset to seek to. - The defining where to seek from. - The new position in the stream. - Any access - - - - Set the length of the current stream - Always throws a NotSupportedException - - The new length value for the stream. - Any access - - - - Writes a sequence of bytes to stream and advances the current position - This method always throws a NotSupportedException - - Thew buffer containing data to write. - The offset of the first byte to write. - The number of bytes to write. - Any access - - - - Writes one byte to the current stream and advances the current position - Always throws a NotSupportedException - - The byte to write. - Any access - - - - Closes the input stream. When - is true the underlying stream is also closed. - - - - - Flag indicating wether this instance has been closed or not. - - - - - This exception is used to indicate that there is a problem - with a TAR archive header. - - - - - Initialise a new instance of the InvalidHeaderException class. - - - - - Initialises a new instance of the InvalidHeaderException class with a specified message. - - Message describing the exception cause. - - - - Initialise a new instance of InvalidHeaderException - - Message describing the problem. - The exception that is the cause of the current exception. - - - - Used to advise clients of 'events' while processing archives - - - - - The TarArchive class implements the concept of a - 'Tape Archive'. A tar archive is a series of entries, each of - which represents a file system object. Each entry in - the archive consists of a header block followed by 0 or more data blocks. - Directory entries consist only of the header block, and are followed by entries - for the directory's contents. File entries consist of a - header followed by the number of blocks needed to - contain the file's contents. All entries are written on - block boundaries. Blocks are 512 bytes long. - - TarArchives are instantiated in either read or write mode, - based upon whether they are instantiated with an InputStream - or an OutputStream. Once instantiated TarArchives read/write - mode can not be changed. - - There is currently no support for random access to tar archives. - However, it seems that subclassing TarArchive, and using the - TarBuffer.CurrentRecord and TarBuffer.CurrentBlock - properties, this would be rather trivial. - - - - - Client hook allowing detailed information to be reported during processing - - - - - Raises the ProgressMessage event - - The TarEntry for this event - message for this event. Null is no message - - - - Constructor for a default . - - - - - Initalise a TarArchive for input. - - The to use for input. - - - - Initialise a TarArchive for output. - - The to use for output. - - - - The InputStream based constructors create a TarArchive for the - purposes of extracting or listing a tar archive. Thus, use - these constructors when you wish to extract files from or list - the contents of an existing tar archive. - - The stream to retrieve archive data from. - Returns a new suitable for reading from. - - - - Create TarArchive for reading setting block factor - - A stream containing the tar archive contents - The blocking factor to apply - Returns a suitable for reading. - - - - Create a TarArchive for writing to, using the default blocking factor - - The to write to - Returns a suitable for writing. - - - - Create a tar archive for writing. - - The stream to write to - The blocking factor to use for buffering. - Returns a suitable for writing. - - - - Set the flag that determines whether existing files are - kept, or overwritten during extraction. - - - If true, do not overwrite existing files. - - - - - Get/set the ascii file translation flag. If ascii file translation - is true, then the file is checked to see if it a binary file or not. - If the flag is true and the test indicates it is ascii text - file, it will be translated. The translation converts the local - operating system's concept of line ends into the UNIX line end, - '\n', which is the defacto standard for a TAR archive. This makes - text files compatible with UNIX. - - - - - Set the ascii file translation flag. - - - If true, translate ascii text files. - - - - - PathPrefix is added to entry names as they are written if the value is not null. - A slash character is appended after PathPrefix - - - - - RootPath is removed from entry names if it is found at the - beginning of the name. - - - - - Set user and group information that will be used to fill in the - tar archive's entry headers. This information is based on that available - for the linux operating system, which is not always available on other - operating systems. TarArchive allows the programmer to specify values - to be used in their place. - is set to true by this call. - - - The user id to use in the headers. - - - The user name to use in the headers. - - - The group id to use in the headers. - - - The group name to use in the headers. - - - - - Get or set a value indicating if overrides defined by SetUserInfo should be applied. - - If overrides are not applied then the values as set in each header will be used. - - - - Get the archive user id. - See ApplyUserInfoOverrides for detail - on how to allow setting values on a per entry basis. - - - The current user id. - - - - - Get the archive user name. - See ApplyUserInfoOverrides for detail - on how to allow setting values on a per entry basis. - - - The current user name. - - - - - Get the archive group id. - See ApplyUserInfoOverrides for detail - on how to allow setting values on a per entry basis. - - - The current group id. - - - - - Get the archive group name. - See ApplyUserInfoOverrides for detail - on how to allow setting values on a per entry basis. - - - The current group name. - - - - - Get the archive's record size. Tar archives are composed of - a series of RECORDS each containing a number of BLOCKS. - This allowed tar archives to match the IO characteristics of - the physical device being used. Archives are expected - to be properly "blocked". - - - The record size this archive is using. - - - - - Sets the IsStreamOwner property on the underlying stream. - Set this to false to prevent the Close of the TarArchive from closing the stream. - - - - - Close the archive. - - - - - Perform the "list" command for the archive contents. - - NOTE That this method uses the progress event to actually list - the contents. If the progress display event is not set, nothing will be listed! - - - - - Perform the "extract" command and extract the contents of the archive. - - - The destination directory into which to extract. - - - - - Extract an entry from the archive. This method assumes that the - tarIn stream has been properly set with a call to GetNextEntry(). - - - The destination directory into which to extract. - - - The TarEntry returned by tarIn.GetNextEntry(). - - - - - Write an entry to the archive. This method will call the putNextEntry - and then write the contents of the entry, and finally call closeEntry() - for entries that are files. For directories, it will call putNextEntry(), - and then, if the recurse flag is true, process each entry that is a - child of the directory. - - - The TarEntry representing the entry to write to the archive. - - - If true, process the children of directory entries. - - - - - Write an entry to the archive. This method will call the putNextEntry - and then write the contents of the entry, and finally call closeEntry() - for entries that are files. For directories, it will call putNextEntry(), - and then, if the recurse flag is true, process each entry that is a - child of the directory. - - - The TarEntry representing the entry to write to the archive. - - - If true, process the children of directory entries. - - - - - Performs application-defined tasks associated with freeing, releasing, or resetting unmanaged resources. - - - - - Releases the unmanaged resources used by the FileStream and optionally releases the managed resources. - - true to release both managed and unmanaged resources; - false to release only unmanaged resources. - - - - Closes the archive and releases any associated resources. - - - - - Ensures that resources are freed and other cleanup operations are performed - when the garbage collector reclaims the . - - - - - The TarBuffer class implements the tar archive concept - of a buffered input stream. This concept goes back to the - days of blocked tape drives and special io devices. In the - C# universe, the only real function that this class - performs is to ensure that files have the correct "record" - size, or other tars will complain. -

- You should never have a need to access this class directly. - TarBuffers are created by Tar IO Streams. -

-
-
- - - The size of a block in a tar archive in bytes. - - This is 512 bytes. - - - - The number of blocks in a default record. - - - The default value is 20 blocks per record. - - - - - The size in bytes of a default record. - - - The default size is 10KB. - - - - - Get the record size for this buffer - - The record size in bytes. - This is equal to the multiplied by the - - - - Get the TAR Buffer's record size. - - The record size in bytes. - This is equal to the multiplied by the - - - - Get the Blocking factor for the buffer - - This is the number of blocks in each record. - - - - Get the TAR Buffer's block factor - - The block factor; the number of blocks per record. - - - - Construct a default TarBuffer - - - - - Create TarBuffer for reading with default BlockFactor - - Stream to buffer - A new suitable for input. - - - - Construct TarBuffer for reading inputStream setting BlockFactor - - Stream to buffer - Blocking factor to apply - A new suitable for input. - - - - Construct TarBuffer for writing with default BlockFactor - - output stream for buffer - A new suitable for output. - - - - Construct TarBuffer for writing Tar output to streams. - - Output stream to write to. - Blocking factor to apply - A new suitable for output. - - - - Initialization common to all constructors. - - - - - Determine if an archive block indicates End of Archive. End of - archive is indicated by a block that consists entirely of null bytes. - All remaining blocks for the record should also be null's - However some older tars only do a couple of null blocks (Old GNU tar for one) - and also partial records - - The data block to check. - Returns true if the block is an EOF block; false otherwise. - - - - Determine if an archive block indicates the End of an Archive has been reached. - End of archive is indicated by a block that consists entirely of null bytes. - All remaining blocks for the record should also be null's - However some older tars only do a couple of null blocks (Old GNU tar for one) - and also partial records - - The data block to check. - Returns true if the block is an EOF block; false otherwise. - - - - Skip over a block on the input stream. - - - - - Read a block from the input stream. - - - The block of data read. - - - - - Read a record from data stream. - - - false if End-Of-File, else true. - - - - - Get the current block number, within the current record, zero based. - - Block numbers are zero based values - - - - - Gets or sets a flag indicating ownership of underlying stream. - When the flag is true will close the underlying stream also. - - The default value is true. - - - - Get the current block number, within the current record, zero based. - - - The current zero based block number. - - - The absolute block number = (record number * block factor) + block number. - - - - - Get the current record number. - - - The current zero based record number. - - - - - Get the current record number. - - - The current zero based record number. - - - - - Write a block of data to the archive. - - - The data to write to the archive. - - - - - Write an archive record to the archive, where the record may be - inside of a larger array buffer. The buffer must be "offset plus - record size" long. - - - The buffer containing the record data to write. - - - The offset of the record data within buffer. - - - - - Write a TarBuffer record to the archive. - - - - - WriteFinalRecord writes the current record buffer to output any unwritten data is present. - - Any trailing bytes are set to zero which is by definition correct behaviour - for the end of a tar stream. - - - - Close the TarBuffer. If this is an output buffer, also flush the - current block before closing. - - - - - This class represents an entry in a Tar archive. It consists - of the entry's header, as well as the entry's File. Entries - can be instantiated in one of three ways, depending on how - they are to be used. -

- TarEntries that are created from the header bytes read from - an archive are instantiated with the TarEntry( byte[] ) - constructor. These entries will be used when extracting from - or listing the contents of an archive. These entries have their - header filled in using the header bytes. They also set the File - to null, since they reference an archive entry not a file.

-

- TarEntries that are created from files that are to be written - into an archive are instantiated with the CreateEntryFromFile(string) - pseudo constructor. These entries have their header filled in using - the File's information. They also keep a reference to the File - for convenience when writing entries.

-

- Finally, TarEntries can be constructed from nothing but a name. - This allows the programmer to construct the entry by hand, for - instance when only an InputStream is available for writing to - the archive, and the header information is constructed from - other information. In this case the header fields are set to - defaults and the File is set to null.

- -
-
- - - Initialise a default instance of . - - - - - Construct an entry from an archive's header bytes. File is set - to null. - - - The header bytes from a tar archive entry. - - - - - Construct a TarEntry using the header provided - - Header details for entry - - - - Clone this tar entry. - - Returns a clone of this entry. - - - - Construct an entry with only a name. - This allows the programmer to construct the entry's header "by hand". - - The name to use for the entry - Returns the newly created - - - - Construct an entry for a file. File is set to file, and the - header is constructed from information from the file. - - The file name that the entry represents. - Returns the newly created - - - - Determine if the two entries are equal. Equality is determined - by the header names being equal. - - The to compare with the current Object. - - True if the entries are equal; false if not. - - - - - Derive a Hash value for the current - - A Hash code for the current - - - - Determine if the given entry is a descendant of this entry. - Descendancy is determined by the name of the descendant - starting with this entry's name. - - - Entry to be checked as a descendent of this. - - - True if entry is a descendant of this. - - - - - Get this entry's header. - - - This entry's TarHeader. - - - - - Get/Set this entry's name. - - - - - Get/set this entry's user id. - - - - - Get/set this entry's group id. - - - - - Get/set this entry's user name. - - - - - Get/set this entry's group name. - - - - - Convenience method to set this entry's group and user ids. - - - This entry's new user id. - - - This entry's new group id. - - - - - Convenience method to set this entry's group and user names. - - - This entry's new user name. - - - This entry's new group name. - - - - - Get/Set the modification time for this entry - - - - - Get this entry's file. - - - This entry's file. - - - - - Get/set this entry's recorded file size. - - - - - Return true if this entry represents a directory, false otherwise - - - True if this entry is a directory. - - - - - Fill in a TarHeader with information from a File. - - - The TarHeader to fill in. - - - The file from which to get the header information. - - - - - Get entries for all files present in this entries directory. - If this entry doesnt represent a directory zero entries are returned. - - - An array of TarEntry's for this entry's children. - - - - - Write an entry's header information to a header buffer. - - - The tar entry header buffer to fill in. - - - - - Convenience method that will modify an entry's name directly - in place in an entry header buffer byte array. - - - The buffer containing the entry header to modify. - - - The new name to place into the header buffer. - - - - - Fill in a TarHeader given only the entry's name. - - - The TarHeader to fill in. - - - The tar entry name. - - - - - The name of the file this entry represents or null if the entry is not based on a file. - - - - - The entry's header information. - - - - - TarException represents exceptions specific to Tar classes and code. - - - - - Initialise a new instance of . - - - - - Initialise a new instance of with its message string. - - A that describes the error. - - - - Initialise a new instance of . - - A that describes the error. - The that caused this exception. - - - - Reads the extended header of a Tar stream - - - - - Creates a new . - - - - - Read bytes from - - - - - - - Returns the parsed headers as key-value strings - - - - - This class encapsulates the Tar Entry Header used in Tar Archives. - The class also holds a number of tar constants, used mostly in headers. - - - The tar format and its POSIX successor PAX have a long history which makes for compatability - issues when creating and reading files. - - This is further complicated by a large number of programs with variations on formats - One common issue is the handling of names longer than 100 characters. - GNU style long names are currently supported. - - This is the ustar (Posix 1003.1) header. - - struct header - { - char t_name[100]; // 0 Filename - char t_mode[8]; // 100 Permissions - char t_uid[8]; // 108 Numerical User ID - char t_gid[8]; // 116 Numerical Group ID - char t_size[12]; // 124 Filesize - char t_mtime[12]; // 136 st_mtime - char t_chksum[8]; // 148 Checksum - char t_typeflag; // 156 Type of File - char t_linkname[100]; // 157 Target of Links - char t_magic[6]; // 257 "ustar" or other... - char t_version[2]; // 263 Version fixed to 00 - char t_uname[32]; // 265 User Name - char t_gname[32]; // 297 Group Name - char t_devmajor[8]; // 329 Major for devices - char t_devminor[8]; // 337 Minor for devices - char t_prefix[155]; // 345 Prefix for t_name - char t_mfill[12]; // 500 Filler up to 512 - }; - - - - - The length of the name field in a header buffer. - - - - - The length of the mode field in a header buffer. - - - - - The length of the user id field in a header buffer. - - - - - The length of the group id field in a header buffer. - - - - - The length of the checksum field in a header buffer. - - - - - Offset of checksum in a header buffer. - - - - - The length of the size field in a header buffer. - - - - - The length of the magic field in a header buffer. - - - - - The length of the version field in a header buffer. - - - - - The length of the modification time field in a header buffer. - - - - - The length of the user name field in a header buffer. - - - - - The length of the group name field in a header buffer. - - - - - The length of the devices field in a header buffer. - - - - - The length of the name prefix field in a header buffer. - - - - - The "old way" of indicating a normal file. - - - - - Normal file type. - - - - - Link file type. - - - - - Symbolic link file type. - - - - - Character device file type. - - - - - Block device file type. - - - - - Directory file type. - - - - - FIFO (pipe) file type. - - - - - Contiguous file type. - - - - - Posix.1 2001 global extended header - - - - - Posix.1 2001 extended header - - - - - Solaris access control list file type - - - - - GNU dir dump file type - This is a dir entry that contains the names of files that were in the - dir at the time the dump was made - - - - - Solaris Extended Attribute File - - - - - Inode (metadata only) no file content - - - - - Identifies the next file on the tape as having a long link name - - - - - Identifies the next file on the tape as having a long name - - - - - Continuation of a file that began on another volume - - - - - For storing filenames that dont fit in the main header (old GNU) - - - - - GNU Sparse file - - - - - GNU Tape/volume header ignore on extraction - - - - - The magic tag representing a POSIX tar archive. (would be written with a trailing NULL) - - - - - The magic tag representing an old GNU tar archive where version is included in magic and overwrites it - - - - - Initialise a default TarHeader instance - - - - - Get/set the name for this tar entry. - - Thrown when attempting to set the property to null. - - - - Get the name of this entry. - - The entry's name. - - - - Get/set the entry's Unix style permission mode. - - - - - The entry's user id. - - - This is only directly relevant to unix systems. - The default is zero. - - - - - Get/set the entry's group id. - - - This is only directly relevant to linux/unix systems. - The default value is zero. - - - - - Get/set the entry's size. - - Thrown when setting the size to less than zero. - - - - Get/set the entry's modification time. - - - The modification time is only accurate to within a second. - - Thrown when setting the date time to less than 1/1/1970. - - - - Get the entry's checksum. This is only valid/updated after writing or reading an entry. - - - - - Get value of true if the header checksum is valid, false otherwise. - - - - - Get/set the entry's type flag. - - - - - The entry's link name. - - Thrown when attempting to set LinkName to null. - - - - Get/set the entry's magic tag. - - Thrown when attempting to set Magic to null. - - - - The entry's version. - - Thrown when attempting to set Version to null. - - - - The entry's user name. - - - - - Get/set the entry's group name. - - - This is only directly relevant to unix systems. - - - - - Get/set the entry's major device number. - - - - - Get/set the entry's minor device number. - - - - - Create a new that is a copy of the current instance. - - A new that is a copy of the current instance. - - - - Parse TarHeader information from a header buffer. - - - The tar entry header buffer to get information from. - - - - - 'Write' header information to buffer provided, updating the check sum. - - output buffer for header information - - - - Get a hash code for the current object. - - A hash code for the current object. - - - - Determines if this instance is equal to the specified object. - - The object to compare with. - true if the objects are equal, false otherwise. - - - - Set defaults for values used when constructing a TarHeader instance. - - Value to apply as a default for userId. - Value to apply as a default for userName. - Value to apply as a default for groupId. - Value to apply as a default for groupName. - - - - Parse an octal string from a header buffer. - - The header buffer from which to parse. - The offset into the buffer from which to parse. - The number of header bytes to parse. - The long equivalent of the octal string. - - - - Parse a name from a header buffer. - - - The header buffer from which to parse. - - - The offset into the buffer from which to parse. - - - The number of header bytes to parse. - - - The name parsed. - - - - - Add name to the buffer as a collection of bytes - - The name to add - The offset of the first character - The buffer to add to - The index of the first byte to add - The number of characters/bytes to add - The next free index in the - - - - Add name to the buffer as a collection of bytes - - The name to add - The offset of the first character - The buffer to add to - The index of the first byte to add - The number of characters/bytes to add - The next free index in the - - - - Add an entry name to the buffer - - - The name to add - - - The buffer to add to - - - The offset into the buffer from which to start adding - - - The number of header bytes to add - - - The index of the next free byte in the buffer - - - - - Add an entry name to the buffer - - The name to add - The buffer to add to - The offset into the buffer from which to start adding - The number of header bytes to add - The index of the next free byte in the buffer - - - - Add a string to a buffer as a collection of ascii bytes. - - The string to add - The offset of the first character to add. - The buffer to add to. - The offset to start adding at. - The number of ascii characters to add. - The next free index in the buffer. - - - - Put an octal representation of a value into a buffer - - - the value to be converted to octal - - - buffer to store the octal string - - - The offset into the buffer where the value starts - - - The length of the octal string to create - - - The offset of the character next byte after the octal string - - - - - Put an octal or binary representation of a value into a buffer - - Value to be convert to octal - The buffer to update - The offset into the buffer to store the value - The length of the octal string. Must be 12. - Index of next byte - - - - Add the checksum integer to header buffer. - - - The header buffer to set the checksum for - The offset into the buffer for the checksum - The number of header bytes to update. - It's formatted differently from the other fields: it has 6 digits, a - null, then a space -- rather than digits, a space, then a null. - The final space is already there, from checksumming - - The modified buffer offset - - - - Compute the checksum for a tar entry header. - The checksum field must be all spaces prior to this happening - - The tar entry's header buffer. - The computed checksum. - - - - Make a checksum for a tar entry ignoring the checksum contents. - - The tar entry's header buffer. - The checksum for the buffer - - - - The TarInputStream reads a UNIX tar archive as an InputStream. - methods are provided to position at each successive entry in - the archive, and the read each entry as a normal input stream - using read(). - - - - - Construct a TarInputStream with default block factor - - stream to source data from - - - - Construct a TarInputStream with user specified block factor - - stream to source data from - block factor to apply to archive - - - - Gets or sets a flag indicating ownership of underlying stream. - When the flag is true will close the underlying stream also. - - The default value is true. - - - - Gets a value indicating whether the current stream supports reading - - - - - Gets a value indicating whether the current stream supports seeking - This property always returns false. - - - - - Gets a value indicating if the stream supports writing. - This property always returns false. - - - - - The length in bytes of the stream - - - - - Gets or sets the position within the stream. - Setting the Position is not supported and throws a NotSupportedExceptionNotSupportedException - - Any attempt to set position - - - - Flushes the baseInputStream - - - - - Set the streams position. This operation is not supported and will throw a NotSupportedException - - The offset relative to the origin to seek to. - The to start seeking from. - The new position in the stream. - Any access - - - - Sets the length of the stream - This operation is not supported and will throw a NotSupportedException - - The new stream length. - Any access - - - - Writes a block of bytes to this stream using data from a buffer. - This operation is not supported and will throw a NotSupportedException - - The buffer containing bytes to write. - The offset in the buffer of the frist byte to write. - The number of bytes to write. - Any access - - - - Writes a byte to the current position in the file stream. - This operation is not supported and will throw a NotSupportedException - - The byte value to write. - Any access - - - - Reads a byte from the current tar archive entry. - - A byte cast to an int; -1 if the at the end of the stream. - - - - Reads bytes from the current tar archive entry. - - This method is aware of the boundaries of the current - entry in the archive and will deal with them appropriately - - - The buffer into which to place bytes read. - - - The offset at which to place bytes read. - - - The number of bytes to read. - - - The number of bytes read, or 0 at end of stream/EOF. - - - - - Closes this stream. Calls the TarBuffer's close() method. - The underlying stream is closed by the TarBuffer. - - - - - Set the entry factory for this instance. - - The factory for creating new entries - - - - Get the record size being used by this stream's TarBuffer. - - - - - Get the record size being used by this stream's TarBuffer. - - - TarBuffer record size. - - - - - Get the available data that can be read from the current - entry in the archive. This does not indicate how much data - is left in the entire archive, only in the current entry. - This value is determined from the entry's size header field - and the amount of data already read from the current entry. - - - The number of available bytes for the current entry. - - - - - Skip bytes in the input buffer. This skips bytes in the - current entry's data, not the entire archive, and will - stop at the end of the current entry's data if the number - to skip extends beyond that point. - - - The number of bytes to skip. - - - - - Return a value of true if marking is supported; false otherwise. - - Currently marking is not supported, the return value is always false. - - - - Since we do not support marking just yet, we do nothing. - - - The limit to mark. - - - - - Since we do not support marking just yet, we do nothing. - - - - - Get the next entry in this tar archive. This will skip - over any remaining data in the current entry, if there - is one, and place the input stream at the header of the - next entry, and read the header and instantiate a new - TarEntry from the header bytes and return that entry. - If there are no more entries in the archive, null will - be returned to indicate that the end of the archive has - been reached. - - - The next TarEntry in the archive, or null. - - - - - Copies the contents of the current tar archive entry directly into - an output stream. - - - The OutputStream into which to write the entry's data. - - - - - This interface is provided, along with the method , to allow - the programmer to have their own subclass instantiated for the - entries return from . - - - - - Create an entry based on name alone - - - Name of the new EntryPointNotFoundException to create - - created TarEntry or descendant class - - - - Create an instance based on an actual file - - - Name of file to represent in the entry - - - Created TarEntry or descendant class - - - - - Create a tar entry based on the header information passed - - - Buffer containing header information to create an an entry from. - - - Created TarEntry or descendant class - - - - - Standard entry factory class creating instances of the class TarEntry - - - - - Create a based on named - - The name to use for the entry - A new - - - - Create a tar entry with details obtained from file - - The name of the file to retrieve details from. - A new - - - - Create an entry based on details in header - - The buffer containing entry details. - A new - - - - Flag set when last block has been read - - - - - Size of this entry as recorded in header - - - - - Number of bytes read for this entry so far - - - - - Buffer used with calls to Read() - - - - - Working buffer - - - - - Current entry being read - - - - - Factory used to create TarEntry or descendant class instance - - - - - Stream used as the source of input data. - - - - - The TarOutputStream writes a UNIX tar archive as an OutputStream. - Methods are provided to put entries, and then write their contents - by writing to this stream using write(). - - public - - - - Construct TarOutputStream using default block factor - - stream to write to - - - - Construct TarOutputStream with user specified block factor - - stream to write to - blocking factor - - - - Gets or sets a flag indicating ownership of underlying stream. - When the flag is true will close the underlying stream also. - - The default value is true. - - - - true if the stream supports reading; otherwise, false. - - - - - true if the stream supports seeking; otherwise, false. - - - - - true if stream supports writing; otherwise, false. - - - - - length of stream in bytes - - - - - gets or sets the position within the current stream. - - - - - set the position within the current stream - - The offset relative to the to seek to - The to seek from. - The new position in the stream. - - - - Set the length of the current stream - - The new stream length. - - - - Read a byte from the stream and advance the position within the stream - by one byte or returns -1 if at the end of the stream. - - The byte value or -1 if at end of stream - - - - read bytes from the current stream and advance the position within the - stream by the number of bytes read. - - The buffer to store read bytes in. - The index into the buffer to being storing bytes at. - The desired number of bytes to read. - The total number of bytes read, or zero if at the end of the stream. - The number of bytes may be less than the count - requested if data is not avialable. - - - - All buffered data is written to destination - - - - - Ends the TAR archive without closing the underlying OutputStream. - The result is that the EOF block of nulls is written. - - - - - Ends the TAR archive and closes the underlying OutputStream. - - This means that Finish() is called followed by calling the - TarBuffer's Close(). - - - - Get the record size being used by this stream's TarBuffer. - - - - - Get the record size being used by this stream's TarBuffer. - - - The TarBuffer record size. - - - - - Get a value indicating wether an entry is open, requiring more data to be written. - - - - - Put an entry on the output stream. This writes the entry's - header and positions the output stream for writing - the contents of the entry. Once this method is called, the - stream is ready for calls to write() to write the entry's - contents. Once the contents are written, closeEntry() - MUST be called to ensure that all buffered data - is completely written to the output stream. - - - The TarEntry to be written to the archive. - - - - - Close an entry. This method MUST be called for all file - entries that contain data. The reason is that we must - buffer data written to the stream in order to satisfy - the buffer's block based writes. Thus, there may be - data fragments still being assembled that must be written - to the output stream before this entry is closed and the - next entry written. - - - - - Writes a byte to the current tar archive entry. - This method simply calls Write(byte[], int, int). - - - The byte to be written. - - - - - Writes bytes to the current tar archive entry. This method - is aware of the current entry and will throw an exception if - you attempt to write bytes past the length specified for the - current entry. The method is also (painfully) aware of the - record buffering required by TarBuffer, and manages buffers - that are not a multiple of recordsize in length, including - assembling records from small buffers. - - - The buffer to write to the archive. - - - The offset in the buffer from which to get bytes. - - - The number of bytes to write. - - - - - Write an EOF (end of archive) block to the tar archive. - The end of the archive is indicated by two blocks consisting entirely of zero bytes. - - - - - bytes written for this entry so far - - - - - current 'Assembly' buffer length - - - - - Flag indicating wether this instance has been closed or not. - - - - - Size for the current entry - - - - - single block working buffer - - - - - 'Assembly' buffer used to assemble data before writing - - - - - TarBuffer used to provide correct blocking factor - - - - - the destination stream for the archive contents - - - - - This is the Deflater class. The deflater class compresses input - with the deflate algorithm described in RFC 1951. It has several - compression levels and three different strategies described below. - - This class is not thread safe. This is inherent in the API, due - to the split of deflate and setInput. - - author of the original java version : Jochen Hoenicke - - - - - The best and slowest compression level. This tries to find very - long and distant string repetitions. - - - - - The worst but fastest compression level. - - - - - The default compression level. - - - - - This level won't compress at all but output uncompressed blocks. - - - - - The compression method. This is the only method supported so far. - There is no need to use this constant at all. - - - - - Compression Level as an enum for safer use - - - - - The best and slowest compression level. This tries to find very - long and distant string repetitions. - - - - - The worst but fastest compression level. - - - - - The default compression level. - - - - - This level won't compress at all but output uncompressed blocks. - - - - - The compression method. This is the only method supported so far. - There is no need to use this constant at all. - - - - - Creates a new deflater with default compression level. - - - - - Creates a new deflater with given compression level. - - - the compression level, a value between NO_COMPRESSION - and BEST_COMPRESSION, or DEFAULT_COMPRESSION. - - if lvl is out of range. - - - - Creates a new deflater with given compression level. - - - the compression level, a value between NO_COMPRESSION - and BEST_COMPRESSION. - - - true, if we should suppress the Zlib/RFC1950 header at the - beginning and the adler checksum at the end of the output. This is - useful for the GZIP/PKZIP formats. - - if lvl is out of range. - - - - Resets the deflater. The deflater acts afterwards as if it was - just created with the same compression level and strategy as it - had before. - - - - - Gets the current adler checksum of the data that was processed so far. - - - - - Gets the number of input bytes processed so far. - - - - - Gets the number of output bytes so far. - - - - - Flushes the current input block. Further calls to deflate() will - produce enough output to inflate everything in the current input - block. This is not part of Sun's JDK so I have made it package - private. It is used by DeflaterOutputStream to implement - flush(). - - - - - Finishes the deflater with the current input block. It is an error - to give more input after this method was called. This method must - be called to force all bytes to be flushed. - - - - - Returns true if the stream was finished and no more output bytes - are available. - - - - - Returns true, if the input buffer is empty. - You should then call setInput(). - NOTE: This method can also return true when the stream - was finished. - - - - - Sets the data which should be compressed next. This should be only - called when needsInput indicates that more input is needed. - If you call setInput when needsInput() returns false, the - previous input that is still pending will be thrown away. - The given byte array should not be changed, before needsInput() returns - true again. - This call is equivalent to setInput(input, 0, input.length). - - - the buffer containing the input data. - - - if the buffer was finished() or ended(). - - - - - Sets the data which should be compressed next. This should be - only called when needsInput indicates that more input is needed. - The given byte array should not be changed, before needsInput() returns - true again. - - - the buffer containing the input data. - - - the start of the data. - - - the number of data bytes of input. - - - if the buffer was Finish()ed or if previous input is still pending. - - - - - Sets the compression level. There is no guarantee of the exact - position of the change, but if you call this when needsInput is - true the change of compression level will occur somewhere near - before the end of the so far given input. - - - the new compression level. - - - - - Get current compression level - - Returns the current compression level - - - - Sets the compression strategy. Strategy is one of - DEFAULT_STRATEGY, HUFFMAN_ONLY and FILTERED. For the exact - position where the strategy is changed, the same as for - SetLevel() applies. - - - The new compression strategy. - - - - - Deflates the current input block with to the given array. - - - The buffer where compressed data is stored - - - The number of compressed bytes added to the output, or 0 if either - IsNeedingInput() or IsFinished returns true or length is zero. - - - - - Deflates the current input block to the given array. - - - Buffer to store the compressed data. - - - Offset into the output array. - - - The maximum number of bytes that may be stored. - - - The number of compressed bytes added to the output, or 0 if either - needsInput() or finished() returns true or length is zero. - - - If Finish() was previously called. - - - If offset or length don't match the array length. - - - - - Sets the dictionary which should be used in the deflate process. - This call is equivalent to setDictionary(dict, 0, dict.Length). - - - the dictionary. - - - if SetInput () or Deflate () were already called or another dictionary was already set. - - - - - Sets the dictionary which should be used in the deflate process. - The dictionary is a byte array containing strings that are - likely to occur in the data which should be compressed. The - dictionary is not stored in the compressed output, only a - checksum. To decompress the output you need to supply the same - dictionary again. - - - The dictionary data - - - The index where dictionary information commences. - - - The number of bytes in the dictionary. - - - If SetInput () or Deflate() were already called or another dictionary was already set. - - - - - Compression level. - - - - - If true no Zlib/RFC1950 headers or footers are generated - - - - - The current state. - - - - - The total bytes of output written. - - - - - The pending output. - - - - - The deflater engine. - - - - - This class contains constants used for deflation. - - - - - Set to true to enable debugging - - - - - Written to Zip file to identify a stored block - - - - - Identifies static tree in Zip file - - - - - Identifies dynamic tree in Zip file - - - - - Header flag indicating a preset dictionary for deflation - - - - - Sets internal buffer sizes for Huffman encoding - - - - - Internal compression engine constant - - - - - Internal compression engine constant - - - - - Internal compression engine constant - - - - - Internal compression engine constant - - - - - Internal compression engine constant - - - - - Internal compression engine constant - - - - - Internal compression engine constant - - - - - Internal compression engine constant - - - - - Internal compression engine constant - - - - - Internal compression engine constant - - - - - Internal compression engine constant - - - - - Internal compression engine constant - - - - - Internal compression engine constant - - - - - Internal compression engine constant - - - - - Internal compression engine constant - - - - - Internal compression engine constant - - - - - Internal compression engine constant - - - - - Internal compression engine constant - - - - - Internal compression engine constant - - - - - Internal compression engine constant - - - - - Internal compression engine constant - - - - - Strategies for deflater - - - - - The default strategy - - - - - This strategy will only allow longer string repetitions. It is - useful for random data with a small character set. - - - - - This strategy will not look for string repetitions at all. It - only encodes with Huffman trees (which means, that more common - characters get a smaller encoding. - - - - - Low level compression engine for deflate algorithm which uses a 32K sliding window - with secondary compression from Huffman/Shannon-Fano codes. - - - - - Construct instance with pending buffer - Adler calculation will be peformed - - - Pending buffer to use - - - - - Construct instance with pending buffer - - - Pending buffer to use - - - If no adler calculation should be performed - - - - - Deflate drives actual compression of data - - True to flush input buffers - Finish deflation with the current input. - Returns true if progress has been made. - - - - Sets input data to be deflated. Should only be called when NeedsInput() - returns true - - The buffer containing input data. - The offset of the first byte of data. - The number of bytes of data to use as input. - - - - Determines if more input is needed. - - Return true if input is needed via SetInput - - - - Set compression dictionary - - The buffer containing the dictionary data - The offset in the buffer for the first byte of data - The length of the dictionary data. - - - - Reset internal state - - - - - Reset Adler checksum - - - - - Get current value of Adler checksum - - - - - Total data processed - - - - - Get/set the deflate strategy - - - - - Set the deflate level (0-9) - - The value to set the level to. - - - - Fill the window - - - - - Inserts the current string in the head hash and returns the previous - value for this hash. - - The previous hash value - - - - Find the best (longest) string in the window matching the - string starting at strstart. - - Preconditions: - - strstart + DeflaterConstants.MAX_MATCH <= window.length. - - - True if a match greater than the minimum length is found - - - - Hashtable, hashing three characters to an index for window, so - that window[index]..window[index+2] have this hash code. - Note that the array should really be unsigned short, so you need - to and the values with 0xffff. - - - - - prev[index & WMASK] points to the previous index that has the - same hash code as the string starting at index. This way - entries with the same hash code are in a linked list. - Note that the array should really be unsigned short, so you need - to and the values with 0xffff. - - - - - Points to the current character in the window. - - - - - lookahead is the number of characters starting at strstart in - window that are valid. - So window[strstart] until window[strstart+lookahead-1] are valid - characters. - - - - - This array contains the part of the uncompressed stream that - is of relevance. The current character is indexed by strstart. - - - - - The current compression function. - - - - - The input data for compression. - - - - - The total bytes of input read. - - - - - The offset into inputBuf, where input data starts. - - - - - The end offset of the input data. - - - - - The adler checksum - - - - - This is the DeflaterHuffman class. - - This class is not thread safe. This is inherent in the API, due - to the split of Deflate and SetInput. - - author of the original java version : Jochen Hoenicke - - - - - Resets the internal state of the tree - - - - - Check that all frequencies are zero - - - At least one frequency is non-zero - - - - - Set static codes and length - - new codes - length for new codes - - - - Build dynamic codes and lengths - - - - - Get encoded length - - Encoded length, the sum of frequencies * lengths - - - - Scan a literal or distance tree to determine the frequencies of the codes - in the bit length tree. - - - - - Write tree values - - Tree to write - - - - Pending buffer to use - - - - - Construct instance with pending buffer - - Pending buffer to use - - - - Reset internal state - - - - - Write all trees to pending buffer - - The number/rank of treecodes to send. - - - - Compress current buffer writing data to pending buffer - - - - - Flush block to output with no compression - - Data to write - Index of first byte to write - Count of bytes to write - True if this is the last block - - - - Flush block to output with compression - - Data to flush - Index of first byte to flush - Count of bytes to flush - True if this is the last block - - - - Get value indicating if internal buffer is full - - true if buffer is full - - - - Add literal to buffer - - Literal value to add to buffer. - Value indicating internal buffer is full - - - - Add distance code and length to literal and distance trees - - Distance code - Length - Value indicating if internal buffer is full - - - - Reverse the bits of a 16 bit value. - - Value to reverse bits - Value with bits reversed - - - - This class stores the pending output of the Deflater. - - author of the original java version : Jochen Hoenicke - - - - - Construct instance with default buffer size - - - - - Inflater is used to decompress data that has been compressed according - to the "deflate" standard described in rfc1951. - - By default Zlib (rfc1950) headers and footers are expected in the input. - You can use constructor public Inflater(bool noHeader) passing true - if there is no Zlib header information - - The usage is as following. First you have to set some input with - SetInput(), then Inflate() it. If inflate doesn't - inflate any bytes there may be three reasons: -
    -
  • IsNeedingInput() returns true because the input buffer is empty. - You have to provide more input with SetInput(). - NOTE: IsNeedingInput() also returns true when, the stream is finished. -
  • -
  • IsNeedingDictionary() returns true, you have to provide a preset - dictionary with SetDictionary().
  • -
  • IsFinished returns true, the inflater has finished.
  • -
- Once the first output byte is produced, a dictionary will not be - needed at a later stage. - - author of the original java version : John Leuner, Jochen Hoenicke -
-
- - - Copy lengths for literal codes 257..285 - - - - - Extra bits for literal codes 257..285 - - - - - Copy offsets for distance codes 0..29 - - - - - Extra bits for distance codes - - - - - These are the possible states for an inflater - - - - - This variable contains the current state. - - - - - The adler checksum of the dictionary or of the decompressed - stream, as it is written in the header resp. footer of the - compressed stream. - Only valid if mode is DECODE_DICT or DECODE_CHKSUM. - - - - - The number of bits needed to complete the current state. This - is valid, if mode is DECODE_DICT, DECODE_CHKSUM, - DECODE_HUFFMAN_LENBITS or DECODE_HUFFMAN_DISTBITS. - - - - - True, if the last block flag was set in the last block of the - inflated stream. This means that the stream ends after the - current block. - - - - - The total number of inflated bytes. - - - - - The total number of bytes set with setInput(). This is not the - value returned by the TotalIn property, since this also includes the - unprocessed input. - - - - - This variable stores the noHeader flag that was given to the constructor. - True means, that the inflated stream doesn't contain a Zlib header or - footer. - - - - - Creates a new inflater or RFC1951 decompressor - RFC1950/Zlib headers and footers will be expected in the input data - - - - - Creates a new inflater. - - - True if no RFC1950/Zlib header and footer fields are expected in the input data - - This is used for GZIPed/Zipped input. - - For compatibility with - Sun JDK you should provide one byte of input more than needed in - this case. - - - - - Resets the inflater so that a new stream can be decompressed. All - pending input and output will be discarded. - - - - - Decodes a zlib/RFC1950 header. - - - False if more input is needed. - - - The header is invalid. - - - - - Decodes the dictionary checksum after the deflate header. - - - False if more input is needed. - - - - - Decodes the huffman encoded symbols in the input stream. - - - false if more input is needed, true if output window is - full or the current block ends. - - - if deflated stream is invalid. - - - - - Decodes the adler checksum after the deflate stream. - - - false if more input is needed. - - - If checksum doesn't match. - - - - - Decodes the deflated stream. - - - false if more input is needed, or if finished. - - - if deflated stream is invalid. - - - - - Sets the preset dictionary. This should only be called, if - needsDictionary() returns true and it should set the same - dictionary, that was used for deflating. The getAdler() - function returns the checksum of the dictionary needed. - - - The dictionary. - - - - - Sets the preset dictionary. This should only be called, if - needsDictionary() returns true and it should set the same - dictionary, that was used for deflating. The getAdler() - function returns the checksum of the dictionary needed. - - - The dictionary. - - - The index into buffer where the dictionary starts. - - - The number of bytes in the dictionary. - - - No dictionary is needed. - - - The adler checksum for the buffer is invalid - - - - - Sets the input. This should only be called, if needsInput() - returns true. - - - the input. - - - - - Sets the input. This should only be called, if needsInput() - returns true. - - - The source of input data - - - The index into buffer where the input starts. - - - The number of bytes of input to use. - - - No input is needed. - - - The index and/or count are wrong. - - - - - Inflates the compressed stream to the output buffer. If this - returns 0, you should check, whether IsNeedingDictionary(), - IsNeedingInput() or IsFinished() returns true, to determine why no - further output is produced. - - - the output buffer. - - - The number of bytes written to the buffer, 0 if no further - output can be produced. - - - if buffer has length 0. - - - if deflated stream is invalid. - - - - - Inflates the compressed stream to the output buffer. If this - returns 0, you should check, whether needsDictionary(), - needsInput() or finished() returns true, to determine why no - further output is produced. - - - the output buffer. - - - the offset in buffer where storing starts. - - - the maximum number of bytes to output. - - - the number of bytes written to the buffer, 0 if no further output can be produced. - - - if count is less than 0. - - - if the index and / or count are wrong. - - - if deflated stream is invalid. - - - - - Returns true, if the input buffer is empty. - You should then call setInput(). - NOTE: This method also returns true when the stream is finished. - - - - - Returns true, if a preset dictionary is needed to inflate the input. - - - - - Returns true, if the inflater has finished. This means, that no - input is needed and no output can be produced. - - - - - Gets the adler checksum. This is either the checksum of all - uncompressed bytes returned by inflate(), or if needsDictionary() - returns true (and thus no output was yet produced) this is the - adler checksum of the expected dictionary. - - - the adler checksum. - - - - - Gets the total number of output bytes returned by Inflate(). - - - the total number of output bytes. - - - - - Gets the total number of processed compressed input bytes. - - - The total number of bytes of processed input bytes. - - - - - Gets the number of unprocessed input bytes. Useful, if the end of the - stream is reached and you want to further process the bytes after - the deflate stream. - - - The number of bytes of the input which have not been processed. - - - - - Continue decoding header from until more bits are needed or decoding has been completed - - Returns whether decoding could be completed - - - - Get literal/length huffman tree, must not be used before has returned true - - If hader has not been successfully read by the state machine - - - - Get distance huffman tree, must not be used before has returned true - - If hader has not been successfully read by the state machine - - - - Huffman tree used for inflation - - - - - Literal length tree - - - - - Distance tree - - - - - Constructs a Huffman tree from the array of code lengths. - - - the array of code lengths - - - - - Reads the next symbol from input. The symbol is encoded using the - huffman tree. - - - input the input source. - - - the next symbol, or -1 if not enough input is available. - - - - - This class is general purpose class for writing data to a buffer. - - It allows you to write bits as well as bytes - Based on DeflaterPending.java - - author of the original java version : Jochen Hoenicke - - - - - Internal work buffer - - - - - construct instance using default buffer size of 4096 - - - - - construct instance using specified buffer size - - - size to use for internal buffer - - - - - Clear internal state/buffers - - - - - Write a byte to buffer - - - The value to write - - - - - Write a short value to buffer LSB first - - - The value to write. - - - - - write an integer LSB first - - The value to write. - - - - Write a block of data to buffer - - data to write - offset of first byte to write - number of bytes to write - - - - The number of bits written to the buffer - - - - - Align internal buffer on a byte boundary - - - - - Write bits to internal buffer - - source of bits - number of bits to write - - - - Write a short value to internal buffer most significant byte first - - value to write - - - - Indicates if buffer has been flushed - - - - - Flushes the pending buffer into the given output array. If the - output array is to small, only a partial flush is done. - - The output array. - The offset into output array. - The maximum number of bytes to store. - The number of bytes flushed. - - - - Convert internal buffer to byte array. - Buffer is empty on completion - - - The internal buffer contents converted to a byte array. - - - - - A special stream deflating or compressing the bytes that are - written to it. It uses a Deflater to perform actual deflating.
- Authors of the original java version : Tom Tromey, Jochen Hoenicke -
-
- - - Creates a new DeflaterOutputStream with a default Deflater and default buffer size. - - - the output stream where deflated output should be written. - - - - - Creates a new DeflaterOutputStream with the given Deflater and - default buffer size. - - - the output stream where deflated output should be written. - - - the underlying deflater. - - - - - Creates a new DeflaterOutputStream with the given Deflater and - buffer size. - - - The output stream where deflated output is written. - - - The underlying deflater to use - - - The buffer size in bytes to use when deflating (minimum value 512) - - - bufsize is less than or equal to zero. - - - baseOutputStream does not support writing - - - deflater instance is null - - - - - Finishes the stream by calling finish() on the deflater. - - - Not all input is deflated - - - - - Gets or sets a flag indicating ownership of underlying stream. - When the flag is true will close the underlying stream also. - - The default value is true. - - - - Allows client to determine if an entry can be patched after its added - - - - - Returns the 10 byte AUTH CODE to be appended immediately following the AES data stream. - - - - - Get/set the password used for encryption. - - When set to null or if the password is empty no encryption is performed - - - - Encrypt a block of data - - - Data to encrypt. NOTE the original contents of the buffer are lost - - - Offset of first byte in buffer to encrypt - - - Number of bytes in buffer to encrypt - - - - - Initializes encryption keys based on given . - - The password. - - - - Initializes encryption keys based on given password. - - - - - Deflates everything in the input buffers. This will call - def.deflate() until all bytes from the input buffers - are processed. - - - - - Gets value indicating stream can be read from - - - - - Gets a value indicating if seeking is supported for this stream - This property always returns false - - - - - Get value indicating if this stream supports writing - - - - - Get current length of stream - - - - - Gets the current position within the stream. - - Any attempt to set position - - - - Sets the current position of this stream to the given value. Not supported by this class! - - The offset relative to the to seek. - The to seek from. - The new position in the stream. - Any access - - - - Sets the length of this stream to the given value. Not supported by this class! - - The new stream length. - Any access - - - - Read a byte from stream advancing position by one - - The byte read cast to an int. THe value is -1 if at the end of the stream. - Any access - - - - Read a block of bytes from stream - - The buffer to store read data in. - The offset to start storing at. - The maximum number of bytes to read. - The actual number of bytes read. Zero if end of stream is detected. - Any access - - - - Flushes the stream by calling Flush on the deflater and then - on the underlying stream. This ensures that all bytes are flushed. - - - - - Calls and closes the underlying - stream when is true. - - - - - Writes a single byte to the compressed output stream. - - - The byte value. - - - - - Writes bytes from an array to the compressed stream. - - - The byte array - - - The offset into the byte array where to start. - - - The number of bytes to write. - - - - - This buffer is used temporarily to retrieve the bytes from the - deflater and write them to the underlying output stream. - - - - - The deflater which is used to deflate the stream. - - - - - Base stream the deflater depends on. - - - - - An input buffer customised for use by - - - The buffer supports decryption of incoming data. - - - - - Initialise a new instance of with a default buffer size - - The stream to buffer. - - - - Initialise a new instance of - - The stream to buffer. - The size to use for the buffer - A minimum buffer size of 1KB is permitted. Lower sizes are treated as 1KB. - - - - Get the length of bytes bytes in the - - - - - Get the contents of the raw data buffer. - - This may contain encrypted data. - - - - Get the number of useable bytes in - - - - - Get the contents of the clear text buffer. - - - - - Get/set the number of bytes available - - - - - Call passing the current clear text buffer contents. - - The inflater to set input for. - - - - Fill the buffer from the underlying input stream. - - - - - Read a buffer directly from the input stream - - The buffer to fill - Returns the number of bytes read. - - - - Read a buffer directly from the input stream - - The buffer to read into - The offset to start reading data into. - The number of bytes to read. - Returns the number of bytes read. - - - - Read clear text data from the input stream. - - The buffer to add data to. - The offset to start adding data at. - The number of bytes to read. - Returns the number of bytes actually read. - - - - Read a from the input stream. - - Returns the byte read. - - - - Read an in little endian byte order. - - The short value read case to an int. - - - - Read an in little endian byte order. - - The int value read. - - - - Read a in little endian byte order. - - The long value read. - - - - Get/set the to apply to any data. - - Set this value to null to have no transform applied. - - - - This filter stream is used to decompress data compressed using the "deflate" - format. The "deflate" format is described in RFC 1951. - - This stream may form the basis for other decompression filters, such - as the GZipInputStream. - - Author of the original java version : John Leuner. - - - - - Create an InflaterInputStream with the default decompressor - and a default buffer size of 4KB. - - - The InputStream to read bytes from - - - - - Create an InflaterInputStream with the specified decompressor - and a default buffer size of 4KB. - - - The source of input data - - - The decompressor used to decompress data read from baseInputStream - - - - - Create an InflaterInputStream with the specified decompressor - and the specified buffer size. - - - The InputStream to read bytes from - - - The decompressor to use - - - Size of the buffer to use - - - - - Gets or sets a flag indicating ownership of underlying stream. - When the flag is true will close the underlying stream also. - - The default value is true. - - - - Skip specified number of bytes of uncompressed data - - - Number of bytes to skip - - - The number of bytes skipped, zero if the end of - stream has been reached - - - The number of bytes to skip is less than or equal to zero. - - - - - Clear any cryptographic state. - - - - - Returns 0 once the end of the stream (EOF) has been reached. - Otherwise returns 1. - - - - - Fills the buffer with more data to decompress. - - - Stream ends early - - - - - Gets a value indicating whether the current stream supports reading - - - - - Gets a value of false indicating seeking is not supported for this stream. - - - - - Gets a value of false indicating that this stream is not writeable. - - - - - A value representing the length of the stream in bytes. - - - - - The current position within the stream. - Throws a NotSupportedException when attempting to set the position - - Attempting to set the position - - - - Flushes the baseInputStream - - - - - Sets the position within the current stream - Always throws a NotSupportedException - - The relative offset to seek to. - The defining where to seek from. - The new position in the stream. - Any access - - - - Set the length of the current stream - Always throws a NotSupportedException - - The new length value for the stream. - Any access - - - - Writes a sequence of bytes to stream and advances the current position - This method always throws a NotSupportedException - - Thew buffer containing data to write. - The offset of the first byte to write. - The number of bytes to write. - Any access - - - - Writes one byte to the current stream and advances the current position - Always throws a NotSupportedException - - The byte to write. - Any access - - - - Closes the input stream. When - is true the underlying stream is also closed. - - - - - Reads decompressed data into the provided buffer byte array - - - The array to read and decompress data into - - - The offset indicating where the data should be placed - - - The number of bytes to decompress - - The number of bytes read. Zero signals the end of stream - - Inflater needs a dictionary - - - - - Decompressor for this stream - - - - - Input buffer for this stream. - - - - - Base stream the inflater reads from. - - - - - The compressed size - - - - - Flag indicating wether this instance has been closed or not. - - - - - Contains the output from the Inflation process. - We need to have a window so that we can refer backwards into the output stream - to repeat stuff.
- Author of the original java version : John Leuner -
-
- - - Write a byte to this output window - - value to write - - if window is full - - - - - Append a byte pattern already in the window itself - - length of pattern to copy - distance from end of window pattern occurs - - If the repeated data overflows the window - - - - - Copy from input manipulator to internal window - - source of data - length of data to copy - the number of bytes copied - - - - Copy dictionary to window - - source dictionary - offset of start in source dictionary - length of dictionary - - If window isnt empty - - - - - Get remaining unfilled space in window - - Number of bytes left in window - - - - Get bytes available for output in window - - Number of bytes filled - - - - Copy contents of window to output - - buffer to copy to - offset to start at - number of bytes to count - The number of bytes copied - - If a window underflow occurs - - - - - Reset by clearing window so GetAvailable returns 0 - - - - - This class allows us to retrieve a specified number of bits from - the input buffer, as well as copy big byte blocks. - - It uses an int buffer to store up to 31 bits for direct - manipulation. This guarantees that we can get at least 16 bits, - but we only need at most 15, so this is all safe. - - There are some optimizations in this class, for example, you must - never peek more than 8 bits more than needed, and you must first - peek bits before you may drop them. This is not a general purpose - class but optimized for the behaviour of the Inflater. - - authors of the original java version : John Leuner, Jochen Hoenicke - - - - - Get the next sequence of bits but don't increase input pointer. bitCount must be - less or equal 16 and if this call succeeds, you must drop - at least n - 8 bits in the next call. - - The number of bits to peek. - - the value of the bits, or -1 if not enough bits available. */ - - - - - Tries to grab the next bits from the input and - sets to the value, adding . - - true if enough bits could be read, otherwise false - - - - Tries to grab the next bits from the input and - sets of to the value. - - true if enough bits could be read, otherwise false - - - - Drops the next n bits from the input. You should have called PeekBits - with a bigger or equal n before, to make sure that enough bits are in - the bit buffer. - - The number of bits to drop. - - - - Gets the next n bits and increases input pointer. This is equivalent - to followed by , except for correct error handling. - - The number of bits to retrieve. - - the value of the bits, or -1 if not enough bits available. - - - - - Gets the number of bits available in the bit buffer. This must be - only called when a previous PeekBits() returned -1. - - - the number of bits available. - - - - - Gets the number of bytes available. - - - The number of bytes available. - - - - - Skips to the next byte boundary. - - - - - Returns true when SetInput can be called - - - - - Copies bytes from input buffer to output buffer starting - at output[offset]. You have to make sure, that the buffer is - byte aligned. If not enough bytes are available, copies fewer - bytes. - - - The buffer to copy bytes to. - - - The offset in the buffer at which copying starts - - - The length to copy, 0 is allowed. - - - The number of bytes copied, 0 if no bytes were available. - - - Length is less than zero - - - Bit buffer isnt byte aligned - - - - - Resets state and empties internal buffers - - - - - Add more input for consumption. - Only call when IsNeedingInput returns true - - data to be input - offset of first byte of input - number of bytes of input to add. - - - - FastZipEvents supports all events applicable to FastZip operations. - - - - - Delegate to invoke when processing directories. - - - - - Delegate to invoke when processing files. - - - - - Delegate to invoke during processing of files. - - - - - Delegate to invoke when processing for a file has been completed. - - - - - Delegate to invoke when processing directory failures. - - - - - Delegate to invoke when processing file failures. - - - - - Raise the directory failure event. - - The directory causing the failure. - The exception for this event. - A boolean indicating if execution should continue or not. - - - - Fires the file failure handler delegate. - - The file causing the failure. - The exception for this failure. - A boolean indicating if execution should continue or not. - - - - Fires the ProcessFile delegate. - - The file being processed. - A boolean indicating if execution should continue or not. - - - - Fires the delegate - - The file whose processing has been completed. - A boolean indicating if execution should continue or not. - - - - Fires the process directory delegate. - - The directory being processed. - Flag indicating if the directory has matching files as determined by the current filter. - A of true if the operation should continue; false otherwise. - - - - The minimum timespan between events. - - The minimum period of time between events. - - The default interval is three seconds. - - - - FastZip provides facilities for creating and extracting zip files. - - - - - Defines the desired handling when overwriting files during extraction. - - - - - Prompt the user to confirm overwriting - - - - - Never overwrite files. - - - - - Always overwrite files. - - - - - Initialise a default instance of . - - - - - Initialise a new instance of - - The events to use during operations. - - - - Get/set a value indicating wether empty directories should be created. - - - - - Get / set the password value. - - - - - Get or set the active when creating Zip files. - - - - - - Get or set the active when creating Zip files. - - - - - Gets or sets the setting for Zip64 handling when writing. - - - The default value is dynamic which is not backwards compatible with old - programs and can cause problems with XP's built in compression which cant - read Zip64 archives. However it does avoid the situation were a large file - is added and cannot be completed correctly. - NOTE: Setting the size for entries before they are added is the best solution! - By default the EntryFactory used by FastZip will set fhe file size. - - - - - Get/set a value indicating wether file dates and times should - be restored when extracting files from an archive. - - The default value is false. - - - - Get/set a value indicating whether file attributes should - be restored during extract operations - - - - - Get/set the Compression Level that will be used - when creating the zip - - - - - Delegate called when confirming overwriting of files. - - - - - Create a zip file. - - The name of the zip file to create. - The directory to source files from. - True to recurse directories, false for no recursion. - The file filter to apply. - The directory filter to apply. - - - - Create a zip file/archive. - - The name of the zip file to create. - The directory to obtain files and directories from. - True to recurse directories, false for no recursion. - The file filter to apply. - - - - Create a zip archive sending output to the passed. - - The stream to write archive data to. - The directory to source files from. - True to recurse directories, false for no recursion. - The file filter to apply. - The directory filter to apply. - The is closed after creation. - - - - Extract the contents of a zip file. - - The zip file to extract from. - The directory to save extracted information in. - A filter to apply to files. - - - - Extract the contents of a zip file. - - The zip file to extract from. - The directory to save extracted information in. - The style of overwriting to apply. - A delegate to invoke when confirming overwriting. - A filter to apply to files. - A filter to apply to directories. - Flag indicating whether to restore the date and time for extracted files. - Allow parent directory traversal in file paths (e.g. ../file) - - - - Extract the contents of a zip file held in a stream. - - The seekable input stream containing the zip to extract from. - The directory to save extracted information in. - The style of overwriting to apply. - A delegate to invoke when confirming overwriting. - A filter to apply to files. - A filter to apply to directories. - Flag indicating whether to restore the date and time for extracted files. - Flag indicating whether the inputStream will be closed by this method. - Allow parent directory traversal in file paths (e.g. ../file) - - - - Defines factory methods for creating new values. - - - - - Create a for a file given its name - - The name of the file to create an entry for. - Returns a file entry based on the passed. - - - - Create a for a file given its name - - The name of the file to create an entry for. - If true get details from the file system if the file exists. - Returns a file entry based on the passed. - - - - Create a for a file given its actual name and optional override name - - The name of the file to create an entry for. - An alternative name to be used for the new entry. Null if not applicable. - If true get details from the file system if the file exists. - Returns a file entry based on the passed. - - - - Create a for a directory given its name - - The name of the directory to create an entry for. - Returns a directory entry based on the passed. - - - - Create a for a directory given its name - - The name of the directory to create an entry for. - If true get details from the file system for this directory if it exists. - Returns a directory entry based on the passed. - - - - Get/set the applicable. - - - - - WindowsNameTransform transforms names to windows compatible ones. - - - - - The maximum windows path name permitted. - - This may not valid for all windows systems - CE?, etc but I cant find the equivalent in the CLR. - - - - In this case we need Windows' invalid path characters. - Path.GetInvalidPathChars() only returns a subset invalid on all platforms. - - - - - Initialises a new instance of - - - Allow parent directory traversal in file paths (e.g. ../file) - - - - Initialise a default instance of - - - - - Gets or sets a value containing the target directory to prefix values with. - - - - - Allow parent directory traversal in file paths (e.g. ../file) - - - - - Gets or sets a value indicating wether paths on incoming values should be removed. - - - - - Transform a Zip directory name to a windows directory name. - - The directory name to transform. - The transformed name. - - - - Transform a Zip format file name to a windows style one. - - The file name to transform. - The transformed name. - - - - Test a name to see if it is a valid name for a windows filename as extracted from a Zip archive. - - The name to test. - Returns true if the name is a valid zip name; false otherwise. - The filename isnt a true windows path in some fundamental ways like no absolute paths, no rooted paths etc. - - - - Force a name to be valid by replacing invalid characters with a fixed value - - The name to make valid - The replacement character to use for any invalid characters. - Returns a valid name - - - - Gets or set the character to replace invalid characters during transformations. - - - - - Determines how entries are tested to see if they should use Zip64 extensions or not. - - - - - Zip64 will not be forced on entries during processing. - - An entry can have this overridden if required - - - - Zip64 should always be used. - - - - - #ZipLib will determine use based on entry values when added to archive. - - - - - The kind of compression used for an entry in an archive - - - - - A direct copy of the file contents is held in the archive - - - - - Common Zip compression method using a sliding dictionary - of up to 32KB and secondary compression from Huffman/Shannon-Fano trees - - - - - An extension to deflate with a 64KB window. Not supported by #Zip currently - - - - - BZip2 compression. Not supported by #Zip. - - - - - WinZip special for AES encryption, Now supported by #Zip. - - - - - Identifies the encryption algorithm used for an entry - - - - - No encryption has been used. - - - - - Encrypted using PKZIP 2.0 or 'classic' encryption. - - - - - DES encryption has been used. - - - - - RC2 encryption has been used for encryption. - - - - - Triple DES encryption with 168 bit keys has been used for this entry. - - - - - Triple DES with 112 bit keys has been used for this entry. - - - - - AES 128 has been used for encryption. - - - - - AES 192 has been used for encryption. - - - - - AES 256 has been used for encryption. - - - - - RC2 corrected has been used for encryption. - - - - - Blowfish has been used for encryption. - - - - - Twofish has been used for encryption. - - - - - RC4 has been used for encryption. - - - - - An unknown algorithm has been used for encryption. - - - - - Defines the contents of the general bit flags field for an archive entry. - - - - - Bit 0 if set indicates that the file is encrypted - - - - - Bits 1 and 2 - Two bits defining the compression method (only for Method 6 Imploding and 8,9 Deflating) - - - - - Bit 3 if set indicates a trailing data desciptor is appended to the entry data - - - - - Bit 4 is reserved for use with method 8 for enhanced deflation - - - - - Bit 5 if set indicates the file contains Pkzip compressed patched data. - Requires version 2.7 or greater. - - - - - Bit 6 if set indicates strong encryption has been used for this entry. - - - - - Bit 7 is currently unused - - - - - Bit 8 is currently unused - - - - - Bit 9 is currently unused - - - - - Bit 10 is currently unused - - - - - Bit 11 if set indicates the filename and - comment fields for this file must be encoded using UTF-8. - - - - - Bit 12 is documented as being reserved by PKware for enhanced compression. - - - - - Bit 13 if set indicates that values in the local header are masked to hide - their actual values, and the central directory is encrypted. - - - Used when encrypting the central directory contents. - - - - - Bit 14 is documented as being reserved for use by PKware - - - - - Bit 15 is documented as being reserved for use by PKware - - - - - This class contains constants used for Zip format files - - - - - The version made by field for entries in the central header when created by this library - - - This is also the Zip version for the library when comparing against the version required to extract - for an entry. See . - - - - - The version made by field for entries in the central header when created by this library - - - This is also the Zip version for the library when comparing against the version required to extract - for an entry. See ZipInputStream.CanDecompressEntry. - - - - - The minimum version required to support strong encryption - - - - - The minimum version required to support strong encryption - - - - - Version indicating AES encryption - - - - - The version required for Zip64 extensions (4.5 or higher) - - - - - Size of local entry header (excluding variable length fields at end) - - - - - Size of local entry header (excluding variable length fields at end) - - - - - Size of Zip64 data descriptor - - - - - Size of data descriptor - - - - - Size of data descriptor - - - - - Size of central header entry (excluding variable fields) - - - - - Size of central header entry - - - - - Size of end of central record (excluding variable fields) - - - - - Size of end of central record (excluding variable fields) - - - - - Size of 'classic' cryptographic header stored before any entry data - - - - - Size of cryptographic header stored before entry data - - - - - Signature for local entry header - - - - - Signature for local entry header - - - - - Signature for spanning entry - - - - - Signature for spanning entry - - - - - Signature for temporary spanning entry - - - - - Signature for temporary spanning entry - - - - - Signature for data descriptor - - - This is only used where the length, Crc, or compressed size isnt known when the - entry is created and the output stream doesnt support seeking. - The local entry cannot be 'patched' with the correct values in this case - so the values are recorded after the data prefixed by this header, as well as in the central directory. - - - - - Signature for data descriptor - - - This is only used where the length, Crc, or compressed size isnt known when the - entry is created and the output stream doesnt support seeking. - The local entry cannot be 'patched' with the correct values in this case - so the values are recorded after the data prefixed by this header, as well as in the central directory. - - - - - Signature for central header - - - - - Signature for central header - - - - - Signature for Zip64 central file header - - - - - Signature for Zip64 central file header - - - - - Signature for Zip64 central directory locator - - - - - Signature for archive extra data signature (were headers are encrypted). - - - - - Central header digitial signature - - - - - Central header digitial signature - - - - - End of central directory record signature - - - - - End of central directory record signature - - - - - Default encoding used for string conversion. 0 gives the default system OEM code page. - Using the default code page isnt the full solution neccessarily - there are many variable factors, codepage 850 is often a good choice for - European users, however be careful about compatability. - - - - Depracated wrapper for - - - Depracated wrapper for - - - Depracated wrapper for - - - Depracated wrapper for - - - Depracated wrapper for - - - Depracated wrapper for - - - - Defines known values for the property. - - - - - Host system = MSDOS - - - - - Host system = Amiga - - - - - Host system = Open VMS - - - - - Host system = Unix - - - - - Host system = VMCms - - - - - Host system = Atari ST - - - - - Host system = OS2 - - - - - Host system = Macintosh - - - - - Host system = ZSystem - - - - - Host system = Cpm - - - - - Host system = Windows NT - - - - - Host system = MVS - - - - - Host system = VSE - - - - - Host system = Acorn RISC - - - - - Host system = VFAT - - - - - Host system = Alternate MVS - - - - - Host system = BEOS - - - - - Host system = Tandem - - - - - Host system = OS400 - - - - - Host system = OSX - - - - - Host system = WinZIP AES - - - - - This class represents an entry in a zip archive. This can be a file - or a directory - ZipFile and ZipInputStream will give you instances of this class as - information about the members in an archive. ZipOutputStream - uses an instance of this class when creating an entry in a Zip file. -
-
Author of the original java version : Jochen Hoenicke -
-
- - - Creates a zip entry with the given name. - - - The name for this entry. Can include directory components. - The convention for names is 'unix' style paths with relative names only. - There are with no device names and path elements are separated by '/' characters. - - - The name passed is null - - - - - Creates a zip entry with the given name and version required to extract - - - The name for this entry. Can include directory components. - The convention for names is 'unix' style paths with no device names and - path elements separated by '/' characters. This is not enforced see CleanName - on how to ensure names are valid if this is desired. - - - The minimum 'feature version' required this entry - - - The name passed is null - - - - - Initializes an entry with the given name and made by information - - Name for this entry - Version and HostSystem Information - Minimum required zip feature version required to extract this entry - Compression method for this entry. - - The name passed is null - - - versionRequiredToExtract should be 0 (auto-calculate) or > 10 - - - This constructor is used by the ZipFile class when reading from the central header - It is not generally useful, use the constructor specifying the name only. - - - - - Creates a deep copy of the given zip entry. - - - The entry to copy. - - - - - Get a value indicating wether the entry has a CRC value available. - - - - - Get/Set flag indicating if entry is encrypted. - A simple helper routine to aid interpretation of flags - - This is an assistant that interprets the flags property. - - - - Get / set a flag indicating wether entry name and comment text are - encoded in unicode UTF8. - - This is an assistant that interprets the flags property. - - - - Value used during password checking for PKZIP 2.0 / 'classic' encryption. - - - - - Get/Set general purpose bit flag for entry - - - General purpose bit flag
-
- Bit 0: If set, indicates the file is encrypted
- Bit 1-2 Only used for compression type 6 Imploding, and 8, 9 deflating
- Imploding:
- Bit 1 if set indicates an 8K sliding dictionary was used. If clear a 4k dictionary was used
- Bit 2 if set indicates 3 Shannon-Fanno trees were used to encode the sliding dictionary, 2 otherwise
-
- Deflating:
- Bit 2 Bit 1
- 0 0 Normal compression was used
- 0 1 Maximum compression was used
- 1 0 Fast compression was used
- 1 1 Super fast compression was used
-
- Bit 3: If set, the fields crc-32, compressed size - and uncompressed size are were not able to be written during zip file creation - The correct values are held in a data descriptor immediately following the compressed data.
- Bit 4: Reserved for use by PKZIP for enhanced deflating
- Bit 5: If set indicates the file contains compressed patch data
- Bit 6: If set indicates strong encryption was used.
- Bit 7-10: Unused or reserved
- Bit 11: If set the name and comments for this entry are in unicode.
- Bit 12-15: Unused or reserved
-
- - -
- - - Get/Set index of this entry in Zip file - - This is only valid when the entry is part of a - - - - Get/set offset for use in central header - - - - - Get/Set external file attributes as an integer. - The values of this are operating system dependant see - HostSystem for details - - - - - Get the version made by for this entry or zero if unknown. - The value / 10 indicates the major version number, and - the value mod 10 is the minor version number - - - - - Get a value indicating this entry is for a DOS/Windows system. - - - - - Test the external attributes for this to - see if the external attributes are Dos based (including WINNT and variants) - and match the values - - The attributes to test. - Returns true if the external attributes are known to be DOS/Windows - based and have the same attributes set as the value passed. - - - - Gets the compatability information for the external file attribute - If the external file attributes are compatible with MS-DOS and can be read - by PKZIP for DOS version 2.04g then this value will be zero. Otherwise the value - will be non-zero and identify the host system on which the attributes are compatible. - - - - The values for this as defined in the Zip File format and by others are shown below. The values are somewhat - misleading in some cases as they are not all used as shown. You should consult the relevant documentation - to obtain up to date and correct information. The modified appnote by the infozip group is - particularly helpful as it documents a lot of peculiarities. The document is however a little dated. - - 0 - MS-DOS and OS/2 (FAT / VFAT / FAT32 file systems) - 1 - Amiga - 2 - OpenVMS - 3 - Unix - 4 - VM/CMS - 5 - Atari ST - 6 - OS/2 HPFS - 7 - Macintosh - 8 - Z-System - 9 - CP/M - 10 - Windows NTFS - 11 - MVS (OS/390 - Z/OS) - 12 - VSE - 13 - Acorn Risc - 14 - VFAT - 15 - Alternate MVS - 16 - BeOS - 17 - Tandem - 18 - OS/400 - 19 - OS/X (Darwin) - 99 - WinZip AES - remainder - unused - - - - - - Get minimum Zip feature version required to extract this entry - - - Minimum features are defined as:
- 1.0 - Default value
- 1.1 - File is a volume label
- 2.0 - File is a folder/directory
- 2.0 - File is compressed using Deflate compression
- 2.0 - File is encrypted using traditional encryption
- 2.1 - File is compressed using Deflate64
- 2.5 - File is compressed using PKWARE DCL Implode
- 2.7 - File is a patch data set
- 4.5 - File uses Zip64 format extensions
- 4.6 - File is compressed using BZIP2 compression
- 5.0 - File is encrypted using DES
- 5.0 - File is encrypted using 3DES
- 5.0 - File is encrypted using original RC2 encryption
- 5.0 - File is encrypted using RC4 encryption
- 5.1 - File is encrypted using AES encryption
- 5.1 - File is encrypted using corrected RC2 encryption
- 5.1 - File is encrypted using corrected RC2-64 encryption
- 6.1 - File is encrypted using non-OAEP key wrapping
- 6.2 - Central directory encryption (not confirmed yet)
- 6.3 - File is compressed using LZMA
- 6.3 - File is compressed using PPMD+
- 6.3 - File is encrypted using Blowfish
- 6.3 - File is encrypted using Twofish
-
- -
- - - Get a value indicating whether this entry can be decompressed by the library. - - This is based on the and - wether the compression method is supported. - - - - Force this entry to be recorded using Zip64 extensions. - - - - - Get a value indicating wether Zip64 extensions were forced. - - A value of true if Zip64 extensions have been forced on; false if not. - - - - Gets a value indicating if the entry requires Zip64 extensions - to store the full entry values. - - A value of true if a local header requires Zip64 extensions; false if not. - - - - Get a value indicating wether the central directory entry requires Zip64 extensions to be stored. - - - - - Get/Set DosTime value. - - - The MS-DOS date format can only represent dates between 1/1/1980 and 12/31/2107. - - - - - Gets/Sets the time of last modification of the entry. - - - The property is updated to match this as far as possible. - - - - - Returns the entry name. - - - The unix naming convention is followed. - Path components in the entry should always separated by forward slashes ('/'). - Dos device names like C: should also be removed. - See the class, or - - - - - Gets/Sets the size of the uncompressed data. - - - The size or -1 if unknown. - - Setting the size before adding an entry to an archive can help - avoid compatability problems with some archivers which dont understand Zip64 extensions. - - - - Gets/Sets the size of the compressed data. - - - The compressed entry size or -1 if unknown. - - - - - Gets/Sets the crc of the uncompressed data. - - - Crc is not in the range 0..0xffffffffL - - - The crc value or -1 if unknown. - - - - - Gets/Sets the compression method. Only Deflated and Stored are supported. - - - The compression method for this entry - - - - - - - Gets the compression method for outputting to the local or central header. - Returns same value as CompressionMethod except when AES encrypting, which - places 99 in the method and places the real method in the extra data. - - - - - Gets/Sets the extra data. - - - Extra data is longer than 64KB (0xffff) bytes. - - - Extra data or null if not set. - - - - - For AES encrypted files returns or sets the number of bits of encryption (128, 192 or 256). - When setting, only 0 (off), 128 or 256 is supported. - - - - - AES Encryption strength for storage in extra data in entry header. - 1 is 128 bit, 2 is 192 bit, 3 is 256 bit. - - - - - Returns the length of the salt, in bytes - - - - - Number of extra bytes required to hold the AES Header fields (Salt, Pwd verify, AuthCode) - - - - - Process extra data fields updating the entry based on the contents. - - True if the extra data fields should be handled - for a local header, rather than for a central header. - - - - - Gets/Sets the entry comment. - - - If comment is longer than 0xffff. - - - The comment or null if not set. - - - A comment is only available for entries when read via the class. - The class doesnt have the comment data available. - - - - - Gets a value indicating if the entry is a directory. - however. - - - A directory is determined by an entry name with a trailing slash '/'. - The external file attributes can also indicate an entry is for a directory. - Currently only dos/windows attributes are tested in this manner. - The trailing slash convention should always be followed. - - - - - Get a value of true if the entry appears to be a file; false otherwise - - - This only takes account of DOS/Windows attributes. Other operating systems are ignored. - For linux and others the result may be incorrect. - - - - - Test entry to see if data can be extracted. - - Returns true if data can be extracted for this entry; false otherwise. - - - - Creates a copy of this zip entry. - - An that is a copy of the current instance. - - - - Gets a string representation of this ZipEntry. - - A readable textual representation of this - - - - Test a compression method to see if this library - supports extracting data compressed with that method - - The compression method to test. - Returns true if the compression method is supported; false otherwise - - - - Cleans a name making it conform to Zip file conventions. - Devices names ('c:\') and UNC share names ('\\server\share') are removed - and forward slashes ('\') are converted to back slashes ('/'). - Names are made relative by trimming leading slashes which is compatible - with the ZIP naming convention. - - The name to clean - The 'cleaned' name. - - The Zip name transform class is more flexible. - - - - - Basic implementation of - - - - - Defines the possible values to be used for the . - - - - - Use the recorded LastWriteTime value for the file. - - - - - Use the recorded LastWriteTimeUtc value for the file - - - - - Use the recorded CreateTime value for the file. - - - - - Use the recorded CreateTimeUtc value for the file. - - - - - Use the recorded LastAccessTime value for the file. - - - - - Use the recorded LastAccessTimeUtc value for the file. - - - - - Use a fixed value. - - The actual value used can be - specified via the constructor or - using the with the setting set - to which will use the when this class was constructed. - The property can also be used to set this value. - - - - Initialise a new instance of the class. - - A default , and the LastWriteTime for files is used. - - - - Initialise a new instance of using the specified - - The time setting to use when creating Zip entries. - - - - Initialise a new instance of using the specified - - The time to set all values to. - - - - Get / set the to be used when creating new values. - - - Setting this property to null will cause a default name transform to be used. - - - - - Get / set the in use. - - - - - Get / set the value to use when is set to - - - - - A bitmask defining the attributes to be retrieved from the actual file. - - The default is to get all possible attributes from the actual file. - - - - A bitmask defining which attributes are to be set on. - - By default no attributes are set on. - - - - Get set a value indicating wether unidoce text should be set on. - - - - - Make a new for a file. - - The name of the file to create a new entry for. - Returns a new based on the . - - - - Make a new for a file. - - The name of the file to create a new entry for. - If true entry detail is retrieved from the file system if the file exists. - Returns a new based on the . - - - - Make a new from a name. - - The name of the file to create a new entry for. - An alternative name to be used for the new entry. Null if not applicable. - If true entry detail is retrieved from the file system if the file exists. - Returns a new based on the . - - - - Make a new for a directory. - - The raw untransformed name for the new directory - Returns a new representing a directory. - - - - Make a new for a directory. - - The raw untransformed name for the new directory - If true entry detail is retrieved from the file system if the file exists. - Returns a new representing a directory. - - - - ZipException represents exceptions specific to Zip classes and code. - - - - - Initialise a new instance of . - - - - - Initialise a new instance of with its message string. - - A that describes the error. - - - - Initialise a new instance of . - - A that describes the error. - The that caused this exception. - - - - ExtraData tagged value interface. - - - - - Get the ID for this tagged data value. - - - - - Set the contents of this instance from the data passed. - - The data to extract contents from. - The offset to begin extracting data from. - The number of bytes to extract. - - - - Get the data representing this instance. - - Returns the data for this instance. - - - - A raw binary tagged value - - - - - Initialise a new instance. - - The tag ID. - - - - Get the ID for this tagged data value. - - - - - Set the data from the raw values provided. - - The raw data to extract values from. - The index to start extracting values from. - The number of bytes available. - - - - Get the binary data representing this instance. - - The raw binary data representing this instance. - - - - Get /set the binary data representing this instance. - - The raw binary data representing this instance. - - - - The tag ID for this instance. - - - - - Class representing extended unix date time values. - - - - - Flags indicate which values are included in this instance. - - - - - The modification time is included - - - - - The access time is included - - - - - The create time is included. - - - - - Get the ID - - - - - Set the data from the raw values provided. - - The raw data to extract values from. - The index to start extracting values from. - The number of bytes available. - - - - Get the binary data representing this instance. - - The raw binary data representing this instance. - - - - Test a value to see if is valid and can be represented here. - - The value to test. - Returns true if the value is valid and can be represented; false if not. - The standard Unix time is a signed integer data type, directly encoding the Unix time number, - which is the number of seconds since 1970-01-01. - Being 32 bits means the values here cover a range of about 136 years. - The minimum representable time is 1901-12-13 20:45:52, - and the maximum representable time is 2038-01-19 03:14:07. - - - - - Get /set the Modification Time - - - - - - - Get / set the Access Time - - - - - - - Get / Set the Create Time - - - - - - - Get/set the values to include. - - - - - Class handling NT date time values. - - - - - Get the ID for this tagged data value. - - - - - Set the data from the raw values provided. - - The raw data to extract values from. - The index to start extracting values from. - The number of bytes available. - - - - Get the binary data representing this instance. - - The raw binary data representing this instance. - - - - Test a valuie to see if is valid and can be represented here. - - The value to test. - Returns true if the value is valid and can be represented; false if not. - - NTFS filetimes are 64-bit unsigned integers, stored in Intel - (least significant byte first) byte order. They determine the - number of 1.0E-07 seconds (1/10th microseconds!) past WinNT "epoch", - which is "01-Jan-1601 00:00:00 UTC". 28 May 60056 is the upper limit - - - - - Get/set the last modification time. - - - - - Get /set the create time - - - - - Get /set the last access time. - - - - - A factory that creates tagged data instances. - - - - - Get data for a specific tag value. - - The tag ID to find. - The data to search. - The offset to begin extracting data from. - The number of bytes to extract. - The located value found, or null if not found. - - - - - A class to handle the extra data field for Zip entries - - - Extra data contains 0 or more values each prefixed by a header tag and length. - They contain zero or more bytes of actual data. - The data is held internally using a copy on write strategy. This is more efficient but - means that for extra data created by passing in data can have the values modified by the caller - in some circumstances. - - - - - Initialise a default instance. - - - - - Initialise with known extra data. - - The extra data. - - - - Get the raw extra data value - - Returns the raw byte[] extra data this instance represents. - - - - Clear the stored data. - - - - - Gets the current extra data length. - - - - - Get a read-only for the associated tag. - - The tag to locate data for. - Returns a containing tag data or null if no tag was found. - - - - Get the tagged data for a tag. - - The tag to search for. - Returns a tagged value or null if none found. - - - - Get the length of the last value found by - - This is only valid if has previously returned true. - - - - Get the index for the current read value. - - This is only valid if has previously returned true. - Initially the result will be the index of the first byte of actual data. The value is updated after calls to - , and . - - - - Get the number of bytes remaining to be read for the current value; - - - - - Find an extra data value - - The identifier for the value to find. - Returns true if the value was found; false otherwise. - - - - Add a new entry to extra data. - - The value to add. - - - - Add a new entry to extra data - - The ID for this entry. - The data to add. - If the ID already exists its contents are replaced. - - - - Start adding a new entry. - - Add data using , , , or . - The new entry is completed and actually added by calling - - - - - Add entry data added since using the ID passed. - - The identifier to use for this entry. - - - - Add a byte of data to the pending new entry. - - The byte to add. - - - - - Add data to a pending new entry. - - The data to add. - - - - - Add a short value in little endian order to the pending new entry. - - The data to add. - - - - - Add an integer value in little endian order to the pending new entry. - - The data to add. - - - - - Add a long value in little endian order to the pending new entry. - - The data to add. - - - - - Delete an extra data field. - - The identifier of the field to delete. - Returns true if the field was found and deleted. - - - - Read a long in little endian form from the last found data value - - Returns the long value read. - - - - Read an integer in little endian form from the last found data value. - - Returns the integer read. - - - - Read a short value in little endian form from the last found data value. - - Returns the short value read. - - - - Read a byte from an extra data - - The byte value read or -1 if the end of data has been reached. - - - - Skip data during reading. - - The number of bytes to skip. - - - - Internal form of that reads data at any location. - - Returns the short value read. - - - - Dispose of this instance. - - - - - Arguments used with KeysRequiredEvent - - - - - Initialise a new instance of - - The name of the file for which keys are required. - - - - Initialise a new instance of - - The name of the file for which keys are required. - The current key value. - - - - Gets the name of the file for which keys are required. - - - - - Gets or sets the key value - - - - - The strategy to apply to testing. - - - - - Find the first error only. - - - - - Find all possible errors. - - - - - The operation in progress reported by a during testing. - - TestArchive - - - - Setting up testing. - - - - - Testing an individual entries header - - - - - Testing an individual entries data - - - - - Testing an individual entry has completed. - - - - - Running miscellaneous tests - - - - - Testing is complete - - - - - Status returned returned by during testing. - - TestArchive - - - - Initialise a new instance of - - The this status applies to. - - - - Get the current in progress. - - - - - Get the this status is applicable to. - - - - - Get the current/last entry tested. - - - - - Get the number of errors detected so far. - - - - - Get the number of bytes tested so far for the current entry. - - - - - Get a value indicating wether the last entry test was valid. - - - - - Delegate invoked during testing if supplied indicating current progress and status. - - If the message is non-null an error has occured. If the message is null - the operation as found in status has started. - - - - The possible ways of applying updates to an archive. - - - - - Perform all updates on temporary files ensuring that the original file is saved. - - - - - Update the archive directly, which is faster but less safe. - - - - - This class represents a Zip archive. You can ask for the contained - entries, or get an input stream for a file entry. The entry is - automatically decompressed. - - You can also update the archive adding or deleting entries. - - This class is thread safe for input: You can open input streams for arbitrary - entries in different threads. -
-
Author of the original java version : Jochen Hoenicke -
- - - using System; - using System.Text; - using System.Collections; - using System.IO; - - using ICSharpCode.SharpZipLib.Zip; - - class MainClass - { - static public void Main(string[] args) - { - using (ZipFile zFile = new ZipFile(args[0])) { - Console.WriteLine("Listing of : " + zFile.Name); - Console.WriteLine(""); - Console.WriteLine("Raw Size Size Date Time Name"); - Console.WriteLine("-------- -------- -------- ------ ---------"); - foreach (ZipEntry e in zFile) { - if ( e.IsFile ) { - DateTime d = e.DateTime; - Console.WriteLine("{0, -10}{1, -10}{2} {3} {4}", e.Size, e.CompressedSize, - d.ToString("dd-MM-yy"), d.ToString("HH:mm"), - e.Name); - } - } - } - } - } - - -
- - - Delegate for handling keys/password setting during compresion/decompression. - - - - - Event handler for handling encryption keys. - - - - - Handles getting of encryption keys when required. - - The file for which encryption keys are required. - - - - Get/set the encryption key value. - - - - - Password to be used for encrypting/decrypting files. - - Set to null if no password is required. - - - - Get a value indicating wether encryption keys are currently available. - - - - - Opens a Zip file with the given name for reading. - - The name of the file to open. - The argument supplied is null. - - An i/o error occurs - - - The file doesn't contain a valid zip archive. - - - - - Opens a Zip file reading the given . - - The to read archive data from. - The supplied argument is null. - - An i/o error occurs. - - - The file doesn't contain a valid zip archive. - - - - - Opens a Zip file reading the given . - - The to read archive data from. - - An i/o error occurs - - - The stream doesn't contain a valid zip archive.
-
- - The stream doesnt support seeking. - - - The stream argument is null. - -
- - - Initialises a default instance with no entries and no file storage. - - - - - Finalize this instance. - - - - - Closes the ZipFile. If the stream is owned then this also closes the underlying input stream. - Once closed, no further instance methods should be called. - - - An i/o error occurs. - - - - - Create a new whose data will be stored in a file. - - The name of the archive to create. - Returns the newly created - is null - - - - Create a new whose data will be stored on a stream. - - The stream providing data storage. - Returns the newly created - is null - doesnt support writing. - - - - Get/set a flag indicating if the underlying stream is owned by the ZipFile instance. - If the flag is true then the stream will be closed when Close is called. - - - The default value is true in all cases. - - - - - Get a value indicating wether - this archive is embedded in another file or not. - - - - - Get a value indicating that this archive is a new one. - - - - - Gets the comment for the zip file. - - - - - Gets the name of this zip file. - - - - - Gets the number of entries in this zip file. - - - The Zip file has been closed. - - - - - Get the number of entries contained in this . - - - - - Indexer property for ZipEntries - - - - - Gets an enumerator for the Zip entries in this Zip file. - - Returns an for this archive. - - The Zip file has been closed. - - - - - Return the index of the entry with a matching name - - Entry name to find - If true the comparison is case insensitive - The index position of the matching entry or -1 if not found - - The Zip file has been closed. - - - - - Searches for a zip entry in this archive with the given name. - String comparisons are case insensitive - - - The name to find. May contain directory components separated by slashes ('/'). - - - A clone of the zip entry, or null if no entry with that name exists. - - - The Zip file has been closed. - - - - - Gets an input stream for reading the given zip entry data in an uncompressed form. - Normally the should be an entry returned by GetEntry(). - - The to obtain a data for - An input containing data for this - - The ZipFile has already been closed - - - The compression method for the entry is unknown - - - The entry is not found in the ZipFile - - - - - Creates an input stream reading a zip entry - - The index of the entry to obtain an input stream for. - - An input containing data for this - - - The ZipFile has already been closed - - - The compression method for the entry is unknown - - - The entry is not found in the ZipFile - - - - - Test an archive for integrity/validity - - Perform low level data Crc check - true if all tests pass, false otherwise - Testing will terminate on the first error found. - - - - Test an archive for integrity/validity - - Perform low level data Crc check - The to apply. - The handler to call during testing. - true if all tests pass, false otherwise - The object has already been closed. - - - - Test a local header against that provided from the central directory - - - The entry to test against - - The type of tests to carry out. - The offset of the entries data in the file - - - - The kind of update to apply. - - - - - Get / set the to apply to names when updating. - - - - - Get/set the used to generate values - during updates. - - - - - Get /set the buffer size to be used when updating this zip file. - - - - - Get a value indicating an update has been started. - - - - - Get / set a value indicating how Zip64 Extension usage is determined when adding entries. - - - - - Begin updating this archive. - - The archive storage for use during the update. - The data source to utilise during updating. - ZipFile has been closed. - One of the arguments provided is null - ZipFile has been closed. - - - - Begin updating to this archive. - - The storage to use during the update. - - - - Begin updating this archive. - - - - - - - - Commit current updates, updating this archive. - - - - ZipFile has been closed. - - - - Abort updating leaving the archive unchanged. - - - - - - - Set the file comment to be recorded when the current update is commited. - - The comment to record. - ZipFile has been closed. - - - - Add a new entry to the archive. - - The name of the file to add. - The compression method to use. - Ensure Unicode text is used for name and comment for this entry. - Argument supplied is null. - ZipFile has been closed. - Compression method is not supported. - - - - Add a new entry to the archive. - - The name of the file to add. - The compression method to use. - ZipFile has been closed. - The compression method is not supported. - - - - Add a file to the archive. - - The name of the file to add. - Argument supplied is null. - - - - Add a file to the archive. - - The name of the file to add. - The name to use for the on the Zip file created. - Argument supplied is null. - - - - Add a file entry with data. - - The source of the data for this entry. - The name to give to the entry. - - - - Add a file entry with data. - - The source of the data for this entry. - The name to give to the entry. - The compression method to use. - - - - Add a file entry with data. - - The source of the data for this entry. - The name to give to the entry. - The compression method to use. - Ensure Unicode text is used for name and comments for this entry. - - - - Add a that contains no data. - - The entry to add. - This can be used to add directories, volume labels, or empty file entries. - - - - Add a directory entry to the archive. - - The directory to add. - - - - Delete an entry by name - - The filename to delete - True if the entry was found and deleted; false otherwise. - - - - Delete a from the archive. - - The entry to delete. - - - - Write an unsigned short in little endian byte order. - - - - - Write an int in little endian byte order. - - - - - Write an unsigned int in little endian byte order. - - - - - Write a long in little endian byte order. - - - - - Get a raw memory buffer. - - Returns a raw memory buffer. - - - - Get the size of the source descriptor for a . - - The update to get the size for. - The descriptor size, zero if there isnt one. - - - - Get an output stream for the specified - - The entry to get an output stream for. - The output stream obtained for the entry. - - - - Class used to sort updates. - - - - - Compares two objects and returns a value indicating whether one is - less than, equal to or greater than the other. - - First object to compare - Second object to compare. - Compare result. - - - - Represents a pending update to a Zip file. - - - - - Copy an existing entry. - - The existing entry to copy. - - - - Get the for this update. - - This is the source or original entry. - - - - Get the that will be written to the updated/new file. - - - - - Get the command for this update. - - - - - Get the filename if any for this update. Null if none exists. - - - - - Get/set the location of the size patch for this update. - - - - - Get /set the location of the crc patch for this update. - - - - - Get/set the size calculated by offset. - Specifically, the difference between this and next entry's starting offset. - - - - - Releases the unmanaged resources used by the this instance and optionally releases the managed resources. - - true to release both managed and unmanaged resources; - false to release only unmanaged resources. - - - - Read an unsigned short in little endian byte order. - - Returns the value read. - - The stream ends prematurely - - - - - Read a uint in little endian byte order. - - Returns the value read. - - An i/o error occurs. - - - The file ends prematurely - - - - - Search for and read the central directory of a zip file filling the entries array. - - - An i/o error occurs. - - - The central directory is malformed or cannot be found - - - - - Locate the data for a given entry. - - - The start offset of the data. - - - The stream ends prematurely - - - The local header signature is invalid, the entry and central header file name lengths are different - or the local and entry compression methods dont match - - - - - Represents a string from a which is stored as an array of bytes. - - - - - Initialise a with a string. - - The textual string form. - - - - Initialise a using a string in its binary 'raw' form. - - - - - - Get a value indicating the original source of data for this instance. - True if the source was a string; false if the source was binary data. - - - - - Get the length of the comment when represented as raw bytes. - - - - - Get the comment in its 'raw' form as plain bytes. - - - - - Reset the comment to its initial state. - - - - - Implicit conversion of comment to a string. - - The to convert to a string. - The textual equivalent for the input value. - - - - An enumerator for Zip entries - - - - - An is a stream that you can write uncompressed data - to and flush, but cannot read, seek or do anything else to. - - - - - Gets a value indicating whether the current stream supports reading. - - - - - Write any buffered data to underlying storage. - - - - - Gets a value indicating whether the current stream supports writing. - - - - - Gets a value indicating whether the current stream supports seeking. - - - - - Get the length in bytes of the stream. - - - - - Gets or sets the position within the current stream. - - - - - Reads a sequence of bytes from the current stream and advances the position within the stream by the number of bytes read. - - An array of bytes. When this method returns, the buffer contains the specified byte array with the values between offset and (offset + count - 1) replaced by the bytes read from the current source. - The zero-based byte offset in buffer at which to begin storing the data read from the current stream. - The maximum number of bytes to be read from the current stream. - - The total number of bytes read into the buffer. This can be less than the number of bytes requested if that many bytes are not currently available, or zero (0) if the end of the stream has been reached. - - The sum of offset and count is larger than the buffer length. - Methods were called after the stream was closed. - The stream does not support reading. - buffer is null. - An I/O error occurs. - offset or count is negative. - - - - Sets the position within the current stream. - - A byte offset relative to the origin parameter. - A value of type indicating the reference point used to obtain the new position. - - The new position within the current stream. - - An I/O error occurs. - The stream does not support seeking, such as if the stream is constructed from a pipe or console output. - Methods were called after the stream was closed. - - - - Sets the length of the current stream. - - The desired length of the current stream in bytes. - The stream does not support both writing and seeking, such as if the stream is constructed from a pipe or console output. - An I/O error occurs. - Methods were called after the stream was closed. - - - - Writes a sequence of bytes to the current stream and advances the current position within this stream by the number of bytes written. - - An array of bytes. This method copies count bytes from buffer to the current stream. - The zero-based byte offset in buffer at which to begin copying bytes to the current stream. - The number of bytes to be written to the current stream. - An I/O error occurs. - The stream does not support writing. - Methods were called after the stream was closed. - buffer is null. - The sum of offset and count is greater than the buffer length. - offset or count is negative. - - - - A is an - whose data is only a part or subsection of a file. - - - - - Initialise a new instance of the class. - - The containing the underlying stream to use for IO. - The start of the partial data. - The length of the partial data. - - - - Read a byte from this stream. - - Returns the byte read or -1 on end of stream. - - - - Reads a sequence of bytes from the current stream and advances the position within the stream by the number of bytes read. - - An array of bytes. When this method returns, the buffer contains the specified byte array with the values between offset and (offset + count - 1) replaced by the bytes read from the current source. - The zero-based byte offset in buffer at which to begin storing the data read from the current stream. - The maximum number of bytes to be read from the current stream. - - The total number of bytes read into the buffer. This can be less than the number of bytes requested if that many bytes are not currently available, or zero (0) if the end of the stream has been reached. - - The sum of offset and count is larger than the buffer length. - Methods were called after the stream was closed. - The stream does not support reading. - buffer is null. - An I/O error occurs. - offset or count is negative. - - - - Writes a sequence of bytes to the current stream and advances the current position within this stream by the number of bytes written. - - An array of bytes. This method copies count bytes from buffer to the current stream. - The zero-based byte offset in buffer at which to begin copying bytes to the current stream. - The number of bytes to be written to the current stream. - An I/O error occurs. - The stream does not support writing. - Methods were called after the stream was closed. - buffer is null. - The sum of offset and count is greater than the buffer length. - offset or count is negative. - - - - When overridden in a derived class, sets the length of the current stream. - - The desired length of the current stream in bytes. - The stream does not support both writing and seeking, such as if the stream is constructed from a pipe or console output. - An I/O error occurs. - Methods were called after the stream was closed. - - - - When overridden in a derived class, sets the position within the current stream. - - A byte offset relative to the origin parameter. - A value of type indicating the reference point used to obtain the new position. - - The new position within the current stream. - - An I/O error occurs. - The stream does not support seeking, such as if the stream is constructed from a pipe or console output. - Methods were called after the stream was closed. - - - - Clears all buffers for this stream and causes any buffered data to be written to the underlying device. - - An I/O error occurs. - - - - Gets or sets the position within the current stream. - - - The current position within the stream. - An I/O error occurs. - The stream does not support seeking. - Methods were called after the stream was closed. - - - - Gets the length in bytes of the stream. - - - A long value representing the length of the stream in bytes. - A class derived from Stream does not support seeking. - Methods were called after the stream was closed. - - - - Gets a value indicating whether the current stream supports writing. - - false - true if the stream supports writing; otherwise, false. - - - - Gets a value indicating whether the current stream supports seeking. - - true - true if the stream supports seeking; otherwise, false. - - - - Gets a value indicating whether the current stream supports reading. - - true. - true if the stream supports reading; otherwise, false. - - - - Gets a value that determines whether the current stream can time out. - - - A value that determines whether the current stream can time out. - - - - Provides a static way to obtain a source of data for an entry. - - - - - Get a source of data by creating a new stream. - - Returns a to use for compression input. - Ideally a new stream is created and opened to achieve this, to avoid locking problems. - - - - Represents a source of data that can dynamically provide - multiple data sources based on the parameters passed. - - - - - Get a data source. - - The to get a source for. - The name for data if known. - Returns a to use for compression input. - Ideally a new stream is created and opened to achieve this, to avoid locking problems. - - - - Default implementation of a for use with files stored on disk. - - - - - Initialise a new instnace of - - The name of the file to obtain data from. - - - - Get a providing data. - - Returns a provising data. - - - - Default implementation of for files stored on disk. - - - - - Get a providing data for an entry. - - The entry to provide data for. - The file name for data if known. - Returns a stream providing data; or null if not available - - - - Defines facilities for data storage when updating Zip Archives. - - - - - Get the to apply during updates. - - - - - Get an empty that can be used for temporary output. - - Returns a temporary output - - - - - Convert a temporary output stream to a final stream. - - The resulting final - - - - - Make a temporary copy of the original stream. - - The to copy. - Returns a temporary output that is a copy of the input. - - - - Return a stream suitable for performing direct updates on the original source. - - The current stream. - Returns a stream suitable for direct updating. - This may be the current stream passed. - - - - Dispose of this instance. - - - - - An abstract suitable for extension by inheritance. - - - - - Initializes a new instance of the class. - - The update mode. - - - - Gets a temporary output - - Returns the temporary output stream. - - - - - Converts the temporary to its final form. - - Returns a that can be used to read - the final storage for the archive. - - - - - Make a temporary copy of a . - - The to make a copy of. - Returns a temporary output that is a copy of the input. - - - - Return a stream suitable for performing direct updates on the original source. - - The to open for direct update. - Returns a stream suitable for direct updating. - - - - Disposes this instance. - - - - - Gets the update mode applicable. - - The update mode. - - - - An implementation suitable for hard disks. - - - - - Initializes a new instance of the class. - - The file. - The update mode. - - - - Initializes a new instance of the class. - - The file. - - - - Gets a temporary output for performing updates on. - - Returns the temporary output stream. - - - - Converts a temporary to its final form. - - Returns a that can be used to read - the final storage for the archive. - - - - Make a temporary copy of a stream. - - The to copy. - Returns a temporary output that is a copy of the input. - - - - Return a stream suitable for performing direct updates on the original source. - - The current stream. - Returns a stream suitable for direct updating. - If the is not null this is used as is. - - - - Disposes this instance. - - - - - An implementation suitable for in memory streams. - - - - - Initializes a new instance of the class. - - - - - Initializes a new instance of the class. - - The to use - This constructor is for testing as memory streams dont really require safe mode. - - - - Get the stream returned by if this was in fact called. - - - - - Gets the temporary output - - Returns the temporary output stream. - - - - Converts the temporary to its final form. - - Returns a that can be used to read - the final storage for the archive. - - - - Make a temporary copy of the original stream. - - The to copy. - Returns a temporary output that is a copy of the input. - - - - Return a stream suitable for performing direct updates on the original source. - - The original source stream - Returns a stream suitable for direct updating. - If the passed is not null this is used; - otherwise a new is returned. - - - - Disposes this instance. - - - - - Holds data pertinent to a data descriptor. - - - - - Get /set the compressed size of data. - - - - - Get / set the uncompressed size of data - - - - - Get /set the crc value. - - - - - This class assists with writing/reading from Zip files. - - - - - Initialise an instance of this class. - - The name of the file to open. - - - - Initialise a new instance of . - - The stream to use. - - - - Get / set a value indicating wether the the underlying stream is owned or not. - - If the stream is owned it is closed when this instance is closed. - - - - Close the stream. - - - The underlying stream is closed only if is true. - - - - - Locates a block with the desired . - - The signature to find. - Location, marking the end of block. - Minimum size of the block. - The maximum variable data. - Eeturns the offset of the first byte after the signature; -1 if not found - - - - Write Zip64 end of central directory records (File header and locator). - - The number of entries in the central directory. - The size of entries in the central directory. - The offset of the dentral directory. - - - - Write the required records to end the central directory. - - The number of entries in the directory. - The size of the entries in the directory. - The start of the central directory. - The archive comment. (This can be null). - - - - Read an unsigned short in little endian byte order. - - Returns the value read. - - An i/o error occurs. - - - The file ends prematurely - - - - - Read an int in little endian byte order. - - Returns the value read. - - An i/o error occurs. - - - The file ends prematurely - - - - - Read a long in little endian byte order. - - The value read. - - - - Write an unsigned short in little endian byte order. - - The value to write. - - - - Write a ushort in little endian byte order. - - The value to write. - - - - Write an int in little endian byte order. - - The value to write. - - - - Write a uint in little endian byte order. - - The value to write. - - - - Write a long in little endian byte order. - - The value to write. - - - - Write a ulong in little endian byte order. - - The value to write. - - - - Write a data descriptor. - - The entry to write a descriptor for. - Returns the number of descriptor bytes written. - - - - Read data descriptor at the end of compressed data. - - if set to true [zip64]. - The data to fill in. - Returns the number of bytes read in the descriptor. - - - - This is an InflaterInputStream that reads the files baseInputStream an zip archive - one after another. It has a special method to get the zip entry of - the next file. The zip entry contains information about the file name - size, compressed size, Crc, etc. - It includes support for Stored and Deflated entries. -
-
Author of the original java version : Jochen Hoenicke -
- - This sample shows how to read a zip file - - using System; - using System.Text; - using System.IO; - - using ICSharpCode.SharpZipLib.Zip; - - class MainClass - { - public static void Main(string[] args) - { - using ( ZipInputStream s = new ZipInputStream(File.OpenRead(args[0]))) { - - ZipEntry theEntry; - const int size = 2048; - byte[] data = new byte[2048]; - - while ((theEntry = s.GetNextEntry()) != null) { - if ( entry.IsFile ) { - Console.Write("Show contents (y/n) ?"); - if (Console.ReadLine() == "y") { - while (true) { - size = s.Read(data, 0, data.Length); - if (size > 0) { - Console.Write(new ASCIIEncoding().GetString(data, 0, size)); - } else { - break; - } - } - } - } - } - } - } - } - - -
- - - Delegate for reading bytes from a stream. - - - - - The current reader this instance. - - - - - Creates a new Zip input stream, for reading a zip archive. - - The underlying providing data. - - - - Creates a new Zip input stream, for reading a zip archive. - - The underlying providing data. - Size of the buffer. - - - - Optional password used for encryption when non-null - - A password for all encrypted entries in this - - - - Gets a value indicating if there is a current entry and it can be decompressed - - - The entry can only be decompressed if the library supports the zip features required to extract it. - See the ZipEntry Version property for more details. - - - - - Advances to the next entry in the archive - - - The next entry in the archive or null if there are no more entries. - - - If the previous entry is still open CloseEntry is called. - - - Input stream is closed - - - Password is not set, password is invalid, compression method is invalid, - version required to extract is not supported - - - - - Read data descriptor at the end of compressed data. - - - - - Complete cleanup as the final part of closing. - - True if the crc value should be tested - - - - Closes the current zip entry and moves to the next one. - - - The stream is closed - - - The Zip stream ends early - - - - - Returns 1 if there is an entry available - Otherwise returns 0. - - - - - Returns the current size that can be read from the current entry if available - - Thrown if the entry size is not known. - Thrown if no entry is currently available. - - - - Reads a byte from the current zip entry. - - - The byte or -1 if end of stream is reached. - - - - - Handle attempts to read by throwing an . - - The destination array to store data in. - The offset at which data read should be stored. - The maximum number of bytes to read. - Returns the number of bytes actually read. - - - - Handle attempts to read from this entry by throwing an exception - - - - - Perform the initial read on an entry which may include - reading encryption headers and setting up inflation. - - The destination to fill with data read. - The offset to start reading at. - The maximum number of bytes to read. - The actual number of bytes read. - - - - Read a block of bytes from the stream. - - The destination for the bytes. - The index to start storing data. - The number of bytes to attempt to read. - Returns the number of bytes read. - Zero bytes read means end of stream. - - - - Reads a block of bytes from the current zip entry. - - - The number of bytes read (this may be less than the length requested, even before the end of stream), or 0 on end of stream. - - - An i/o error occured. - - - The deflated stream is corrupted. - - - The stream is not open. - - - - - Closes the zip input stream - - - - - ZipNameTransform transforms names as per the Zip file naming convention. - - The use of absolute names is supported although its use is not valid - according to Zip naming conventions, and should not be used if maximum compatability is desired. - - - - Initialize a new instance of - - - - - Initialize a new instance of - - The string to trim from the front of paths if found. - - - - Static constructor. - - - - - Transform a windows directory name according to the Zip file naming conventions. - - The directory name to transform. - The transformed name. - - - - Transform a windows file name according to the Zip file naming conventions. - - The file name to transform. - The transformed name. - - - - Get/set the path prefix to be trimmed from paths if present. - - The prefix is trimmed before any conversion from - a windows path is done. - - - - Force a name to be valid by replacing invalid characters with a fixed value - - The name to force valid - The replacement character to use. - Returns a valid name - - - - Test a name to see if it is a valid name for a zip entry. - - The name to test. - If true checking is relaxed about windows file names and absolute paths. - Returns true if the name is a valid zip name; false otherwise. - Zip path names are actually in Unix format, and should only contain relative paths. - This means that any path stored should not contain a drive or - device letter, or a leading slash. All slashes should forward slashes '/'. - An empty name is valid for a file where the input comes from standard input. - A null name is not considered valid. - - - - - Test a name to see if it is a valid name for a zip entry. - - The name to test. - Returns true if the name is a valid zip name; false otherwise. - Zip path names are actually in unix format, - and should only contain relative paths if a path is present. - This means that the path stored should not contain a drive or - device letter, or a leading slash. All slashes should forward slashes '/'. - An empty name is valid where the input comes from standard input. - A null name is not considered valid. - - - - - This is a DeflaterOutputStream that writes the files into a zip - archive one after another. It has a special method to start a new - zip entry. The zip entries contains information about the file name - size, compressed size, CRC, etc. - - It includes support for Stored and Deflated entries. - This class is not thread safe. -
-
Author of the original java version : Jochen Hoenicke -
- This sample shows how to create a zip file - - using System; - using System.IO; - - using ICSharpCode.SharpZipLib.Core; - using ICSharpCode.SharpZipLib.Zip; - - class MainClass - { - public static void Main(string[] args) - { - string[] filenames = Directory.GetFiles(args[0]); - byte[] buffer = new byte[4096]; - - using ( ZipOutputStream s = new ZipOutputStream(File.Create(args[1])) ) { - - s.SetLevel(9); // 0 - store only to 9 - means best compression - - foreach (string file in filenames) { - ZipEntry entry = new ZipEntry(file); - s.PutNextEntry(entry); - - using (FileStream fs = File.OpenRead(file)) { - StreamUtils.Copy(fs, s, buffer); - } - } - } - } - } - - -
- - - Creates a new Zip output stream, writing a zip archive. - - - The output stream to which the archive contents are written. - - - - - Creates a new Zip output stream, writing a zip archive. - - The output stream to which the archive contents are written. - Size of the buffer to use. - - - - Gets a flag value of true if the central header has been added for this archive; false if it has not been added. - - No further entries can be added once this has been done. - - - - Set the zip file comment. - - - The comment text for the entire archive. - - - The converted comment is longer than 0xffff bytes. - - - - - Sets the compression level. The new level will be activated - immediately. - - The new compression level (1 to 9). - - Level specified is not supported. - - - - - - Get the current deflater compression level - - The current compression level - - - - Get / set a value indicating how Zip64 Extension usage is determined when adding entries. - - Older archivers may not understand Zip64 extensions. - If backwards compatability is an issue be careful when adding entries to an archive. - Setting this property to off is workable but less desirable as in those circumstances adding a file - larger then 4GB will fail. - - - - Write an unsigned short in little endian byte order. - - - - - Write an int in little endian byte order. - - - - - Write an int in little endian byte order. - - - - - Starts a new Zip entry. It automatically closes the previous - entry if present. - All entry elements bar name are optional, but must be correct if present. - If the compression method is stored and the output is not patchable - the compression for that entry is automatically changed to deflate level 0 - - - the entry. - - - if entry passed is null. - - - if an I/O error occured. - - - if stream was finished - - - Too many entries in the Zip file
- Entry name is too long
- Finish has already been called
-
-
- - - Closes the current entry, updating header and footer information as required - - - An I/O error occurs. - - - No entry is active. - - - - - Writes the given buffer to the current entry. - - The buffer containing data to write. - The offset of the first byte to write. - The number of bytes to write. - Archive size is invalid - No entry is active. - - - - Finishes the stream. This will write the central directory at the - end of the zip file and flush the stream. - - - This is automatically called when the stream is closed. - - - An I/O error occurs. - - - Comment exceeds the maximum length
- Entry name exceeds the maximum length -
-
- - - The entries for the archive. - - - - - Used to track the crc of data added to entries. - - - - - The current entry being added. - - - - - Used to track the size of data for an entry during writing. - - - - - Offset to be recorded for each entry in the central header. - - - - - Comment for the entire archive recorded in central header. - - - - - Flag indicating that header patching is required for the current entry. - - - - - Position to patch crc - - - - - Position to patch size. - - - - - This static class contains functions for encoding and decoding zip file strings - - - - Code page backing field - - The original Zip specification (https://pkware.cachefly.net/webdocs/casestudies/APPNOTE.TXT) states - that file names should only be encoded with IBM Code Page 437 or UTF-8. - In practice, most zip apps use OEM or system encoding (typically cp437 on Windows). - Let's be good citizens and default to UTF-8 http://utf8everywhere.org/ - - - - Automatically select codepage while opening archive - see https://github.com/icsharpcode/SharpZipLib/pull/280#issuecomment-433608324 - - - - - Encoding used for string conversion. Setting this to 65001 (UTF-8) will - also set the Language encoding flag to indicate UTF-8 encoded file names. - - - - - Attempt to get the operating system default codepage, or failing that, to - the fallback code page IBM 437. - - - - - Get wether the default codepage is set to UTF-8. Setting this property to false will - set the to - - - /// Get OEM codepage from NetFX, which parses the NLP file with culture info table etc etc. - But sometimes it yields the special value of 1 which is nicknamed CodePageNoOEM in sources (might also mean CP_OEMCP, but Encoding puts it so). - This was observed on Ukranian and Hindu systems. - Given this value, throws an . - So replace it with , (IBM 437 which is the default code page in a default Windows installation console. - - - - - Convert a portion of a byte array to a string using - - - Data to convert to string - - - Number of bytes to convert starting from index 0 - - - data[0]..data[count - 1] converted to a string - - - - - Convert a byte array to a string using - - - Byte array to convert - - - dataconverted to a string - - - - - Convert a byte array to a string using - - The applicable general purpose bits flags - - Byte array to convert - - The number of bytes to convert. - - dataconverted to a string - - - - - Convert a byte array to a string using - - - Byte array to convert - - The applicable general purpose bits flags - - dataconverted to a string - - - - - Convert a string to a byte array using - - - String to convert to an array - - Converted array - - - - Convert a string to a byte array using - - The applicable general purpose bits flags - - String to convert to an array - - Converted array - -
-
diff --git a/packages/System.Buffers.4.4.0/LICENSE.TXT b/packages/System.Buffers.4.4.0/LICENSE.TXT deleted file mode 100644 index 984713a4..00000000 --- a/packages/System.Buffers.4.4.0/LICENSE.TXT +++ /dev/null @@ -1,23 +0,0 @@ -The MIT License (MIT) - -Copyright (c) .NET Foundation and Contributors - -All rights reserved. - -Permission is hereby granted, free of charge, to any person obtaining a copy -of this software and associated documentation files (the "Software"), to deal -in the Software without restriction, including without limitation the rights -to use, copy, modify, merge, publish, distribute, sublicense, and/or sell -copies of the Software, and to permit persons to whom the Software is -furnished to do so, subject to the following conditions: - -The above copyright notice and this permission notice shall be included in all -copies or substantial portions of the Software. - -THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR -IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, -FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE -AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER -LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, -OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE -SOFTWARE. diff --git a/packages/System.Buffers.4.4.0/System.Buffers.4.4.0.nupkg b/packages/System.Buffers.4.4.0/System.Buffers.4.4.0.nupkg deleted file mode 100644 index cb90a179..00000000 Binary files a/packages/System.Buffers.4.4.0/System.Buffers.4.4.0.nupkg and /dev/null differ diff --git a/packages/System.Buffers.4.4.0/THIRD-PARTY-NOTICES.TXT b/packages/System.Buffers.4.4.0/THIRD-PARTY-NOTICES.TXT deleted file mode 100644 index 06055ff0..00000000 --- a/packages/System.Buffers.4.4.0/THIRD-PARTY-NOTICES.TXT +++ /dev/null @@ -1,226 +0,0 @@ -.NET Core uses third-party libraries or other resources that may be -distributed under licenses different than the .NET Core software. - -In the event that we accidentally failed to list a required notice, please -bring it to our attention. Post an issue or email us: - - dotnet@microsoft.com - -The attached notices are provided for information only. - -License notice for Slicing-by-8 -------------------------------- - -http://sourceforge.net/projects/slicing-by-8/ - -Copyright (c) 2004-2006 Intel Corporation - All Rights Reserved - - -This software program is licensed subject to the BSD License, available at -http://www.opensource.org/licenses/bsd-license.html. - - -License notice for Unicode data -------------------------------- - -http://www.unicode.org/copyright.html#License - -Copyright © 1991-2017 Unicode, Inc. All rights reserved. -Distributed under the Terms of Use in http://www.unicode.org/copyright.html. - -Permission is hereby granted, free of charge, to any person obtaining -a copy of the Unicode data files and any associated documentation -(the "Data Files") or Unicode software and any associated documentation -(the "Software") to deal in the Data Files or Software -without restriction, including without limitation the rights to use, -copy, modify, merge, publish, distribute, and/or sell copies of -the Data Files or Software, and to permit persons to whom the Data Files -or Software are furnished to do so, provided that either -(a) this copyright and permission notice appear with all copies -of the Data Files or Software, or -(b) this copyright and permission notice appear in associated -Documentation. - -THE DATA FILES AND SOFTWARE ARE PROVIDED "AS IS", WITHOUT WARRANTY OF -ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE -WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND -NONINFRINGEMENT OF THIRD PARTY RIGHTS. -IN NO EVENT SHALL THE COPYRIGHT HOLDER OR HOLDERS INCLUDED IN THIS -NOTICE BE LIABLE FOR ANY CLAIM, OR ANY SPECIAL INDIRECT OR CONSEQUENTIAL -DAMAGES, OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, -DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER -TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR -PERFORMANCE OF THE DATA FILES OR SOFTWARE. - -Except as contained in this notice, the name of a copyright holder -shall not be used in advertising or otherwise to promote the sale, -use or other dealings in these Data Files or Software without prior -written authorization of the copyright holder. - -License notice for Zlib ------------------------ - -https://github.com/madler/zlib -http://zlib.net/zlib_license.html - -/* zlib.h -- interface of the 'zlib' general purpose compression library - version 1.2.11, January 15th, 2017 - - Copyright (C) 1995-2017 Jean-loup Gailly and Mark Adler - - This software is provided 'as-is', without any express or implied - warranty. In no event will the authors be held liable for any damages - arising from the use of this software. - - Permission is granted to anyone to use this software for any purpose, - including commercial applications, and to alter it and redistribute it - freely, subject to the following restrictions: - - 1. The origin of this software must not be misrepresented; you must not - claim that you wrote the original software. If you use this software - in a product, an acknowledgment in the product documentation would be - appreciated but is not required. - 2. Altered source versions must be plainly marked as such, and must not be - misrepresented as being the original software. - 3. This notice may not be removed or altered from any source distribution. - - Jean-loup Gailly Mark Adler - jloup@gzip.org madler@alumni.caltech.edu - -*/ - -License notice for Mono -------------------------------- - -http://www.mono-project.com/docs/about-mono/ - -Copyright (c) .NET Foundation Contributors - -MIT License - -Permission is hereby granted, free of charge, to any person obtaining a copy -of this software and associated documentation files (the Software), to deal -in the Software without restriction, including without limitation the rights -to use, copy, modify, merge, publish, distribute, sublicense, and/or sell -copies of the Software, and to permit persons to whom the Software is -furnished to do so, subject to the following conditions: - -The above copyright notice and this permission notice shall be included in all -copies or substantial portions of the Software. - -THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, -EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF -MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND -NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE -LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION -OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION -WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. - -License notice for International Organization for Standardization ------------------------------------------------------------------ - -Portions (C) International Organization for Standardization 1986: - Permission to copy in any form is granted for use with - conforming SGML systems and applications as defined in - ISO 8879, provided this notice is included in all copies. - -License notice for Intel ------------------------- - -"Copyright (c) 2004-2006 Intel Corporation - All Rights Reserved - -Redistribution and use in source and binary forms, with or without -modification, are permitted provided that the following conditions are met: - -1. Redistributions of source code must retain the above copyright notice, this -list of conditions and the following disclaimer. - -2. Redistributions in binary form must reproduce the above copyright notice, -this list of conditions and the following disclaimer in the documentation -and/or other materials provided with the distribution. - -THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" -AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE -IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE -DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE -FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL -DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR -SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER -CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, -OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE -OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. - -License notice for Xamarin and Novell -------------------------------------- - -Copyright (c) 2015 Xamarin, Inc (http://www.xamarin.com) - -Permission is hereby granted, free of charge, to any person obtaining a copy -of this software and associated documentation files (the "Software"), to deal -in the Software without restriction, including without limitation the rights -to use, copy, modify, merge, publish, distribute, sublicense, and/or sell -copies of the Software, and to permit persons to whom the Software is -furnished to do so, subject to the following conditions: - -The above copyright notice and this permission notice shall be included in -all copies or substantial portions of the Software. - -THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR -IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, -FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE -AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER -LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, -OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN -THE SOFTWARE. - -Copyright (c) 2011 Novell, Inc (http://www.novell.com) - -Permission is hereby granted, free of charge, to any person obtaining a copy -of this software and associated documentation files (the "Software"), to deal -in the Software without restriction, including without limitation the rights -to use, copy, modify, merge, publish, distribute, sublicense, and/or sell -copies of the Software, and to permit persons to whom the Software is -furnished to do so, subject to the following conditions: - -The above copyright notice and this permission notice shall be included in -all copies or substantial portions of the Software. - -THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR -IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, -FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE -AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER -LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, -OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN -THE SOFTWARE. - -Third party notice for W3C --------------------------- - -"W3C SOFTWARE AND DOCUMENT NOTICE AND LICENSE -Status: This license takes effect 13 May, 2015. -This work is being provided by the copyright holders under the following license. -License -By obtaining and/or copying this work, you (the licensee) agree that you have read, understood, and will comply with the following terms and conditions. -Permission to copy, modify, and distribute this work, with or without modification, for any purpose and without fee or royalty is hereby granted, provided that you include the following on ALL copies of the work or portions thereof, including modifications: -The full text of this NOTICE in a location viewable to users of the redistributed or derivative work. -Any pre-existing intellectual property disclaimers, notices, or terms and conditions. If none exist, the W3C Software and Document Short Notice should be included. -Notice of any changes or modifications, through a copyright statement on the new code or document such as "This software or document includes material copied from or derived from [title and URI of the W3C document]. Copyright © [YEAR] W3C® (MIT, ERCIM, Keio, Beihang)." -Disclaimers -THIS WORK IS PROVIDED "AS IS," AND COPYRIGHT HOLDERS MAKE NO REPRESENTATIONS OR WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO, WARRANTIES OF MERCHANTABILITY OR FITNESS FOR ANY PARTICULAR PURPOSE OR THAT THE USE OF THE SOFTWARE OR DOCUMENT WILL NOT INFRINGE ANY THIRD PARTY PATENTS, COPYRIGHTS, TRADEMARKS OR OTHER RIGHTS. -COPYRIGHT HOLDERS WILL NOT BE LIABLE FOR ANY DIRECT, INDIRECT, SPECIAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF ANY USE OF THE SOFTWARE OR DOCUMENT. -The name and trademarks of copyright holders may NOT be used in advertising or publicity pertaining to the work without specific, written prior permission. Title to copyright in this work will at all times remain with copyright holders." - -License notice for Bit Twiddling Hacks --------------------------------------- - -Bit Twiddling Hacks - -By Sean Eron Anderson -seander@cs.stanford.edu - -Individually, the code snippets here are in the public domain (unless otherwise -noted) — feel free to use them however you please. The aggregate collection and -descriptions are © 1997-2005 Sean Eron Anderson. The code and descriptions are -distributed in the hope that they will be useful, but WITHOUT ANY WARRANTY and -without even the implied warranty of merchantability or fitness for a particular -purpose. diff --git a/packages/System.Buffers.4.4.0/lib/netcoreapp2.0/_._ b/packages/System.Buffers.4.4.0/lib/netcoreapp2.0/_._ deleted file mode 100644 index e69de29b..00000000 diff --git a/packages/System.Buffers.4.4.0/lib/netstandard1.1/System.Buffers.dll b/packages/System.Buffers.4.4.0/lib/netstandard1.1/System.Buffers.dll deleted file mode 100644 index fb2911dd..00000000 Binary files a/packages/System.Buffers.4.4.0/lib/netstandard1.1/System.Buffers.dll and /dev/null differ diff --git a/packages/System.Buffers.4.4.0/lib/netstandard1.1/System.Buffers.xml b/packages/System.Buffers.4.4.0/lib/netstandard1.1/System.Buffers.xml deleted file mode 100644 index d3d239ec..00000000 --- a/packages/System.Buffers.4.4.0/lib/netstandard1.1/System.Buffers.xml +++ /dev/null @@ -1,39 +0,0 @@ - - - - System.Buffers - - - - Provides a resource pool that enables reusing instances of type . - The type of the objects that are in the resource pool. - - - Initializes a new instance of the class. - - - Creates a new instance of the class. - A new instance of the class. - - - Creates a new instance of the class using the specifed configuration. - The maximum length of an array instance that may be stored in the pool. - The maximum number of array instances that may be stored in each bucket in the pool. The pool groups arrays of similar lengths into buckets for faster access. - A new instance of the class with the specified configuration. - - - Retrieves a buffer that is at least the requested length. - The minimum length of the array. - An array of type that is at least minimumLength in length. - - - Returns an array to the pool that was previously obtained using the method on the same instance. - A buffer to return to the pool that was previously obtained using the method. - Indicates whether the contents of the buffer should be cleared before reuse. If bufferLength is set to true, and if the pool will store the buffer to enable subsequent reuse, the method will clear the array of its contents so that a subsequent caller using the method will not see the content of the previous caller. If bufferLength is set to false or if the pool will release the buffer, the array's contents are left unchanged. - - - Gets a shared instance. - A shared instance. - - - \ No newline at end of file diff --git a/packages/System.Buffers.4.4.0/lib/netstandard2.0/System.Buffers.dll b/packages/System.Buffers.4.4.0/lib/netstandard2.0/System.Buffers.dll deleted file mode 100644 index b6d9c778..00000000 Binary files a/packages/System.Buffers.4.4.0/lib/netstandard2.0/System.Buffers.dll and /dev/null differ diff --git a/packages/System.Buffers.4.4.0/lib/netstandard2.0/System.Buffers.xml b/packages/System.Buffers.4.4.0/lib/netstandard2.0/System.Buffers.xml deleted file mode 100644 index d3d239ec..00000000 --- a/packages/System.Buffers.4.4.0/lib/netstandard2.0/System.Buffers.xml +++ /dev/null @@ -1,39 +0,0 @@ - - - - System.Buffers - - - - Provides a resource pool that enables reusing instances of type . - The type of the objects that are in the resource pool. - - - Initializes a new instance of the class. - - - Creates a new instance of the class. - A new instance of the class. - - - Creates a new instance of the class using the specifed configuration. - The maximum length of an array instance that may be stored in the pool. - The maximum number of array instances that may be stored in each bucket in the pool. The pool groups arrays of similar lengths into buckets for faster access. - A new instance of the class with the specified configuration. - - - Retrieves a buffer that is at least the requested length. - The minimum length of the array. - An array of type that is at least minimumLength in length. - - - Returns an array to the pool that was previously obtained using the method on the same instance. - A buffer to return to the pool that was previously obtained using the method. - Indicates whether the contents of the buffer should be cleared before reuse. If bufferLength is set to true, and if the pool will store the buffer to enable subsequent reuse, the method will clear the array of its contents so that a subsequent caller using the method will not see the content of the previous caller. If bufferLength is set to false or if the pool will release the buffer, the array's contents are left unchanged. - - - Gets a shared instance. - A shared instance. - - - \ No newline at end of file diff --git a/packages/System.Buffers.4.4.0/ref/netcoreapp2.0/_._ b/packages/System.Buffers.4.4.0/ref/netcoreapp2.0/_._ deleted file mode 100644 index e69de29b..00000000 diff --git a/packages/System.Buffers.4.4.0/ref/netstandard1.1/System.Buffers.dll b/packages/System.Buffers.4.4.0/ref/netstandard1.1/System.Buffers.dll deleted file mode 100644 index 33880ef3..00000000 Binary files a/packages/System.Buffers.4.4.0/ref/netstandard1.1/System.Buffers.dll and /dev/null differ diff --git a/packages/System.Buffers.4.4.0/ref/netstandard1.1/System.Buffers.xml b/packages/System.Buffers.4.4.0/ref/netstandard1.1/System.Buffers.xml deleted file mode 100644 index d3d239ec..00000000 --- a/packages/System.Buffers.4.4.0/ref/netstandard1.1/System.Buffers.xml +++ /dev/null @@ -1,39 +0,0 @@ - - - - System.Buffers - - - - Provides a resource pool that enables reusing instances of type . - The type of the objects that are in the resource pool. - - - Initializes a new instance of the class. - - - Creates a new instance of the class. - A new instance of the class. - - - Creates a new instance of the class using the specifed configuration. - The maximum length of an array instance that may be stored in the pool. - The maximum number of array instances that may be stored in each bucket in the pool. The pool groups arrays of similar lengths into buckets for faster access. - A new instance of the class with the specified configuration. - - - Retrieves a buffer that is at least the requested length. - The minimum length of the array. - An array of type that is at least minimumLength in length. - - - Returns an array to the pool that was previously obtained using the method on the same instance. - A buffer to return to the pool that was previously obtained using the method. - Indicates whether the contents of the buffer should be cleared before reuse. If bufferLength is set to true, and if the pool will store the buffer to enable subsequent reuse, the method will clear the array of its contents so that a subsequent caller using the method will not see the content of the previous caller. If bufferLength is set to false or if the pool will release the buffer, the array's contents are left unchanged. - - - Gets a shared instance. - A shared instance. - - - \ No newline at end of file diff --git a/packages/System.Buffers.4.4.0/ref/netstandard2.0/System.Buffers.dll b/packages/System.Buffers.4.4.0/ref/netstandard2.0/System.Buffers.dll deleted file mode 100644 index fa635a9c..00000000 Binary files a/packages/System.Buffers.4.4.0/ref/netstandard2.0/System.Buffers.dll and /dev/null differ diff --git a/packages/System.Buffers.4.4.0/ref/netstandard2.0/System.Buffers.xml b/packages/System.Buffers.4.4.0/ref/netstandard2.0/System.Buffers.xml deleted file mode 100644 index d3d239ec..00000000 --- a/packages/System.Buffers.4.4.0/ref/netstandard2.0/System.Buffers.xml +++ /dev/null @@ -1,39 +0,0 @@ - - - - System.Buffers - - - - Provides a resource pool that enables reusing instances of type . - The type of the objects that are in the resource pool. - - - Initializes a new instance of the class. - - - Creates a new instance of the class. - A new instance of the class. - - - Creates a new instance of the class using the specifed configuration. - The maximum length of an array instance that may be stored in the pool. - The maximum number of array instances that may be stored in each bucket in the pool. The pool groups arrays of similar lengths into buckets for faster access. - A new instance of the class with the specified configuration. - - - Retrieves a buffer that is at least the requested length. - The minimum length of the array. - An array of type that is at least minimumLength in length. - - - Returns an array to the pool that was previously obtained using the method on the same instance. - A buffer to return to the pool that was previously obtained using the method. - Indicates whether the contents of the buffer should be cleared before reuse. If bufferLength is set to true, and if the pool will store the buffer to enable subsequent reuse, the method will clear the array of its contents so that a subsequent caller using the method will not see the content of the previous caller. If bufferLength is set to false or if the pool will release the buffer, the array's contents are left unchanged. - - - Gets a shared instance. - A shared instance. - - - \ No newline at end of file diff --git a/packages/System.Buffers.4.4.0/useSharedDesignerContext.txt b/packages/System.Buffers.4.4.0/useSharedDesignerContext.txt deleted file mode 100644 index e69de29b..00000000 diff --git a/packages/System.Buffers.4.4.0/version.txt b/packages/System.Buffers.4.4.0/version.txt deleted file mode 100644 index 1ca86a08..00000000 --- a/packages/System.Buffers.4.4.0/version.txt +++ /dev/null @@ -1 +0,0 @@ -8321c729934c0f8be754953439b88e6e1c120c24 diff --git a/packages/System.Memory.4.5.1/.signature.p7s b/packages/System.Memory.4.5.1/.signature.p7s deleted file mode 100644 index 1d92af61..00000000 Binary files a/packages/System.Memory.4.5.1/.signature.p7s and /dev/null differ diff --git a/packages/System.Memory.4.5.1/LICENSE.TXT b/packages/System.Memory.4.5.1/LICENSE.TXT deleted file mode 100644 index 984713a4..00000000 --- a/packages/System.Memory.4.5.1/LICENSE.TXT +++ /dev/null @@ -1,23 +0,0 @@ -The MIT License (MIT) - -Copyright (c) .NET Foundation and Contributors - -All rights reserved. - -Permission is hereby granted, free of charge, to any person obtaining a copy -of this software and associated documentation files (the "Software"), to deal -in the Software without restriction, including without limitation the rights -to use, copy, modify, merge, publish, distribute, sublicense, and/or sell -copies of the Software, and to permit persons to whom the Software is -furnished to do so, subject to the following conditions: - -The above copyright notice and this permission notice shall be included in all -copies or substantial portions of the Software. - -THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR -IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, -FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE -AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER -LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, -OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE -SOFTWARE. diff --git a/packages/System.Memory.4.5.1/System.Memory.4.5.1.nupkg b/packages/System.Memory.4.5.1/System.Memory.4.5.1.nupkg deleted file mode 100644 index 6b59e748..00000000 Binary files a/packages/System.Memory.4.5.1/System.Memory.4.5.1.nupkg and /dev/null differ diff --git a/packages/System.Memory.4.5.1/THIRD-PARTY-NOTICES.TXT b/packages/System.Memory.4.5.1/THIRD-PARTY-NOTICES.TXT deleted file mode 100644 index db542ca2..00000000 --- a/packages/System.Memory.4.5.1/THIRD-PARTY-NOTICES.TXT +++ /dev/null @@ -1,309 +0,0 @@ -.NET Core uses third-party libraries or other resources that may be -distributed under licenses different than the .NET Core software. - -In the event that we accidentally failed to list a required notice, please -bring it to our attention. Post an issue or email us: - - dotnet@microsoft.com - -The attached notices are provided for information only. - -License notice for Slicing-by-8 -------------------------------- - -http://sourceforge.net/projects/slicing-by-8/ - -Copyright (c) 2004-2006 Intel Corporation - All Rights Reserved - - -This software program is licensed subject to the BSD License, available at -http://www.opensource.org/licenses/bsd-license.html. - - -License notice for Unicode data -------------------------------- - -http://www.unicode.org/copyright.html#License - -Copyright © 1991-2017 Unicode, Inc. All rights reserved. -Distributed under the Terms of Use in http://www.unicode.org/copyright.html. - -Permission is hereby granted, free of charge, to any person obtaining -a copy of the Unicode data files and any associated documentation -(the "Data Files") or Unicode software and any associated documentation -(the "Software") to deal in the Data Files or Software -without restriction, including without limitation the rights to use, -copy, modify, merge, publish, distribute, and/or sell copies of -the Data Files or Software, and to permit persons to whom the Data Files -or Software are furnished to do so, provided that either -(a) this copyright and permission notice appear with all copies -of the Data Files or Software, or -(b) this copyright and permission notice appear in associated -Documentation. - -THE DATA FILES AND SOFTWARE ARE PROVIDED "AS IS", WITHOUT WARRANTY OF -ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE -WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND -NONINFRINGEMENT OF THIRD PARTY RIGHTS. -IN NO EVENT SHALL THE COPYRIGHT HOLDER OR HOLDERS INCLUDED IN THIS -NOTICE BE LIABLE FOR ANY CLAIM, OR ANY SPECIAL INDIRECT OR CONSEQUENTIAL -DAMAGES, OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, -DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER -TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR -PERFORMANCE OF THE DATA FILES OR SOFTWARE. - -Except as contained in this notice, the name of a copyright holder -shall not be used in advertising or otherwise to promote the sale, -use or other dealings in these Data Files or Software without prior -written authorization of the copyright holder. - -License notice for Zlib ------------------------ - -https://github.com/madler/zlib -http://zlib.net/zlib_license.html - -/* zlib.h -- interface of the 'zlib' general purpose compression library - version 1.2.11, January 15th, 2017 - - Copyright (C) 1995-2017 Jean-loup Gailly and Mark Adler - - This software is provided 'as-is', without any express or implied - warranty. In no event will the authors be held liable for any damages - arising from the use of this software. - - Permission is granted to anyone to use this software for any purpose, - including commercial applications, and to alter it and redistribute it - freely, subject to the following restrictions: - - 1. The origin of this software must not be misrepresented; you must not - claim that you wrote the original software. If you use this software - in a product, an acknowledgment in the product documentation would be - appreciated but is not required. - 2. Altered source versions must be plainly marked as such, and must not be - misrepresented as being the original software. - 3. This notice may not be removed or altered from any source distribution. - - Jean-loup Gailly Mark Adler - jloup@gzip.org madler@alumni.caltech.edu - -*/ - -License notice for Mono -------------------------------- - -http://www.mono-project.com/docs/about-mono/ - -Copyright (c) .NET Foundation Contributors - -MIT License - -Permission is hereby granted, free of charge, to any person obtaining a copy -of this software and associated documentation files (the Software), to deal -in the Software without restriction, including without limitation the rights -to use, copy, modify, merge, publish, distribute, sublicense, and/or sell -copies of the Software, and to permit persons to whom the Software is -furnished to do so, subject to the following conditions: - -The above copyright notice and this permission notice shall be included in all -copies or substantial portions of the Software. - -THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, -EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF -MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND -NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE -LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION -OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION -WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. - -License notice for International Organization for Standardization ------------------------------------------------------------------ - -Portions (C) International Organization for Standardization 1986: - Permission to copy in any form is granted for use with - conforming SGML systems and applications as defined in - ISO 8879, provided this notice is included in all copies. - -License notice for Intel ------------------------- - -"Copyright (c) 2004-2006 Intel Corporation - All Rights Reserved - -Redistribution and use in source and binary forms, with or without -modification, are permitted provided that the following conditions are met: - -1. Redistributions of source code must retain the above copyright notice, this -list of conditions and the following disclaimer. - -2. Redistributions in binary form must reproduce the above copyright notice, -this list of conditions and the following disclaimer in the documentation -and/or other materials provided with the distribution. - -THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" -AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE -IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE -DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE -FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL -DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR -SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER -CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, -OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE -OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. - -License notice for Xamarin and Novell -------------------------------------- - -Copyright (c) 2015 Xamarin, Inc (http://www.xamarin.com) - -Permission is hereby granted, free of charge, to any person obtaining a copy -of this software and associated documentation files (the "Software"), to deal -in the Software without restriction, including without limitation the rights -to use, copy, modify, merge, publish, distribute, sublicense, and/or sell -copies of the Software, and to permit persons to whom the Software is -furnished to do so, subject to the following conditions: - -The above copyright notice and this permission notice shall be included in -all copies or substantial portions of the Software. - -THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR -IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, -FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE -AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER -LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, -OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN -THE SOFTWARE. - -Copyright (c) 2011 Novell, Inc (http://www.novell.com) - -Permission is hereby granted, free of charge, to any person obtaining a copy -of this software and associated documentation files (the "Software"), to deal -in the Software without restriction, including without limitation the rights -to use, copy, modify, merge, publish, distribute, sublicense, and/or sell -copies of the Software, and to permit persons to whom the Software is -furnished to do so, subject to the following conditions: - -The above copyright notice and this permission notice shall be included in -all copies or substantial portions of the Software. - -THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR -IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, -FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE -AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER -LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, -OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN -THE SOFTWARE. - -Third party notice for W3C --------------------------- - -"W3C SOFTWARE AND DOCUMENT NOTICE AND LICENSE -Status: This license takes effect 13 May, 2015. -This work is being provided by the copyright holders under the following license. -License -By obtaining and/or copying this work, you (the licensee) agree that you have read, understood, and will comply with the following terms and conditions. -Permission to copy, modify, and distribute this work, with or without modification, for any purpose and without fee or royalty is hereby granted, provided that you include the following on ALL copies of the work or portions thereof, including modifications: -The full text of this NOTICE in a location viewable to users of the redistributed or derivative work. -Any pre-existing intellectual property disclaimers, notices, or terms and conditions. If none exist, the W3C Software and Document Short Notice should be included. -Notice of any changes or modifications, through a copyright statement on the new code or document such as "This software or document includes material copied from or derived from [title and URI of the W3C document]. Copyright © [YEAR] W3C® (MIT, ERCIM, Keio, Beihang)." -Disclaimers -THIS WORK IS PROVIDED "AS IS," AND COPYRIGHT HOLDERS MAKE NO REPRESENTATIONS OR WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO, WARRANTIES OF MERCHANTABILITY OR FITNESS FOR ANY PARTICULAR PURPOSE OR THAT THE USE OF THE SOFTWARE OR DOCUMENT WILL NOT INFRINGE ANY THIRD PARTY PATENTS, COPYRIGHTS, TRADEMARKS OR OTHER RIGHTS. -COPYRIGHT HOLDERS WILL NOT BE LIABLE FOR ANY DIRECT, INDIRECT, SPECIAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF ANY USE OF THE SOFTWARE OR DOCUMENT. -The name and trademarks of copyright holders may NOT be used in advertising or publicity pertaining to the work without specific, written prior permission. Title to copyright in this work will at all times remain with copyright holders." - -License notice for Bit Twiddling Hacks --------------------------------------- - -Bit Twiddling Hacks - -By Sean Eron Anderson -seander@cs.stanford.edu - -Individually, the code snippets here are in the public domain (unless otherwise -noted) — feel free to use them however you please. The aggregate collection and -descriptions are © 1997-2005 Sean Eron Anderson. The code and descriptions are -distributed in the hope that they will be useful, but WITHOUT ANY WARRANTY and -without even the implied warranty of merchantability or fitness for a particular -purpose. - -License notice for Brotli --------------------------------------- - -Copyright (c) 2009, 2010, 2013-2016 by the Brotli Authors. - -Permission is hereby granted, free of charge, to any person obtaining a copy -of this software and associated documentation files (the "Software"), to deal -in the Software without restriction, including without limitation the rights -to use, copy, modify, merge, publish, distribute, sublicense, and/or sell -copies of the Software, and to permit persons to whom the Software is -furnished to do so, subject to the following conditions: - -The above copyright notice and this permission notice shall be included in -all copies or substantial portions of the Software. - -THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR -IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, -FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE -AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER -LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, -OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN -THE SOFTWARE. - -compress_fragment.c: -Copyright (c) 2011, Google Inc. -All rights reserved. - -Redistribution and use in source and binary forms, with or without -modification, are permitted provided that the following conditions are -met: - - * Redistributions of source code must retain the above copyright -notice, this list of conditions and the following disclaimer. - * Redistributions in binary form must reproduce the above -copyright notice, this list of conditions and the following disclaimer -in the documentation and/or other materials provided with the -distribution. - * Neither the name of Google Inc. nor the names of its -contributors may be used to endorse or promote products derived from -this software without specific prior written permission. - -THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS -""AS IS"" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT -LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR -A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT -OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, -SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT -LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, -DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY -THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT -(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE -OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. - -decode_fuzzer.c: -Copyright (c) 2015 The Chromium Authors. All rights reserved. - -Redistribution and use in source and binary forms, with or without -modification, are permitted provided that the following conditions are -met: - - * Redistributions of source code must retain the above copyright -notice, this list of conditions and the following disclaimer. - * Redistributions in binary form must reproduce the above -copyright notice, this list of conditions and the following disclaimer -in the documentation and/or other materials provided with the -distribution. - * Neither the name of Google Inc. nor the names of its -contributors may be used to endorse or promote products derived from -this software without specific prior written permission. - -THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS -""AS IS"" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT -LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR -A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT -OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, -SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT -LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, -DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY -THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT -(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE -OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE." - diff --git a/packages/System.Memory.4.5.1/lib/netcoreapp2.1/_._ b/packages/System.Memory.4.5.1/lib/netcoreapp2.1/_._ deleted file mode 100644 index e69de29b..00000000 diff --git a/packages/System.Memory.4.5.1/lib/netstandard1.1/System.Memory.dll b/packages/System.Memory.4.5.1/lib/netstandard1.1/System.Memory.dll deleted file mode 100644 index 7556f4a3..00000000 Binary files a/packages/System.Memory.4.5.1/lib/netstandard1.1/System.Memory.dll and /dev/null differ diff --git a/packages/System.Memory.4.5.1/lib/netstandard1.1/System.Memory.xml b/packages/System.Memory.4.5.1/lib/netstandard1.1/System.Memory.xml deleted file mode 100644 index 4d12fd71..00000000 --- a/packages/System.Memory.4.5.1/lib/netstandard1.1/System.Memory.xml +++ /dev/null @@ -1,355 +0,0 @@ - - - System.Memory - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - \ No newline at end of file diff --git a/packages/System.Memory.4.5.1/lib/netstandard2.0/System.Memory.dll b/packages/System.Memory.4.5.1/lib/netstandard2.0/System.Memory.dll deleted file mode 100644 index 078aa556..00000000 Binary files a/packages/System.Memory.4.5.1/lib/netstandard2.0/System.Memory.dll and /dev/null differ diff --git a/packages/System.Memory.4.5.1/lib/netstandard2.0/System.Memory.xml b/packages/System.Memory.4.5.1/lib/netstandard2.0/System.Memory.xml deleted file mode 100644 index 4d12fd71..00000000 --- a/packages/System.Memory.4.5.1/lib/netstandard2.0/System.Memory.xml +++ /dev/null @@ -1,355 +0,0 @@ - - - System.Memory - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - \ No newline at end of file diff --git a/packages/System.Memory.4.5.1/ref/netcoreapp2.1/_._ b/packages/System.Memory.4.5.1/ref/netcoreapp2.1/_._ deleted file mode 100644 index e69de29b..00000000 diff --git a/packages/System.Memory.4.5.1/ref/netstandard1.1/System.Memory.dll b/packages/System.Memory.4.5.1/ref/netstandard1.1/System.Memory.dll deleted file mode 100644 index 8a91bf72..00000000 Binary files a/packages/System.Memory.4.5.1/ref/netstandard1.1/System.Memory.dll and /dev/null differ diff --git a/packages/System.Memory.4.5.1/ref/netstandard1.1/System.Memory.xml b/packages/System.Memory.4.5.1/ref/netstandard1.1/System.Memory.xml deleted file mode 100644 index 4d12fd71..00000000 --- a/packages/System.Memory.4.5.1/ref/netstandard1.1/System.Memory.xml +++ /dev/null @@ -1,355 +0,0 @@ - - - System.Memory - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - \ No newline at end of file diff --git a/packages/System.Memory.4.5.1/ref/netstandard2.0/System.Memory.dll b/packages/System.Memory.4.5.1/ref/netstandard2.0/System.Memory.dll deleted file mode 100644 index c2a97a54..00000000 Binary files a/packages/System.Memory.4.5.1/ref/netstandard2.0/System.Memory.dll and /dev/null differ diff --git a/packages/System.Memory.4.5.1/ref/netstandard2.0/System.Memory.xml b/packages/System.Memory.4.5.1/ref/netstandard2.0/System.Memory.xml deleted file mode 100644 index 4d12fd71..00000000 --- a/packages/System.Memory.4.5.1/ref/netstandard2.0/System.Memory.xml +++ /dev/null @@ -1,355 +0,0 @@ - - - System.Memory - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - \ No newline at end of file diff --git a/packages/System.Memory.4.5.1/useSharedDesignerContext.txt b/packages/System.Memory.4.5.1/useSharedDesignerContext.txt deleted file mode 100644 index e69de29b..00000000 diff --git a/packages/System.Memory.4.5.1/version.txt b/packages/System.Memory.4.5.1/version.txt deleted file mode 100644 index 69c27cff..00000000 --- a/packages/System.Memory.4.5.1/version.txt +++ /dev/null @@ -1 +0,0 @@ -7ee84596d92e178bce54c986df31ccc52479e772 diff --git a/packages/System.Numerics.Vectors.4.4.0/LICENSE.TXT b/packages/System.Numerics.Vectors.4.4.0/LICENSE.TXT deleted file mode 100644 index 984713a4..00000000 --- a/packages/System.Numerics.Vectors.4.4.0/LICENSE.TXT +++ /dev/null @@ -1,23 +0,0 @@ -The MIT License (MIT) - -Copyright (c) .NET Foundation and Contributors - -All rights reserved. - -Permission is hereby granted, free of charge, to any person obtaining a copy -of this software and associated documentation files (the "Software"), to deal -in the Software without restriction, including without limitation the rights -to use, copy, modify, merge, publish, distribute, sublicense, and/or sell -copies of the Software, and to permit persons to whom the Software is -furnished to do so, subject to the following conditions: - -The above copyright notice and this permission notice shall be included in all -copies or substantial portions of the Software. - -THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR -IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, -FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE -AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER -LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, -OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE -SOFTWARE. diff --git a/packages/System.Numerics.Vectors.4.4.0/System.Numerics.Vectors.4.4.0.nupkg b/packages/System.Numerics.Vectors.4.4.0/System.Numerics.Vectors.4.4.0.nupkg deleted file mode 100644 index c3cf74f5..00000000 Binary files a/packages/System.Numerics.Vectors.4.4.0/System.Numerics.Vectors.4.4.0.nupkg and /dev/null differ diff --git a/packages/System.Numerics.Vectors.4.4.0/THIRD-PARTY-NOTICES.TXT b/packages/System.Numerics.Vectors.4.4.0/THIRD-PARTY-NOTICES.TXT deleted file mode 100644 index 06055ff0..00000000 --- a/packages/System.Numerics.Vectors.4.4.0/THIRD-PARTY-NOTICES.TXT +++ /dev/null @@ -1,226 +0,0 @@ -.NET Core uses third-party libraries or other resources that may be -distributed under licenses different than the .NET Core software. - -In the event that we accidentally failed to list a required notice, please -bring it to our attention. Post an issue or email us: - - dotnet@microsoft.com - -The attached notices are provided for information only. - -License notice for Slicing-by-8 -------------------------------- - -http://sourceforge.net/projects/slicing-by-8/ - -Copyright (c) 2004-2006 Intel Corporation - All Rights Reserved - - -This software program is licensed subject to the BSD License, available at -http://www.opensource.org/licenses/bsd-license.html. - - -License notice for Unicode data -------------------------------- - -http://www.unicode.org/copyright.html#License - -Copyright © 1991-2017 Unicode, Inc. All rights reserved. -Distributed under the Terms of Use in http://www.unicode.org/copyright.html. - -Permission is hereby granted, free of charge, to any person obtaining -a copy of the Unicode data files and any associated documentation -(the "Data Files") or Unicode software and any associated documentation -(the "Software") to deal in the Data Files or Software -without restriction, including without limitation the rights to use, -copy, modify, merge, publish, distribute, and/or sell copies of -the Data Files or Software, and to permit persons to whom the Data Files -or Software are furnished to do so, provided that either -(a) this copyright and permission notice appear with all copies -of the Data Files or Software, or -(b) this copyright and permission notice appear in associated -Documentation. - -THE DATA FILES AND SOFTWARE ARE PROVIDED "AS IS", WITHOUT WARRANTY OF -ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE -WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND -NONINFRINGEMENT OF THIRD PARTY RIGHTS. -IN NO EVENT SHALL THE COPYRIGHT HOLDER OR HOLDERS INCLUDED IN THIS -NOTICE BE LIABLE FOR ANY CLAIM, OR ANY SPECIAL INDIRECT OR CONSEQUENTIAL -DAMAGES, OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, -DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER -TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR -PERFORMANCE OF THE DATA FILES OR SOFTWARE. - -Except as contained in this notice, the name of a copyright holder -shall not be used in advertising or otherwise to promote the sale, -use or other dealings in these Data Files or Software without prior -written authorization of the copyright holder. - -License notice for Zlib ------------------------ - -https://github.com/madler/zlib -http://zlib.net/zlib_license.html - -/* zlib.h -- interface of the 'zlib' general purpose compression library - version 1.2.11, January 15th, 2017 - - Copyright (C) 1995-2017 Jean-loup Gailly and Mark Adler - - This software is provided 'as-is', without any express or implied - warranty. In no event will the authors be held liable for any damages - arising from the use of this software. - - Permission is granted to anyone to use this software for any purpose, - including commercial applications, and to alter it and redistribute it - freely, subject to the following restrictions: - - 1. The origin of this software must not be misrepresented; you must not - claim that you wrote the original software. If you use this software - in a product, an acknowledgment in the product documentation would be - appreciated but is not required. - 2. Altered source versions must be plainly marked as such, and must not be - misrepresented as being the original software. - 3. This notice may not be removed or altered from any source distribution. - - Jean-loup Gailly Mark Adler - jloup@gzip.org madler@alumni.caltech.edu - -*/ - -License notice for Mono -------------------------------- - -http://www.mono-project.com/docs/about-mono/ - -Copyright (c) .NET Foundation Contributors - -MIT License - -Permission is hereby granted, free of charge, to any person obtaining a copy -of this software and associated documentation files (the Software), to deal -in the Software without restriction, including without limitation the rights -to use, copy, modify, merge, publish, distribute, sublicense, and/or sell -copies of the Software, and to permit persons to whom the Software is -furnished to do so, subject to the following conditions: - -The above copyright notice and this permission notice shall be included in all -copies or substantial portions of the Software. - -THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, -EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF -MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND -NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE -LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION -OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION -WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. - -License notice for International Organization for Standardization ------------------------------------------------------------------ - -Portions (C) International Organization for Standardization 1986: - Permission to copy in any form is granted for use with - conforming SGML systems and applications as defined in - ISO 8879, provided this notice is included in all copies. - -License notice for Intel ------------------------- - -"Copyright (c) 2004-2006 Intel Corporation - All Rights Reserved - -Redistribution and use in source and binary forms, with or without -modification, are permitted provided that the following conditions are met: - -1. Redistributions of source code must retain the above copyright notice, this -list of conditions and the following disclaimer. - -2. Redistributions in binary form must reproduce the above copyright notice, -this list of conditions and the following disclaimer in the documentation -and/or other materials provided with the distribution. - -THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" -AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE -IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE -DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE -FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL -DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR -SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER -CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, -OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE -OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. - -License notice for Xamarin and Novell -------------------------------------- - -Copyright (c) 2015 Xamarin, Inc (http://www.xamarin.com) - -Permission is hereby granted, free of charge, to any person obtaining a copy -of this software and associated documentation files (the "Software"), to deal -in the Software without restriction, including without limitation the rights -to use, copy, modify, merge, publish, distribute, sublicense, and/or sell -copies of the Software, and to permit persons to whom the Software is -furnished to do so, subject to the following conditions: - -The above copyright notice and this permission notice shall be included in -all copies or substantial portions of the Software. - -THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR -IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, -FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE -AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER -LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, -OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN -THE SOFTWARE. - -Copyright (c) 2011 Novell, Inc (http://www.novell.com) - -Permission is hereby granted, free of charge, to any person obtaining a copy -of this software and associated documentation files (the "Software"), to deal -in the Software without restriction, including without limitation the rights -to use, copy, modify, merge, publish, distribute, sublicense, and/or sell -copies of the Software, and to permit persons to whom the Software is -furnished to do so, subject to the following conditions: - -The above copyright notice and this permission notice shall be included in -all copies or substantial portions of the Software. - -THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR -IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, -FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE -AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER -LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, -OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN -THE SOFTWARE. - -Third party notice for W3C --------------------------- - -"W3C SOFTWARE AND DOCUMENT NOTICE AND LICENSE -Status: This license takes effect 13 May, 2015. -This work is being provided by the copyright holders under the following license. -License -By obtaining and/or copying this work, you (the licensee) agree that you have read, understood, and will comply with the following terms and conditions. -Permission to copy, modify, and distribute this work, with or without modification, for any purpose and without fee or royalty is hereby granted, provided that you include the following on ALL copies of the work or portions thereof, including modifications: -The full text of this NOTICE in a location viewable to users of the redistributed or derivative work. -Any pre-existing intellectual property disclaimers, notices, or terms and conditions. If none exist, the W3C Software and Document Short Notice should be included. -Notice of any changes or modifications, through a copyright statement on the new code or document such as "This software or document includes material copied from or derived from [title and URI of the W3C document]. Copyright © [YEAR] W3C® (MIT, ERCIM, Keio, Beihang)." -Disclaimers -THIS WORK IS PROVIDED "AS IS," AND COPYRIGHT HOLDERS MAKE NO REPRESENTATIONS OR WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO, WARRANTIES OF MERCHANTABILITY OR FITNESS FOR ANY PARTICULAR PURPOSE OR THAT THE USE OF THE SOFTWARE OR DOCUMENT WILL NOT INFRINGE ANY THIRD PARTY PATENTS, COPYRIGHTS, TRADEMARKS OR OTHER RIGHTS. -COPYRIGHT HOLDERS WILL NOT BE LIABLE FOR ANY DIRECT, INDIRECT, SPECIAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF ANY USE OF THE SOFTWARE OR DOCUMENT. -The name and trademarks of copyright holders may NOT be used in advertising or publicity pertaining to the work without specific, written prior permission. Title to copyright in this work will at all times remain with copyright holders." - -License notice for Bit Twiddling Hacks --------------------------------------- - -Bit Twiddling Hacks - -By Sean Eron Anderson -seander@cs.stanford.edu - -Individually, the code snippets here are in the public domain (unless otherwise -noted) — feel free to use them however you please. The aggregate collection and -descriptions are © 1997-2005 Sean Eron Anderson. The code and descriptions are -distributed in the hope that they will be useful, but WITHOUT ANY WARRANTY and -without even the implied warranty of merchantability or fitness for a particular -purpose. diff --git a/packages/System.Numerics.Vectors.4.4.0/lib/MonoAndroid10/_._ b/packages/System.Numerics.Vectors.4.4.0/lib/MonoAndroid10/_._ deleted file mode 100644 index e69de29b..00000000 diff --git a/packages/System.Numerics.Vectors.4.4.0/lib/MonoTouch10/_._ b/packages/System.Numerics.Vectors.4.4.0/lib/MonoTouch10/_._ deleted file mode 100644 index e69de29b..00000000 diff --git a/packages/System.Numerics.Vectors.4.4.0/lib/net46/System.Numerics.Vectors.dll b/packages/System.Numerics.Vectors.4.4.0/lib/net46/System.Numerics.Vectors.dll deleted file mode 100644 index ce46d5be..00000000 Binary files a/packages/System.Numerics.Vectors.4.4.0/lib/net46/System.Numerics.Vectors.dll and /dev/null differ diff --git a/packages/System.Numerics.Vectors.4.4.0/lib/net46/System.Numerics.Vectors.xml b/packages/System.Numerics.Vectors.4.4.0/lib/net46/System.Numerics.Vectors.xml deleted file mode 100644 index 51297939..00000000 --- a/packages/System.Numerics.Vectors.4.4.0/lib/net46/System.Numerics.Vectors.xml +++ /dev/null @@ -1,2597 +0,0 @@ - - - - System.Numerics.Vectors - - - - Represents a 3x2 matrix. - - - Creates a 3x2 matrix from the specified components. - The value to assign to the first element in the first row. - The value to assign to the second element in the first row. - The value to assign to the first element in the second row. - The value to assign to the second element in the second row. - The value to assign to the first element in the third row. - The value to assign to the second element in the third row. - - - Adds each element in one matrix with its corresponding element in a second matrix. - The first matrix. - The second matrix. - The matrix that contains the summed values of value1 and value2. - - - Creates a rotation matrix using the given rotation in radians. - The amount of rotation, in radians. - The rotation matrix. - - - Creates a rotation matrix using the specified rotation in radians and a center point. - The amount of rotation, in radians. - The center point. - The rotation matrix. - - - Creates a scaling matrix from the specified X and Y components. - The value to scale by on the X axis. - The value to scale by on the Y axis. - The scaling matrix. - - - Creates a scaling matrix that scales uniformly with the specified scale with an offset from the specified center. - The uniform scale to use. - The center offset. - The scaling matrix. - - - Creates a scaling matrix that is offset by a given center point. - The value to scale by on the X axis. - The value to scale by on the Y axis. - The center point. - The scaling matrix. - - - Creates a scaling matrix that scales uniformly with the given scale. - The uniform scale to use. - The scaling matrix. - - - Creates a scaling matrix from the specified vector scale. - The scale to use. - The scaling matrix. - - - Creates a scaling matrix from the specified vector scale with an offset from the specified center point. - The scale to use. - The center offset. - The scaling matrix. - - - Creates a skew matrix from the specified angles in radians. - The X angle, in radians. - The Y angle, in radians. - The skew matrix. - - - Creates a skew matrix from the specified angles in radians and a center point. - The X angle, in radians. - The Y angle, in radians. - The center point. - The skew matrix. - - - Creates a translation matrix from the specified 2-dimensional vector. - The translation position. - The translation matrix. - - - Creates a translation matrix from the specified X and Y components. - The X position. - The Y position. - The translation matrix. - - - Returns a value that indicates whether this instance and another 3x2 matrix are equal. - The other matrix. - true if the two matrices are equal; otherwise, false. - - - Returns a value that indicates whether this instance and a specified object are equal. - The object to compare with the current instance. - true if the current instance and obj are equal; otherwise, false```. If <code data-dev-comment-type="paramref">obj</code> isnull, the method returnsfalse`. - - - Calculates the determinant for this matrix. - The determinant. - - - Returns the hash code for this instance. - The hash code. - - - Gets the multiplicative identity matrix. - The multiplicative identify matrix. - - - Inverts the specified matrix. The return value indicates whether the operation succeeded. - The matrix to invert. - When this method returns, contains the inverted matrix if the operation succeeded. - true if matrix was converted successfully; otherwise, false. - - - Indicates whether the current matrix is the identity matrix. - true if the current matrix is the identity matrix; otherwise, false. - - - Performs a linear interpolation from one matrix to a second matrix based on a value that specifies the weighting of the second matrix. - The first matrix. - The second matrix. - The relative weighting of matrix2. - The interpolated matrix. - - - The first element of the first row. - - - - The second element of the first row. - - - - The first element of the second row. - - - - The second element of the second row. - - - - The first element of the third row. - - - - The second element of the third row. - - - - Returns the matrix that results from multiplying two matrices together. - The first matrix. - The second matrix. - The product matrix. - - - Returns the matrix that results from scaling all the elements of a specified matrix by a scalar factor. - The matrix to scale. - The scaling value to use. - The scaled matrix. - - - Negates the specified matrix by multiplying all its values by -1. - The matrix to negate. - The negated matrix. - - - Adds each element in one matrix with its corresponding element in a second matrix. - The first matrix. - The second matrix. - The matrix that contains the summed values. - - - Returns a value that indicates whether the specified matrices are equal. - The first matrix to compare. - The second matrix to compare. - true if value1 and value2 are equal; otherwise, false. - - - Returns a value that indicates whether the specified matrices are not equal. - The first matrix to compare. - The second matrix to compare. - true if value1 and value2 are not equal; otherwise, false. - - - Returns the matrix that results from multiplying two matrices together. - The first matrix. - The second matrix. - The product matrix. - - - Returns the matrix that results from scaling all the elements of a specified matrix by a scalar factor. - The matrix to scale. - The scaling value to use. - The scaled matrix. - - - Subtracts each element in a second matrix from its corresponding element in a first matrix. - The first matrix. - The second matrix. - The matrix containing the values that result from subtracting each element in value2 from its corresponding element in value1. - - - Negates the specified matrix by multiplying all its values by -1. - The matrix to negate. - The negated matrix. - - - Subtracts each element in a second matrix from its corresponding element in a first matrix. - The first matrix. - The second matrix. - The matrix containing the values that result from subtracting each element in value2 from its corresponding element in value1. - - - Returns a string that represents this matrix. - The string representation of this matrix. - - - Gets or sets the translation component of this matrix. - The translation component of the current instance. - - - Represents a 4x4 matrix. - - - Creates a object from a specified object. - A 3x2 matrix. - - - Creates a 4x4 matrix from the specified components. - The value to assign to the first element in the first row. - The value to assign to the second element in the first row. - The value to assign to the third element in the first row. - The value to assign to the fourth element in the first row. - The value to assign to the first element in the second row. - The value to assign to the second element in the second row. - The value to assign to the third element in the second row. - The value to assign to the third element in the second row. - The value to assign to the first element in the third row. - The value to assign to the second element in the third row. - The value to assign to the third element in the third row. - The value to assign to the fourth element in the third row. - The value to assign to the first element in the fourth row. - The value to assign to the second element in the fourth row. - The value to assign to the third element in the fourth row. - The value to assign to the fourth element in the fourth row. - - - Adds each element in one matrix with its corresponding element in a second matrix. - The first matrix. - The second matrix. - The matrix that contains the summed values of value1 and value2. - - - Creates a spherical billboard that rotates around a specified object position. - The position of the object that the billboard will rotate around. - The position of the camera. - The up vector of the camera. - The forward vector of the camera. - The created billboard. - - - Creates a cylindrical billboard that rotates around a specified axis. - The position of the object that the billboard will rotate around. - The position of the camera. - The axis to rotate the billboard around. - The forward vector of the camera. - The forward vector of the object. - The billboard matrix. - - - Creates a matrix that rotates around an arbitrary vector. - The axis to rotate around. - The angle to rotate around axis, in radians. - The rotation matrix. - - - Creates a rotation matrix from the specified Quaternion rotation value. - The source Quaternion. - The rotation matrix. - - - Creates a rotation matrix from the specified yaw, pitch, and roll. - The angle of rotation, in radians, around the Y axis. - The angle of rotation, in radians, around the X axis. - The angle of rotation, in radians, around the Z axis. - The rotation matrix. - - - Creates a view matrix. - The position of the camera. - The target towards which the camera is pointing. - The direction that is "up" from the camera's point of view. - The view matrix. - - - Creates an orthographic perspective matrix from the given view volume dimensions. - The width of the view volume. - The height of the view volume. - The minimum Z-value of the view volume. - The maximum Z-value of the view volume. - The orthographic projection matrix. - - - Creates a customized orthographic projection matrix. - The minimum X-value of the view volume. - The maximum X-value of the view volume. - The minimum Y-value of the view volume. - The maximum Y-value of the view volume. - The minimum Z-value of the view volume. - The maximum Z-value of the view volume. - The orthographic projection matrix. - - - Creates a perspective projection matrix from the given view volume dimensions. - The width of the view volume at the near view plane. - The height of the view volume at the near view plane. - The distance to the near view plane. - The distance to the far view plane. - The perspective projection matrix. - nearPlaneDistance is less than or equal to zero. -or- farPlaneDistance is less than or equal to zero. -or- nearPlaneDistance is greater than or equal to farPlaneDistance. - - - Creates a perspective projection matrix based on a field of view, aspect ratio, and near and far view plane distances. - The field of view in the y direction, in radians. - The aspect ratio, defined as view space width divided by height. - The distance to the near view plane. - The distance to the far view plane. - The perspective projection matrix. - fieldOfView is less than or equal to zero. -or- fieldOfView is greater than or equal to . nearPlaneDistance is less than or equal to zero. -or- farPlaneDistance is less than or equal to zero. -or- nearPlaneDistance is greater than or equal to farPlaneDistance. - - - Creates a customized perspective projection matrix. - The minimum x-value of the view volume at the near view plane. - The maximum x-value of the view volume at the near view plane. - The minimum y-value of the view volume at the near view plane. - The maximum y-value of the view volume at the near view plane. - The distance to the near view plane. - The distance to the far view plane. - The perspective projection matrix. - nearPlaneDistance is less than or equal to zero. -or- farPlaneDistance is less than or equal to zero. -or- nearPlaneDistance is greater than or equal to farPlaneDistance. - - - Creates a matrix that reflects the coordinate system about a specified plane. - The plane about which to create a reflection. - A new matrix expressing the reflection. - - - Creates a matrix for rotating points around the X axis. - The amount, in radians, by which to rotate around the X axis. - The rotation matrix. - - - Creates a matrix for rotating points around the X axis from a center point. - The amount, in radians, by which to rotate around the X axis. - The center point. - The rotation matrix. - - - The amount, in radians, by which to rotate around the Y axis from a center point. - The amount, in radians, by which to rotate around the Y-axis. - The center point. - The rotation matrix. - - - Creates a matrix for rotating points around the Y axis. - The amount, in radians, by which to rotate around the Y-axis. - The rotation matrix. - - - Creates a matrix for rotating points around the Z axis. - The amount, in radians, by which to rotate around the Z-axis. - The rotation matrix. - - - Creates a matrix for rotating points around the Z axis from a center point. - The amount, in radians, by which to rotate around the Z-axis. - The center point. - The rotation matrix. - - - Creates a scaling matrix from the specified vector scale. - The scale to use. - The scaling matrix. - - - Creates a uniform scaling matrix that scale equally on each axis. - The uniform scaling factor. - The scaling matrix. - - - Creates a scaling matrix with a center point. - The vector that contains the amount to scale on each axis. - The center point. - The scaling matrix. - - - Creates a uniform scaling matrix that scales equally on each axis with a center point. - The uniform scaling factor. - The center point. - The scaling matrix. - - - Creates a scaling matrix from the specified X, Y, and Z components. - The value to scale by on the X axis. - The value to scale by on the Y axis. - The value to scale by on the Z axis. - The scaling matrix. - - - Creates a scaling matrix that is offset by a given center point. - The value to scale by on the X axis. - The value to scale by on the Y axis. - The value to scale by on the Z axis. - The center point. - The scaling matrix. - - - Creates a matrix that flattens geometry into a specified plane as if casting a shadow from a specified light source. - The direction from which the light that will cast the shadow is coming. - The plane onto which the new matrix should flatten geometry so as to cast a shadow. - A new matrix that can be used to flatten geometry onto the specified plane from the specified direction. - - - Creates a translation matrix from the specified 3-dimensional vector. - The amount to translate in each axis. - The translation matrix. - - - Creates a translation matrix from the specified X, Y, and Z components. - The amount to translate on the X axis. - The amount to translate on the Y axis. - The amount to translate on the Z axis. - The translation matrix. - - - Creates a world matrix with the specified parameters. - The position of the object. - The forward direction of the object. - The upward direction of the object. Its value is usually [0, 1, 0]. - The world matrix. - - - Attempts to extract the scale, translation, and rotation components from the given scale, rotation, or translation matrix. The return value indicates whether the operation succeeded. - The source matrix. - When this method returns, contains the scaling component of the transformation matrix if the operation succeeded. - When this method returns, contains the rotation component of the transformation matrix if the operation succeeded. - When the method returns, contains the translation component of the transformation matrix if the operation succeeded. - true if matrix was decomposed successfully; otherwise, false. - - - Returns a value that indicates whether this instance and another 4x4 matrix are equal. - The other matrix. - true if the two matrices are equal; otherwise, false. - - - Returns a value that indicates whether this instance and a specified object are equal. - The object to compare with the current instance. - true if the current instance and obj are equal; otherwise, false```. If <code data-dev-comment-type="paramref">obj</code> isnull, the method returnsfalse`. - - - Calculates the determinant of the current 4x4 matrix. - The determinant. - - - Returns the hash code for this instance. - The hash code. - - - Gets the multiplicative identity matrix. - Gets the multiplicative identity matrix. - - - Inverts the specified matrix. The return value indicates whether the operation succeeded. - The matrix to invert. - When this method returns, contains the inverted matrix if the operation succeeded. - true if matrix was converted successfully; otherwise, false. - - - Indicates whether the current matrix is the identity matrix. - true if the current matrix is the identity matrix; otherwise, false. - - - Performs a linear interpolation from one matrix to a second matrix based on a value that specifies the weighting of the second matrix. - The first matrix. - The second matrix. - The relative weighting of matrix2. - The interpolated matrix. - - - The first element of the first row. - - - - The second element of the first row. - - - - The third element of the first row. - - - - The fourth element of the first row. - - - - The first element of the second row. - - - - The second element of the second row. - - - - The third element of the second row. - - - - The fourth element of the second row. - - - - The first element of the third row. - - - - The second element of the third row. - - - - The third element of the third row. - - - - The fourth element of the third row. - - - - The first element of the fourth row. - - - - The second element of the fourth row. - - - - The third element of the fourth row. - - - - The fourth element of the fourth row. - - - - Returns the matrix that results from multiplying two matrices together. - The first matrix. - The second matrix. - The product matrix. - - - Returns the matrix that results from scaling all the elements of a specified matrix by a scalar factor. - The matrix to scale. - The scaling value to use. - The scaled matrix. - - - Negates the specified matrix by multiplying all its values by -1. - The matrix to negate. - The negated matrix. - - - Adds each element in one matrix with its corresponding element in a second matrix. - The first matrix. - The second matrix. - The matrix that contains the summed values. - - - Returns a value that indicates whether the specified matrices are equal. - The first matrix to compare. - The second matrix to care - true if value1 and value2 are equal; otherwise, false. - - - Returns a value that indicates whether the specified matrices are not equal. - The first matrix to compare. - The second matrix to compare. - true if value1 and value2 are not equal; otherwise, false. - - - Returns the matrix that results from scaling all the elements of a specified matrix by a scalar factor. - The matrix to scale. - The scaling value to use. - The scaled matrix. - - - Returns the matrix that results from multiplying two matrices together. - The first matrix. - The second matrix. - The product matrix. - - - Subtracts each element in a second matrix from its corresponding element in a first matrix. - The first matrix. - The second matrix. - The matrix containing the values that result from subtracting each element in value2 from its corresponding element in value1. - - - Negates the specified matrix by multiplying all its values by -1. - The matrix to negate. - The negated matrix. - - - Subtracts each element in a second matrix from its corresponding element in a first matrix. - The first matrix. - The second matrix. - The matrix containing the values that result from subtracting each element in value2 from its corresponding element in value1. - - - Returns a string that represents this matrix. - The string representation of this matrix. - - - Transforms the specified matrix by applying the specified Quaternion rotation. - The matrix to transform. - The rotation t apply. - The transformed matrix. - - - Gets or sets the translation component of this matrix. - The translation component of the current instance. - - - Transposes the rows and columns of a matrix. - The matrix to transpose. - The transposed matrix. - - - Represents a three-dimensional plane. - - - Creates a object from a specified four-dimensional vector. - A vector whose first three elements describe the normal vector, and whose defines the distance along that normal from the origin. - - - Creates a object from a specified normal and the distance along the normal from the origin. - The plane's normal vector. - The plane's distance from the origin along its normal vector. - - - Creates a object from the X, Y, and Z components of its normal, and its distance from the origin on that normal. - The X component of the normal. - The Y component of the normal. - The Z component of the normal. - The distance of the plane along its normal from the origin. - - - Creates a object that contains three specified points. - The first point defining the plane. - The second point defining the plane. - The third point defining the plane. - The plane containing the three points. - - - The distance of the plane along its normal from the origin. - - - - Calculates the dot product of a plane and a 4-dimensional vector. - The plane. - The four-dimensional vector. - The dot product. - - - Returns the dot product of a specified three-dimensional vector and the normal vector of this plane plus the distance () value of the plane. - The plane. - The 3-dimensional vector. - The dot product. - - - Returns the dot product of a specified three-dimensional vector and the vector of this plane. - The plane. - The three-dimensional vector. - The dot product. - - - Returns a value that indicates whether this instance and a specified object are equal. - The object to compare with the current instance. - true if the current instance and obj are equal; otherwise, false```. If <code data-dev-comment-type="paramref">obj</code> isnull, the method returnsfalse`. - - - Returns a value that indicates whether this instance and another plane object are equal. - The other plane. - true if the two planes are equal; otherwise, false. - - - Returns the hash code for this instance. - The hash code. - - - The normal vector of the plane. - - - - Creates a new object whose normal vector is the source plane's normal vector normalized. - The source plane. - The normalized plane. - - - Returns a value that indicates whether two planes are equal. - The first plane to compare. - The second plane to compare. - true if value1 and value2 are equal; otherwise, false. - - - Returns a value that indicates whether two planes are not equal. - The first plane to compare. - The second plane to compare. - true if value1 and value2 are not equal; otherwise, false. - - - Returns the string representation of this plane object. - A string that represents this object. - - - Transforms a normalized plane by a 4x4 matrix. - The normalized plane to transform. - The transformation matrix to apply to plane. - The transformed plane. - - - Transforms a normalized plane by a Quaternion rotation. - The normalized plane to transform. - The Quaternion rotation to apply to the plane. - A new plane that results from applying the Quaternion rotation. - - - Represents a vector that is used to encode three-dimensional physical rotations. - - - Creates a quaternion from the specified vector and rotation parts. - The vector part of the quaternion. - The rotation part of the quaternion. - - - Constructs a quaternion from the specified components. - The value to assign to the X component of the quaternion. - The value to assign to the Y component of the quaternion. - The value to assign to the Z component of the quaternion. - The value to assign to the W component of the quaternion. - - - Adds each element in one quaternion with its corresponding element in a second quaternion. - The first quaternion. - The second quaternion. - The quaternion that contains the summed values of value1 and value2. - - - Concatenates two quaternions. - The first quaternion rotation in the series. - The second quaternion rotation in the series. - A new quaternion representing the concatenation of the value1 rotation followed by the value2 rotation. - - - Returns the conjugate of a specified quaternion. - The quaternion. - A new quaternion that is the conjugate of value. - - - Creates a quaternion from a vector and an angle to rotate about the vector. - The vector to rotate around. - The angle, in radians, to rotate around the vector. - The newly created quaternion. - - - Creates a quaternion from the specified rotation matrix. - The rotation matrix. - The newly created quaternion. - - - Creates a new quaternion from the given yaw, pitch, and roll. - The yaw angle, in radians, around the Y axis. - The pitch angle, in radians, around the X axis. - The roll angle, in radians, around the Z axis. - The resulting quaternion. - - - Divides one quaternion by a second quaternion. - The dividend. - The divisor. - The quaternion that results from dividing value1 by value2. - - - Calculates the dot product of two quaternions. - The first quaternion. - The second quaternion. - The dot product. - - - Returns a value that indicates whether this instance and another quaternion are equal. - The other quaternion. - true if the two quaternions are equal; otherwise, false. - - - Returns a value that indicates whether this instance and a specified object are equal. - The object to compare with the current instance. - true if the current instance and obj are equal; otherwise, false```. If <code data-dev-comment-type="paramref">obj</code> isnull, the method returnsfalse`. - - - Returns the hash code for this instance. - The hash code. - - - Gets a quaternion that represents no rotation. - A quaternion whose values are (0, 0, 0, 1). - - - Returns the inverse of a quaternion. - The quaternion. - The inverted quaternion. - - - Gets a value that indicates whether the current instance is the identity quaternion. - true if the current instance is the identity quaternion; otherwise, false. - - - Calculates the length of the quaternion. - The computed length of the quaternion. - - - Calculates the squared length of the quaternion. - The length squared of the quaternion. - - - Performs a linear interpolation between two quaternions based on a value that specifies the weighting of the second quaternion. - The first quaternion. - The second quaternion. - The relative weight of quaternion2 in the interpolation. - The interpolated quaternion. - - - Returns the quaternion that results from multiplying two quaternions together. - The first quaternion. - The second quaternion. - The product quaternion. - - - Returns the quaternion that results from scaling all the components of a specified quaternion by a scalar factor. - The source quaternion. - The scalar value. - The scaled quaternion. - - - Reverses the sign of each component of the quaternion. - The quaternion to negate. - The negated quaternion. - - - Divides each component of a specified by its length. - The quaternion to normalize. - The normalized quaternion. - - - Adds each element in one quaternion with its corresponding element in a second quaternion. - The first quaternion. - The second quaternion. - The quaternion that contains the summed values of value1 and value2. - - - Divides one quaternion by a second quaternion. - The dividend. - The divisor. - The quaternion that results from dividing value1 by value2. - - - Returns a value that indicates whether two quaternions are equal. - The first quaternion to compare. - The second quaternion to compare. - true if the two quaternions are equal; otherwise, false. - - - Returns a value that indicates whether two quaternions are not equal. - The first quaternion to compare. - The second quaternion to compare. - true if value1 and value2 are not equal; otherwise, false. - - - Returns the quaternion that results from scaling all the components of a specified quaternion by a scalar factor. - The source quaternion. - The scalar value. - The scaled quaternion. - - - Returns the quaternion that results from multiplying two quaternions together. - The first quaternion. - The second quaternion. - The product quaternion. - - - Subtracts each element in a second quaternion from its corresponding element in a first quaternion. - The first quaternion. - The second quaternion. - The quaternion containing the values that result from subtracting each element in value2 from its corresponding element in value1. - - - Reverses the sign of each component of the quaternion. - The quaternion to negate. - The negated quaternion. - - - Interpolates between two quaternions, using spherical linear interpolation. - The first quaternion. - The second quaternion. - The relative weight of the second quaternion in the interpolation. - The interpolated quaternion. - - - Subtracts each element in a second quaternion from its corresponding element in a first quaternion. - The first quaternion. - The second quaternion. - The quaternion containing the values that result from subtracting each element in value2 from its corresponding element in value1. - - - Returns a string that represents this quaternion. - The string representation of this quaternion. - - - The rotation component of the quaternion. - - - - The X value of the vector component of the quaternion. - - - - The Y value of the vector component of the quaternion. - - - - The Z value of the vector component of the quaternion. - - - - Represents a single vector of a specified numeric type that is suitable for low-level optimization of parallel algorithms. - The vector type. T can be any primitive numeric type. - - - Creates a vector whose components are of a specified type. - The numeric type that defines the type of the components in the vector. - - - Creates a vector from a specified array. - A numeric array. - values is null. - - - Creates a vector from a specified array starting at a specified index position. - A numeric array. - The starting index position from which to create the vector. - values is null. - index is less than zero. -or- The length of values minus index is less than . - - - Copies the vector instance to a specified destination array. - The array to receive a copy of the vector values. - destination is null. - The number of elements in the current vector is greater than the number of elements available in the destination array. - - - Copies the vector instance to a specified destination array starting at a specified index position. - The array to receive a copy of the vector values. - The starting index in destination at which to begin the copy operation. - destination is null. - The number of elements in the current instance is greater than the number of elements available from startIndex to the end of the destination array. - index is less than zero or greater than the last index in destination. - - - Returns the number of elements stored in the vector. - The number of elements stored in the vector. - Access to the property getter via reflection is not supported. - - - Returns a value that indicates whether this instance is equal to a specified vector. - The vector to compare with this instance. - true if the current instance and other are equal; otherwise, false. - - - Returns a value that indicates whether this instance is equal to a specified object. - The object to compare with this instance. - true if the current instance and obj are equal; otherwise, false. The method returns false if obj is null, or if obj is a vector of a different type than the current instance. - - - Returns the hash code for this instance. - The hash code. - - - Gets the element at a specified index. - The index of the element to return. - The element at index index. - index is less than zero. -or- index is greater than or equal to . - - - Returns a vector containing all ones. - A vector containing all ones. - - - Adds two vectors together. - The first vector to add. - The second vector to add. - The summed vector. - - - Returns a new vector by performing a bitwise And operation on each of the elements in two vectors. - The first vector. - The second vector. - The vector that results from the bitwise And of left and right. - - - Returns a new vector by performing a bitwise Or operation on each of the elements in two vectors. - The first vector. - The second vector. - The vector that results from the bitwise Or of the elements in left and right. - - - Divides the first vector by the second. - The first vector. - The second vector. - The vector that results from dividing left by right. - - - Returns a value that indicates whether each pair of elements in two specified vectors are equal. - The first vector to compare. - The second vector to compare. - true if left and right are equal; otherwise, false. - - - Returns a new vector by performing a bitwise XOr operation on each of the elements in two vectors. - The first vector. - The second vector. - The vector that results from the bitwise XOr of the elements in left and right. - - - Reinterprets the bits of the specified vector into a vector of type . - The vector to reinterpret. - The reinterpreted vector. - - - Reinterprets the bits of the specified vector into a vector of type . - The vector to reinterpret. - The reinterpreted vector. - - - Reinterprets the bits of the specified vector into a vector of type . - The vector to reinterpret. - The reinterpreted vector. - - - Reinterprets the bits of the specified vector into a vector of type . - The vector to reinterpret. - The reinterpreted vector. - - - Reinterprets the bits of the specified vector into a vector of type . - The vector to reinterpret. - The reinterpreted vector. - - - Reinterprets the bits of the specified vector into a vector of type . - The vector to reinterpret. - The reinterpreted vector. - - - Reinterprets the bits of the specified vector into a vector of type . - The vector to reinterpret. - The reinterpreted vector. - - - Reinterprets the bits of the specified vector into a vector of type . - The vector to reinterpret. - The reinterpreted vector. - - - Reinterprets the bits of the specified vector into a vector of type . - The vector to reinterpret. - The reinterpreted vector. - - - Reinterprets the bits of the specified vector into a vector of type . - The vector to reinterpret. - The reinterpreted vector. - - - Returns a value that indicates whether any single pair of elements in the specified vectors is equal. - The first vector to compare. - The second vector to compare. - true if any element pairs in left and right are equal. false if no element pairs are equal. - - - Multiplies two vectors together. - The first vector. - The second vector. - The product vector. - - - Multiplies a vector by a specified scalar value. - The source vector. - A scalar value. - The scaled vector. - - - Multiplies a vector by the given scalar. - The scalar value. - The source vector. - The scaled vector. - - - Returns a new vector whose elements are obtained by taking the one's complement of a specified vector's elements. - The source vector. - The one's complement vector. - - - Subtracts the second vector from the first. - The first vector. - The second vector. - The vector that results from subtracting right from left. - - - Negates a given vector. - The vector to negate. - The negated vector. - - - Returns the string representation of this vector using the specified format string to format individual elements and the specified format provider to define culture-specific formatting. - A or that defines the format of individual elements. - A format provider that supplies culture-specific formatting information. - The string representation of the current instance. - - - Returns the string representation of this vector using default formatting. - The string representation of this vector. - - - Returns the string representation of this vector using the specified format string to format individual elements. - A or that defines the format of individual elements. - The string representation of the current instance. - - - Returns a vector containing all zeroes. - A vector containing all zeroes. - - - Provides a collection of static convenience methods for creating, manipulating, combining, and converting generic vectors. - - - Returns a new vector whose elements are the absolute values of the given vector's elements. - The source vector. - The vector type. T can be any primitive numeric type. - The absolute value vector. - - - Returns a new vector whose values are the sum of each pair of elements from two given vectors. - The first vector. - The second vector. - The vector type. T can be any primitive numeric type. - The summed vector. - - - Returns a new vector by performing a bitwise And Not operation on each pair of corresponding elements in two vectors. - The first vector. - The second vector. - The vector type. T can be any primitive numeric type. - The resulting vector. - - - Reinterprets the bits of a specified vector into those of a vector of unsigned bytes. - The source vector. - The vector type. T can be any primitive numeric type. - The reinterpreted vector. - - - Reinterprets the bits of a specified vector into those of a double-precision floating-point vector. - The source vector. - The vector type. T can be any primitive numeric type. - The reinterpreted vector. - - - Reinterprets the bits of a specified vector into those of a vector of 16-bit integers. - The source vector. - The vector type. T can be any primitive numeric type. - The reinterpreted vector. - - - Reinterprets the bits of a specified vector into those of a vector of integers. - The source vector. - The vector type. T can be any primitive numeric type. - The reinterpreted vector. - - - Reinterprets the bits of a specified vector into those of a vector of long integers. - The source vector. - The vector type. T can be any primitive numeric type. - The reinterpreted vector. - - - Reinterprets the bits of a specified vector into those of a vector of signed bytes. - The source vector. - The vector type. T can be any primitive numeric type. - The reinterpreted vector. - - - Reinterprets the bits of a specified vector into those of a single-precision floating-point vector. - The source vector. - The vector type. T can be any primitive numeric type. - The reinterpreted vector. - - - Reinterprets the bits of a specified vector into those of a vector of unsigned 16-bit integers. - The source vector. - The vector type. T can be any primitive numeric type. - The reinterpreted vector. - - - Reinterprets the bits of a specified vector into those of a vector of unsigned integers. - The source vector. - The vector type. T can be any primitive numeric type. - The reinterpreted vector. - - - Reinterprets the bits of a specified vector into those of a vector of unsigned long integers. - The source vector. - The vector type. T can be any primitive numeric type. - The reinterpreted vector. - - - Returns a new vector by performing a bitwise And operation on each pair of elements in two vectors. - The first vector. - The second vector. - The vector type. T can be any primitive numeric type. - The resulting vector. - - - Returns a new vector by performing a bitwise Or operation on each pair of elements in two vectors. - The first vector. - The second vector. - The vector type. T can be any primitive numeric type. - The resulting vector. - - - Creates a new single-precision vector with elements selected between two specified single-precision source vectors based on an integral mask vector. - The integral mask vector used to drive selection. - The first source vector. - The second source vector. - The new vector with elements selected based on the mask. - - - Creates a new double-precision vector with elements selected between two specified double-precision source vectors based on an integral mask vector. - The integral mask vector used to drive selection. - The first source vector. - The second source vector. - The new vector with elements selected based on the mask. - - - Creates a new vector of a specified type with elements selected between two specified source vectors of the same type based on an integral mask vector. - The integral mask vector used to drive selection. - The first source vector. - The second source vector. - The vector type. T can be any primitive numeric type. - The new vector with elements selected based on the mask. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Returns a new vector whose values are the result of dividing the first vector's elements by the corresponding elements in the second vector. - The first vector. - The second vector. - The vector type. T can be any primitive numeric type. - The divided vector. - - - Returns the dot product of two vectors. - The first vector. - The second vector. - The vector type. T can be any primitive numeric type. - The dot product. - - - Returns a new integral vector whose elements signal whether the elements in two specified double-precision vectors are equal. - The first vector to compare. - The second vector to compare. - The resulting integral vector. - - - Returns a new integral vector whose elements signal whether the elements in two specified integral vectors are equal. - The first vector to compare. - The second vector to compare. - The resulting integral vector. - - - Returns a new vector whose elements signal whether the elements in two specified long integer vectors are equal. - The first vector to compare. - The second vector to compare. - The resulting long integer vector. - - - Returns a new integral vector whose elements signal whether the elements in two specified single-precision vectors are equal. - The first vector to compare. - The second vector to compare. - The resulting integral vector. - - - Returns a new vector of a specified type whose elements signal whether the elements in two specified vectors of the same type are equal. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - The resulting vector. - - - Returns a value that indicates whether each pair of elements in the given vectors is equal. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - true if all elements in left and right are equal; otherwise, false. - - - Returns a value that indicates whether any single pair of elements in the given vectors is equal. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - true if any element pair in left and right is equal; otherwise, false. - - - Returns a new integral vector whose elements signal whether the elements in one double-precision floating-point vector are greater than their corresponding elements in a second double-precision floating-point vector. - The first vector to compare. - The second vector to compare. - The resulting integral vector. - - - Returns a new integral vector whose elements signal whether the elements in one integral vector are greater than their corresponding elements in a second integral vector. - The first vector to compare. - The second vector to compare. - The resulting integral vector. - - - Returns a new long integer vector whose elements signal whether the elements in one long integer vector are greater than their corresponding elements in a second long integer vector. - The first vector to compare. - The second vector to compare. - The resulting long integer vector. - - - Returns a new integral vector whose elements signal whether the elements in one single-precision floating-point vector are greater than their corresponding elements in a second single-precision floating-point vector. - The first vector to compare. - The second vector to compare. - The resulting integral vector. - - - Returns a new vector whose elements signal whether the elements in one vector of a specified type are greater than their corresponding elements in the second vector of the same time. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - The resulting vector. - - - Returns a value that indicates whether all elements in the first vector are greater than the corresponding elements in the second vector. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - true if all elements in left are greater than the corresponding elements in right; otherwise, false. - - - Returns a value that indicates whether any element in the first vector is greater than the corresponding element in the second vector. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - true if any element in left is greater than the corresponding element in right; otherwise, false. - - - Returns a new integral vector whose elements signal whether the elements in one vector are greater than or equal to their corresponding elements in the single-precision floating-point second vector. - The first vector to compare. - The second vector to compare. - The resulting integral vector. - - - Returns a new long integer vector whose elements signal whether the elements in one long integer vector are greater than or equal to their corresponding elements in the second long integer vector. - The first vector to compare. - The second vector to compare. - The resulting long integer vector. - - - Returns a new integral vector whose elements signal whether the elements in one integral vector are greater than or equal to their corresponding elements in the second integral vector. - The first vector to compare. - The second vector to compare. - The resulting integral vector. - - - Returns a new integral vector whose elements signal whether the elements in one vector are greater than or equal to their corresponding elements in the second double-precision floating-point vector. - The first vector to compare. - The second vector to compare. - The resulting integral vector. - - - Returns a new vector whose elements signal whether the elements in one vector of a specified type are greater than or equal to their corresponding elements in the second vector of the same type. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - The resulting vector. - - - Returns a value that indicates whether all elements in the first vector are greater than or equal to all the corresponding elements in the second vector. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - true if all elements in left are greater than or equal to the corresponding elements in right; otherwise, false. - - - Returns a value that indicates whether any element in the first vector is greater than or equal to the corresponding element in the second vector. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - true if any element in left is greater than or equal to the corresponding element in right; otherwise, false. - - - Gets a value that indicates whether vector operations are subject to hardware acceleration through JIT intrinsic support. - true if vector operations are subject to hardware acceleration; otherwise, false. - - - Returns a new integral vector whose elements signal whether the elements in one double-precision floating-point vector are less than their corresponding elements in a second double-precision floating-point vector. - The first vector to compare. - The second vector to compare. - The resulting integral vector. - - - Returns a new integral vector whose elements signal whether the elements in one integral vector are less than their corresponding elements in a second integral vector. - The first vector to compare. - The second vector to compare. - The resulting integral vector - - - Returns a new long integer vector whose elements signal whether the elements in one long integer vector are less than their corresponding elements in a second long integer vector. - The first vector to compare. - The second vector to compare. - The resulting long integer vector. - - - Returns a new integral vector whose elements signal whether the elements in one single-precision vector are less than their corresponding elements in a second single-precision vector. - The first vector to compare. - The second vector to compare. - The resulting integral vector. - - - Returns a new vector of a specified type whose elements signal whether the elements in one vector are less than their corresponding elements in the second vector. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - The resulting vector. - - - Returns a value that indicates whether all of the elements in the first vector are less than their corresponding elements in the second vector. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - true if all of the elements in left are less than the corresponding elements in right; otherwise, false. - - - Returns a value that indicates whether any element in the first vector is less than the corresponding element in the second vector. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - true if any element in left is less than the corresponding element in right; otherwise, false. - - - Returns a new integral vector whose elements signal whether the elements in one double-precision floating-point vector are less than or equal to their corresponding elements in a second double-precision floating-point vector. - The first vector to compare. - The second vector to compare. - The resulting integral vector. - - - Returns a new integral vector whose elements signal whether the elements in one integral vector are less than or equal to their corresponding elements in a second integral vector. - The first vector to compare. - The second vector to compare. - The resulting integral vector. - - - Returns a new long integer vector whose elements signal whether the elements in one long integer vector are less or equal to their corresponding elements in a second long integer vector. - The first vector to compare. - The second vector to compare. - The resulting long integer vector. - - - Returns a new integral vector whose elements signal whether the elements in one single-precision floating-point vector are less than or equal to their corresponding elements in a second single-precision floating-point vector. - The first vector to compare. - The second vector to compare. - The resulting integral vector. - - - Returns a new vector whose elements signal whether the elements in one vector are less than or equal to their corresponding elements in the second vector. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - The resulting vector. - - - Returns a value that indicates whether all elements in the first vector are less than or equal to their corresponding elements in the second vector. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - true if all of the elements in left are less than or equal to the corresponding elements in right; otherwise, false. - - - Returns a value that indicates whether any element in the first vector is less than or equal to the corresponding element in the second vector. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - true if any element in left is less than or equal to the corresponding element in right; otherwise, false. - - - Returns a new vector whose elements are the maximum of each pair of elements in the two given vectors. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - The maximum vector. - - - Returns a new vector whose elements are the minimum of each pair of elements in the two given vectors. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - The minimum vector. - - - Returns a new vector whose values are a scalar value multiplied by each of the values of a specified vector. - The scalar value. - The vector. - The vector type. T can be any primitive numeric type. - The scaled vector. - - - Returns a new vector whose values are the product of each pair of elements in two specified vectors. - The first vector. - The second vector. - The vector type. T can be any primitive numeric type. - The product vector. - - - Returns a new vector whose values are the values of a specified vector each multiplied by a scalar value. - The vector. - The scalar value. - The vector type. T can be any primitive numeric type. - The scaled vector. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Returns a new vector whose elements are the negation of the corresponding element in the specified vector. - The source vector. - The vector type. T can be any primitive numeric type. - The negated vector. - - - Returns a new vector whose elements are obtained by taking the one's complement of a specified vector's elements. - The source vector. - The vector type. T can be any primitive numeric type. - The resulting vector. - - - Returns a new vector whose elements are the square roots of a specified vector's elements. - The source vector. - The vector type. T can be any primitive numeric type. - The square root vector. - - - Returns a new vector whose values are the difference between the elements in the second vector and their corresponding elements in the first vector. - The first vector. - The second vector. - The vector type. T can be any primitive numeric type. - The difference vector. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Returns a new vector by performing a bitwise exclusive Or (XOr) operation on each pair of elements in two vectors. - The first vector. - The second vector. - The vector type. T can be any primitive numeric type. - The resulting vector. - - - Represents a vector with two single-precision floating-point values. - - - Creates a new object whose two elements have the same value. - The value to assign to both elements. - - - Creates a vector whose elements have the specified values. - The value to assign to the field. - The value to assign to the field. - - - Returns a vector whose elements are the absolute values of each of the specified vector's elements. - A vector. - The absolute value vector. - - - Adds two vectors together. - The first vector to add. - The second vector to add. - The summed vector. - - - Restricts a vector between a minimum and a maximum value. - The vector to restrict. - The minimum value. - The maximum value. - The restricted vector. - - - Copies the elements of the vector to a specified array. - The destination array. - array is null. - The number of elements in the current instance is greater than in the array. - array is multidimensional. - - - Copies the elements of the vector to a specified array starting at a specified index position. - The destination array. - The index at which to copy the first element of the vector. - array is null. - The number of elements in the current instance is greater than in the array. - index is less than zero. -or- index is greater than or equal to the array length. - array is multidimensional. - - - Computes the Euclidean distance between the two given points. - The first point. - The second point. - The distance. - - - Returns the Euclidean distance squared between two specified points. - The first point. - The second point. - The distance squared. - - - Divides the first vector by the second. - The first vector. - The second vector. - The vector resulting from the division. - - - Divides the specified vector by a specified scalar value. - The vector. - The scalar value. - The vector that results from the division. - - - Returns the dot product of two vectors. - The first vector. - The second vector. - The dot product. - - - Returns a value that indicates whether this instance and a specified object are equal. - The object to compare with the current instance. - true if the current instance and obj are equal; otherwise, false```. If <code data-dev-comment-type="paramref">obj</code> isnull, the method returnsfalse`. - - - Returns a value that indicates whether this instance and another vector are equal. - The other vector. - true if the two vectors are equal; otherwise, false. - - - Returns the hash code for this instance. - The hash code. - - - Returns the length of the vector. - The vector's length. - - - Returns the length of the vector squared. - The vector's length squared. - - - Performs a linear interpolation between two vectors based on the given weighting. - The first vector. - The second vector. - A value between 0 and 1 that indicates the weight of value2. - The interpolated vector. - - - Returns a vector whose elements are the maximum of each of the pairs of elements in two specified vectors. - The first vector. - The second vector. - The maximized vector. - - - Returns a vector whose elements are the minimum of each of the pairs of elements in two specified vectors. - The first vector. - The second vector. - The minimized vector. - - - Multiplies two vectors together. - The first vector. - The second vector. - The product vector. - - - Multiplies a vector by a specified scalar. - The vector to multiply. - The scalar value. - The scaled vector. - - - Multiplies a scalar value by a specified vector. - The scaled value. - The vector. - The scaled vector. - - - Negates a specified vector. - The vector to negate. - The negated vector. - - - Returns a vector with the same direction as the specified vector, but with a length of one. - The vector to normalize. - The normalized vector. - - - Gets a vector whose 2 elements are equal to one. - A vector whose two elements are equal to one (that is, it returns the vector (1,1). - - - Adds two vectors together. - The first vector to add. - The second vector to add. - The summed vector. - - - Divides the first vector by the second. - The first vector. - The second vector. - The vector that results from dividing left by right. - - - Divides the specified vector by a specified scalar value. - The vector. - The scalar value. - The result of the division. - - - Returns a value that indicates whether each pair of elements in two specified vectors is equal. - The first vector to compare. - The second vector to compare. - true if left and right are equal; otherwise, false. - - - Returns a value that indicates whether two specified vectors are not equal. - The first vector to compare. - The second vector to compare. - true if left and right are not equal; otherwise, false. - - - Multiplies two vectors together. - The first vector. - The second vector. - The product vector. - - - Multiples the specified vector by the specified scalar value. - The vector. - The scalar value. - The scaled vector. - - - Multiples the scalar value by the specified vector. - The vector. - The scalar value. - The scaled vector. - - - Subtracts the second vector from the first. - The first vector. - The second vector. - The vector that results from subtracting right from left. - - - Negates the specified vector. - The vector to negate. - The negated vector. - - - Returns the reflection of a vector off a surface that has the specified normal. - The source vector. - The normal of the surface being reflected off. - The reflected vector. - - - Returns a vector whose elements are the square root of each of a specified vector's elements. - A vector. - The square root vector. - - - Subtracts the second vector from the first. - The first vector. - The second vector. - The difference vector. - - - Returns the string representation of the current instance using default formatting. - The string representation of the current instance. - - - Returns the string representation of the current instance using the specified format string to format individual elements. - A or that defines the format of individual elements. - The string representation of the current instance. - - - Returns the string representation of the current instance using the specified format string to format individual elements and the specified format provider to define culture-specific formatting. - A or that defines the format of individual elements. - A format provider that supplies culture-specific formatting information. - The string representation of the current instance. - - - Transforms a vector by a specified 3x2 matrix. - The vector to transform. - The transformation matrix. - The transformed vector. - - - Transforms a vector by a specified 4x4 matrix. - The vector to transform. - The transformation matrix. - The transformed vector. - - - Transforms a vector by the specified Quaternion rotation value. - The vector to rotate. - The rotation to apply. - The transformed vector. - - - Transforms a vector normal by the given 3x2 matrix. - The source vector. - The matrix. - The transformed vector. - - - Transforms a vector normal by the given 4x4 matrix. - The source vector. - The matrix. - The transformed vector. - - - Gets the vector (1,0). - The vector (1,0). - - - Gets the vector (0,1). - The vector (0,1). - - - The X component of the vector. - - - - The Y component of the vector. - - - - Returns a vector whose 2 elements are equal to zero. - A vector whose two elements are equal to zero (that is, it returns the vector (0,0). - - - Represents a vector with three single-precision floating-point values. - - - Creates a new object whose three elements have the same value. - The value to assign to all three elements. - - - Creates a new object from the specified object and the specified value. - The vector with two elements. - The additional value to assign to the field. - - - Creates a vector whose elements have the specified values. - The value to assign to the field. - The value to assign to the field. - The value to assign to the field. - - - Returns a vector whose elements are the absolute values of each of the specified vector's elements. - A vector. - The absolute value vector. - - - Adds two vectors together. - The first vector to add. - The second vector to add. - The summed vector. - - - Restricts a vector between a minimum and a maximum value. - The vector to restrict. - The minimum value. - The maximum value. - The restricted vector. - - - Copies the elements of the vector to a specified array. - The destination array. - array is null. - The number of elements in the current instance is greater than in the array. - array is multidimensional. - - - Copies the elements of the vector to a specified array starting at a specified index position. - The destination array. - The index at which to copy the first element of the vector. - array is null. - The number of elements in the current instance is greater than in the array. - index is less than zero. -or- index is greater than or equal to the array length. - array is multidimensional. - - - Computes the cross product of two vectors. - The first vector. - The second vector. - The cross product. - - - Computes the Euclidean distance between the two given points. - The first point. - The second point. - The distance. - - - Returns the Euclidean distance squared between two specified points. - The first point. - The second point. - The distance squared. - - - Divides the specified vector by a specified scalar value. - The vector. - The scalar value. - The vector that results from the division. - - - Divides the first vector by the second. - The first vector. - The second vector. - The vector resulting from the division. - - - Returns the dot product of two vectors. - The first vector. - The second vector. - The dot product. - - - Returns a value that indicates whether this instance and another vector are equal. - The other vector. - true if the two vectors are equal; otherwise, false. - - - Returns a value that indicates whether this instance and a specified object are equal. - The object to compare with the current instance. - true if the current instance and obj are equal; otherwise, false```. If <code data-dev-comment-type="paramref">obj</code> isnull, the method returnsfalse`. - - - Returns the hash code for this instance. - The hash code. - - - Returns the length of this vector object. - The vector's length. - - - Returns the length of the vector squared. - The vector's length squared. - - - Performs a linear interpolation between two vectors based on the given weighting. - The first vector. - The second vector. - A value between 0 and 1 that indicates the weight of value2. - The interpolated vector. - - - Returns a vector whose elements are the maximum of each of the pairs of elements in two specified vectors. - The first vector. - The second vector. - The maximized vector. - - - Returns a vector whose elements are the minimum of each of the pairs of elements in two specified vectors. - The first vector. - The second vector. - The minimized vector. - - - Multiplies a scalar value by a specified vector. - The scaled value. - The vector. - The scaled vector. - - - Multiplies two vectors together. - The first vector. - The second vector. - The product vector. - - - Multiplies a vector by a specified scalar. - The vector to multiply. - The scalar value. - The scaled vector. - - - Negates a specified vector. - The vector to negate. - The negated vector. - - - Returns a vector with the same direction as the specified vector, but with a length of one. - The vector to normalize. - The normalized vector. - - - Gets a vector whose 3 elements are equal to one. - A vector whose three elements are equal to one (that is, it returns the vector (1,1,1). - - - Adds two vectors together. - The first vector to add. - The second vector to add. - The summed vector. - - - Divides the first vector by the second. - The first vector. - The second vector. - The vector that results from dividing left by right. - - - Divides the specified vector by a specified scalar value. - The vector. - The scalar value. - The result of the division. - - - Returns a value that indicates whether each pair of elements in two specified vectors is equal. - The first vector to compare. - The second vector to compare. - true if left and right are equal; otherwise, false. - - - Returns a value that indicates whether two specified vectors are not equal. - The first vector to compare. - The second vector to compare. - true if left and right are not equal; otherwise, false. - - - Multiplies two vectors together. - The first vector. - The second vector. - The product vector. - - - Multiples the specified vector by the specified scalar value. - The vector. - The scalar value. - The scaled vector. - - - Multiples the scalar value by the specified vector. - The vector. - The scalar value. - The scaled vector. - - - Subtracts the second vector from the first. - The first vector. - The second vector. - The vector that results from subtracting right from left. - - - Negates the specified vector. - The vector to negate. - The negated vector. - - - Returns the reflection of a vector off a surface that has the specified normal. - The source vector. - The normal of the surface being reflected off. - The reflected vector. - - - Returns a vector whose elements are the square root of each of a specified vector's elements. - A vector. - The square root vector. - - - Subtracts the second vector from the first. - The first vector. - The second vector. - The difference vector. - - - Returns the string representation of the current instance using default formatting. - The string representation of the current instance. - - - Returns the string representation of the current instance using the specified format string to format individual elements. - A or that defines the format of individual elements. - The string representation of the current instance. - - - Returns the string representation of the current instance using the specified format string to format individual elements and the specified format provider to define culture-specific formatting. - A or that defines the format of individual elements. - A format provider that supplies culture-specific formatting information. - The string representation of the current instance. - - - Transforms a vector by a specified 4x4 matrix. - The vector to transform. - The transformation matrix. - The transformed vector. - - - Transforms a vector by the specified Quaternion rotation value. - The vector to rotate. - The rotation to apply. - The transformed vector. - - - Transforms a vector normal by the given 4x4 matrix. - The source vector. - The matrix. - The transformed vector. - - - Gets the vector (1,0,0). - The vector (1,0,0). - - - Gets the vector (0,1,0). - The vector (0,1,0).. - - - Gets the vector (0,0,1). - The vector (0,0,1). - - - The X component of the vector. - - - - The Y component of the vector. - - - - The Z component of the vector. - - - - Gets a vector whose 3 elements are equal to zero. - A vector whose three elements are equal to zero (that is, it returns the vector (0,0,0). - - - Represents a vector with four single-precision floating-point values. - - - Creates a new object whose four elements have the same value. - The value to assign to all four elements. - - - Constructs a new object from the specified object and a W component. - The vector to use for the X, Y, and Z components. - The W component. - - - Creates a new object from the specified object and a Z and a W component. - The vector to use for the X and Y components. - The Z component. - The W component. - - - Creates a vector whose elements have the specified values. - The value to assign to the field. - The value to assign to the field. - The value to assign to the field. - The value to assign to the field. - - - Returns a vector whose elements are the absolute values of each of the specified vector's elements. - A vector. - The absolute value vector. - - - Adds two vectors together. - The first vector to add. - The second vector to add. - The summed vector. - - - Restricts a vector between a minimum and a maximum value. - The vector to restrict. - The minimum value. - The maximum value. - The restricted vector. - - - Copies the elements of the vector to a specified array. - The destination array. - array is null. - The number of elements in the current instance is greater than in the array. - array is multidimensional. - - - Copies the elements of the vector to a specified array starting at a specified index position. - The destination array. - The index at which to copy the first element of the vector. - array is null. - The number of elements in the current instance is greater than in the array. - index is less than zero. -or- index is greater than or equal to the array length. - array is multidimensional. - - - Computes the Euclidean distance between the two given points. - The first point. - The second point. - The distance. - - - Returns the Euclidean distance squared between two specified points. - The first point. - The second point. - The distance squared. - - - Divides the first vector by the second. - The first vector. - The second vector. - The vector resulting from the division. - - - Divides the specified vector by a specified scalar value. - The vector. - The scalar value. - The vector that results from the division. - - - Returns the dot product of two vectors. - The first vector. - The second vector. - The dot product. - - - Returns a value that indicates whether this instance and another vector are equal. - The other vector. - true if the two vectors are equal; otherwise, false. - - - Returns a value that indicates whether this instance and a specified object are equal. - The object to compare with the current instance. - true if the current instance and obj are equal; otherwise, false```. If <code data-dev-comment-type="paramref">obj</code> isnull, the method returnsfalse`. - - - Returns the hash code for this instance. - The hash code. - - - Returns the length of this vector object. - The vector's length. - - - Returns the length of the vector squared. - The vector's length squared. - - - Performs a linear interpolation between two vectors based on the given weighting. - The first vector. - The second vector. - A value between 0 and 1 that indicates the weight of value2. - The interpolated vector. - - - Returns a vector whose elements are the maximum of each of the pairs of elements in two specified vectors. - The first vector. - The second vector. - The maximized vector. - - - Returns a vector whose elements are the minimum of each of the pairs of elements in two specified vectors. - The first vector. - The second vector. - The minimized vector. - - - Multiplies two vectors together. - The first vector. - The second vector. - The product vector. - - - Multiplies a vector by a specified scalar. - The vector to multiply. - The scalar value. - The scaled vector. - - - Multiplies a scalar value by a specified vector. - The scaled value. - The vector. - The scaled vector. - - - Negates a specified vector. - The vector to negate. - The negated vector. - - - Returns a vector with the same direction as the specified vector, but with a length of one. - The vector to normalize. - The normalized vector. - - - Gets a vector whose 4 elements are equal to one. - Returns . - - - Adds two vectors together. - The first vector to add. - The second vector to add. - The summed vector. - - - Divides the first vector by the second. - The first vector. - The second vector. - The vector that results from dividing left by right. - - - Divides the specified vector by a specified scalar value. - The vector. - The scalar value. - The result of the division. - - - Returns a value that indicates whether each pair of elements in two specified vectors is equal. - The first vector to compare. - The second vector to compare. - true if left and right are equal; otherwise, false. - - - Returns a value that indicates whether two specified vectors are not equal. - The first vector to compare. - The second vector to compare. - true if left and right are not equal; otherwise, false. - - - Multiplies two vectors together. - The first vector. - The second vector. - The product vector. - - - Multiples the specified vector by the specified scalar value. - The vector. - The scalar value. - The scaled vector. - - - Multiples the scalar value by the specified vector. - The vector. - The scalar value. - The scaled vector. - - - Subtracts the second vector from the first. - The first vector. - The second vector. - The vector that results from subtracting right from left. - - - Negates the specified vector. - The vector to negate. - The negated vector. - - - Returns a vector whose elements are the square root of each of a specified vector's elements. - A vector. - The square root vector. - - - Subtracts the second vector from the first. - The first vector. - The second vector. - The difference vector. - - - Returns the string representation of the current instance using default formatting. - The string representation of the current instance. - - - Returns the string representation of the current instance using the specified format string to format individual elements. - A or that defines the format of individual elements. - The string representation of the current instance. - - - Returns the string representation of the current instance using the specified format string to format individual elements and the specified format provider to define culture-specific formatting. - A or that defines the format of individual elements. - A format provider that supplies culture-specific formatting information. - The string representation of the current instance. - - - Transforms a four-dimensional vector by the specified Quaternion rotation value. - The vector to rotate. - The rotation to apply. - The transformed vector. - - - Transforms a four-dimensional vector by a specified 4x4 matrix. - The vector to transform. - The transformation matrix. - The transformed vector. - - - Transforms a three-dimensional vector by the specified Quaternion rotation value. - The vector to rotate. - The rotation to apply. - The transformed vector. - - - Transforms a two-dimensional vector by a specified 4x4 matrix. - The vector to transform. - The transformation matrix. - The transformed vector. - - - Transforms a two-dimensional vector by the specified Quaternion rotation value. - The vector to rotate. - The rotation to apply. - The transformed vector. - - - Transforms a three-dimensional vector by a specified 4x4 matrix. - The vector to transform. - The transformation matrix. - The transformed vector. - - - Gets the vector (0,0,0,1). - The vector (0,0,0,1). - - - Gets the vector (1,0,0,0). - The vector (1,0,0,0). - - - Gets the vector (0,1,0,0). - The vector (0,1,0,0).. - - - Gets a vector whose 4 elements are equal to zero. - The vector (0,0,1,0). - - - The W component of the vector. - - - - The X component of the vector. - - - - The Y component of the vector. - - - - The Z component of the vector. - - - - Gets a vector whose 4 elements are equal to zero. - A vector whose four elements are equal to zero (that is, it returns the vector (0,0,0,0). - - - \ No newline at end of file diff --git a/packages/System.Numerics.Vectors.4.4.0/lib/netcoreapp2.0/_._ b/packages/System.Numerics.Vectors.4.4.0/lib/netcoreapp2.0/_._ deleted file mode 100644 index e69de29b..00000000 diff --git a/packages/System.Numerics.Vectors.4.4.0/lib/netstandard1.0/System.Numerics.Vectors.dll b/packages/System.Numerics.Vectors.4.4.0/lib/netstandard1.0/System.Numerics.Vectors.dll deleted file mode 100644 index 46308fdb..00000000 Binary files a/packages/System.Numerics.Vectors.4.4.0/lib/netstandard1.0/System.Numerics.Vectors.dll and /dev/null differ diff --git a/packages/System.Numerics.Vectors.4.4.0/lib/netstandard1.0/System.Numerics.Vectors.xml b/packages/System.Numerics.Vectors.4.4.0/lib/netstandard1.0/System.Numerics.Vectors.xml deleted file mode 100644 index 51297939..00000000 --- a/packages/System.Numerics.Vectors.4.4.0/lib/netstandard1.0/System.Numerics.Vectors.xml +++ /dev/null @@ -1,2597 +0,0 @@ - - - - System.Numerics.Vectors - - - - Represents a 3x2 matrix. - - - Creates a 3x2 matrix from the specified components. - The value to assign to the first element in the first row. - The value to assign to the second element in the first row. - The value to assign to the first element in the second row. - The value to assign to the second element in the second row. - The value to assign to the first element in the third row. - The value to assign to the second element in the third row. - - - Adds each element in one matrix with its corresponding element in a second matrix. - The first matrix. - The second matrix. - The matrix that contains the summed values of value1 and value2. - - - Creates a rotation matrix using the given rotation in radians. - The amount of rotation, in radians. - The rotation matrix. - - - Creates a rotation matrix using the specified rotation in radians and a center point. - The amount of rotation, in radians. - The center point. - The rotation matrix. - - - Creates a scaling matrix from the specified X and Y components. - The value to scale by on the X axis. - The value to scale by on the Y axis. - The scaling matrix. - - - Creates a scaling matrix that scales uniformly with the specified scale with an offset from the specified center. - The uniform scale to use. - The center offset. - The scaling matrix. - - - Creates a scaling matrix that is offset by a given center point. - The value to scale by on the X axis. - The value to scale by on the Y axis. - The center point. - The scaling matrix. - - - Creates a scaling matrix that scales uniformly with the given scale. - The uniform scale to use. - The scaling matrix. - - - Creates a scaling matrix from the specified vector scale. - The scale to use. - The scaling matrix. - - - Creates a scaling matrix from the specified vector scale with an offset from the specified center point. - The scale to use. - The center offset. - The scaling matrix. - - - Creates a skew matrix from the specified angles in radians. - The X angle, in radians. - The Y angle, in radians. - The skew matrix. - - - Creates a skew matrix from the specified angles in radians and a center point. - The X angle, in radians. - The Y angle, in radians. - The center point. - The skew matrix. - - - Creates a translation matrix from the specified 2-dimensional vector. - The translation position. - The translation matrix. - - - Creates a translation matrix from the specified X and Y components. - The X position. - The Y position. - The translation matrix. - - - Returns a value that indicates whether this instance and another 3x2 matrix are equal. - The other matrix. - true if the two matrices are equal; otherwise, false. - - - Returns a value that indicates whether this instance and a specified object are equal. - The object to compare with the current instance. - true if the current instance and obj are equal; otherwise, false```. If <code data-dev-comment-type="paramref">obj</code> isnull, the method returnsfalse`. - - - Calculates the determinant for this matrix. - The determinant. - - - Returns the hash code for this instance. - The hash code. - - - Gets the multiplicative identity matrix. - The multiplicative identify matrix. - - - Inverts the specified matrix. The return value indicates whether the operation succeeded. - The matrix to invert. - When this method returns, contains the inverted matrix if the operation succeeded. - true if matrix was converted successfully; otherwise, false. - - - Indicates whether the current matrix is the identity matrix. - true if the current matrix is the identity matrix; otherwise, false. - - - Performs a linear interpolation from one matrix to a second matrix based on a value that specifies the weighting of the second matrix. - The first matrix. - The second matrix. - The relative weighting of matrix2. - The interpolated matrix. - - - The first element of the first row. - - - - The second element of the first row. - - - - The first element of the second row. - - - - The second element of the second row. - - - - The first element of the third row. - - - - The second element of the third row. - - - - Returns the matrix that results from multiplying two matrices together. - The first matrix. - The second matrix. - The product matrix. - - - Returns the matrix that results from scaling all the elements of a specified matrix by a scalar factor. - The matrix to scale. - The scaling value to use. - The scaled matrix. - - - Negates the specified matrix by multiplying all its values by -1. - The matrix to negate. - The negated matrix. - - - Adds each element in one matrix with its corresponding element in a second matrix. - The first matrix. - The second matrix. - The matrix that contains the summed values. - - - Returns a value that indicates whether the specified matrices are equal. - The first matrix to compare. - The second matrix to compare. - true if value1 and value2 are equal; otherwise, false. - - - Returns a value that indicates whether the specified matrices are not equal. - The first matrix to compare. - The second matrix to compare. - true if value1 and value2 are not equal; otherwise, false. - - - Returns the matrix that results from multiplying two matrices together. - The first matrix. - The second matrix. - The product matrix. - - - Returns the matrix that results from scaling all the elements of a specified matrix by a scalar factor. - The matrix to scale. - The scaling value to use. - The scaled matrix. - - - Subtracts each element in a second matrix from its corresponding element in a first matrix. - The first matrix. - The second matrix. - The matrix containing the values that result from subtracting each element in value2 from its corresponding element in value1. - - - Negates the specified matrix by multiplying all its values by -1. - The matrix to negate. - The negated matrix. - - - Subtracts each element in a second matrix from its corresponding element in a first matrix. - The first matrix. - The second matrix. - The matrix containing the values that result from subtracting each element in value2 from its corresponding element in value1. - - - Returns a string that represents this matrix. - The string representation of this matrix. - - - Gets or sets the translation component of this matrix. - The translation component of the current instance. - - - Represents a 4x4 matrix. - - - Creates a object from a specified object. - A 3x2 matrix. - - - Creates a 4x4 matrix from the specified components. - The value to assign to the first element in the first row. - The value to assign to the second element in the first row. - The value to assign to the third element in the first row. - The value to assign to the fourth element in the first row. - The value to assign to the first element in the second row. - The value to assign to the second element in the second row. - The value to assign to the third element in the second row. - The value to assign to the third element in the second row. - The value to assign to the first element in the third row. - The value to assign to the second element in the third row. - The value to assign to the third element in the third row. - The value to assign to the fourth element in the third row. - The value to assign to the first element in the fourth row. - The value to assign to the second element in the fourth row. - The value to assign to the third element in the fourth row. - The value to assign to the fourth element in the fourth row. - - - Adds each element in one matrix with its corresponding element in a second matrix. - The first matrix. - The second matrix. - The matrix that contains the summed values of value1 and value2. - - - Creates a spherical billboard that rotates around a specified object position. - The position of the object that the billboard will rotate around. - The position of the camera. - The up vector of the camera. - The forward vector of the camera. - The created billboard. - - - Creates a cylindrical billboard that rotates around a specified axis. - The position of the object that the billboard will rotate around. - The position of the camera. - The axis to rotate the billboard around. - The forward vector of the camera. - The forward vector of the object. - The billboard matrix. - - - Creates a matrix that rotates around an arbitrary vector. - The axis to rotate around. - The angle to rotate around axis, in radians. - The rotation matrix. - - - Creates a rotation matrix from the specified Quaternion rotation value. - The source Quaternion. - The rotation matrix. - - - Creates a rotation matrix from the specified yaw, pitch, and roll. - The angle of rotation, in radians, around the Y axis. - The angle of rotation, in radians, around the X axis. - The angle of rotation, in radians, around the Z axis. - The rotation matrix. - - - Creates a view matrix. - The position of the camera. - The target towards which the camera is pointing. - The direction that is "up" from the camera's point of view. - The view matrix. - - - Creates an orthographic perspective matrix from the given view volume dimensions. - The width of the view volume. - The height of the view volume. - The minimum Z-value of the view volume. - The maximum Z-value of the view volume. - The orthographic projection matrix. - - - Creates a customized orthographic projection matrix. - The minimum X-value of the view volume. - The maximum X-value of the view volume. - The minimum Y-value of the view volume. - The maximum Y-value of the view volume. - The minimum Z-value of the view volume. - The maximum Z-value of the view volume. - The orthographic projection matrix. - - - Creates a perspective projection matrix from the given view volume dimensions. - The width of the view volume at the near view plane. - The height of the view volume at the near view plane. - The distance to the near view plane. - The distance to the far view plane. - The perspective projection matrix. - nearPlaneDistance is less than or equal to zero. -or- farPlaneDistance is less than or equal to zero. -or- nearPlaneDistance is greater than or equal to farPlaneDistance. - - - Creates a perspective projection matrix based on a field of view, aspect ratio, and near and far view plane distances. - The field of view in the y direction, in radians. - The aspect ratio, defined as view space width divided by height. - The distance to the near view plane. - The distance to the far view plane. - The perspective projection matrix. - fieldOfView is less than or equal to zero. -or- fieldOfView is greater than or equal to . nearPlaneDistance is less than or equal to zero. -or- farPlaneDistance is less than or equal to zero. -or- nearPlaneDistance is greater than or equal to farPlaneDistance. - - - Creates a customized perspective projection matrix. - The minimum x-value of the view volume at the near view plane. - The maximum x-value of the view volume at the near view plane. - The minimum y-value of the view volume at the near view plane. - The maximum y-value of the view volume at the near view plane. - The distance to the near view plane. - The distance to the far view plane. - The perspective projection matrix. - nearPlaneDistance is less than or equal to zero. -or- farPlaneDistance is less than or equal to zero. -or- nearPlaneDistance is greater than or equal to farPlaneDistance. - - - Creates a matrix that reflects the coordinate system about a specified plane. - The plane about which to create a reflection. - A new matrix expressing the reflection. - - - Creates a matrix for rotating points around the X axis. - The amount, in radians, by which to rotate around the X axis. - The rotation matrix. - - - Creates a matrix for rotating points around the X axis from a center point. - The amount, in radians, by which to rotate around the X axis. - The center point. - The rotation matrix. - - - The amount, in radians, by which to rotate around the Y axis from a center point. - The amount, in radians, by which to rotate around the Y-axis. - The center point. - The rotation matrix. - - - Creates a matrix for rotating points around the Y axis. - The amount, in radians, by which to rotate around the Y-axis. - The rotation matrix. - - - Creates a matrix for rotating points around the Z axis. - The amount, in radians, by which to rotate around the Z-axis. - The rotation matrix. - - - Creates a matrix for rotating points around the Z axis from a center point. - The amount, in radians, by which to rotate around the Z-axis. - The center point. - The rotation matrix. - - - Creates a scaling matrix from the specified vector scale. - The scale to use. - The scaling matrix. - - - Creates a uniform scaling matrix that scale equally on each axis. - The uniform scaling factor. - The scaling matrix. - - - Creates a scaling matrix with a center point. - The vector that contains the amount to scale on each axis. - The center point. - The scaling matrix. - - - Creates a uniform scaling matrix that scales equally on each axis with a center point. - The uniform scaling factor. - The center point. - The scaling matrix. - - - Creates a scaling matrix from the specified X, Y, and Z components. - The value to scale by on the X axis. - The value to scale by on the Y axis. - The value to scale by on the Z axis. - The scaling matrix. - - - Creates a scaling matrix that is offset by a given center point. - The value to scale by on the X axis. - The value to scale by on the Y axis. - The value to scale by on the Z axis. - The center point. - The scaling matrix. - - - Creates a matrix that flattens geometry into a specified plane as if casting a shadow from a specified light source. - The direction from which the light that will cast the shadow is coming. - The plane onto which the new matrix should flatten geometry so as to cast a shadow. - A new matrix that can be used to flatten geometry onto the specified plane from the specified direction. - - - Creates a translation matrix from the specified 3-dimensional vector. - The amount to translate in each axis. - The translation matrix. - - - Creates a translation matrix from the specified X, Y, and Z components. - The amount to translate on the X axis. - The amount to translate on the Y axis. - The amount to translate on the Z axis. - The translation matrix. - - - Creates a world matrix with the specified parameters. - The position of the object. - The forward direction of the object. - The upward direction of the object. Its value is usually [0, 1, 0]. - The world matrix. - - - Attempts to extract the scale, translation, and rotation components from the given scale, rotation, or translation matrix. The return value indicates whether the operation succeeded. - The source matrix. - When this method returns, contains the scaling component of the transformation matrix if the operation succeeded. - When this method returns, contains the rotation component of the transformation matrix if the operation succeeded. - When the method returns, contains the translation component of the transformation matrix if the operation succeeded. - true if matrix was decomposed successfully; otherwise, false. - - - Returns a value that indicates whether this instance and another 4x4 matrix are equal. - The other matrix. - true if the two matrices are equal; otherwise, false. - - - Returns a value that indicates whether this instance and a specified object are equal. - The object to compare with the current instance. - true if the current instance and obj are equal; otherwise, false```. If <code data-dev-comment-type="paramref">obj</code> isnull, the method returnsfalse`. - - - Calculates the determinant of the current 4x4 matrix. - The determinant. - - - Returns the hash code for this instance. - The hash code. - - - Gets the multiplicative identity matrix. - Gets the multiplicative identity matrix. - - - Inverts the specified matrix. The return value indicates whether the operation succeeded. - The matrix to invert. - When this method returns, contains the inverted matrix if the operation succeeded. - true if matrix was converted successfully; otherwise, false. - - - Indicates whether the current matrix is the identity matrix. - true if the current matrix is the identity matrix; otherwise, false. - - - Performs a linear interpolation from one matrix to a second matrix based on a value that specifies the weighting of the second matrix. - The first matrix. - The second matrix. - The relative weighting of matrix2. - The interpolated matrix. - - - The first element of the first row. - - - - The second element of the first row. - - - - The third element of the first row. - - - - The fourth element of the first row. - - - - The first element of the second row. - - - - The second element of the second row. - - - - The third element of the second row. - - - - The fourth element of the second row. - - - - The first element of the third row. - - - - The second element of the third row. - - - - The third element of the third row. - - - - The fourth element of the third row. - - - - The first element of the fourth row. - - - - The second element of the fourth row. - - - - The third element of the fourth row. - - - - The fourth element of the fourth row. - - - - Returns the matrix that results from multiplying two matrices together. - The first matrix. - The second matrix. - The product matrix. - - - Returns the matrix that results from scaling all the elements of a specified matrix by a scalar factor. - The matrix to scale. - The scaling value to use. - The scaled matrix. - - - Negates the specified matrix by multiplying all its values by -1. - The matrix to negate. - The negated matrix. - - - Adds each element in one matrix with its corresponding element in a second matrix. - The first matrix. - The second matrix. - The matrix that contains the summed values. - - - Returns a value that indicates whether the specified matrices are equal. - The first matrix to compare. - The second matrix to care - true if value1 and value2 are equal; otherwise, false. - - - Returns a value that indicates whether the specified matrices are not equal. - The first matrix to compare. - The second matrix to compare. - true if value1 and value2 are not equal; otherwise, false. - - - Returns the matrix that results from scaling all the elements of a specified matrix by a scalar factor. - The matrix to scale. - The scaling value to use. - The scaled matrix. - - - Returns the matrix that results from multiplying two matrices together. - The first matrix. - The second matrix. - The product matrix. - - - Subtracts each element in a second matrix from its corresponding element in a first matrix. - The first matrix. - The second matrix. - The matrix containing the values that result from subtracting each element in value2 from its corresponding element in value1. - - - Negates the specified matrix by multiplying all its values by -1. - The matrix to negate. - The negated matrix. - - - Subtracts each element in a second matrix from its corresponding element in a first matrix. - The first matrix. - The second matrix. - The matrix containing the values that result from subtracting each element in value2 from its corresponding element in value1. - - - Returns a string that represents this matrix. - The string representation of this matrix. - - - Transforms the specified matrix by applying the specified Quaternion rotation. - The matrix to transform. - The rotation t apply. - The transformed matrix. - - - Gets or sets the translation component of this matrix. - The translation component of the current instance. - - - Transposes the rows and columns of a matrix. - The matrix to transpose. - The transposed matrix. - - - Represents a three-dimensional plane. - - - Creates a object from a specified four-dimensional vector. - A vector whose first three elements describe the normal vector, and whose defines the distance along that normal from the origin. - - - Creates a object from a specified normal and the distance along the normal from the origin. - The plane's normal vector. - The plane's distance from the origin along its normal vector. - - - Creates a object from the X, Y, and Z components of its normal, and its distance from the origin on that normal. - The X component of the normal. - The Y component of the normal. - The Z component of the normal. - The distance of the plane along its normal from the origin. - - - Creates a object that contains three specified points. - The first point defining the plane. - The second point defining the plane. - The third point defining the plane. - The plane containing the three points. - - - The distance of the plane along its normal from the origin. - - - - Calculates the dot product of a plane and a 4-dimensional vector. - The plane. - The four-dimensional vector. - The dot product. - - - Returns the dot product of a specified three-dimensional vector and the normal vector of this plane plus the distance () value of the plane. - The plane. - The 3-dimensional vector. - The dot product. - - - Returns the dot product of a specified three-dimensional vector and the vector of this plane. - The plane. - The three-dimensional vector. - The dot product. - - - Returns a value that indicates whether this instance and a specified object are equal. - The object to compare with the current instance. - true if the current instance and obj are equal; otherwise, false```. If <code data-dev-comment-type="paramref">obj</code> isnull, the method returnsfalse`. - - - Returns a value that indicates whether this instance and another plane object are equal. - The other plane. - true if the two planes are equal; otherwise, false. - - - Returns the hash code for this instance. - The hash code. - - - The normal vector of the plane. - - - - Creates a new object whose normal vector is the source plane's normal vector normalized. - The source plane. - The normalized plane. - - - Returns a value that indicates whether two planes are equal. - The first plane to compare. - The second plane to compare. - true if value1 and value2 are equal; otherwise, false. - - - Returns a value that indicates whether two planes are not equal. - The first plane to compare. - The second plane to compare. - true if value1 and value2 are not equal; otherwise, false. - - - Returns the string representation of this plane object. - A string that represents this object. - - - Transforms a normalized plane by a 4x4 matrix. - The normalized plane to transform. - The transformation matrix to apply to plane. - The transformed plane. - - - Transforms a normalized plane by a Quaternion rotation. - The normalized plane to transform. - The Quaternion rotation to apply to the plane. - A new plane that results from applying the Quaternion rotation. - - - Represents a vector that is used to encode three-dimensional physical rotations. - - - Creates a quaternion from the specified vector and rotation parts. - The vector part of the quaternion. - The rotation part of the quaternion. - - - Constructs a quaternion from the specified components. - The value to assign to the X component of the quaternion. - The value to assign to the Y component of the quaternion. - The value to assign to the Z component of the quaternion. - The value to assign to the W component of the quaternion. - - - Adds each element in one quaternion with its corresponding element in a second quaternion. - The first quaternion. - The second quaternion. - The quaternion that contains the summed values of value1 and value2. - - - Concatenates two quaternions. - The first quaternion rotation in the series. - The second quaternion rotation in the series. - A new quaternion representing the concatenation of the value1 rotation followed by the value2 rotation. - - - Returns the conjugate of a specified quaternion. - The quaternion. - A new quaternion that is the conjugate of value. - - - Creates a quaternion from a vector and an angle to rotate about the vector. - The vector to rotate around. - The angle, in radians, to rotate around the vector. - The newly created quaternion. - - - Creates a quaternion from the specified rotation matrix. - The rotation matrix. - The newly created quaternion. - - - Creates a new quaternion from the given yaw, pitch, and roll. - The yaw angle, in radians, around the Y axis. - The pitch angle, in radians, around the X axis. - The roll angle, in radians, around the Z axis. - The resulting quaternion. - - - Divides one quaternion by a second quaternion. - The dividend. - The divisor. - The quaternion that results from dividing value1 by value2. - - - Calculates the dot product of two quaternions. - The first quaternion. - The second quaternion. - The dot product. - - - Returns a value that indicates whether this instance and another quaternion are equal. - The other quaternion. - true if the two quaternions are equal; otherwise, false. - - - Returns a value that indicates whether this instance and a specified object are equal. - The object to compare with the current instance. - true if the current instance and obj are equal; otherwise, false```. If <code data-dev-comment-type="paramref">obj</code> isnull, the method returnsfalse`. - - - Returns the hash code for this instance. - The hash code. - - - Gets a quaternion that represents no rotation. - A quaternion whose values are (0, 0, 0, 1). - - - Returns the inverse of a quaternion. - The quaternion. - The inverted quaternion. - - - Gets a value that indicates whether the current instance is the identity quaternion. - true if the current instance is the identity quaternion; otherwise, false. - - - Calculates the length of the quaternion. - The computed length of the quaternion. - - - Calculates the squared length of the quaternion. - The length squared of the quaternion. - - - Performs a linear interpolation between two quaternions based on a value that specifies the weighting of the second quaternion. - The first quaternion. - The second quaternion. - The relative weight of quaternion2 in the interpolation. - The interpolated quaternion. - - - Returns the quaternion that results from multiplying two quaternions together. - The first quaternion. - The second quaternion. - The product quaternion. - - - Returns the quaternion that results from scaling all the components of a specified quaternion by a scalar factor. - The source quaternion. - The scalar value. - The scaled quaternion. - - - Reverses the sign of each component of the quaternion. - The quaternion to negate. - The negated quaternion. - - - Divides each component of a specified by its length. - The quaternion to normalize. - The normalized quaternion. - - - Adds each element in one quaternion with its corresponding element in a second quaternion. - The first quaternion. - The second quaternion. - The quaternion that contains the summed values of value1 and value2. - - - Divides one quaternion by a second quaternion. - The dividend. - The divisor. - The quaternion that results from dividing value1 by value2. - - - Returns a value that indicates whether two quaternions are equal. - The first quaternion to compare. - The second quaternion to compare. - true if the two quaternions are equal; otherwise, false. - - - Returns a value that indicates whether two quaternions are not equal. - The first quaternion to compare. - The second quaternion to compare. - true if value1 and value2 are not equal; otherwise, false. - - - Returns the quaternion that results from scaling all the components of a specified quaternion by a scalar factor. - The source quaternion. - The scalar value. - The scaled quaternion. - - - Returns the quaternion that results from multiplying two quaternions together. - The first quaternion. - The second quaternion. - The product quaternion. - - - Subtracts each element in a second quaternion from its corresponding element in a first quaternion. - The first quaternion. - The second quaternion. - The quaternion containing the values that result from subtracting each element in value2 from its corresponding element in value1. - - - Reverses the sign of each component of the quaternion. - The quaternion to negate. - The negated quaternion. - - - Interpolates between two quaternions, using spherical linear interpolation. - The first quaternion. - The second quaternion. - The relative weight of the second quaternion in the interpolation. - The interpolated quaternion. - - - Subtracts each element in a second quaternion from its corresponding element in a first quaternion. - The first quaternion. - The second quaternion. - The quaternion containing the values that result from subtracting each element in value2 from its corresponding element in value1. - - - Returns a string that represents this quaternion. - The string representation of this quaternion. - - - The rotation component of the quaternion. - - - - The X value of the vector component of the quaternion. - - - - The Y value of the vector component of the quaternion. - - - - The Z value of the vector component of the quaternion. - - - - Represents a single vector of a specified numeric type that is suitable for low-level optimization of parallel algorithms. - The vector type. T can be any primitive numeric type. - - - Creates a vector whose components are of a specified type. - The numeric type that defines the type of the components in the vector. - - - Creates a vector from a specified array. - A numeric array. - values is null. - - - Creates a vector from a specified array starting at a specified index position. - A numeric array. - The starting index position from which to create the vector. - values is null. - index is less than zero. -or- The length of values minus index is less than . - - - Copies the vector instance to a specified destination array. - The array to receive a copy of the vector values. - destination is null. - The number of elements in the current vector is greater than the number of elements available in the destination array. - - - Copies the vector instance to a specified destination array starting at a specified index position. - The array to receive a copy of the vector values. - The starting index in destination at which to begin the copy operation. - destination is null. - The number of elements in the current instance is greater than the number of elements available from startIndex to the end of the destination array. - index is less than zero or greater than the last index in destination. - - - Returns the number of elements stored in the vector. - The number of elements stored in the vector. - Access to the property getter via reflection is not supported. - - - Returns a value that indicates whether this instance is equal to a specified vector. - The vector to compare with this instance. - true if the current instance and other are equal; otherwise, false. - - - Returns a value that indicates whether this instance is equal to a specified object. - The object to compare with this instance. - true if the current instance and obj are equal; otherwise, false. The method returns false if obj is null, or if obj is a vector of a different type than the current instance. - - - Returns the hash code for this instance. - The hash code. - - - Gets the element at a specified index. - The index of the element to return. - The element at index index. - index is less than zero. -or- index is greater than or equal to . - - - Returns a vector containing all ones. - A vector containing all ones. - - - Adds two vectors together. - The first vector to add. - The second vector to add. - The summed vector. - - - Returns a new vector by performing a bitwise And operation on each of the elements in two vectors. - The first vector. - The second vector. - The vector that results from the bitwise And of left and right. - - - Returns a new vector by performing a bitwise Or operation on each of the elements in two vectors. - The first vector. - The second vector. - The vector that results from the bitwise Or of the elements in left and right. - - - Divides the first vector by the second. - The first vector. - The second vector. - The vector that results from dividing left by right. - - - Returns a value that indicates whether each pair of elements in two specified vectors are equal. - The first vector to compare. - The second vector to compare. - true if left and right are equal; otherwise, false. - - - Returns a new vector by performing a bitwise XOr operation on each of the elements in two vectors. - The first vector. - The second vector. - The vector that results from the bitwise XOr of the elements in left and right. - - - Reinterprets the bits of the specified vector into a vector of type . - The vector to reinterpret. - The reinterpreted vector. - - - Reinterprets the bits of the specified vector into a vector of type . - The vector to reinterpret. - The reinterpreted vector. - - - Reinterprets the bits of the specified vector into a vector of type . - The vector to reinterpret. - The reinterpreted vector. - - - Reinterprets the bits of the specified vector into a vector of type . - The vector to reinterpret. - The reinterpreted vector. - - - Reinterprets the bits of the specified vector into a vector of type . - The vector to reinterpret. - The reinterpreted vector. - - - Reinterprets the bits of the specified vector into a vector of type . - The vector to reinterpret. - The reinterpreted vector. - - - Reinterprets the bits of the specified vector into a vector of type . - The vector to reinterpret. - The reinterpreted vector. - - - Reinterprets the bits of the specified vector into a vector of type . - The vector to reinterpret. - The reinterpreted vector. - - - Reinterprets the bits of the specified vector into a vector of type . - The vector to reinterpret. - The reinterpreted vector. - - - Reinterprets the bits of the specified vector into a vector of type . - The vector to reinterpret. - The reinterpreted vector. - - - Returns a value that indicates whether any single pair of elements in the specified vectors is equal. - The first vector to compare. - The second vector to compare. - true if any element pairs in left and right are equal. false if no element pairs are equal. - - - Multiplies two vectors together. - The first vector. - The second vector. - The product vector. - - - Multiplies a vector by a specified scalar value. - The source vector. - A scalar value. - The scaled vector. - - - Multiplies a vector by the given scalar. - The scalar value. - The source vector. - The scaled vector. - - - Returns a new vector whose elements are obtained by taking the one's complement of a specified vector's elements. - The source vector. - The one's complement vector. - - - Subtracts the second vector from the first. - The first vector. - The second vector. - The vector that results from subtracting right from left. - - - Negates a given vector. - The vector to negate. - The negated vector. - - - Returns the string representation of this vector using the specified format string to format individual elements and the specified format provider to define culture-specific formatting. - A or that defines the format of individual elements. - A format provider that supplies culture-specific formatting information. - The string representation of the current instance. - - - Returns the string representation of this vector using default formatting. - The string representation of this vector. - - - Returns the string representation of this vector using the specified format string to format individual elements. - A or that defines the format of individual elements. - The string representation of the current instance. - - - Returns a vector containing all zeroes. - A vector containing all zeroes. - - - Provides a collection of static convenience methods for creating, manipulating, combining, and converting generic vectors. - - - Returns a new vector whose elements are the absolute values of the given vector's elements. - The source vector. - The vector type. T can be any primitive numeric type. - The absolute value vector. - - - Returns a new vector whose values are the sum of each pair of elements from two given vectors. - The first vector. - The second vector. - The vector type. T can be any primitive numeric type. - The summed vector. - - - Returns a new vector by performing a bitwise And Not operation on each pair of corresponding elements in two vectors. - The first vector. - The second vector. - The vector type. T can be any primitive numeric type. - The resulting vector. - - - Reinterprets the bits of a specified vector into those of a vector of unsigned bytes. - The source vector. - The vector type. T can be any primitive numeric type. - The reinterpreted vector. - - - Reinterprets the bits of a specified vector into those of a double-precision floating-point vector. - The source vector. - The vector type. T can be any primitive numeric type. - The reinterpreted vector. - - - Reinterprets the bits of a specified vector into those of a vector of 16-bit integers. - The source vector. - The vector type. T can be any primitive numeric type. - The reinterpreted vector. - - - Reinterprets the bits of a specified vector into those of a vector of integers. - The source vector. - The vector type. T can be any primitive numeric type. - The reinterpreted vector. - - - Reinterprets the bits of a specified vector into those of a vector of long integers. - The source vector. - The vector type. T can be any primitive numeric type. - The reinterpreted vector. - - - Reinterprets the bits of a specified vector into those of a vector of signed bytes. - The source vector. - The vector type. T can be any primitive numeric type. - The reinterpreted vector. - - - Reinterprets the bits of a specified vector into those of a single-precision floating-point vector. - The source vector. - The vector type. T can be any primitive numeric type. - The reinterpreted vector. - - - Reinterprets the bits of a specified vector into those of a vector of unsigned 16-bit integers. - The source vector. - The vector type. T can be any primitive numeric type. - The reinterpreted vector. - - - Reinterprets the bits of a specified vector into those of a vector of unsigned integers. - The source vector. - The vector type. T can be any primitive numeric type. - The reinterpreted vector. - - - Reinterprets the bits of a specified vector into those of a vector of unsigned long integers. - The source vector. - The vector type. T can be any primitive numeric type. - The reinterpreted vector. - - - Returns a new vector by performing a bitwise And operation on each pair of elements in two vectors. - The first vector. - The second vector. - The vector type. T can be any primitive numeric type. - The resulting vector. - - - Returns a new vector by performing a bitwise Or operation on each pair of elements in two vectors. - The first vector. - The second vector. - The vector type. T can be any primitive numeric type. - The resulting vector. - - - Creates a new single-precision vector with elements selected between two specified single-precision source vectors based on an integral mask vector. - The integral mask vector used to drive selection. - The first source vector. - The second source vector. - The new vector with elements selected based on the mask. - - - Creates a new double-precision vector with elements selected between two specified double-precision source vectors based on an integral mask vector. - The integral mask vector used to drive selection. - The first source vector. - The second source vector. - The new vector with elements selected based on the mask. - - - Creates a new vector of a specified type with elements selected between two specified source vectors of the same type based on an integral mask vector. - The integral mask vector used to drive selection. - The first source vector. - The second source vector. - The vector type. T can be any primitive numeric type. - The new vector with elements selected based on the mask. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Returns a new vector whose values are the result of dividing the first vector's elements by the corresponding elements in the second vector. - The first vector. - The second vector. - The vector type. T can be any primitive numeric type. - The divided vector. - - - Returns the dot product of two vectors. - The first vector. - The second vector. - The vector type. T can be any primitive numeric type. - The dot product. - - - Returns a new integral vector whose elements signal whether the elements in two specified double-precision vectors are equal. - The first vector to compare. - The second vector to compare. - The resulting integral vector. - - - Returns a new integral vector whose elements signal whether the elements in two specified integral vectors are equal. - The first vector to compare. - The second vector to compare. - The resulting integral vector. - - - Returns a new vector whose elements signal whether the elements in two specified long integer vectors are equal. - The first vector to compare. - The second vector to compare. - The resulting long integer vector. - - - Returns a new integral vector whose elements signal whether the elements in two specified single-precision vectors are equal. - The first vector to compare. - The second vector to compare. - The resulting integral vector. - - - Returns a new vector of a specified type whose elements signal whether the elements in two specified vectors of the same type are equal. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - The resulting vector. - - - Returns a value that indicates whether each pair of elements in the given vectors is equal. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - true if all elements in left and right are equal; otherwise, false. - - - Returns a value that indicates whether any single pair of elements in the given vectors is equal. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - true if any element pair in left and right is equal; otherwise, false. - - - Returns a new integral vector whose elements signal whether the elements in one double-precision floating-point vector are greater than their corresponding elements in a second double-precision floating-point vector. - The first vector to compare. - The second vector to compare. - The resulting integral vector. - - - Returns a new integral vector whose elements signal whether the elements in one integral vector are greater than their corresponding elements in a second integral vector. - The first vector to compare. - The second vector to compare. - The resulting integral vector. - - - Returns a new long integer vector whose elements signal whether the elements in one long integer vector are greater than their corresponding elements in a second long integer vector. - The first vector to compare. - The second vector to compare. - The resulting long integer vector. - - - Returns a new integral vector whose elements signal whether the elements in one single-precision floating-point vector are greater than their corresponding elements in a second single-precision floating-point vector. - The first vector to compare. - The second vector to compare. - The resulting integral vector. - - - Returns a new vector whose elements signal whether the elements in one vector of a specified type are greater than their corresponding elements in the second vector of the same time. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - The resulting vector. - - - Returns a value that indicates whether all elements in the first vector are greater than the corresponding elements in the second vector. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - true if all elements in left are greater than the corresponding elements in right; otherwise, false. - - - Returns a value that indicates whether any element in the first vector is greater than the corresponding element in the second vector. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - true if any element in left is greater than the corresponding element in right; otherwise, false. - - - Returns a new integral vector whose elements signal whether the elements in one vector are greater than or equal to their corresponding elements in the single-precision floating-point second vector. - The first vector to compare. - The second vector to compare. - The resulting integral vector. - - - Returns a new long integer vector whose elements signal whether the elements in one long integer vector are greater than or equal to their corresponding elements in the second long integer vector. - The first vector to compare. - The second vector to compare. - The resulting long integer vector. - - - Returns a new integral vector whose elements signal whether the elements in one integral vector are greater than or equal to their corresponding elements in the second integral vector. - The first vector to compare. - The second vector to compare. - The resulting integral vector. - - - Returns a new integral vector whose elements signal whether the elements in one vector are greater than or equal to their corresponding elements in the second double-precision floating-point vector. - The first vector to compare. - The second vector to compare. - The resulting integral vector. - - - Returns a new vector whose elements signal whether the elements in one vector of a specified type are greater than or equal to their corresponding elements in the second vector of the same type. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - The resulting vector. - - - Returns a value that indicates whether all elements in the first vector are greater than or equal to all the corresponding elements in the second vector. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - true if all elements in left are greater than or equal to the corresponding elements in right; otherwise, false. - - - Returns a value that indicates whether any element in the first vector is greater than or equal to the corresponding element in the second vector. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - true if any element in left is greater than or equal to the corresponding element in right; otherwise, false. - - - Gets a value that indicates whether vector operations are subject to hardware acceleration through JIT intrinsic support. - true if vector operations are subject to hardware acceleration; otherwise, false. - - - Returns a new integral vector whose elements signal whether the elements in one double-precision floating-point vector are less than their corresponding elements in a second double-precision floating-point vector. - The first vector to compare. - The second vector to compare. - The resulting integral vector. - - - Returns a new integral vector whose elements signal whether the elements in one integral vector are less than their corresponding elements in a second integral vector. - The first vector to compare. - The second vector to compare. - The resulting integral vector - - - Returns a new long integer vector whose elements signal whether the elements in one long integer vector are less than their corresponding elements in a second long integer vector. - The first vector to compare. - The second vector to compare. - The resulting long integer vector. - - - Returns a new integral vector whose elements signal whether the elements in one single-precision vector are less than their corresponding elements in a second single-precision vector. - The first vector to compare. - The second vector to compare. - The resulting integral vector. - - - Returns a new vector of a specified type whose elements signal whether the elements in one vector are less than their corresponding elements in the second vector. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - The resulting vector. - - - Returns a value that indicates whether all of the elements in the first vector are less than their corresponding elements in the second vector. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - true if all of the elements in left are less than the corresponding elements in right; otherwise, false. - - - Returns a value that indicates whether any element in the first vector is less than the corresponding element in the second vector. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - true if any element in left is less than the corresponding element in right; otherwise, false. - - - Returns a new integral vector whose elements signal whether the elements in one double-precision floating-point vector are less than or equal to their corresponding elements in a second double-precision floating-point vector. - The first vector to compare. - The second vector to compare. - The resulting integral vector. - - - Returns a new integral vector whose elements signal whether the elements in one integral vector are less than or equal to their corresponding elements in a second integral vector. - The first vector to compare. - The second vector to compare. - The resulting integral vector. - - - Returns a new long integer vector whose elements signal whether the elements in one long integer vector are less or equal to their corresponding elements in a second long integer vector. - The first vector to compare. - The second vector to compare. - The resulting long integer vector. - - - Returns a new integral vector whose elements signal whether the elements in one single-precision floating-point vector are less than or equal to their corresponding elements in a second single-precision floating-point vector. - The first vector to compare. - The second vector to compare. - The resulting integral vector. - - - Returns a new vector whose elements signal whether the elements in one vector are less than or equal to their corresponding elements in the second vector. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - The resulting vector. - - - Returns a value that indicates whether all elements in the first vector are less than or equal to their corresponding elements in the second vector. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - true if all of the elements in left are less than or equal to the corresponding elements in right; otherwise, false. - - - Returns a value that indicates whether any element in the first vector is less than or equal to the corresponding element in the second vector. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - true if any element in left is less than or equal to the corresponding element in right; otherwise, false. - - - Returns a new vector whose elements are the maximum of each pair of elements in the two given vectors. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - The maximum vector. - - - Returns a new vector whose elements are the minimum of each pair of elements in the two given vectors. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - The minimum vector. - - - Returns a new vector whose values are a scalar value multiplied by each of the values of a specified vector. - The scalar value. - The vector. - The vector type. T can be any primitive numeric type. - The scaled vector. - - - Returns a new vector whose values are the product of each pair of elements in two specified vectors. - The first vector. - The second vector. - The vector type. T can be any primitive numeric type. - The product vector. - - - Returns a new vector whose values are the values of a specified vector each multiplied by a scalar value. - The vector. - The scalar value. - The vector type. T can be any primitive numeric type. - The scaled vector. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Returns a new vector whose elements are the negation of the corresponding element in the specified vector. - The source vector. - The vector type. T can be any primitive numeric type. - The negated vector. - - - Returns a new vector whose elements are obtained by taking the one's complement of a specified vector's elements. - The source vector. - The vector type. T can be any primitive numeric type. - The resulting vector. - - - Returns a new vector whose elements are the square roots of a specified vector's elements. - The source vector. - The vector type. T can be any primitive numeric type. - The square root vector. - - - Returns a new vector whose values are the difference between the elements in the second vector and their corresponding elements in the first vector. - The first vector. - The second vector. - The vector type. T can be any primitive numeric type. - The difference vector. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Returns a new vector by performing a bitwise exclusive Or (XOr) operation on each pair of elements in two vectors. - The first vector. - The second vector. - The vector type. T can be any primitive numeric type. - The resulting vector. - - - Represents a vector with two single-precision floating-point values. - - - Creates a new object whose two elements have the same value. - The value to assign to both elements. - - - Creates a vector whose elements have the specified values. - The value to assign to the field. - The value to assign to the field. - - - Returns a vector whose elements are the absolute values of each of the specified vector's elements. - A vector. - The absolute value vector. - - - Adds two vectors together. - The first vector to add. - The second vector to add. - The summed vector. - - - Restricts a vector between a minimum and a maximum value. - The vector to restrict. - The minimum value. - The maximum value. - The restricted vector. - - - Copies the elements of the vector to a specified array. - The destination array. - array is null. - The number of elements in the current instance is greater than in the array. - array is multidimensional. - - - Copies the elements of the vector to a specified array starting at a specified index position. - The destination array. - The index at which to copy the first element of the vector. - array is null. - The number of elements in the current instance is greater than in the array. - index is less than zero. -or- index is greater than or equal to the array length. - array is multidimensional. - - - Computes the Euclidean distance between the two given points. - The first point. - The second point. - The distance. - - - Returns the Euclidean distance squared between two specified points. - The first point. - The second point. - The distance squared. - - - Divides the first vector by the second. - The first vector. - The second vector. - The vector resulting from the division. - - - Divides the specified vector by a specified scalar value. - The vector. - The scalar value. - The vector that results from the division. - - - Returns the dot product of two vectors. - The first vector. - The second vector. - The dot product. - - - Returns a value that indicates whether this instance and a specified object are equal. - The object to compare with the current instance. - true if the current instance and obj are equal; otherwise, false```. If <code data-dev-comment-type="paramref">obj</code> isnull, the method returnsfalse`. - - - Returns a value that indicates whether this instance and another vector are equal. - The other vector. - true if the two vectors are equal; otherwise, false. - - - Returns the hash code for this instance. - The hash code. - - - Returns the length of the vector. - The vector's length. - - - Returns the length of the vector squared. - The vector's length squared. - - - Performs a linear interpolation between two vectors based on the given weighting. - The first vector. - The second vector. - A value between 0 and 1 that indicates the weight of value2. - The interpolated vector. - - - Returns a vector whose elements are the maximum of each of the pairs of elements in two specified vectors. - The first vector. - The second vector. - The maximized vector. - - - Returns a vector whose elements are the minimum of each of the pairs of elements in two specified vectors. - The first vector. - The second vector. - The minimized vector. - - - Multiplies two vectors together. - The first vector. - The second vector. - The product vector. - - - Multiplies a vector by a specified scalar. - The vector to multiply. - The scalar value. - The scaled vector. - - - Multiplies a scalar value by a specified vector. - The scaled value. - The vector. - The scaled vector. - - - Negates a specified vector. - The vector to negate. - The negated vector. - - - Returns a vector with the same direction as the specified vector, but with a length of one. - The vector to normalize. - The normalized vector. - - - Gets a vector whose 2 elements are equal to one. - A vector whose two elements are equal to one (that is, it returns the vector (1,1). - - - Adds two vectors together. - The first vector to add. - The second vector to add. - The summed vector. - - - Divides the first vector by the second. - The first vector. - The second vector. - The vector that results from dividing left by right. - - - Divides the specified vector by a specified scalar value. - The vector. - The scalar value. - The result of the division. - - - Returns a value that indicates whether each pair of elements in two specified vectors is equal. - The first vector to compare. - The second vector to compare. - true if left and right are equal; otherwise, false. - - - Returns a value that indicates whether two specified vectors are not equal. - The first vector to compare. - The second vector to compare. - true if left and right are not equal; otherwise, false. - - - Multiplies two vectors together. - The first vector. - The second vector. - The product vector. - - - Multiples the specified vector by the specified scalar value. - The vector. - The scalar value. - The scaled vector. - - - Multiples the scalar value by the specified vector. - The vector. - The scalar value. - The scaled vector. - - - Subtracts the second vector from the first. - The first vector. - The second vector. - The vector that results from subtracting right from left. - - - Negates the specified vector. - The vector to negate. - The negated vector. - - - Returns the reflection of a vector off a surface that has the specified normal. - The source vector. - The normal of the surface being reflected off. - The reflected vector. - - - Returns a vector whose elements are the square root of each of a specified vector's elements. - A vector. - The square root vector. - - - Subtracts the second vector from the first. - The first vector. - The second vector. - The difference vector. - - - Returns the string representation of the current instance using default formatting. - The string representation of the current instance. - - - Returns the string representation of the current instance using the specified format string to format individual elements. - A or that defines the format of individual elements. - The string representation of the current instance. - - - Returns the string representation of the current instance using the specified format string to format individual elements and the specified format provider to define culture-specific formatting. - A or that defines the format of individual elements. - A format provider that supplies culture-specific formatting information. - The string representation of the current instance. - - - Transforms a vector by a specified 3x2 matrix. - The vector to transform. - The transformation matrix. - The transformed vector. - - - Transforms a vector by a specified 4x4 matrix. - The vector to transform. - The transformation matrix. - The transformed vector. - - - Transforms a vector by the specified Quaternion rotation value. - The vector to rotate. - The rotation to apply. - The transformed vector. - - - Transforms a vector normal by the given 3x2 matrix. - The source vector. - The matrix. - The transformed vector. - - - Transforms a vector normal by the given 4x4 matrix. - The source vector. - The matrix. - The transformed vector. - - - Gets the vector (1,0). - The vector (1,0). - - - Gets the vector (0,1). - The vector (0,1). - - - The X component of the vector. - - - - The Y component of the vector. - - - - Returns a vector whose 2 elements are equal to zero. - A vector whose two elements are equal to zero (that is, it returns the vector (0,0). - - - Represents a vector with three single-precision floating-point values. - - - Creates a new object whose three elements have the same value. - The value to assign to all three elements. - - - Creates a new object from the specified object and the specified value. - The vector with two elements. - The additional value to assign to the field. - - - Creates a vector whose elements have the specified values. - The value to assign to the field. - The value to assign to the field. - The value to assign to the field. - - - Returns a vector whose elements are the absolute values of each of the specified vector's elements. - A vector. - The absolute value vector. - - - Adds two vectors together. - The first vector to add. - The second vector to add. - The summed vector. - - - Restricts a vector between a minimum and a maximum value. - The vector to restrict. - The minimum value. - The maximum value. - The restricted vector. - - - Copies the elements of the vector to a specified array. - The destination array. - array is null. - The number of elements in the current instance is greater than in the array. - array is multidimensional. - - - Copies the elements of the vector to a specified array starting at a specified index position. - The destination array. - The index at which to copy the first element of the vector. - array is null. - The number of elements in the current instance is greater than in the array. - index is less than zero. -or- index is greater than or equal to the array length. - array is multidimensional. - - - Computes the cross product of two vectors. - The first vector. - The second vector. - The cross product. - - - Computes the Euclidean distance between the two given points. - The first point. - The second point. - The distance. - - - Returns the Euclidean distance squared between two specified points. - The first point. - The second point. - The distance squared. - - - Divides the specified vector by a specified scalar value. - The vector. - The scalar value. - The vector that results from the division. - - - Divides the first vector by the second. - The first vector. - The second vector. - The vector resulting from the division. - - - Returns the dot product of two vectors. - The first vector. - The second vector. - The dot product. - - - Returns a value that indicates whether this instance and another vector are equal. - The other vector. - true if the two vectors are equal; otherwise, false. - - - Returns a value that indicates whether this instance and a specified object are equal. - The object to compare with the current instance. - true if the current instance and obj are equal; otherwise, false```. If <code data-dev-comment-type="paramref">obj</code> isnull, the method returnsfalse`. - - - Returns the hash code for this instance. - The hash code. - - - Returns the length of this vector object. - The vector's length. - - - Returns the length of the vector squared. - The vector's length squared. - - - Performs a linear interpolation between two vectors based on the given weighting. - The first vector. - The second vector. - A value between 0 and 1 that indicates the weight of value2. - The interpolated vector. - - - Returns a vector whose elements are the maximum of each of the pairs of elements in two specified vectors. - The first vector. - The second vector. - The maximized vector. - - - Returns a vector whose elements are the minimum of each of the pairs of elements in two specified vectors. - The first vector. - The second vector. - The minimized vector. - - - Multiplies a scalar value by a specified vector. - The scaled value. - The vector. - The scaled vector. - - - Multiplies two vectors together. - The first vector. - The second vector. - The product vector. - - - Multiplies a vector by a specified scalar. - The vector to multiply. - The scalar value. - The scaled vector. - - - Negates a specified vector. - The vector to negate. - The negated vector. - - - Returns a vector with the same direction as the specified vector, but with a length of one. - The vector to normalize. - The normalized vector. - - - Gets a vector whose 3 elements are equal to one. - A vector whose three elements are equal to one (that is, it returns the vector (1,1,1). - - - Adds two vectors together. - The first vector to add. - The second vector to add. - The summed vector. - - - Divides the first vector by the second. - The first vector. - The second vector. - The vector that results from dividing left by right. - - - Divides the specified vector by a specified scalar value. - The vector. - The scalar value. - The result of the division. - - - Returns a value that indicates whether each pair of elements in two specified vectors is equal. - The first vector to compare. - The second vector to compare. - true if left and right are equal; otherwise, false. - - - Returns a value that indicates whether two specified vectors are not equal. - The first vector to compare. - The second vector to compare. - true if left and right are not equal; otherwise, false. - - - Multiplies two vectors together. - The first vector. - The second vector. - The product vector. - - - Multiples the specified vector by the specified scalar value. - The vector. - The scalar value. - The scaled vector. - - - Multiples the scalar value by the specified vector. - The vector. - The scalar value. - The scaled vector. - - - Subtracts the second vector from the first. - The first vector. - The second vector. - The vector that results from subtracting right from left. - - - Negates the specified vector. - The vector to negate. - The negated vector. - - - Returns the reflection of a vector off a surface that has the specified normal. - The source vector. - The normal of the surface being reflected off. - The reflected vector. - - - Returns a vector whose elements are the square root of each of a specified vector's elements. - A vector. - The square root vector. - - - Subtracts the second vector from the first. - The first vector. - The second vector. - The difference vector. - - - Returns the string representation of the current instance using default formatting. - The string representation of the current instance. - - - Returns the string representation of the current instance using the specified format string to format individual elements. - A or that defines the format of individual elements. - The string representation of the current instance. - - - Returns the string representation of the current instance using the specified format string to format individual elements and the specified format provider to define culture-specific formatting. - A or that defines the format of individual elements. - A format provider that supplies culture-specific formatting information. - The string representation of the current instance. - - - Transforms a vector by a specified 4x4 matrix. - The vector to transform. - The transformation matrix. - The transformed vector. - - - Transforms a vector by the specified Quaternion rotation value. - The vector to rotate. - The rotation to apply. - The transformed vector. - - - Transforms a vector normal by the given 4x4 matrix. - The source vector. - The matrix. - The transformed vector. - - - Gets the vector (1,0,0). - The vector (1,0,0). - - - Gets the vector (0,1,0). - The vector (0,1,0).. - - - Gets the vector (0,0,1). - The vector (0,0,1). - - - The X component of the vector. - - - - The Y component of the vector. - - - - The Z component of the vector. - - - - Gets a vector whose 3 elements are equal to zero. - A vector whose three elements are equal to zero (that is, it returns the vector (0,0,0). - - - Represents a vector with four single-precision floating-point values. - - - Creates a new object whose four elements have the same value. - The value to assign to all four elements. - - - Constructs a new object from the specified object and a W component. - The vector to use for the X, Y, and Z components. - The W component. - - - Creates a new object from the specified object and a Z and a W component. - The vector to use for the X and Y components. - The Z component. - The W component. - - - Creates a vector whose elements have the specified values. - The value to assign to the field. - The value to assign to the field. - The value to assign to the field. - The value to assign to the field. - - - Returns a vector whose elements are the absolute values of each of the specified vector's elements. - A vector. - The absolute value vector. - - - Adds two vectors together. - The first vector to add. - The second vector to add. - The summed vector. - - - Restricts a vector between a minimum and a maximum value. - The vector to restrict. - The minimum value. - The maximum value. - The restricted vector. - - - Copies the elements of the vector to a specified array. - The destination array. - array is null. - The number of elements in the current instance is greater than in the array. - array is multidimensional. - - - Copies the elements of the vector to a specified array starting at a specified index position. - The destination array. - The index at which to copy the first element of the vector. - array is null. - The number of elements in the current instance is greater than in the array. - index is less than zero. -or- index is greater than or equal to the array length. - array is multidimensional. - - - Computes the Euclidean distance between the two given points. - The first point. - The second point. - The distance. - - - Returns the Euclidean distance squared between two specified points. - The first point. - The second point. - The distance squared. - - - Divides the first vector by the second. - The first vector. - The second vector. - The vector resulting from the division. - - - Divides the specified vector by a specified scalar value. - The vector. - The scalar value. - The vector that results from the division. - - - Returns the dot product of two vectors. - The first vector. - The second vector. - The dot product. - - - Returns a value that indicates whether this instance and another vector are equal. - The other vector. - true if the two vectors are equal; otherwise, false. - - - Returns a value that indicates whether this instance and a specified object are equal. - The object to compare with the current instance. - true if the current instance and obj are equal; otherwise, false```. If <code data-dev-comment-type="paramref">obj</code> isnull, the method returnsfalse`. - - - Returns the hash code for this instance. - The hash code. - - - Returns the length of this vector object. - The vector's length. - - - Returns the length of the vector squared. - The vector's length squared. - - - Performs a linear interpolation between two vectors based on the given weighting. - The first vector. - The second vector. - A value between 0 and 1 that indicates the weight of value2. - The interpolated vector. - - - Returns a vector whose elements are the maximum of each of the pairs of elements in two specified vectors. - The first vector. - The second vector. - The maximized vector. - - - Returns a vector whose elements are the minimum of each of the pairs of elements in two specified vectors. - The first vector. - The second vector. - The minimized vector. - - - Multiplies two vectors together. - The first vector. - The second vector. - The product vector. - - - Multiplies a vector by a specified scalar. - The vector to multiply. - The scalar value. - The scaled vector. - - - Multiplies a scalar value by a specified vector. - The scaled value. - The vector. - The scaled vector. - - - Negates a specified vector. - The vector to negate. - The negated vector. - - - Returns a vector with the same direction as the specified vector, but with a length of one. - The vector to normalize. - The normalized vector. - - - Gets a vector whose 4 elements are equal to one. - Returns . - - - Adds two vectors together. - The first vector to add. - The second vector to add. - The summed vector. - - - Divides the first vector by the second. - The first vector. - The second vector. - The vector that results from dividing left by right. - - - Divides the specified vector by a specified scalar value. - The vector. - The scalar value. - The result of the division. - - - Returns a value that indicates whether each pair of elements in two specified vectors is equal. - The first vector to compare. - The second vector to compare. - true if left and right are equal; otherwise, false. - - - Returns a value that indicates whether two specified vectors are not equal. - The first vector to compare. - The second vector to compare. - true if left and right are not equal; otherwise, false. - - - Multiplies two vectors together. - The first vector. - The second vector. - The product vector. - - - Multiples the specified vector by the specified scalar value. - The vector. - The scalar value. - The scaled vector. - - - Multiples the scalar value by the specified vector. - The vector. - The scalar value. - The scaled vector. - - - Subtracts the second vector from the first. - The first vector. - The second vector. - The vector that results from subtracting right from left. - - - Negates the specified vector. - The vector to negate. - The negated vector. - - - Returns a vector whose elements are the square root of each of a specified vector's elements. - A vector. - The square root vector. - - - Subtracts the second vector from the first. - The first vector. - The second vector. - The difference vector. - - - Returns the string representation of the current instance using default formatting. - The string representation of the current instance. - - - Returns the string representation of the current instance using the specified format string to format individual elements. - A or that defines the format of individual elements. - The string representation of the current instance. - - - Returns the string representation of the current instance using the specified format string to format individual elements and the specified format provider to define culture-specific formatting. - A or that defines the format of individual elements. - A format provider that supplies culture-specific formatting information. - The string representation of the current instance. - - - Transforms a four-dimensional vector by the specified Quaternion rotation value. - The vector to rotate. - The rotation to apply. - The transformed vector. - - - Transforms a four-dimensional vector by a specified 4x4 matrix. - The vector to transform. - The transformation matrix. - The transformed vector. - - - Transforms a three-dimensional vector by the specified Quaternion rotation value. - The vector to rotate. - The rotation to apply. - The transformed vector. - - - Transforms a two-dimensional vector by a specified 4x4 matrix. - The vector to transform. - The transformation matrix. - The transformed vector. - - - Transforms a two-dimensional vector by the specified Quaternion rotation value. - The vector to rotate. - The rotation to apply. - The transformed vector. - - - Transforms a three-dimensional vector by a specified 4x4 matrix. - The vector to transform. - The transformation matrix. - The transformed vector. - - - Gets the vector (0,0,0,1). - The vector (0,0,0,1). - - - Gets the vector (1,0,0,0). - The vector (1,0,0,0). - - - Gets the vector (0,1,0,0). - The vector (0,1,0,0).. - - - Gets a vector whose 4 elements are equal to zero. - The vector (0,0,1,0). - - - The W component of the vector. - - - - The X component of the vector. - - - - The Y component of the vector. - - - - The Z component of the vector. - - - - Gets a vector whose 4 elements are equal to zero. - A vector whose four elements are equal to zero (that is, it returns the vector (0,0,0,0). - - - \ No newline at end of file diff --git a/packages/System.Numerics.Vectors.4.4.0/lib/netstandard2.0/System.Numerics.Vectors.dll b/packages/System.Numerics.Vectors.4.4.0/lib/netstandard2.0/System.Numerics.Vectors.dll deleted file mode 100644 index a808165a..00000000 Binary files a/packages/System.Numerics.Vectors.4.4.0/lib/netstandard2.0/System.Numerics.Vectors.dll and /dev/null differ diff --git a/packages/System.Numerics.Vectors.4.4.0/lib/netstandard2.0/System.Numerics.Vectors.xml b/packages/System.Numerics.Vectors.4.4.0/lib/netstandard2.0/System.Numerics.Vectors.xml deleted file mode 100644 index 51297939..00000000 --- a/packages/System.Numerics.Vectors.4.4.0/lib/netstandard2.0/System.Numerics.Vectors.xml +++ /dev/null @@ -1,2597 +0,0 @@ - - - - System.Numerics.Vectors - - - - Represents a 3x2 matrix. - - - Creates a 3x2 matrix from the specified components. - The value to assign to the first element in the first row. - The value to assign to the second element in the first row. - The value to assign to the first element in the second row. - The value to assign to the second element in the second row. - The value to assign to the first element in the third row. - The value to assign to the second element in the third row. - - - Adds each element in one matrix with its corresponding element in a second matrix. - The first matrix. - The second matrix. - The matrix that contains the summed values of value1 and value2. - - - Creates a rotation matrix using the given rotation in radians. - The amount of rotation, in radians. - The rotation matrix. - - - Creates a rotation matrix using the specified rotation in radians and a center point. - The amount of rotation, in radians. - The center point. - The rotation matrix. - - - Creates a scaling matrix from the specified X and Y components. - The value to scale by on the X axis. - The value to scale by on the Y axis. - The scaling matrix. - - - Creates a scaling matrix that scales uniformly with the specified scale with an offset from the specified center. - The uniform scale to use. - The center offset. - The scaling matrix. - - - Creates a scaling matrix that is offset by a given center point. - The value to scale by on the X axis. - The value to scale by on the Y axis. - The center point. - The scaling matrix. - - - Creates a scaling matrix that scales uniformly with the given scale. - The uniform scale to use. - The scaling matrix. - - - Creates a scaling matrix from the specified vector scale. - The scale to use. - The scaling matrix. - - - Creates a scaling matrix from the specified vector scale with an offset from the specified center point. - The scale to use. - The center offset. - The scaling matrix. - - - Creates a skew matrix from the specified angles in radians. - The X angle, in radians. - The Y angle, in radians. - The skew matrix. - - - Creates a skew matrix from the specified angles in radians and a center point. - The X angle, in radians. - The Y angle, in radians. - The center point. - The skew matrix. - - - Creates a translation matrix from the specified 2-dimensional vector. - The translation position. - The translation matrix. - - - Creates a translation matrix from the specified X and Y components. - The X position. - The Y position. - The translation matrix. - - - Returns a value that indicates whether this instance and another 3x2 matrix are equal. - The other matrix. - true if the two matrices are equal; otherwise, false. - - - Returns a value that indicates whether this instance and a specified object are equal. - The object to compare with the current instance. - true if the current instance and obj are equal; otherwise, false```. If <code data-dev-comment-type="paramref">obj</code> isnull, the method returnsfalse`. - - - Calculates the determinant for this matrix. - The determinant. - - - Returns the hash code for this instance. - The hash code. - - - Gets the multiplicative identity matrix. - The multiplicative identify matrix. - - - Inverts the specified matrix. The return value indicates whether the operation succeeded. - The matrix to invert. - When this method returns, contains the inverted matrix if the operation succeeded. - true if matrix was converted successfully; otherwise, false. - - - Indicates whether the current matrix is the identity matrix. - true if the current matrix is the identity matrix; otherwise, false. - - - Performs a linear interpolation from one matrix to a second matrix based on a value that specifies the weighting of the second matrix. - The first matrix. - The second matrix. - The relative weighting of matrix2. - The interpolated matrix. - - - The first element of the first row. - - - - The second element of the first row. - - - - The first element of the second row. - - - - The second element of the second row. - - - - The first element of the third row. - - - - The second element of the third row. - - - - Returns the matrix that results from multiplying two matrices together. - The first matrix. - The second matrix. - The product matrix. - - - Returns the matrix that results from scaling all the elements of a specified matrix by a scalar factor. - The matrix to scale. - The scaling value to use. - The scaled matrix. - - - Negates the specified matrix by multiplying all its values by -1. - The matrix to negate. - The negated matrix. - - - Adds each element in one matrix with its corresponding element in a second matrix. - The first matrix. - The second matrix. - The matrix that contains the summed values. - - - Returns a value that indicates whether the specified matrices are equal. - The first matrix to compare. - The second matrix to compare. - true if value1 and value2 are equal; otherwise, false. - - - Returns a value that indicates whether the specified matrices are not equal. - The first matrix to compare. - The second matrix to compare. - true if value1 and value2 are not equal; otherwise, false. - - - Returns the matrix that results from multiplying two matrices together. - The first matrix. - The second matrix. - The product matrix. - - - Returns the matrix that results from scaling all the elements of a specified matrix by a scalar factor. - The matrix to scale. - The scaling value to use. - The scaled matrix. - - - Subtracts each element in a second matrix from its corresponding element in a first matrix. - The first matrix. - The second matrix. - The matrix containing the values that result from subtracting each element in value2 from its corresponding element in value1. - - - Negates the specified matrix by multiplying all its values by -1. - The matrix to negate. - The negated matrix. - - - Subtracts each element in a second matrix from its corresponding element in a first matrix. - The first matrix. - The second matrix. - The matrix containing the values that result from subtracting each element in value2 from its corresponding element in value1. - - - Returns a string that represents this matrix. - The string representation of this matrix. - - - Gets or sets the translation component of this matrix. - The translation component of the current instance. - - - Represents a 4x4 matrix. - - - Creates a object from a specified object. - A 3x2 matrix. - - - Creates a 4x4 matrix from the specified components. - The value to assign to the first element in the first row. - The value to assign to the second element in the first row. - The value to assign to the third element in the first row. - The value to assign to the fourth element in the first row. - The value to assign to the first element in the second row. - The value to assign to the second element in the second row. - The value to assign to the third element in the second row. - The value to assign to the third element in the second row. - The value to assign to the first element in the third row. - The value to assign to the second element in the third row. - The value to assign to the third element in the third row. - The value to assign to the fourth element in the third row. - The value to assign to the first element in the fourth row. - The value to assign to the second element in the fourth row. - The value to assign to the third element in the fourth row. - The value to assign to the fourth element in the fourth row. - - - Adds each element in one matrix with its corresponding element in a second matrix. - The first matrix. - The second matrix. - The matrix that contains the summed values of value1 and value2. - - - Creates a spherical billboard that rotates around a specified object position. - The position of the object that the billboard will rotate around. - The position of the camera. - The up vector of the camera. - The forward vector of the camera. - The created billboard. - - - Creates a cylindrical billboard that rotates around a specified axis. - The position of the object that the billboard will rotate around. - The position of the camera. - The axis to rotate the billboard around. - The forward vector of the camera. - The forward vector of the object. - The billboard matrix. - - - Creates a matrix that rotates around an arbitrary vector. - The axis to rotate around. - The angle to rotate around axis, in radians. - The rotation matrix. - - - Creates a rotation matrix from the specified Quaternion rotation value. - The source Quaternion. - The rotation matrix. - - - Creates a rotation matrix from the specified yaw, pitch, and roll. - The angle of rotation, in radians, around the Y axis. - The angle of rotation, in radians, around the X axis. - The angle of rotation, in radians, around the Z axis. - The rotation matrix. - - - Creates a view matrix. - The position of the camera. - The target towards which the camera is pointing. - The direction that is "up" from the camera's point of view. - The view matrix. - - - Creates an orthographic perspective matrix from the given view volume dimensions. - The width of the view volume. - The height of the view volume. - The minimum Z-value of the view volume. - The maximum Z-value of the view volume. - The orthographic projection matrix. - - - Creates a customized orthographic projection matrix. - The minimum X-value of the view volume. - The maximum X-value of the view volume. - The minimum Y-value of the view volume. - The maximum Y-value of the view volume. - The minimum Z-value of the view volume. - The maximum Z-value of the view volume. - The orthographic projection matrix. - - - Creates a perspective projection matrix from the given view volume dimensions. - The width of the view volume at the near view plane. - The height of the view volume at the near view plane. - The distance to the near view plane. - The distance to the far view plane. - The perspective projection matrix. - nearPlaneDistance is less than or equal to zero. -or- farPlaneDistance is less than or equal to zero. -or- nearPlaneDistance is greater than or equal to farPlaneDistance. - - - Creates a perspective projection matrix based on a field of view, aspect ratio, and near and far view plane distances. - The field of view in the y direction, in radians. - The aspect ratio, defined as view space width divided by height. - The distance to the near view plane. - The distance to the far view plane. - The perspective projection matrix. - fieldOfView is less than or equal to zero. -or- fieldOfView is greater than or equal to . nearPlaneDistance is less than or equal to zero. -or- farPlaneDistance is less than or equal to zero. -or- nearPlaneDistance is greater than or equal to farPlaneDistance. - - - Creates a customized perspective projection matrix. - The minimum x-value of the view volume at the near view plane. - The maximum x-value of the view volume at the near view plane. - The minimum y-value of the view volume at the near view plane. - The maximum y-value of the view volume at the near view plane. - The distance to the near view plane. - The distance to the far view plane. - The perspective projection matrix. - nearPlaneDistance is less than or equal to zero. -or- farPlaneDistance is less than or equal to zero. -or- nearPlaneDistance is greater than or equal to farPlaneDistance. - - - Creates a matrix that reflects the coordinate system about a specified plane. - The plane about which to create a reflection. - A new matrix expressing the reflection. - - - Creates a matrix for rotating points around the X axis. - The amount, in radians, by which to rotate around the X axis. - The rotation matrix. - - - Creates a matrix for rotating points around the X axis from a center point. - The amount, in radians, by which to rotate around the X axis. - The center point. - The rotation matrix. - - - The amount, in radians, by which to rotate around the Y axis from a center point. - The amount, in radians, by which to rotate around the Y-axis. - The center point. - The rotation matrix. - - - Creates a matrix for rotating points around the Y axis. - The amount, in radians, by which to rotate around the Y-axis. - The rotation matrix. - - - Creates a matrix for rotating points around the Z axis. - The amount, in radians, by which to rotate around the Z-axis. - The rotation matrix. - - - Creates a matrix for rotating points around the Z axis from a center point. - The amount, in radians, by which to rotate around the Z-axis. - The center point. - The rotation matrix. - - - Creates a scaling matrix from the specified vector scale. - The scale to use. - The scaling matrix. - - - Creates a uniform scaling matrix that scale equally on each axis. - The uniform scaling factor. - The scaling matrix. - - - Creates a scaling matrix with a center point. - The vector that contains the amount to scale on each axis. - The center point. - The scaling matrix. - - - Creates a uniform scaling matrix that scales equally on each axis with a center point. - The uniform scaling factor. - The center point. - The scaling matrix. - - - Creates a scaling matrix from the specified X, Y, and Z components. - The value to scale by on the X axis. - The value to scale by on the Y axis. - The value to scale by on the Z axis. - The scaling matrix. - - - Creates a scaling matrix that is offset by a given center point. - The value to scale by on the X axis. - The value to scale by on the Y axis. - The value to scale by on the Z axis. - The center point. - The scaling matrix. - - - Creates a matrix that flattens geometry into a specified plane as if casting a shadow from a specified light source. - The direction from which the light that will cast the shadow is coming. - The plane onto which the new matrix should flatten geometry so as to cast a shadow. - A new matrix that can be used to flatten geometry onto the specified plane from the specified direction. - - - Creates a translation matrix from the specified 3-dimensional vector. - The amount to translate in each axis. - The translation matrix. - - - Creates a translation matrix from the specified X, Y, and Z components. - The amount to translate on the X axis. - The amount to translate on the Y axis. - The amount to translate on the Z axis. - The translation matrix. - - - Creates a world matrix with the specified parameters. - The position of the object. - The forward direction of the object. - The upward direction of the object. Its value is usually [0, 1, 0]. - The world matrix. - - - Attempts to extract the scale, translation, and rotation components from the given scale, rotation, or translation matrix. The return value indicates whether the operation succeeded. - The source matrix. - When this method returns, contains the scaling component of the transformation matrix if the operation succeeded. - When this method returns, contains the rotation component of the transformation matrix if the operation succeeded. - When the method returns, contains the translation component of the transformation matrix if the operation succeeded. - true if matrix was decomposed successfully; otherwise, false. - - - Returns a value that indicates whether this instance and another 4x4 matrix are equal. - The other matrix. - true if the two matrices are equal; otherwise, false. - - - Returns a value that indicates whether this instance and a specified object are equal. - The object to compare with the current instance. - true if the current instance and obj are equal; otherwise, false```. If <code data-dev-comment-type="paramref">obj</code> isnull, the method returnsfalse`. - - - Calculates the determinant of the current 4x4 matrix. - The determinant. - - - Returns the hash code for this instance. - The hash code. - - - Gets the multiplicative identity matrix. - Gets the multiplicative identity matrix. - - - Inverts the specified matrix. The return value indicates whether the operation succeeded. - The matrix to invert. - When this method returns, contains the inverted matrix if the operation succeeded. - true if matrix was converted successfully; otherwise, false. - - - Indicates whether the current matrix is the identity matrix. - true if the current matrix is the identity matrix; otherwise, false. - - - Performs a linear interpolation from one matrix to a second matrix based on a value that specifies the weighting of the second matrix. - The first matrix. - The second matrix. - The relative weighting of matrix2. - The interpolated matrix. - - - The first element of the first row. - - - - The second element of the first row. - - - - The third element of the first row. - - - - The fourth element of the first row. - - - - The first element of the second row. - - - - The second element of the second row. - - - - The third element of the second row. - - - - The fourth element of the second row. - - - - The first element of the third row. - - - - The second element of the third row. - - - - The third element of the third row. - - - - The fourth element of the third row. - - - - The first element of the fourth row. - - - - The second element of the fourth row. - - - - The third element of the fourth row. - - - - The fourth element of the fourth row. - - - - Returns the matrix that results from multiplying two matrices together. - The first matrix. - The second matrix. - The product matrix. - - - Returns the matrix that results from scaling all the elements of a specified matrix by a scalar factor. - The matrix to scale. - The scaling value to use. - The scaled matrix. - - - Negates the specified matrix by multiplying all its values by -1. - The matrix to negate. - The negated matrix. - - - Adds each element in one matrix with its corresponding element in a second matrix. - The first matrix. - The second matrix. - The matrix that contains the summed values. - - - Returns a value that indicates whether the specified matrices are equal. - The first matrix to compare. - The second matrix to care - true if value1 and value2 are equal; otherwise, false. - - - Returns a value that indicates whether the specified matrices are not equal. - The first matrix to compare. - The second matrix to compare. - true if value1 and value2 are not equal; otherwise, false. - - - Returns the matrix that results from scaling all the elements of a specified matrix by a scalar factor. - The matrix to scale. - The scaling value to use. - The scaled matrix. - - - Returns the matrix that results from multiplying two matrices together. - The first matrix. - The second matrix. - The product matrix. - - - Subtracts each element in a second matrix from its corresponding element in a first matrix. - The first matrix. - The second matrix. - The matrix containing the values that result from subtracting each element in value2 from its corresponding element in value1. - - - Negates the specified matrix by multiplying all its values by -1. - The matrix to negate. - The negated matrix. - - - Subtracts each element in a second matrix from its corresponding element in a first matrix. - The first matrix. - The second matrix. - The matrix containing the values that result from subtracting each element in value2 from its corresponding element in value1. - - - Returns a string that represents this matrix. - The string representation of this matrix. - - - Transforms the specified matrix by applying the specified Quaternion rotation. - The matrix to transform. - The rotation t apply. - The transformed matrix. - - - Gets or sets the translation component of this matrix. - The translation component of the current instance. - - - Transposes the rows and columns of a matrix. - The matrix to transpose. - The transposed matrix. - - - Represents a three-dimensional plane. - - - Creates a object from a specified four-dimensional vector. - A vector whose first three elements describe the normal vector, and whose defines the distance along that normal from the origin. - - - Creates a object from a specified normal and the distance along the normal from the origin. - The plane's normal vector. - The plane's distance from the origin along its normal vector. - - - Creates a object from the X, Y, and Z components of its normal, and its distance from the origin on that normal. - The X component of the normal. - The Y component of the normal. - The Z component of the normal. - The distance of the plane along its normal from the origin. - - - Creates a object that contains three specified points. - The first point defining the plane. - The second point defining the plane. - The third point defining the plane. - The plane containing the three points. - - - The distance of the plane along its normal from the origin. - - - - Calculates the dot product of a plane and a 4-dimensional vector. - The plane. - The four-dimensional vector. - The dot product. - - - Returns the dot product of a specified three-dimensional vector and the normal vector of this plane plus the distance () value of the plane. - The plane. - The 3-dimensional vector. - The dot product. - - - Returns the dot product of a specified three-dimensional vector and the vector of this plane. - The plane. - The three-dimensional vector. - The dot product. - - - Returns a value that indicates whether this instance and a specified object are equal. - The object to compare with the current instance. - true if the current instance and obj are equal; otherwise, false```. If <code data-dev-comment-type="paramref">obj</code> isnull, the method returnsfalse`. - - - Returns a value that indicates whether this instance and another plane object are equal. - The other plane. - true if the two planes are equal; otherwise, false. - - - Returns the hash code for this instance. - The hash code. - - - The normal vector of the plane. - - - - Creates a new object whose normal vector is the source plane's normal vector normalized. - The source plane. - The normalized plane. - - - Returns a value that indicates whether two planes are equal. - The first plane to compare. - The second plane to compare. - true if value1 and value2 are equal; otherwise, false. - - - Returns a value that indicates whether two planes are not equal. - The first plane to compare. - The second plane to compare. - true if value1 and value2 are not equal; otherwise, false. - - - Returns the string representation of this plane object. - A string that represents this object. - - - Transforms a normalized plane by a 4x4 matrix. - The normalized plane to transform. - The transformation matrix to apply to plane. - The transformed plane. - - - Transforms a normalized plane by a Quaternion rotation. - The normalized plane to transform. - The Quaternion rotation to apply to the plane. - A new plane that results from applying the Quaternion rotation. - - - Represents a vector that is used to encode three-dimensional physical rotations. - - - Creates a quaternion from the specified vector and rotation parts. - The vector part of the quaternion. - The rotation part of the quaternion. - - - Constructs a quaternion from the specified components. - The value to assign to the X component of the quaternion. - The value to assign to the Y component of the quaternion. - The value to assign to the Z component of the quaternion. - The value to assign to the W component of the quaternion. - - - Adds each element in one quaternion with its corresponding element in a second quaternion. - The first quaternion. - The second quaternion. - The quaternion that contains the summed values of value1 and value2. - - - Concatenates two quaternions. - The first quaternion rotation in the series. - The second quaternion rotation in the series. - A new quaternion representing the concatenation of the value1 rotation followed by the value2 rotation. - - - Returns the conjugate of a specified quaternion. - The quaternion. - A new quaternion that is the conjugate of value. - - - Creates a quaternion from a vector and an angle to rotate about the vector. - The vector to rotate around. - The angle, in radians, to rotate around the vector. - The newly created quaternion. - - - Creates a quaternion from the specified rotation matrix. - The rotation matrix. - The newly created quaternion. - - - Creates a new quaternion from the given yaw, pitch, and roll. - The yaw angle, in radians, around the Y axis. - The pitch angle, in radians, around the X axis. - The roll angle, in radians, around the Z axis. - The resulting quaternion. - - - Divides one quaternion by a second quaternion. - The dividend. - The divisor. - The quaternion that results from dividing value1 by value2. - - - Calculates the dot product of two quaternions. - The first quaternion. - The second quaternion. - The dot product. - - - Returns a value that indicates whether this instance and another quaternion are equal. - The other quaternion. - true if the two quaternions are equal; otherwise, false. - - - Returns a value that indicates whether this instance and a specified object are equal. - The object to compare with the current instance. - true if the current instance and obj are equal; otherwise, false```. If <code data-dev-comment-type="paramref">obj</code> isnull, the method returnsfalse`. - - - Returns the hash code for this instance. - The hash code. - - - Gets a quaternion that represents no rotation. - A quaternion whose values are (0, 0, 0, 1). - - - Returns the inverse of a quaternion. - The quaternion. - The inverted quaternion. - - - Gets a value that indicates whether the current instance is the identity quaternion. - true if the current instance is the identity quaternion; otherwise, false. - - - Calculates the length of the quaternion. - The computed length of the quaternion. - - - Calculates the squared length of the quaternion. - The length squared of the quaternion. - - - Performs a linear interpolation between two quaternions based on a value that specifies the weighting of the second quaternion. - The first quaternion. - The second quaternion. - The relative weight of quaternion2 in the interpolation. - The interpolated quaternion. - - - Returns the quaternion that results from multiplying two quaternions together. - The first quaternion. - The second quaternion. - The product quaternion. - - - Returns the quaternion that results from scaling all the components of a specified quaternion by a scalar factor. - The source quaternion. - The scalar value. - The scaled quaternion. - - - Reverses the sign of each component of the quaternion. - The quaternion to negate. - The negated quaternion. - - - Divides each component of a specified by its length. - The quaternion to normalize. - The normalized quaternion. - - - Adds each element in one quaternion with its corresponding element in a second quaternion. - The first quaternion. - The second quaternion. - The quaternion that contains the summed values of value1 and value2. - - - Divides one quaternion by a second quaternion. - The dividend. - The divisor. - The quaternion that results from dividing value1 by value2. - - - Returns a value that indicates whether two quaternions are equal. - The first quaternion to compare. - The second quaternion to compare. - true if the two quaternions are equal; otherwise, false. - - - Returns a value that indicates whether two quaternions are not equal. - The first quaternion to compare. - The second quaternion to compare. - true if value1 and value2 are not equal; otherwise, false. - - - Returns the quaternion that results from scaling all the components of a specified quaternion by a scalar factor. - The source quaternion. - The scalar value. - The scaled quaternion. - - - Returns the quaternion that results from multiplying two quaternions together. - The first quaternion. - The second quaternion. - The product quaternion. - - - Subtracts each element in a second quaternion from its corresponding element in a first quaternion. - The first quaternion. - The second quaternion. - The quaternion containing the values that result from subtracting each element in value2 from its corresponding element in value1. - - - Reverses the sign of each component of the quaternion. - The quaternion to negate. - The negated quaternion. - - - Interpolates between two quaternions, using spherical linear interpolation. - The first quaternion. - The second quaternion. - The relative weight of the second quaternion in the interpolation. - The interpolated quaternion. - - - Subtracts each element in a second quaternion from its corresponding element in a first quaternion. - The first quaternion. - The second quaternion. - The quaternion containing the values that result from subtracting each element in value2 from its corresponding element in value1. - - - Returns a string that represents this quaternion. - The string representation of this quaternion. - - - The rotation component of the quaternion. - - - - The X value of the vector component of the quaternion. - - - - The Y value of the vector component of the quaternion. - - - - The Z value of the vector component of the quaternion. - - - - Represents a single vector of a specified numeric type that is suitable for low-level optimization of parallel algorithms. - The vector type. T can be any primitive numeric type. - - - Creates a vector whose components are of a specified type. - The numeric type that defines the type of the components in the vector. - - - Creates a vector from a specified array. - A numeric array. - values is null. - - - Creates a vector from a specified array starting at a specified index position. - A numeric array. - The starting index position from which to create the vector. - values is null. - index is less than zero. -or- The length of values minus index is less than . - - - Copies the vector instance to a specified destination array. - The array to receive a copy of the vector values. - destination is null. - The number of elements in the current vector is greater than the number of elements available in the destination array. - - - Copies the vector instance to a specified destination array starting at a specified index position. - The array to receive a copy of the vector values. - The starting index in destination at which to begin the copy operation. - destination is null. - The number of elements in the current instance is greater than the number of elements available from startIndex to the end of the destination array. - index is less than zero or greater than the last index in destination. - - - Returns the number of elements stored in the vector. - The number of elements stored in the vector. - Access to the property getter via reflection is not supported. - - - Returns a value that indicates whether this instance is equal to a specified vector. - The vector to compare with this instance. - true if the current instance and other are equal; otherwise, false. - - - Returns a value that indicates whether this instance is equal to a specified object. - The object to compare with this instance. - true if the current instance and obj are equal; otherwise, false. The method returns false if obj is null, or if obj is a vector of a different type than the current instance. - - - Returns the hash code for this instance. - The hash code. - - - Gets the element at a specified index. - The index of the element to return. - The element at index index. - index is less than zero. -or- index is greater than or equal to . - - - Returns a vector containing all ones. - A vector containing all ones. - - - Adds two vectors together. - The first vector to add. - The second vector to add. - The summed vector. - - - Returns a new vector by performing a bitwise And operation on each of the elements in two vectors. - The first vector. - The second vector. - The vector that results from the bitwise And of left and right. - - - Returns a new vector by performing a bitwise Or operation on each of the elements in two vectors. - The first vector. - The second vector. - The vector that results from the bitwise Or of the elements in left and right. - - - Divides the first vector by the second. - The first vector. - The second vector. - The vector that results from dividing left by right. - - - Returns a value that indicates whether each pair of elements in two specified vectors are equal. - The first vector to compare. - The second vector to compare. - true if left and right are equal; otherwise, false. - - - Returns a new vector by performing a bitwise XOr operation on each of the elements in two vectors. - The first vector. - The second vector. - The vector that results from the bitwise XOr of the elements in left and right. - - - Reinterprets the bits of the specified vector into a vector of type . - The vector to reinterpret. - The reinterpreted vector. - - - Reinterprets the bits of the specified vector into a vector of type . - The vector to reinterpret. - The reinterpreted vector. - - - Reinterprets the bits of the specified vector into a vector of type . - The vector to reinterpret. - The reinterpreted vector. - - - Reinterprets the bits of the specified vector into a vector of type . - The vector to reinterpret. - The reinterpreted vector. - - - Reinterprets the bits of the specified vector into a vector of type . - The vector to reinterpret. - The reinterpreted vector. - - - Reinterprets the bits of the specified vector into a vector of type . - The vector to reinterpret. - The reinterpreted vector. - - - Reinterprets the bits of the specified vector into a vector of type . - The vector to reinterpret. - The reinterpreted vector. - - - Reinterprets the bits of the specified vector into a vector of type . - The vector to reinterpret. - The reinterpreted vector. - - - Reinterprets the bits of the specified vector into a vector of type . - The vector to reinterpret. - The reinterpreted vector. - - - Reinterprets the bits of the specified vector into a vector of type . - The vector to reinterpret. - The reinterpreted vector. - - - Returns a value that indicates whether any single pair of elements in the specified vectors is equal. - The first vector to compare. - The second vector to compare. - true if any element pairs in left and right are equal. false if no element pairs are equal. - - - Multiplies two vectors together. - The first vector. - The second vector. - The product vector. - - - Multiplies a vector by a specified scalar value. - The source vector. - A scalar value. - The scaled vector. - - - Multiplies a vector by the given scalar. - The scalar value. - The source vector. - The scaled vector. - - - Returns a new vector whose elements are obtained by taking the one's complement of a specified vector's elements. - The source vector. - The one's complement vector. - - - Subtracts the second vector from the first. - The first vector. - The second vector. - The vector that results from subtracting right from left. - - - Negates a given vector. - The vector to negate. - The negated vector. - - - Returns the string representation of this vector using the specified format string to format individual elements and the specified format provider to define culture-specific formatting. - A or that defines the format of individual elements. - A format provider that supplies culture-specific formatting information. - The string representation of the current instance. - - - Returns the string representation of this vector using default formatting. - The string representation of this vector. - - - Returns the string representation of this vector using the specified format string to format individual elements. - A or that defines the format of individual elements. - The string representation of the current instance. - - - Returns a vector containing all zeroes. - A vector containing all zeroes. - - - Provides a collection of static convenience methods for creating, manipulating, combining, and converting generic vectors. - - - Returns a new vector whose elements are the absolute values of the given vector's elements. - The source vector. - The vector type. T can be any primitive numeric type. - The absolute value vector. - - - Returns a new vector whose values are the sum of each pair of elements from two given vectors. - The first vector. - The second vector. - The vector type. T can be any primitive numeric type. - The summed vector. - - - Returns a new vector by performing a bitwise And Not operation on each pair of corresponding elements in two vectors. - The first vector. - The second vector. - The vector type. T can be any primitive numeric type. - The resulting vector. - - - Reinterprets the bits of a specified vector into those of a vector of unsigned bytes. - The source vector. - The vector type. T can be any primitive numeric type. - The reinterpreted vector. - - - Reinterprets the bits of a specified vector into those of a double-precision floating-point vector. - The source vector. - The vector type. T can be any primitive numeric type. - The reinterpreted vector. - - - Reinterprets the bits of a specified vector into those of a vector of 16-bit integers. - The source vector. - The vector type. T can be any primitive numeric type. - The reinterpreted vector. - - - Reinterprets the bits of a specified vector into those of a vector of integers. - The source vector. - The vector type. T can be any primitive numeric type. - The reinterpreted vector. - - - Reinterprets the bits of a specified vector into those of a vector of long integers. - The source vector. - The vector type. T can be any primitive numeric type. - The reinterpreted vector. - - - Reinterprets the bits of a specified vector into those of a vector of signed bytes. - The source vector. - The vector type. T can be any primitive numeric type. - The reinterpreted vector. - - - Reinterprets the bits of a specified vector into those of a single-precision floating-point vector. - The source vector. - The vector type. T can be any primitive numeric type. - The reinterpreted vector. - - - Reinterprets the bits of a specified vector into those of a vector of unsigned 16-bit integers. - The source vector. - The vector type. T can be any primitive numeric type. - The reinterpreted vector. - - - Reinterprets the bits of a specified vector into those of a vector of unsigned integers. - The source vector. - The vector type. T can be any primitive numeric type. - The reinterpreted vector. - - - Reinterprets the bits of a specified vector into those of a vector of unsigned long integers. - The source vector. - The vector type. T can be any primitive numeric type. - The reinterpreted vector. - - - Returns a new vector by performing a bitwise And operation on each pair of elements in two vectors. - The first vector. - The second vector. - The vector type. T can be any primitive numeric type. - The resulting vector. - - - Returns a new vector by performing a bitwise Or operation on each pair of elements in two vectors. - The first vector. - The second vector. - The vector type. T can be any primitive numeric type. - The resulting vector. - - - Creates a new single-precision vector with elements selected between two specified single-precision source vectors based on an integral mask vector. - The integral mask vector used to drive selection. - The first source vector. - The second source vector. - The new vector with elements selected based on the mask. - - - Creates a new double-precision vector with elements selected between two specified double-precision source vectors based on an integral mask vector. - The integral mask vector used to drive selection. - The first source vector. - The second source vector. - The new vector with elements selected based on the mask. - - - Creates a new vector of a specified type with elements selected between two specified source vectors of the same type based on an integral mask vector. - The integral mask vector used to drive selection. - The first source vector. - The second source vector. - The vector type. T can be any primitive numeric type. - The new vector with elements selected based on the mask. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Returns a new vector whose values are the result of dividing the first vector's elements by the corresponding elements in the second vector. - The first vector. - The second vector. - The vector type. T can be any primitive numeric type. - The divided vector. - - - Returns the dot product of two vectors. - The first vector. - The second vector. - The vector type. T can be any primitive numeric type. - The dot product. - - - Returns a new integral vector whose elements signal whether the elements in two specified double-precision vectors are equal. - The first vector to compare. - The second vector to compare. - The resulting integral vector. - - - Returns a new integral vector whose elements signal whether the elements in two specified integral vectors are equal. - The first vector to compare. - The second vector to compare. - The resulting integral vector. - - - Returns a new vector whose elements signal whether the elements in two specified long integer vectors are equal. - The first vector to compare. - The second vector to compare. - The resulting long integer vector. - - - Returns a new integral vector whose elements signal whether the elements in two specified single-precision vectors are equal. - The first vector to compare. - The second vector to compare. - The resulting integral vector. - - - Returns a new vector of a specified type whose elements signal whether the elements in two specified vectors of the same type are equal. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - The resulting vector. - - - Returns a value that indicates whether each pair of elements in the given vectors is equal. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - true if all elements in left and right are equal; otherwise, false. - - - Returns a value that indicates whether any single pair of elements in the given vectors is equal. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - true if any element pair in left and right is equal; otherwise, false. - - - Returns a new integral vector whose elements signal whether the elements in one double-precision floating-point vector are greater than their corresponding elements in a second double-precision floating-point vector. - The first vector to compare. - The second vector to compare. - The resulting integral vector. - - - Returns a new integral vector whose elements signal whether the elements in one integral vector are greater than their corresponding elements in a second integral vector. - The first vector to compare. - The second vector to compare. - The resulting integral vector. - - - Returns a new long integer vector whose elements signal whether the elements in one long integer vector are greater than their corresponding elements in a second long integer vector. - The first vector to compare. - The second vector to compare. - The resulting long integer vector. - - - Returns a new integral vector whose elements signal whether the elements in one single-precision floating-point vector are greater than their corresponding elements in a second single-precision floating-point vector. - The first vector to compare. - The second vector to compare. - The resulting integral vector. - - - Returns a new vector whose elements signal whether the elements in one vector of a specified type are greater than their corresponding elements in the second vector of the same time. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - The resulting vector. - - - Returns a value that indicates whether all elements in the first vector are greater than the corresponding elements in the second vector. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - true if all elements in left are greater than the corresponding elements in right; otherwise, false. - - - Returns a value that indicates whether any element in the first vector is greater than the corresponding element in the second vector. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - true if any element in left is greater than the corresponding element in right; otherwise, false. - - - Returns a new integral vector whose elements signal whether the elements in one vector are greater than or equal to their corresponding elements in the single-precision floating-point second vector. - The first vector to compare. - The second vector to compare. - The resulting integral vector. - - - Returns a new long integer vector whose elements signal whether the elements in one long integer vector are greater than or equal to their corresponding elements in the second long integer vector. - The first vector to compare. - The second vector to compare. - The resulting long integer vector. - - - Returns a new integral vector whose elements signal whether the elements in one integral vector are greater than or equal to their corresponding elements in the second integral vector. - The first vector to compare. - The second vector to compare. - The resulting integral vector. - - - Returns a new integral vector whose elements signal whether the elements in one vector are greater than or equal to their corresponding elements in the second double-precision floating-point vector. - The first vector to compare. - The second vector to compare. - The resulting integral vector. - - - Returns a new vector whose elements signal whether the elements in one vector of a specified type are greater than or equal to their corresponding elements in the second vector of the same type. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - The resulting vector. - - - Returns a value that indicates whether all elements in the first vector are greater than or equal to all the corresponding elements in the second vector. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - true if all elements in left are greater than or equal to the corresponding elements in right; otherwise, false. - - - Returns a value that indicates whether any element in the first vector is greater than or equal to the corresponding element in the second vector. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - true if any element in left is greater than or equal to the corresponding element in right; otherwise, false. - - - Gets a value that indicates whether vector operations are subject to hardware acceleration through JIT intrinsic support. - true if vector operations are subject to hardware acceleration; otherwise, false. - - - Returns a new integral vector whose elements signal whether the elements in one double-precision floating-point vector are less than their corresponding elements in a second double-precision floating-point vector. - The first vector to compare. - The second vector to compare. - The resulting integral vector. - - - Returns a new integral vector whose elements signal whether the elements in one integral vector are less than their corresponding elements in a second integral vector. - The first vector to compare. - The second vector to compare. - The resulting integral vector - - - Returns a new long integer vector whose elements signal whether the elements in one long integer vector are less than their corresponding elements in a second long integer vector. - The first vector to compare. - The second vector to compare. - The resulting long integer vector. - - - Returns a new integral vector whose elements signal whether the elements in one single-precision vector are less than their corresponding elements in a second single-precision vector. - The first vector to compare. - The second vector to compare. - The resulting integral vector. - - - Returns a new vector of a specified type whose elements signal whether the elements in one vector are less than their corresponding elements in the second vector. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - The resulting vector. - - - Returns a value that indicates whether all of the elements in the first vector are less than their corresponding elements in the second vector. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - true if all of the elements in left are less than the corresponding elements in right; otherwise, false. - - - Returns a value that indicates whether any element in the first vector is less than the corresponding element in the second vector. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - true if any element in left is less than the corresponding element in right; otherwise, false. - - - Returns a new integral vector whose elements signal whether the elements in one double-precision floating-point vector are less than or equal to their corresponding elements in a second double-precision floating-point vector. - The first vector to compare. - The second vector to compare. - The resulting integral vector. - - - Returns a new integral vector whose elements signal whether the elements in one integral vector are less than or equal to their corresponding elements in a second integral vector. - The first vector to compare. - The second vector to compare. - The resulting integral vector. - - - Returns a new long integer vector whose elements signal whether the elements in one long integer vector are less or equal to their corresponding elements in a second long integer vector. - The first vector to compare. - The second vector to compare. - The resulting long integer vector. - - - Returns a new integral vector whose elements signal whether the elements in one single-precision floating-point vector are less than or equal to their corresponding elements in a second single-precision floating-point vector. - The first vector to compare. - The second vector to compare. - The resulting integral vector. - - - Returns a new vector whose elements signal whether the elements in one vector are less than or equal to their corresponding elements in the second vector. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - The resulting vector. - - - Returns a value that indicates whether all elements in the first vector are less than or equal to their corresponding elements in the second vector. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - true if all of the elements in left are less than or equal to the corresponding elements in right; otherwise, false. - - - Returns a value that indicates whether any element in the first vector is less than or equal to the corresponding element in the second vector. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - true if any element in left is less than or equal to the corresponding element in right; otherwise, false. - - - Returns a new vector whose elements are the maximum of each pair of elements in the two given vectors. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - The maximum vector. - - - Returns a new vector whose elements are the minimum of each pair of elements in the two given vectors. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - The minimum vector. - - - Returns a new vector whose values are a scalar value multiplied by each of the values of a specified vector. - The scalar value. - The vector. - The vector type. T can be any primitive numeric type. - The scaled vector. - - - Returns a new vector whose values are the product of each pair of elements in two specified vectors. - The first vector. - The second vector. - The vector type. T can be any primitive numeric type. - The product vector. - - - Returns a new vector whose values are the values of a specified vector each multiplied by a scalar value. - The vector. - The scalar value. - The vector type. T can be any primitive numeric type. - The scaled vector. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Returns a new vector whose elements are the negation of the corresponding element in the specified vector. - The source vector. - The vector type. T can be any primitive numeric type. - The negated vector. - - - Returns a new vector whose elements are obtained by taking the one's complement of a specified vector's elements. - The source vector. - The vector type. T can be any primitive numeric type. - The resulting vector. - - - Returns a new vector whose elements are the square roots of a specified vector's elements. - The source vector. - The vector type. T can be any primitive numeric type. - The square root vector. - - - Returns a new vector whose values are the difference between the elements in the second vector and their corresponding elements in the first vector. - The first vector. - The second vector. - The vector type. T can be any primitive numeric type. - The difference vector. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Returns a new vector by performing a bitwise exclusive Or (XOr) operation on each pair of elements in two vectors. - The first vector. - The second vector. - The vector type. T can be any primitive numeric type. - The resulting vector. - - - Represents a vector with two single-precision floating-point values. - - - Creates a new object whose two elements have the same value. - The value to assign to both elements. - - - Creates a vector whose elements have the specified values. - The value to assign to the field. - The value to assign to the field. - - - Returns a vector whose elements are the absolute values of each of the specified vector's elements. - A vector. - The absolute value vector. - - - Adds two vectors together. - The first vector to add. - The second vector to add. - The summed vector. - - - Restricts a vector between a minimum and a maximum value. - The vector to restrict. - The minimum value. - The maximum value. - The restricted vector. - - - Copies the elements of the vector to a specified array. - The destination array. - array is null. - The number of elements in the current instance is greater than in the array. - array is multidimensional. - - - Copies the elements of the vector to a specified array starting at a specified index position. - The destination array. - The index at which to copy the first element of the vector. - array is null. - The number of elements in the current instance is greater than in the array. - index is less than zero. -or- index is greater than or equal to the array length. - array is multidimensional. - - - Computes the Euclidean distance between the two given points. - The first point. - The second point. - The distance. - - - Returns the Euclidean distance squared between two specified points. - The first point. - The second point. - The distance squared. - - - Divides the first vector by the second. - The first vector. - The second vector. - The vector resulting from the division. - - - Divides the specified vector by a specified scalar value. - The vector. - The scalar value. - The vector that results from the division. - - - Returns the dot product of two vectors. - The first vector. - The second vector. - The dot product. - - - Returns a value that indicates whether this instance and a specified object are equal. - The object to compare with the current instance. - true if the current instance and obj are equal; otherwise, false```. If <code data-dev-comment-type="paramref">obj</code> isnull, the method returnsfalse`. - - - Returns a value that indicates whether this instance and another vector are equal. - The other vector. - true if the two vectors are equal; otherwise, false. - - - Returns the hash code for this instance. - The hash code. - - - Returns the length of the vector. - The vector's length. - - - Returns the length of the vector squared. - The vector's length squared. - - - Performs a linear interpolation between two vectors based on the given weighting. - The first vector. - The second vector. - A value between 0 and 1 that indicates the weight of value2. - The interpolated vector. - - - Returns a vector whose elements are the maximum of each of the pairs of elements in two specified vectors. - The first vector. - The second vector. - The maximized vector. - - - Returns a vector whose elements are the minimum of each of the pairs of elements in two specified vectors. - The first vector. - The second vector. - The minimized vector. - - - Multiplies two vectors together. - The first vector. - The second vector. - The product vector. - - - Multiplies a vector by a specified scalar. - The vector to multiply. - The scalar value. - The scaled vector. - - - Multiplies a scalar value by a specified vector. - The scaled value. - The vector. - The scaled vector. - - - Negates a specified vector. - The vector to negate. - The negated vector. - - - Returns a vector with the same direction as the specified vector, but with a length of one. - The vector to normalize. - The normalized vector. - - - Gets a vector whose 2 elements are equal to one. - A vector whose two elements are equal to one (that is, it returns the vector (1,1). - - - Adds two vectors together. - The first vector to add. - The second vector to add. - The summed vector. - - - Divides the first vector by the second. - The first vector. - The second vector. - The vector that results from dividing left by right. - - - Divides the specified vector by a specified scalar value. - The vector. - The scalar value. - The result of the division. - - - Returns a value that indicates whether each pair of elements in two specified vectors is equal. - The first vector to compare. - The second vector to compare. - true if left and right are equal; otherwise, false. - - - Returns a value that indicates whether two specified vectors are not equal. - The first vector to compare. - The second vector to compare. - true if left and right are not equal; otherwise, false. - - - Multiplies two vectors together. - The first vector. - The second vector. - The product vector. - - - Multiples the specified vector by the specified scalar value. - The vector. - The scalar value. - The scaled vector. - - - Multiples the scalar value by the specified vector. - The vector. - The scalar value. - The scaled vector. - - - Subtracts the second vector from the first. - The first vector. - The second vector. - The vector that results from subtracting right from left. - - - Negates the specified vector. - The vector to negate. - The negated vector. - - - Returns the reflection of a vector off a surface that has the specified normal. - The source vector. - The normal of the surface being reflected off. - The reflected vector. - - - Returns a vector whose elements are the square root of each of a specified vector's elements. - A vector. - The square root vector. - - - Subtracts the second vector from the first. - The first vector. - The second vector. - The difference vector. - - - Returns the string representation of the current instance using default formatting. - The string representation of the current instance. - - - Returns the string representation of the current instance using the specified format string to format individual elements. - A or that defines the format of individual elements. - The string representation of the current instance. - - - Returns the string representation of the current instance using the specified format string to format individual elements and the specified format provider to define culture-specific formatting. - A or that defines the format of individual elements. - A format provider that supplies culture-specific formatting information. - The string representation of the current instance. - - - Transforms a vector by a specified 3x2 matrix. - The vector to transform. - The transformation matrix. - The transformed vector. - - - Transforms a vector by a specified 4x4 matrix. - The vector to transform. - The transformation matrix. - The transformed vector. - - - Transforms a vector by the specified Quaternion rotation value. - The vector to rotate. - The rotation to apply. - The transformed vector. - - - Transforms a vector normal by the given 3x2 matrix. - The source vector. - The matrix. - The transformed vector. - - - Transforms a vector normal by the given 4x4 matrix. - The source vector. - The matrix. - The transformed vector. - - - Gets the vector (1,0). - The vector (1,0). - - - Gets the vector (0,1). - The vector (0,1). - - - The X component of the vector. - - - - The Y component of the vector. - - - - Returns a vector whose 2 elements are equal to zero. - A vector whose two elements are equal to zero (that is, it returns the vector (0,0). - - - Represents a vector with three single-precision floating-point values. - - - Creates a new object whose three elements have the same value. - The value to assign to all three elements. - - - Creates a new object from the specified object and the specified value. - The vector with two elements. - The additional value to assign to the field. - - - Creates a vector whose elements have the specified values. - The value to assign to the field. - The value to assign to the field. - The value to assign to the field. - - - Returns a vector whose elements are the absolute values of each of the specified vector's elements. - A vector. - The absolute value vector. - - - Adds two vectors together. - The first vector to add. - The second vector to add. - The summed vector. - - - Restricts a vector between a minimum and a maximum value. - The vector to restrict. - The minimum value. - The maximum value. - The restricted vector. - - - Copies the elements of the vector to a specified array. - The destination array. - array is null. - The number of elements in the current instance is greater than in the array. - array is multidimensional. - - - Copies the elements of the vector to a specified array starting at a specified index position. - The destination array. - The index at which to copy the first element of the vector. - array is null. - The number of elements in the current instance is greater than in the array. - index is less than zero. -or- index is greater than or equal to the array length. - array is multidimensional. - - - Computes the cross product of two vectors. - The first vector. - The second vector. - The cross product. - - - Computes the Euclidean distance between the two given points. - The first point. - The second point. - The distance. - - - Returns the Euclidean distance squared between two specified points. - The first point. - The second point. - The distance squared. - - - Divides the specified vector by a specified scalar value. - The vector. - The scalar value. - The vector that results from the division. - - - Divides the first vector by the second. - The first vector. - The second vector. - The vector resulting from the division. - - - Returns the dot product of two vectors. - The first vector. - The second vector. - The dot product. - - - Returns a value that indicates whether this instance and another vector are equal. - The other vector. - true if the two vectors are equal; otherwise, false. - - - Returns a value that indicates whether this instance and a specified object are equal. - The object to compare with the current instance. - true if the current instance and obj are equal; otherwise, false```. If <code data-dev-comment-type="paramref">obj</code> isnull, the method returnsfalse`. - - - Returns the hash code for this instance. - The hash code. - - - Returns the length of this vector object. - The vector's length. - - - Returns the length of the vector squared. - The vector's length squared. - - - Performs a linear interpolation between two vectors based on the given weighting. - The first vector. - The second vector. - A value between 0 and 1 that indicates the weight of value2. - The interpolated vector. - - - Returns a vector whose elements are the maximum of each of the pairs of elements in two specified vectors. - The first vector. - The second vector. - The maximized vector. - - - Returns a vector whose elements are the minimum of each of the pairs of elements in two specified vectors. - The first vector. - The second vector. - The minimized vector. - - - Multiplies a scalar value by a specified vector. - The scaled value. - The vector. - The scaled vector. - - - Multiplies two vectors together. - The first vector. - The second vector. - The product vector. - - - Multiplies a vector by a specified scalar. - The vector to multiply. - The scalar value. - The scaled vector. - - - Negates a specified vector. - The vector to negate. - The negated vector. - - - Returns a vector with the same direction as the specified vector, but with a length of one. - The vector to normalize. - The normalized vector. - - - Gets a vector whose 3 elements are equal to one. - A vector whose three elements are equal to one (that is, it returns the vector (1,1,1). - - - Adds two vectors together. - The first vector to add. - The second vector to add. - The summed vector. - - - Divides the first vector by the second. - The first vector. - The second vector. - The vector that results from dividing left by right. - - - Divides the specified vector by a specified scalar value. - The vector. - The scalar value. - The result of the division. - - - Returns a value that indicates whether each pair of elements in two specified vectors is equal. - The first vector to compare. - The second vector to compare. - true if left and right are equal; otherwise, false. - - - Returns a value that indicates whether two specified vectors are not equal. - The first vector to compare. - The second vector to compare. - true if left and right are not equal; otherwise, false. - - - Multiplies two vectors together. - The first vector. - The second vector. - The product vector. - - - Multiples the specified vector by the specified scalar value. - The vector. - The scalar value. - The scaled vector. - - - Multiples the scalar value by the specified vector. - The vector. - The scalar value. - The scaled vector. - - - Subtracts the second vector from the first. - The first vector. - The second vector. - The vector that results from subtracting right from left. - - - Negates the specified vector. - The vector to negate. - The negated vector. - - - Returns the reflection of a vector off a surface that has the specified normal. - The source vector. - The normal of the surface being reflected off. - The reflected vector. - - - Returns a vector whose elements are the square root of each of a specified vector's elements. - A vector. - The square root vector. - - - Subtracts the second vector from the first. - The first vector. - The second vector. - The difference vector. - - - Returns the string representation of the current instance using default formatting. - The string representation of the current instance. - - - Returns the string representation of the current instance using the specified format string to format individual elements. - A or that defines the format of individual elements. - The string representation of the current instance. - - - Returns the string representation of the current instance using the specified format string to format individual elements and the specified format provider to define culture-specific formatting. - A or that defines the format of individual elements. - A format provider that supplies culture-specific formatting information. - The string representation of the current instance. - - - Transforms a vector by a specified 4x4 matrix. - The vector to transform. - The transformation matrix. - The transformed vector. - - - Transforms a vector by the specified Quaternion rotation value. - The vector to rotate. - The rotation to apply. - The transformed vector. - - - Transforms a vector normal by the given 4x4 matrix. - The source vector. - The matrix. - The transformed vector. - - - Gets the vector (1,0,0). - The vector (1,0,0). - - - Gets the vector (0,1,0). - The vector (0,1,0).. - - - Gets the vector (0,0,1). - The vector (0,0,1). - - - The X component of the vector. - - - - The Y component of the vector. - - - - The Z component of the vector. - - - - Gets a vector whose 3 elements are equal to zero. - A vector whose three elements are equal to zero (that is, it returns the vector (0,0,0). - - - Represents a vector with four single-precision floating-point values. - - - Creates a new object whose four elements have the same value. - The value to assign to all four elements. - - - Constructs a new object from the specified object and a W component. - The vector to use for the X, Y, and Z components. - The W component. - - - Creates a new object from the specified object and a Z and a W component. - The vector to use for the X and Y components. - The Z component. - The W component. - - - Creates a vector whose elements have the specified values. - The value to assign to the field. - The value to assign to the field. - The value to assign to the field. - The value to assign to the field. - - - Returns a vector whose elements are the absolute values of each of the specified vector's elements. - A vector. - The absolute value vector. - - - Adds two vectors together. - The first vector to add. - The second vector to add. - The summed vector. - - - Restricts a vector between a minimum and a maximum value. - The vector to restrict. - The minimum value. - The maximum value. - The restricted vector. - - - Copies the elements of the vector to a specified array. - The destination array. - array is null. - The number of elements in the current instance is greater than in the array. - array is multidimensional. - - - Copies the elements of the vector to a specified array starting at a specified index position. - The destination array. - The index at which to copy the first element of the vector. - array is null. - The number of elements in the current instance is greater than in the array. - index is less than zero. -or- index is greater than or equal to the array length. - array is multidimensional. - - - Computes the Euclidean distance between the two given points. - The first point. - The second point. - The distance. - - - Returns the Euclidean distance squared between two specified points. - The first point. - The second point. - The distance squared. - - - Divides the first vector by the second. - The first vector. - The second vector. - The vector resulting from the division. - - - Divides the specified vector by a specified scalar value. - The vector. - The scalar value. - The vector that results from the division. - - - Returns the dot product of two vectors. - The first vector. - The second vector. - The dot product. - - - Returns a value that indicates whether this instance and another vector are equal. - The other vector. - true if the two vectors are equal; otherwise, false. - - - Returns a value that indicates whether this instance and a specified object are equal. - The object to compare with the current instance. - true if the current instance and obj are equal; otherwise, false```. If <code data-dev-comment-type="paramref">obj</code> isnull, the method returnsfalse`. - - - Returns the hash code for this instance. - The hash code. - - - Returns the length of this vector object. - The vector's length. - - - Returns the length of the vector squared. - The vector's length squared. - - - Performs a linear interpolation between two vectors based on the given weighting. - The first vector. - The second vector. - A value between 0 and 1 that indicates the weight of value2. - The interpolated vector. - - - Returns a vector whose elements are the maximum of each of the pairs of elements in two specified vectors. - The first vector. - The second vector. - The maximized vector. - - - Returns a vector whose elements are the minimum of each of the pairs of elements in two specified vectors. - The first vector. - The second vector. - The minimized vector. - - - Multiplies two vectors together. - The first vector. - The second vector. - The product vector. - - - Multiplies a vector by a specified scalar. - The vector to multiply. - The scalar value. - The scaled vector. - - - Multiplies a scalar value by a specified vector. - The scaled value. - The vector. - The scaled vector. - - - Negates a specified vector. - The vector to negate. - The negated vector. - - - Returns a vector with the same direction as the specified vector, but with a length of one. - The vector to normalize. - The normalized vector. - - - Gets a vector whose 4 elements are equal to one. - Returns . - - - Adds two vectors together. - The first vector to add. - The second vector to add. - The summed vector. - - - Divides the first vector by the second. - The first vector. - The second vector. - The vector that results from dividing left by right. - - - Divides the specified vector by a specified scalar value. - The vector. - The scalar value. - The result of the division. - - - Returns a value that indicates whether each pair of elements in two specified vectors is equal. - The first vector to compare. - The second vector to compare. - true if left and right are equal; otherwise, false. - - - Returns a value that indicates whether two specified vectors are not equal. - The first vector to compare. - The second vector to compare. - true if left and right are not equal; otherwise, false. - - - Multiplies two vectors together. - The first vector. - The second vector. - The product vector. - - - Multiples the specified vector by the specified scalar value. - The vector. - The scalar value. - The scaled vector. - - - Multiples the scalar value by the specified vector. - The vector. - The scalar value. - The scaled vector. - - - Subtracts the second vector from the first. - The first vector. - The second vector. - The vector that results from subtracting right from left. - - - Negates the specified vector. - The vector to negate. - The negated vector. - - - Returns a vector whose elements are the square root of each of a specified vector's elements. - A vector. - The square root vector. - - - Subtracts the second vector from the first. - The first vector. - The second vector. - The difference vector. - - - Returns the string representation of the current instance using default formatting. - The string representation of the current instance. - - - Returns the string representation of the current instance using the specified format string to format individual elements. - A or that defines the format of individual elements. - The string representation of the current instance. - - - Returns the string representation of the current instance using the specified format string to format individual elements and the specified format provider to define culture-specific formatting. - A or that defines the format of individual elements. - A format provider that supplies culture-specific formatting information. - The string representation of the current instance. - - - Transforms a four-dimensional vector by the specified Quaternion rotation value. - The vector to rotate. - The rotation to apply. - The transformed vector. - - - Transforms a four-dimensional vector by a specified 4x4 matrix. - The vector to transform. - The transformation matrix. - The transformed vector. - - - Transforms a three-dimensional vector by the specified Quaternion rotation value. - The vector to rotate. - The rotation to apply. - The transformed vector. - - - Transforms a two-dimensional vector by a specified 4x4 matrix. - The vector to transform. - The transformation matrix. - The transformed vector. - - - Transforms a two-dimensional vector by the specified Quaternion rotation value. - The vector to rotate. - The rotation to apply. - The transformed vector. - - - Transforms a three-dimensional vector by a specified 4x4 matrix. - The vector to transform. - The transformation matrix. - The transformed vector. - - - Gets the vector (0,0,0,1). - The vector (0,0,0,1). - - - Gets the vector (1,0,0,0). - The vector (1,0,0,0). - - - Gets the vector (0,1,0,0). - The vector (0,1,0,0).. - - - Gets a vector whose 4 elements are equal to zero. - The vector (0,0,1,0). - - - The W component of the vector. - - - - The X component of the vector. - - - - The Y component of the vector. - - - - The Z component of the vector. - - - - Gets a vector whose 4 elements are equal to zero. - A vector whose four elements are equal to zero (that is, it returns the vector (0,0,0,0). - - - \ No newline at end of file diff --git a/packages/System.Numerics.Vectors.4.4.0/lib/portable-net45+win8+wp8+wpa81/System.Numerics.Vectors.dll b/packages/System.Numerics.Vectors.4.4.0/lib/portable-net45+win8+wp8+wpa81/System.Numerics.Vectors.dll deleted file mode 100644 index 46308fdb..00000000 Binary files a/packages/System.Numerics.Vectors.4.4.0/lib/portable-net45+win8+wp8+wpa81/System.Numerics.Vectors.dll and /dev/null differ diff --git a/packages/System.Numerics.Vectors.4.4.0/lib/portable-net45+win8+wp8+wpa81/System.Numerics.Vectors.xml b/packages/System.Numerics.Vectors.4.4.0/lib/portable-net45+win8+wp8+wpa81/System.Numerics.Vectors.xml deleted file mode 100644 index 51297939..00000000 --- a/packages/System.Numerics.Vectors.4.4.0/lib/portable-net45+win8+wp8+wpa81/System.Numerics.Vectors.xml +++ /dev/null @@ -1,2597 +0,0 @@ - - - - System.Numerics.Vectors - - - - Represents a 3x2 matrix. - - - Creates a 3x2 matrix from the specified components. - The value to assign to the first element in the first row. - The value to assign to the second element in the first row. - The value to assign to the first element in the second row. - The value to assign to the second element in the second row. - The value to assign to the first element in the third row. - The value to assign to the second element in the third row. - - - Adds each element in one matrix with its corresponding element in a second matrix. - The first matrix. - The second matrix. - The matrix that contains the summed values of value1 and value2. - - - Creates a rotation matrix using the given rotation in radians. - The amount of rotation, in radians. - The rotation matrix. - - - Creates a rotation matrix using the specified rotation in radians and a center point. - The amount of rotation, in radians. - The center point. - The rotation matrix. - - - Creates a scaling matrix from the specified X and Y components. - The value to scale by on the X axis. - The value to scale by on the Y axis. - The scaling matrix. - - - Creates a scaling matrix that scales uniformly with the specified scale with an offset from the specified center. - The uniform scale to use. - The center offset. - The scaling matrix. - - - Creates a scaling matrix that is offset by a given center point. - The value to scale by on the X axis. - The value to scale by on the Y axis. - The center point. - The scaling matrix. - - - Creates a scaling matrix that scales uniformly with the given scale. - The uniform scale to use. - The scaling matrix. - - - Creates a scaling matrix from the specified vector scale. - The scale to use. - The scaling matrix. - - - Creates a scaling matrix from the specified vector scale with an offset from the specified center point. - The scale to use. - The center offset. - The scaling matrix. - - - Creates a skew matrix from the specified angles in radians. - The X angle, in radians. - The Y angle, in radians. - The skew matrix. - - - Creates a skew matrix from the specified angles in radians and a center point. - The X angle, in radians. - The Y angle, in radians. - The center point. - The skew matrix. - - - Creates a translation matrix from the specified 2-dimensional vector. - The translation position. - The translation matrix. - - - Creates a translation matrix from the specified X and Y components. - The X position. - The Y position. - The translation matrix. - - - Returns a value that indicates whether this instance and another 3x2 matrix are equal. - The other matrix. - true if the two matrices are equal; otherwise, false. - - - Returns a value that indicates whether this instance and a specified object are equal. - The object to compare with the current instance. - true if the current instance and obj are equal; otherwise, false```. If <code data-dev-comment-type="paramref">obj</code> isnull, the method returnsfalse`. - - - Calculates the determinant for this matrix. - The determinant. - - - Returns the hash code for this instance. - The hash code. - - - Gets the multiplicative identity matrix. - The multiplicative identify matrix. - - - Inverts the specified matrix. The return value indicates whether the operation succeeded. - The matrix to invert. - When this method returns, contains the inverted matrix if the operation succeeded. - true if matrix was converted successfully; otherwise, false. - - - Indicates whether the current matrix is the identity matrix. - true if the current matrix is the identity matrix; otherwise, false. - - - Performs a linear interpolation from one matrix to a second matrix based on a value that specifies the weighting of the second matrix. - The first matrix. - The second matrix. - The relative weighting of matrix2. - The interpolated matrix. - - - The first element of the first row. - - - - The second element of the first row. - - - - The first element of the second row. - - - - The second element of the second row. - - - - The first element of the third row. - - - - The second element of the third row. - - - - Returns the matrix that results from multiplying two matrices together. - The first matrix. - The second matrix. - The product matrix. - - - Returns the matrix that results from scaling all the elements of a specified matrix by a scalar factor. - The matrix to scale. - The scaling value to use. - The scaled matrix. - - - Negates the specified matrix by multiplying all its values by -1. - The matrix to negate. - The negated matrix. - - - Adds each element in one matrix with its corresponding element in a second matrix. - The first matrix. - The second matrix. - The matrix that contains the summed values. - - - Returns a value that indicates whether the specified matrices are equal. - The first matrix to compare. - The second matrix to compare. - true if value1 and value2 are equal; otherwise, false. - - - Returns a value that indicates whether the specified matrices are not equal. - The first matrix to compare. - The second matrix to compare. - true if value1 and value2 are not equal; otherwise, false. - - - Returns the matrix that results from multiplying two matrices together. - The first matrix. - The second matrix. - The product matrix. - - - Returns the matrix that results from scaling all the elements of a specified matrix by a scalar factor. - The matrix to scale. - The scaling value to use. - The scaled matrix. - - - Subtracts each element in a second matrix from its corresponding element in a first matrix. - The first matrix. - The second matrix. - The matrix containing the values that result from subtracting each element in value2 from its corresponding element in value1. - - - Negates the specified matrix by multiplying all its values by -1. - The matrix to negate. - The negated matrix. - - - Subtracts each element in a second matrix from its corresponding element in a first matrix. - The first matrix. - The second matrix. - The matrix containing the values that result from subtracting each element in value2 from its corresponding element in value1. - - - Returns a string that represents this matrix. - The string representation of this matrix. - - - Gets or sets the translation component of this matrix. - The translation component of the current instance. - - - Represents a 4x4 matrix. - - - Creates a object from a specified object. - A 3x2 matrix. - - - Creates a 4x4 matrix from the specified components. - The value to assign to the first element in the first row. - The value to assign to the second element in the first row. - The value to assign to the third element in the first row. - The value to assign to the fourth element in the first row. - The value to assign to the first element in the second row. - The value to assign to the second element in the second row. - The value to assign to the third element in the second row. - The value to assign to the third element in the second row. - The value to assign to the first element in the third row. - The value to assign to the second element in the third row. - The value to assign to the third element in the third row. - The value to assign to the fourth element in the third row. - The value to assign to the first element in the fourth row. - The value to assign to the second element in the fourth row. - The value to assign to the third element in the fourth row. - The value to assign to the fourth element in the fourth row. - - - Adds each element in one matrix with its corresponding element in a second matrix. - The first matrix. - The second matrix. - The matrix that contains the summed values of value1 and value2. - - - Creates a spherical billboard that rotates around a specified object position. - The position of the object that the billboard will rotate around. - The position of the camera. - The up vector of the camera. - The forward vector of the camera. - The created billboard. - - - Creates a cylindrical billboard that rotates around a specified axis. - The position of the object that the billboard will rotate around. - The position of the camera. - The axis to rotate the billboard around. - The forward vector of the camera. - The forward vector of the object. - The billboard matrix. - - - Creates a matrix that rotates around an arbitrary vector. - The axis to rotate around. - The angle to rotate around axis, in radians. - The rotation matrix. - - - Creates a rotation matrix from the specified Quaternion rotation value. - The source Quaternion. - The rotation matrix. - - - Creates a rotation matrix from the specified yaw, pitch, and roll. - The angle of rotation, in radians, around the Y axis. - The angle of rotation, in radians, around the X axis. - The angle of rotation, in radians, around the Z axis. - The rotation matrix. - - - Creates a view matrix. - The position of the camera. - The target towards which the camera is pointing. - The direction that is "up" from the camera's point of view. - The view matrix. - - - Creates an orthographic perspective matrix from the given view volume dimensions. - The width of the view volume. - The height of the view volume. - The minimum Z-value of the view volume. - The maximum Z-value of the view volume. - The orthographic projection matrix. - - - Creates a customized orthographic projection matrix. - The minimum X-value of the view volume. - The maximum X-value of the view volume. - The minimum Y-value of the view volume. - The maximum Y-value of the view volume. - The minimum Z-value of the view volume. - The maximum Z-value of the view volume. - The orthographic projection matrix. - - - Creates a perspective projection matrix from the given view volume dimensions. - The width of the view volume at the near view plane. - The height of the view volume at the near view plane. - The distance to the near view plane. - The distance to the far view plane. - The perspective projection matrix. - nearPlaneDistance is less than or equal to zero. -or- farPlaneDistance is less than or equal to zero. -or- nearPlaneDistance is greater than or equal to farPlaneDistance. - - - Creates a perspective projection matrix based on a field of view, aspect ratio, and near and far view plane distances. - The field of view in the y direction, in radians. - The aspect ratio, defined as view space width divided by height. - The distance to the near view plane. - The distance to the far view plane. - The perspective projection matrix. - fieldOfView is less than or equal to zero. -or- fieldOfView is greater than or equal to . nearPlaneDistance is less than or equal to zero. -or- farPlaneDistance is less than or equal to zero. -or- nearPlaneDistance is greater than or equal to farPlaneDistance. - - - Creates a customized perspective projection matrix. - The minimum x-value of the view volume at the near view plane. - The maximum x-value of the view volume at the near view plane. - The minimum y-value of the view volume at the near view plane. - The maximum y-value of the view volume at the near view plane. - The distance to the near view plane. - The distance to the far view plane. - The perspective projection matrix. - nearPlaneDistance is less than or equal to zero. -or- farPlaneDistance is less than or equal to zero. -or- nearPlaneDistance is greater than or equal to farPlaneDistance. - - - Creates a matrix that reflects the coordinate system about a specified plane. - The plane about which to create a reflection. - A new matrix expressing the reflection. - - - Creates a matrix for rotating points around the X axis. - The amount, in radians, by which to rotate around the X axis. - The rotation matrix. - - - Creates a matrix for rotating points around the X axis from a center point. - The amount, in radians, by which to rotate around the X axis. - The center point. - The rotation matrix. - - - The amount, in radians, by which to rotate around the Y axis from a center point. - The amount, in radians, by which to rotate around the Y-axis. - The center point. - The rotation matrix. - - - Creates a matrix for rotating points around the Y axis. - The amount, in radians, by which to rotate around the Y-axis. - The rotation matrix. - - - Creates a matrix for rotating points around the Z axis. - The amount, in radians, by which to rotate around the Z-axis. - The rotation matrix. - - - Creates a matrix for rotating points around the Z axis from a center point. - The amount, in radians, by which to rotate around the Z-axis. - The center point. - The rotation matrix. - - - Creates a scaling matrix from the specified vector scale. - The scale to use. - The scaling matrix. - - - Creates a uniform scaling matrix that scale equally on each axis. - The uniform scaling factor. - The scaling matrix. - - - Creates a scaling matrix with a center point. - The vector that contains the amount to scale on each axis. - The center point. - The scaling matrix. - - - Creates a uniform scaling matrix that scales equally on each axis with a center point. - The uniform scaling factor. - The center point. - The scaling matrix. - - - Creates a scaling matrix from the specified X, Y, and Z components. - The value to scale by on the X axis. - The value to scale by on the Y axis. - The value to scale by on the Z axis. - The scaling matrix. - - - Creates a scaling matrix that is offset by a given center point. - The value to scale by on the X axis. - The value to scale by on the Y axis. - The value to scale by on the Z axis. - The center point. - The scaling matrix. - - - Creates a matrix that flattens geometry into a specified plane as if casting a shadow from a specified light source. - The direction from which the light that will cast the shadow is coming. - The plane onto which the new matrix should flatten geometry so as to cast a shadow. - A new matrix that can be used to flatten geometry onto the specified plane from the specified direction. - - - Creates a translation matrix from the specified 3-dimensional vector. - The amount to translate in each axis. - The translation matrix. - - - Creates a translation matrix from the specified X, Y, and Z components. - The amount to translate on the X axis. - The amount to translate on the Y axis. - The amount to translate on the Z axis. - The translation matrix. - - - Creates a world matrix with the specified parameters. - The position of the object. - The forward direction of the object. - The upward direction of the object. Its value is usually [0, 1, 0]. - The world matrix. - - - Attempts to extract the scale, translation, and rotation components from the given scale, rotation, or translation matrix. The return value indicates whether the operation succeeded. - The source matrix. - When this method returns, contains the scaling component of the transformation matrix if the operation succeeded. - When this method returns, contains the rotation component of the transformation matrix if the operation succeeded. - When the method returns, contains the translation component of the transformation matrix if the operation succeeded. - true if matrix was decomposed successfully; otherwise, false. - - - Returns a value that indicates whether this instance and another 4x4 matrix are equal. - The other matrix. - true if the two matrices are equal; otherwise, false. - - - Returns a value that indicates whether this instance and a specified object are equal. - The object to compare with the current instance. - true if the current instance and obj are equal; otherwise, false```. If <code data-dev-comment-type="paramref">obj</code> isnull, the method returnsfalse`. - - - Calculates the determinant of the current 4x4 matrix. - The determinant. - - - Returns the hash code for this instance. - The hash code. - - - Gets the multiplicative identity matrix. - Gets the multiplicative identity matrix. - - - Inverts the specified matrix. The return value indicates whether the operation succeeded. - The matrix to invert. - When this method returns, contains the inverted matrix if the operation succeeded. - true if matrix was converted successfully; otherwise, false. - - - Indicates whether the current matrix is the identity matrix. - true if the current matrix is the identity matrix; otherwise, false. - - - Performs a linear interpolation from one matrix to a second matrix based on a value that specifies the weighting of the second matrix. - The first matrix. - The second matrix. - The relative weighting of matrix2. - The interpolated matrix. - - - The first element of the first row. - - - - The second element of the first row. - - - - The third element of the first row. - - - - The fourth element of the first row. - - - - The first element of the second row. - - - - The second element of the second row. - - - - The third element of the second row. - - - - The fourth element of the second row. - - - - The first element of the third row. - - - - The second element of the third row. - - - - The third element of the third row. - - - - The fourth element of the third row. - - - - The first element of the fourth row. - - - - The second element of the fourth row. - - - - The third element of the fourth row. - - - - The fourth element of the fourth row. - - - - Returns the matrix that results from multiplying two matrices together. - The first matrix. - The second matrix. - The product matrix. - - - Returns the matrix that results from scaling all the elements of a specified matrix by a scalar factor. - The matrix to scale. - The scaling value to use. - The scaled matrix. - - - Negates the specified matrix by multiplying all its values by -1. - The matrix to negate. - The negated matrix. - - - Adds each element in one matrix with its corresponding element in a second matrix. - The first matrix. - The second matrix. - The matrix that contains the summed values. - - - Returns a value that indicates whether the specified matrices are equal. - The first matrix to compare. - The second matrix to care - true if value1 and value2 are equal; otherwise, false. - - - Returns a value that indicates whether the specified matrices are not equal. - The first matrix to compare. - The second matrix to compare. - true if value1 and value2 are not equal; otherwise, false. - - - Returns the matrix that results from scaling all the elements of a specified matrix by a scalar factor. - The matrix to scale. - The scaling value to use. - The scaled matrix. - - - Returns the matrix that results from multiplying two matrices together. - The first matrix. - The second matrix. - The product matrix. - - - Subtracts each element in a second matrix from its corresponding element in a first matrix. - The first matrix. - The second matrix. - The matrix containing the values that result from subtracting each element in value2 from its corresponding element in value1. - - - Negates the specified matrix by multiplying all its values by -1. - The matrix to negate. - The negated matrix. - - - Subtracts each element in a second matrix from its corresponding element in a first matrix. - The first matrix. - The second matrix. - The matrix containing the values that result from subtracting each element in value2 from its corresponding element in value1. - - - Returns a string that represents this matrix. - The string representation of this matrix. - - - Transforms the specified matrix by applying the specified Quaternion rotation. - The matrix to transform. - The rotation t apply. - The transformed matrix. - - - Gets or sets the translation component of this matrix. - The translation component of the current instance. - - - Transposes the rows and columns of a matrix. - The matrix to transpose. - The transposed matrix. - - - Represents a three-dimensional plane. - - - Creates a object from a specified four-dimensional vector. - A vector whose first three elements describe the normal vector, and whose defines the distance along that normal from the origin. - - - Creates a object from a specified normal and the distance along the normal from the origin. - The plane's normal vector. - The plane's distance from the origin along its normal vector. - - - Creates a object from the X, Y, and Z components of its normal, and its distance from the origin on that normal. - The X component of the normal. - The Y component of the normal. - The Z component of the normal. - The distance of the plane along its normal from the origin. - - - Creates a object that contains three specified points. - The first point defining the plane. - The second point defining the plane. - The third point defining the plane. - The plane containing the three points. - - - The distance of the plane along its normal from the origin. - - - - Calculates the dot product of a plane and a 4-dimensional vector. - The plane. - The four-dimensional vector. - The dot product. - - - Returns the dot product of a specified three-dimensional vector and the normal vector of this plane plus the distance () value of the plane. - The plane. - The 3-dimensional vector. - The dot product. - - - Returns the dot product of a specified three-dimensional vector and the vector of this plane. - The plane. - The three-dimensional vector. - The dot product. - - - Returns a value that indicates whether this instance and a specified object are equal. - The object to compare with the current instance. - true if the current instance and obj are equal; otherwise, false```. If <code data-dev-comment-type="paramref">obj</code> isnull, the method returnsfalse`. - - - Returns a value that indicates whether this instance and another plane object are equal. - The other plane. - true if the two planes are equal; otherwise, false. - - - Returns the hash code for this instance. - The hash code. - - - The normal vector of the plane. - - - - Creates a new object whose normal vector is the source plane's normal vector normalized. - The source plane. - The normalized plane. - - - Returns a value that indicates whether two planes are equal. - The first plane to compare. - The second plane to compare. - true if value1 and value2 are equal; otherwise, false. - - - Returns a value that indicates whether two planes are not equal. - The first plane to compare. - The second plane to compare. - true if value1 and value2 are not equal; otherwise, false. - - - Returns the string representation of this plane object. - A string that represents this object. - - - Transforms a normalized plane by a 4x4 matrix. - The normalized plane to transform. - The transformation matrix to apply to plane. - The transformed plane. - - - Transforms a normalized plane by a Quaternion rotation. - The normalized plane to transform. - The Quaternion rotation to apply to the plane. - A new plane that results from applying the Quaternion rotation. - - - Represents a vector that is used to encode three-dimensional physical rotations. - - - Creates a quaternion from the specified vector and rotation parts. - The vector part of the quaternion. - The rotation part of the quaternion. - - - Constructs a quaternion from the specified components. - The value to assign to the X component of the quaternion. - The value to assign to the Y component of the quaternion. - The value to assign to the Z component of the quaternion. - The value to assign to the W component of the quaternion. - - - Adds each element in one quaternion with its corresponding element in a second quaternion. - The first quaternion. - The second quaternion. - The quaternion that contains the summed values of value1 and value2. - - - Concatenates two quaternions. - The first quaternion rotation in the series. - The second quaternion rotation in the series. - A new quaternion representing the concatenation of the value1 rotation followed by the value2 rotation. - - - Returns the conjugate of a specified quaternion. - The quaternion. - A new quaternion that is the conjugate of value. - - - Creates a quaternion from a vector and an angle to rotate about the vector. - The vector to rotate around. - The angle, in radians, to rotate around the vector. - The newly created quaternion. - - - Creates a quaternion from the specified rotation matrix. - The rotation matrix. - The newly created quaternion. - - - Creates a new quaternion from the given yaw, pitch, and roll. - The yaw angle, in radians, around the Y axis. - The pitch angle, in radians, around the X axis. - The roll angle, in radians, around the Z axis. - The resulting quaternion. - - - Divides one quaternion by a second quaternion. - The dividend. - The divisor. - The quaternion that results from dividing value1 by value2. - - - Calculates the dot product of two quaternions. - The first quaternion. - The second quaternion. - The dot product. - - - Returns a value that indicates whether this instance and another quaternion are equal. - The other quaternion. - true if the two quaternions are equal; otherwise, false. - - - Returns a value that indicates whether this instance and a specified object are equal. - The object to compare with the current instance. - true if the current instance and obj are equal; otherwise, false```. If <code data-dev-comment-type="paramref">obj</code> isnull, the method returnsfalse`. - - - Returns the hash code for this instance. - The hash code. - - - Gets a quaternion that represents no rotation. - A quaternion whose values are (0, 0, 0, 1). - - - Returns the inverse of a quaternion. - The quaternion. - The inverted quaternion. - - - Gets a value that indicates whether the current instance is the identity quaternion. - true if the current instance is the identity quaternion; otherwise, false. - - - Calculates the length of the quaternion. - The computed length of the quaternion. - - - Calculates the squared length of the quaternion. - The length squared of the quaternion. - - - Performs a linear interpolation between two quaternions based on a value that specifies the weighting of the second quaternion. - The first quaternion. - The second quaternion. - The relative weight of quaternion2 in the interpolation. - The interpolated quaternion. - - - Returns the quaternion that results from multiplying two quaternions together. - The first quaternion. - The second quaternion. - The product quaternion. - - - Returns the quaternion that results from scaling all the components of a specified quaternion by a scalar factor. - The source quaternion. - The scalar value. - The scaled quaternion. - - - Reverses the sign of each component of the quaternion. - The quaternion to negate. - The negated quaternion. - - - Divides each component of a specified by its length. - The quaternion to normalize. - The normalized quaternion. - - - Adds each element in one quaternion with its corresponding element in a second quaternion. - The first quaternion. - The second quaternion. - The quaternion that contains the summed values of value1 and value2. - - - Divides one quaternion by a second quaternion. - The dividend. - The divisor. - The quaternion that results from dividing value1 by value2. - - - Returns a value that indicates whether two quaternions are equal. - The first quaternion to compare. - The second quaternion to compare. - true if the two quaternions are equal; otherwise, false. - - - Returns a value that indicates whether two quaternions are not equal. - The first quaternion to compare. - The second quaternion to compare. - true if value1 and value2 are not equal; otherwise, false. - - - Returns the quaternion that results from scaling all the components of a specified quaternion by a scalar factor. - The source quaternion. - The scalar value. - The scaled quaternion. - - - Returns the quaternion that results from multiplying two quaternions together. - The first quaternion. - The second quaternion. - The product quaternion. - - - Subtracts each element in a second quaternion from its corresponding element in a first quaternion. - The first quaternion. - The second quaternion. - The quaternion containing the values that result from subtracting each element in value2 from its corresponding element in value1. - - - Reverses the sign of each component of the quaternion. - The quaternion to negate. - The negated quaternion. - - - Interpolates between two quaternions, using spherical linear interpolation. - The first quaternion. - The second quaternion. - The relative weight of the second quaternion in the interpolation. - The interpolated quaternion. - - - Subtracts each element in a second quaternion from its corresponding element in a first quaternion. - The first quaternion. - The second quaternion. - The quaternion containing the values that result from subtracting each element in value2 from its corresponding element in value1. - - - Returns a string that represents this quaternion. - The string representation of this quaternion. - - - The rotation component of the quaternion. - - - - The X value of the vector component of the quaternion. - - - - The Y value of the vector component of the quaternion. - - - - The Z value of the vector component of the quaternion. - - - - Represents a single vector of a specified numeric type that is suitable for low-level optimization of parallel algorithms. - The vector type. T can be any primitive numeric type. - - - Creates a vector whose components are of a specified type. - The numeric type that defines the type of the components in the vector. - - - Creates a vector from a specified array. - A numeric array. - values is null. - - - Creates a vector from a specified array starting at a specified index position. - A numeric array. - The starting index position from which to create the vector. - values is null. - index is less than zero. -or- The length of values minus index is less than . - - - Copies the vector instance to a specified destination array. - The array to receive a copy of the vector values. - destination is null. - The number of elements in the current vector is greater than the number of elements available in the destination array. - - - Copies the vector instance to a specified destination array starting at a specified index position. - The array to receive a copy of the vector values. - The starting index in destination at which to begin the copy operation. - destination is null. - The number of elements in the current instance is greater than the number of elements available from startIndex to the end of the destination array. - index is less than zero or greater than the last index in destination. - - - Returns the number of elements stored in the vector. - The number of elements stored in the vector. - Access to the property getter via reflection is not supported. - - - Returns a value that indicates whether this instance is equal to a specified vector. - The vector to compare with this instance. - true if the current instance and other are equal; otherwise, false. - - - Returns a value that indicates whether this instance is equal to a specified object. - The object to compare with this instance. - true if the current instance and obj are equal; otherwise, false. The method returns false if obj is null, or if obj is a vector of a different type than the current instance. - - - Returns the hash code for this instance. - The hash code. - - - Gets the element at a specified index. - The index of the element to return. - The element at index index. - index is less than zero. -or- index is greater than or equal to . - - - Returns a vector containing all ones. - A vector containing all ones. - - - Adds two vectors together. - The first vector to add. - The second vector to add. - The summed vector. - - - Returns a new vector by performing a bitwise And operation on each of the elements in two vectors. - The first vector. - The second vector. - The vector that results from the bitwise And of left and right. - - - Returns a new vector by performing a bitwise Or operation on each of the elements in two vectors. - The first vector. - The second vector. - The vector that results from the bitwise Or of the elements in left and right. - - - Divides the first vector by the second. - The first vector. - The second vector. - The vector that results from dividing left by right. - - - Returns a value that indicates whether each pair of elements in two specified vectors are equal. - The first vector to compare. - The second vector to compare. - true if left and right are equal; otherwise, false. - - - Returns a new vector by performing a bitwise XOr operation on each of the elements in two vectors. - The first vector. - The second vector. - The vector that results from the bitwise XOr of the elements in left and right. - - - Reinterprets the bits of the specified vector into a vector of type . - The vector to reinterpret. - The reinterpreted vector. - - - Reinterprets the bits of the specified vector into a vector of type . - The vector to reinterpret. - The reinterpreted vector. - - - Reinterprets the bits of the specified vector into a vector of type . - The vector to reinterpret. - The reinterpreted vector. - - - Reinterprets the bits of the specified vector into a vector of type . - The vector to reinterpret. - The reinterpreted vector. - - - Reinterprets the bits of the specified vector into a vector of type . - The vector to reinterpret. - The reinterpreted vector. - - - Reinterprets the bits of the specified vector into a vector of type . - The vector to reinterpret. - The reinterpreted vector. - - - Reinterprets the bits of the specified vector into a vector of type . - The vector to reinterpret. - The reinterpreted vector. - - - Reinterprets the bits of the specified vector into a vector of type . - The vector to reinterpret. - The reinterpreted vector. - - - Reinterprets the bits of the specified vector into a vector of type . - The vector to reinterpret. - The reinterpreted vector. - - - Reinterprets the bits of the specified vector into a vector of type . - The vector to reinterpret. - The reinterpreted vector. - - - Returns a value that indicates whether any single pair of elements in the specified vectors is equal. - The first vector to compare. - The second vector to compare. - true if any element pairs in left and right are equal. false if no element pairs are equal. - - - Multiplies two vectors together. - The first vector. - The second vector. - The product vector. - - - Multiplies a vector by a specified scalar value. - The source vector. - A scalar value. - The scaled vector. - - - Multiplies a vector by the given scalar. - The scalar value. - The source vector. - The scaled vector. - - - Returns a new vector whose elements are obtained by taking the one's complement of a specified vector's elements. - The source vector. - The one's complement vector. - - - Subtracts the second vector from the first. - The first vector. - The second vector. - The vector that results from subtracting right from left. - - - Negates a given vector. - The vector to negate. - The negated vector. - - - Returns the string representation of this vector using the specified format string to format individual elements and the specified format provider to define culture-specific formatting. - A or that defines the format of individual elements. - A format provider that supplies culture-specific formatting information. - The string representation of the current instance. - - - Returns the string representation of this vector using default formatting. - The string representation of this vector. - - - Returns the string representation of this vector using the specified format string to format individual elements. - A or that defines the format of individual elements. - The string representation of the current instance. - - - Returns a vector containing all zeroes. - A vector containing all zeroes. - - - Provides a collection of static convenience methods for creating, manipulating, combining, and converting generic vectors. - - - Returns a new vector whose elements are the absolute values of the given vector's elements. - The source vector. - The vector type. T can be any primitive numeric type. - The absolute value vector. - - - Returns a new vector whose values are the sum of each pair of elements from two given vectors. - The first vector. - The second vector. - The vector type. T can be any primitive numeric type. - The summed vector. - - - Returns a new vector by performing a bitwise And Not operation on each pair of corresponding elements in two vectors. - The first vector. - The second vector. - The vector type. T can be any primitive numeric type. - The resulting vector. - - - Reinterprets the bits of a specified vector into those of a vector of unsigned bytes. - The source vector. - The vector type. T can be any primitive numeric type. - The reinterpreted vector. - - - Reinterprets the bits of a specified vector into those of a double-precision floating-point vector. - The source vector. - The vector type. T can be any primitive numeric type. - The reinterpreted vector. - - - Reinterprets the bits of a specified vector into those of a vector of 16-bit integers. - The source vector. - The vector type. T can be any primitive numeric type. - The reinterpreted vector. - - - Reinterprets the bits of a specified vector into those of a vector of integers. - The source vector. - The vector type. T can be any primitive numeric type. - The reinterpreted vector. - - - Reinterprets the bits of a specified vector into those of a vector of long integers. - The source vector. - The vector type. T can be any primitive numeric type. - The reinterpreted vector. - - - Reinterprets the bits of a specified vector into those of a vector of signed bytes. - The source vector. - The vector type. T can be any primitive numeric type. - The reinterpreted vector. - - - Reinterprets the bits of a specified vector into those of a single-precision floating-point vector. - The source vector. - The vector type. T can be any primitive numeric type. - The reinterpreted vector. - - - Reinterprets the bits of a specified vector into those of a vector of unsigned 16-bit integers. - The source vector. - The vector type. T can be any primitive numeric type. - The reinterpreted vector. - - - Reinterprets the bits of a specified vector into those of a vector of unsigned integers. - The source vector. - The vector type. T can be any primitive numeric type. - The reinterpreted vector. - - - Reinterprets the bits of a specified vector into those of a vector of unsigned long integers. - The source vector. - The vector type. T can be any primitive numeric type. - The reinterpreted vector. - - - Returns a new vector by performing a bitwise And operation on each pair of elements in two vectors. - The first vector. - The second vector. - The vector type. T can be any primitive numeric type. - The resulting vector. - - - Returns a new vector by performing a bitwise Or operation on each pair of elements in two vectors. - The first vector. - The second vector. - The vector type. T can be any primitive numeric type. - The resulting vector. - - - Creates a new single-precision vector with elements selected between two specified single-precision source vectors based on an integral mask vector. - The integral mask vector used to drive selection. - The first source vector. - The second source vector. - The new vector with elements selected based on the mask. - - - Creates a new double-precision vector with elements selected between two specified double-precision source vectors based on an integral mask vector. - The integral mask vector used to drive selection. - The first source vector. - The second source vector. - The new vector with elements selected based on the mask. - - - Creates a new vector of a specified type with elements selected between two specified source vectors of the same type based on an integral mask vector. - The integral mask vector used to drive selection. - The first source vector. - The second source vector. - The vector type. T can be any primitive numeric type. - The new vector with elements selected based on the mask. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Returns a new vector whose values are the result of dividing the first vector's elements by the corresponding elements in the second vector. - The first vector. - The second vector. - The vector type. T can be any primitive numeric type. - The divided vector. - - - Returns the dot product of two vectors. - The first vector. - The second vector. - The vector type. T can be any primitive numeric type. - The dot product. - - - Returns a new integral vector whose elements signal whether the elements in two specified double-precision vectors are equal. - The first vector to compare. - The second vector to compare. - The resulting integral vector. - - - Returns a new integral vector whose elements signal whether the elements in two specified integral vectors are equal. - The first vector to compare. - The second vector to compare. - The resulting integral vector. - - - Returns a new vector whose elements signal whether the elements in two specified long integer vectors are equal. - The first vector to compare. - The second vector to compare. - The resulting long integer vector. - - - Returns a new integral vector whose elements signal whether the elements in two specified single-precision vectors are equal. - The first vector to compare. - The second vector to compare. - The resulting integral vector. - - - Returns a new vector of a specified type whose elements signal whether the elements in two specified vectors of the same type are equal. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - The resulting vector. - - - Returns a value that indicates whether each pair of elements in the given vectors is equal. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - true if all elements in left and right are equal; otherwise, false. - - - Returns a value that indicates whether any single pair of elements in the given vectors is equal. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - true if any element pair in left and right is equal; otherwise, false. - - - Returns a new integral vector whose elements signal whether the elements in one double-precision floating-point vector are greater than their corresponding elements in a second double-precision floating-point vector. - The first vector to compare. - The second vector to compare. - The resulting integral vector. - - - Returns a new integral vector whose elements signal whether the elements in one integral vector are greater than their corresponding elements in a second integral vector. - The first vector to compare. - The second vector to compare. - The resulting integral vector. - - - Returns a new long integer vector whose elements signal whether the elements in one long integer vector are greater than their corresponding elements in a second long integer vector. - The first vector to compare. - The second vector to compare. - The resulting long integer vector. - - - Returns a new integral vector whose elements signal whether the elements in one single-precision floating-point vector are greater than their corresponding elements in a second single-precision floating-point vector. - The first vector to compare. - The second vector to compare. - The resulting integral vector. - - - Returns a new vector whose elements signal whether the elements in one vector of a specified type are greater than their corresponding elements in the second vector of the same time. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - The resulting vector. - - - Returns a value that indicates whether all elements in the first vector are greater than the corresponding elements in the second vector. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - true if all elements in left are greater than the corresponding elements in right; otherwise, false. - - - Returns a value that indicates whether any element in the first vector is greater than the corresponding element in the second vector. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - true if any element in left is greater than the corresponding element in right; otherwise, false. - - - Returns a new integral vector whose elements signal whether the elements in one vector are greater than or equal to their corresponding elements in the single-precision floating-point second vector. - The first vector to compare. - The second vector to compare. - The resulting integral vector. - - - Returns a new long integer vector whose elements signal whether the elements in one long integer vector are greater than or equal to their corresponding elements in the second long integer vector. - The first vector to compare. - The second vector to compare. - The resulting long integer vector. - - - Returns a new integral vector whose elements signal whether the elements in one integral vector are greater than or equal to their corresponding elements in the second integral vector. - The first vector to compare. - The second vector to compare. - The resulting integral vector. - - - Returns a new integral vector whose elements signal whether the elements in one vector are greater than or equal to their corresponding elements in the second double-precision floating-point vector. - The first vector to compare. - The second vector to compare. - The resulting integral vector. - - - Returns a new vector whose elements signal whether the elements in one vector of a specified type are greater than or equal to their corresponding elements in the second vector of the same type. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - The resulting vector. - - - Returns a value that indicates whether all elements in the first vector are greater than or equal to all the corresponding elements in the second vector. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - true if all elements in left are greater than or equal to the corresponding elements in right; otherwise, false. - - - Returns a value that indicates whether any element in the first vector is greater than or equal to the corresponding element in the second vector. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - true if any element in left is greater than or equal to the corresponding element in right; otherwise, false. - - - Gets a value that indicates whether vector operations are subject to hardware acceleration through JIT intrinsic support. - true if vector operations are subject to hardware acceleration; otherwise, false. - - - Returns a new integral vector whose elements signal whether the elements in one double-precision floating-point vector are less than their corresponding elements in a second double-precision floating-point vector. - The first vector to compare. - The second vector to compare. - The resulting integral vector. - - - Returns a new integral vector whose elements signal whether the elements in one integral vector are less than their corresponding elements in a second integral vector. - The first vector to compare. - The second vector to compare. - The resulting integral vector - - - Returns a new long integer vector whose elements signal whether the elements in one long integer vector are less than their corresponding elements in a second long integer vector. - The first vector to compare. - The second vector to compare. - The resulting long integer vector. - - - Returns a new integral vector whose elements signal whether the elements in one single-precision vector are less than their corresponding elements in a second single-precision vector. - The first vector to compare. - The second vector to compare. - The resulting integral vector. - - - Returns a new vector of a specified type whose elements signal whether the elements in one vector are less than their corresponding elements in the second vector. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - The resulting vector. - - - Returns a value that indicates whether all of the elements in the first vector are less than their corresponding elements in the second vector. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - true if all of the elements in left are less than the corresponding elements in right; otherwise, false. - - - Returns a value that indicates whether any element in the first vector is less than the corresponding element in the second vector. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - true if any element in left is less than the corresponding element in right; otherwise, false. - - - Returns a new integral vector whose elements signal whether the elements in one double-precision floating-point vector are less than or equal to their corresponding elements in a second double-precision floating-point vector. - The first vector to compare. - The second vector to compare. - The resulting integral vector. - - - Returns a new integral vector whose elements signal whether the elements in one integral vector are less than or equal to their corresponding elements in a second integral vector. - The first vector to compare. - The second vector to compare. - The resulting integral vector. - - - Returns a new long integer vector whose elements signal whether the elements in one long integer vector are less or equal to their corresponding elements in a second long integer vector. - The first vector to compare. - The second vector to compare. - The resulting long integer vector. - - - Returns a new integral vector whose elements signal whether the elements in one single-precision floating-point vector are less than or equal to their corresponding elements in a second single-precision floating-point vector. - The first vector to compare. - The second vector to compare. - The resulting integral vector. - - - Returns a new vector whose elements signal whether the elements in one vector are less than or equal to their corresponding elements in the second vector. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - The resulting vector. - - - Returns a value that indicates whether all elements in the first vector are less than or equal to their corresponding elements in the second vector. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - true if all of the elements in left are less than or equal to the corresponding elements in right; otherwise, false. - - - Returns a value that indicates whether any element in the first vector is less than or equal to the corresponding element in the second vector. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - true if any element in left is less than or equal to the corresponding element in right; otherwise, false. - - - Returns a new vector whose elements are the maximum of each pair of elements in the two given vectors. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - The maximum vector. - - - Returns a new vector whose elements are the minimum of each pair of elements in the two given vectors. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - The minimum vector. - - - Returns a new vector whose values are a scalar value multiplied by each of the values of a specified vector. - The scalar value. - The vector. - The vector type. T can be any primitive numeric type. - The scaled vector. - - - Returns a new vector whose values are the product of each pair of elements in two specified vectors. - The first vector. - The second vector. - The vector type. T can be any primitive numeric type. - The product vector. - - - Returns a new vector whose values are the values of a specified vector each multiplied by a scalar value. - The vector. - The scalar value. - The vector type. T can be any primitive numeric type. - The scaled vector. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Returns a new vector whose elements are the negation of the corresponding element in the specified vector. - The source vector. - The vector type. T can be any primitive numeric type. - The negated vector. - - - Returns a new vector whose elements are obtained by taking the one's complement of a specified vector's elements. - The source vector. - The vector type. T can be any primitive numeric type. - The resulting vector. - - - Returns a new vector whose elements are the square roots of a specified vector's elements. - The source vector. - The vector type. T can be any primitive numeric type. - The square root vector. - - - Returns a new vector whose values are the difference between the elements in the second vector and their corresponding elements in the first vector. - The first vector. - The second vector. - The vector type. T can be any primitive numeric type. - The difference vector. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Returns a new vector by performing a bitwise exclusive Or (XOr) operation on each pair of elements in two vectors. - The first vector. - The second vector. - The vector type. T can be any primitive numeric type. - The resulting vector. - - - Represents a vector with two single-precision floating-point values. - - - Creates a new object whose two elements have the same value. - The value to assign to both elements. - - - Creates a vector whose elements have the specified values. - The value to assign to the field. - The value to assign to the field. - - - Returns a vector whose elements are the absolute values of each of the specified vector's elements. - A vector. - The absolute value vector. - - - Adds two vectors together. - The first vector to add. - The second vector to add. - The summed vector. - - - Restricts a vector between a minimum and a maximum value. - The vector to restrict. - The minimum value. - The maximum value. - The restricted vector. - - - Copies the elements of the vector to a specified array. - The destination array. - array is null. - The number of elements in the current instance is greater than in the array. - array is multidimensional. - - - Copies the elements of the vector to a specified array starting at a specified index position. - The destination array. - The index at which to copy the first element of the vector. - array is null. - The number of elements in the current instance is greater than in the array. - index is less than zero. -or- index is greater than or equal to the array length. - array is multidimensional. - - - Computes the Euclidean distance between the two given points. - The first point. - The second point. - The distance. - - - Returns the Euclidean distance squared between two specified points. - The first point. - The second point. - The distance squared. - - - Divides the first vector by the second. - The first vector. - The second vector. - The vector resulting from the division. - - - Divides the specified vector by a specified scalar value. - The vector. - The scalar value. - The vector that results from the division. - - - Returns the dot product of two vectors. - The first vector. - The second vector. - The dot product. - - - Returns a value that indicates whether this instance and a specified object are equal. - The object to compare with the current instance. - true if the current instance and obj are equal; otherwise, false```. If <code data-dev-comment-type="paramref">obj</code> isnull, the method returnsfalse`. - - - Returns a value that indicates whether this instance and another vector are equal. - The other vector. - true if the two vectors are equal; otherwise, false. - - - Returns the hash code for this instance. - The hash code. - - - Returns the length of the vector. - The vector's length. - - - Returns the length of the vector squared. - The vector's length squared. - - - Performs a linear interpolation between two vectors based on the given weighting. - The first vector. - The second vector. - A value between 0 and 1 that indicates the weight of value2. - The interpolated vector. - - - Returns a vector whose elements are the maximum of each of the pairs of elements in two specified vectors. - The first vector. - The second vector. - The maximized vector. - - - Returns a vector whose elements are the minimum of each of the pairs of elements in two specified vectors. - The first vector. - The second vector. - The minimized vector. - - - Multiplies two vectors together. - The first vector. - The second vector. - The product vector. - - - Multiplies a vector by a specified scalar. - The vector to multiply. - The scalar value. - The scaled vector. - - - Multiplies a scalar value by a specified vector. - The scaled value. - The vector. - The scaled vector. - - - Negates a specified vector. - The vector to negate. - The negated vector. - - - Returns a vector with the same direction as the specified vector, but with a length of one. - The vector to normalize. - The normalized vector. - - - Gets a vector whose 2 elements are equal to one. - A vector whose two elements are equal to one (that is, it returns the vector (1,1). - - - Adds two vectors together. - The first vector to add. - The second vector to add. - The summed vector. - - - Divides the first vector by the second. - The first vector. - The second vector. - The vector that results from dividing left by right. - - - Divides the specified vector by a specified scalar value. - The vector. - The scalar value. - The result of the division. - - - Returns a value that indicates whether each pair of elements in two specified vectors is equal. - The first vector to compare. - The second vector to compare. - true if left and right are equal; otherwise, false. - - - Returns a value that indicates whether two specified vectors are not equal. - The first vector to compare. - The second vector to compare. - true if left and right are not equal; otherwise, false. - - - Multiplies two vectors together. - The first vector. - The second vector. - The product vector. - - - Multiples the specified vector by the specified scalar value. - The vector. - The scalar value. - The scaled vector. - - - Multiples the scalar value by the specified vector. - The vector. - The scalar value. - The scaled vector. - - - Subtracts the second vector from the first. - The first vector. - The second vector. - The vector that results from subtracting right from left. - - - Negates the specified vector. - The vector to negate. - The negated vector. - - - Returns the reflection of a vector off a surface that has the specified normal. - The source vector. - The normal of the surface being reflected off. - The reflected vector. - - - Returns a vector whose elements are the square root of each of a specified vector's elements. - A vector. - The square root vector. - - - Subtracts the second vector from the first. - The first vector. - The second vector. - The difference vector. - - - Returns the string representation of the current instance using default formatting. - The string representation of the current instance. - - - Returns the string representation of the current instance using the specified format string to format individual elements. - A or that defines the format of individual elements. - The string representation of the current instance. - - - Returns the string representation of the current instance using the specified format string to format individual elements and the specified format provider to define culture-specific formatting. - A or that defines the format of individual elements. - A format provider that supplies culture-specific formatting information. - The string representation of the current instance. - - - Transforms a vector by a specified 3x2 matrix. - The vector to transform. - The transformation matrix. - The transformed vector. - - - Transforms a vector by a specified 4x4 matrix. - The vector to transform. - The transformation matrix. - The transformed vector. - - - Transforms a vector by the specified Quaternion rotation value. - The vector to rotate. - The rotation to apply. - The transformed vector. - - - Transforms a vector normal by the given 3x2 matrix. - The source vector. - The matrix. - The transformed vector. - - - Transforms a vector normal by the given 4x4 matrix. - The source vector. - The matrix. - The transformed vector. - - - Gets the vector (1,0). - The vector (1,0). - - - Gets the vector (0,1). - The vector (0,1). - - - The X component of the vector. - - - - The Y component of the vector. - - - - Returns a vector whose 2 elements are equal to zero. - A vector whose two elements are equal to zero (that is, it returns the vector (0,0). - - - Represents a vector with three single-precision floating-point values. - - - Creates a new object whose three elements have the same value. - The value to assign to all three elements. - - - Creates a new object from the specified object and the specified value. - The vector with two elements. - The additional value to assign to the field. - - - Creates a vector whose elements have the specified values. - The value to assign to the field. - The value to assign to the field. - The value to assign to the field. - - - Returns a vector whose elements are the absolute values of each of the specified vector's elements. - A vector. - The absolute value vector. - - - Adds two vectors together. - The first vector to add. - The second vector to add. - The summed vector. - - - Restricts a vector between a minimum and a maximum value. - The vector to restrict. - The minimum value. - The maximum value. - The restricted vector. - - - Copies the elements of the vector to a specified array. - The destination array. - array is null. - The number of elements in the current instance is greater than in the array. - array is multidimensional. - - - Copies the elements of the vector to a specified array starting at a specified index position. - The destination array. - The index at which to copy the first element of the vector. - array is null. - The number of elements in the current instance is greater than in the array. - index is less than zero. -or- index is greater than or equal to the array length. - array is multidimensional. - - - Computes the cross product of two vectors. - The first vector. - The second vector. - The cross product. - - - Computes the Euclidean distance between the two given points. - The first point. - The second point. - The distance. - - - Returns the Euclidean distance squared between two specified points. - The first point. - The second point. - The distance squared. - - - Divides the specified vector by a specified scalar value. - The vector. - The scalar value. - The vector that results from the division. - - - Divides the first vector by the second. - The first vector. - The second vector. - The vector resulting from the division. - - - Returns the dot product of two vectors. - The first vector. - The second vector. - The dot product. - - - Returns a value that indicates whether this instance and another vector are equal. - The other vector. - true if the two vectors are equal; otherwise, false. - - - Returns a value that indicates whether this instance and a specified object are equal. - The object to compare with the current instance. - true if the current instance and obj are equal; otherwise, false```. If <code data-dev-comment-type="paramref">obj</code> isnull, the method returnsfalse`. - - - Returns the hash code for this instance. - The hash code. - - - Returns the length of this vector object. - The vector's length. - - - Returns the length of the vector squared. - The vector's length squared. - - - Performs a linear interpolation between two vectors based on the given weighting. - The first vector. - The second vector. - A value between 0 and 1 that indicates the weight of value2. - The interpolated vector. - - - Returns a vector whose elements are the maximum of each of the pairs of elements in two specified vectors. - The first vector. - The second vector. - The maximized vector. - - - Returns a vector whose elements are the minimum of each of the pairs of elements in two specified vectors. - The first vector. - The second vector. - The minimized vector. - - - Multiplies a scalar value by a specified vector. - The scaled value. - The vector. - The scaled vector. - - - Multiplies two vectors together. - The first vector. - The second vector. - The product vector. - - - Multiplies a vector by a specified scalar. - The vector to multiply. - The scalar value. - The scaled vector. - - - Negates a specified vector. - The vector to negate. - The negated vector. - - - Returns a vector with the same direction as the specified vector, but with a length of one. - The vector to normalize. - The normalized vector. - - - Gets a vector whose 3 elements are equal to one. - A vector whose three elements are equal to one (that is, it returns the vector (1,1,1). - - - Adds two vectors together. - The first vector to add. - The second vector to add. - The summed vector. - - - Divides the first vector by the second. - The first vector. - The second vector. - The vector that results from dividing left by right. - - - Divides the specified vector by a specified scalar value. - The vector. - The scalar value. - The result of the division. - - - Returns a value that indicates whether each pair of elements in two specified vectors is equal. - The first vector to compare. - The second vector to compare. - true if left and right are equal; otherwise, false. - - - Returns a value that indicates whether two specified vectors are not equal. - The first vector to compare. - The second vector to compare. - true if left and right are not equal; otherwise, false. - - - Multiplies two vectors together. - The first vector. - The second vector. - The product vector. - - - Multiples the specified vector by the specified scalar value. - The vector. - The scalar value. - The scaled vector. - - - Multiples the scalar value by the specified vector. - The vector. - The scalar value. - The scaled vector. - - - Subtracts the second vector from the first. - The first vector. - The second vector. - The vector that results from subtracting right from left. - - - Negates the specified vector. - The vector to negate. - The negated vector. - - - Returns the reflection of a vector off a surface that has the specified normal. - The source vector. - The normal of the surface being reflected off. - The reflected vector. - - - Returns a vector whose elements are the square root of each of a specified vector's elements. - A vector. - The square root vector. - - - Subtracts the second vector from the first. - The first vector. - The second vector. - The difference vector. - - - Returns the string representation of the current instance using default formatting. - The string representation of the current instance. - - - Returns the string representation of the current instance using the specified format string to format individual elements. - A or that defines the format of individual elements. - The string representation of the current instance. - - - Returns the string representation of the current instance using the specified format string to format individual elements and the specified format provider to define culture-specific formatting. - A or that defines the format of individual elements. - A format provider that supplies culture-specific formatting information. - The string representation of the current instance. - - - Transforms a vector by a specified 4x4 matrix. - The vector to transform. - The transformation matrix. - The transformed vector. - - - Transforms a vector by the specified Quaternion rotation value. - The vector to rotate. - The rotation to apply. - The transformed vector. - - - Transforms a vector normal by the given 4x4 matrix. - The source vector. - The matrix. - The transformed vector. - - - Gets the vector (1,0,0). - The vector (1,0,0). - - - Gets the vector (0,1,0). - The vector (0,1,0).. - - - Gets the vector (0,0,1). - The vector (0,0,1). - - - The X component of the vector. - - - - The Y component of the vector. - - - - The Z component of the vector. - - - - Gets a vector whose 3 elements are equal to zero. - A vector whose three elements are equal to zero (that is, it returns the vector (0,0,0). - - - Represents a vector with four single-precision floating-point values. - - - Creates a new object whose four elements have the same value. - The value to assign to all four elements. - - - Constructs a new object from the specified object and a W component. - The vector to use for the X, Y, and Z components. - The W component. - - - Creates a new object from the specified object and a Z and a W component. - The vector to use for the X and Y components. - The Z component. - The W component. - - - Creates a vector whose elements have the specified values. - The value to assign to the field. - The value to assign to the field. - The value to assign to the field. - The value to assign to the field. - - - Returns a vector whose elements are the absolute values of each of the specified vector's elements. - A vector. - The absolute value vector. - - - Adds two vectors together. - The first vector to add. - The second vector to add. - The summed vector. - - - Restricts a vector between a minimum and a maximum value. - The vector to restrict. - The minimum value. - The maximum value. - The restricted vector. - - - Copies the elements of the vector to a specified array. - The destination array. - array is null. - The number of elements in the current instance is greater than in the array. - array is multidimensional. - - - Copies the elements of the vector to a specified array starting at a specified index position. - The destination array. - The index at which to copy the first element of the vector. - array is null. - The number of elements in the current instance is greater than in the array. - index is less than zero. -or- index is greater than or equal to the array length. - array is multidimensional. - - - Computes the Euclidean distance between the two given points. - The first point. - The second point. - The distance. - - - Returns the Euclidean distance squared between two specified points. - The first point. - The second point. - The distance squared. - - - Divides the first vector by the second. - The first vector. - The second vector. - The vector resulting from the division. - - - Divides the specified vector by a specified scalar value. - The vector. - The scalar value. - The vector that results from the division. - - - Returns the dot product of two vectors. - The first vector. - The second vector. - The dot product. - - - Returns a value that indicates whether this instance and another vector are equal. - The other vector. - true if the two vectors are equal; otherwise, false. - - - Returns a value that indicates whether this instance and a specified object are equal. - The object to compare with the current instance. - true if the current instance and obj are equal; otherwise, false```. If <code data-dev-comment-type="paramref">obj</code> isnull, the method returnsfalse`. - - - Returns the hash code for this instance. - The hash code. - - - Returns the length of this vector object. - The vector's length. - - - Returns the length of the vector squared. - The vector's length squared. - - - Performs a linear interpolation between two vectors based on the given weighting. - The first vector. - The second vector. - A value between 0 and 1 that indicates the weight of value2. - The interpolated vector. - - - Returns a vector whose elements are the maximum of each of the pairs of elements in two specified vectors. - The first vector. - The second vector. - The maximized vector. - - - Returns a vector whose elements are the minimum of each of the pairs of elements in two specified vectors. - The first vector. - The second vector. - The minimized vector. - - - Multiplies two vectors together. - The first vector. - The second vector. - The product vector. - - - Multiplies a vector by a specified scalar. - The vector to multiply. - The scalar value. - The scaled vector. - - - Multiplies a scalar value by a specified vector. - The scaled value. - The vector. - The scaled vector. - - - Negates a specified vector. - The vector to negate. - The negated vector. - - - Returns a vector with the same direction as the specified vector, but with a length of one. - The vector to normalize. - The normalized vector. - - - Gets a vector whose 4 elements are equal to one. - Returns . - - - Adds two vectors together. - The first vector to add. - The second vector to add. - The summed vector. - - - Divides the first vector by the second. - The first vector. - The second vector. - The vector that results from dividing left by right. - - - Divides the specified vector by a specified scalar value. - The vector. - The scalar value. - The result of the division. - - - Returns a value that indicates whether each pair of elements in two specified vectors is equal. - The first vector to compare. - The second vector to compare. - true if left and right are equal; otherwise, false. - - - Returns a value that indicates whether two specified vectors are not equal. - The first vector to compare. - The second vector to compare. - true if left and right are not equal; otherwise, false. - - - Multiplies two vectors together. - The first vector. - The second vector. - The product vector. - - - Multiples the specified vector by the specified scalar value. - The vector. - The scalar value. - The scaled vector. - - - Multiples the scalar value by the specified vector. - The vector. - The scalar value. - The scaled vector. - - - Subtracts the second vector from the first. - The first vector. - The second vector. - The vector that results from subtracting right from left. - - - Negates the specified vector. - The vector to negate. - The negated vector. - - - Returns a vector whose elements are the square root of each of a specified vector's elements. - A vector. - The square root vector. - - - Subtracts the second vector from the first. - The first vector. - The second vector. - The difference vector. - - - Returns the string representation of the current instance using default formatting. - The string representation of the current instance. - - - Returns the string representation of the current instance using the specified format string to format individual elements. - A or that defines the format of individual elements. - The string representation of the current instance. - - - Returns the string representation of the current instance using the specified format string to format individual elements and the specified format provider to define culture-specific formatting. - A or that defines the format of individual elements. - A format provider that supplies culture-specific formatting information. - The string representation of the current instance. - - - Transforms a four-dimensional vector by the specified Quaternion rotation value. - The vector to rotate. - The rotation to apply. - The transformed vector. - - - Transforms a four-dimensional vector by a specified 4x4 matrix. - The vector to transform. - The transformation matrix. - The transformed vector. - - - Transforms a three-dimensional vector by the specified Quaternion rotation value. - The vector to rotate. - The rotation to apply. - The transformed vector. - - - Transforms a two-dimensional vector by a specified 4x4 matrix. - The vector to transform. - The transformation matrix. - The transformed vector. - - - Transforms a two-dimensional vector by the specified Quaternion rotation value. - The vector to rotate. - The rotation to apply. - The transformed vector. - - - Transforms a three-dimensional vector by a specified 4x4 matrix. - The vector to transform. - The transformation matrix. - The transformed vector. - - - Gets the vector (0,0,0,1). - The vector (0,0,0,1). - - - Gets the vector (1,0,0,0). - The vector (1,0,0,0). - - - Gets the vector (0,1,0,0). - The vector (0,1,0,0).. - - - Gets a vector whose 4 elements are equal to zero. - The vector (0,0,1,0). - - - The W component of the vector. - - - - The X component of the vector. - - - - The Y component of the vector. - - - - The Z component of the vector. - - - - Gets a vector whose 4 elements are equal to zero. - A vector whose four elements are equal to zero (that is, it returns the vector (0,0,0,0). - - - \ No newline at end of file diff --git a/packages/System.Numerics.Vectors.4.4.0/lib/xamarinios10/_._ b/packages/System.Numerics.Vectors.4.4.0/lib/xamarinios10/_._ deleted file mode 100644 index e69de29b..00000000 diff --git a/packages/System.Numerics.Vectors.4.4.0/lib/xamarinmac20/_._ b/packages/System.Numerics.Vectors.4.4.0/lib/xamarinmac20/_._ deleted file mode 100644 index e69de29b..00000000 diff --git a/packages/System.Numerics.Vectors.4.4.0/lib/xamarintvos10/_._ b/packages/System.Numerics.Vectors.4.4.0/lib/xamarintvos10/_._ deleted file mode 100644 index e69de29b..00000000 diff --git a/packages/System.Numerics.Vectors.4.4.0/lib/xamarinwatchos10/_._ b/packages/System.Numerics.Vectors.4.4.0/lib/xamarinwatchos10/_._ deleted file mode 100644 index e69de29b..00000000 diff --git a/packages/System.Numerics.Vectors.4.4.0/ref/MonoAndroid10/_._ b/packages/System.Numerics.Vectors.4.4.0/ref/MonoAndroid10/_._ deleted file mode 100644 index e69de29b..00000000 diff --git a/packages/System.Numerics.Vectors.4.4.0/ref/MonoTouch10/_._ b/packages/System.Numerics.Vectors.4.4.0/ref/MonoTouch10/_._ deleted file mode 100644 index e69de29b..00000000 diff --git a/packages/System.Numerics.Vectors.4.4.0/ref/net46/System.Numerics.Vectors.dll b/packages/System.Numerics.Vectors.4.4.0/ref/net46/System.Numerics.Vectors.dll deleted file mode 100644 index e91f855a..00000000 Binary files a/packages/System.Numerics.Vectors.4.4.0/ref/net46/System.Numerics.Vectors.dll and /dev/null differ diff --git a/packages/System.Numerics.Vectors.4.4.0/ref/net46/System.Numerics.Vectors.xml b/packages/System.Numerics.Vectors.4.4.0/ref/net46/System.Numerics.Vectors.xml deleted file mode 100644 index 51297939..00000000 --- a/packages/System.Numerics.Vectors.4.4.0/ref/net46/System.Numerics.Vectors.xml +++ /dev/null @@ -1,2597 +0,0 @@ - - - - System.Numerics.Vectors - - - - Represents a 3x2 matrix. - - - Creates a 3x2 matrix from the specified components. - The value to assign to the first element in the first row. - The value to assign to the second element in the first row. - The value to assign to the first element in the second row. - The value to assign to the second element in the second row. - The value to assign to the first element in the third row. - The value to assign to the second element in the third row. - - - Adds each element in one matrix with its corresponding element in a second matrix. - The first matrix. - The second matrix. - The matrix that contains the summed values of value1 and value2. - - - Creates a rotation matrix using the given rotation in radians. - The amount of rotation, in radians. - The rotation matrix. - - - Creates a rotation matrix using the specified rotation in radians and a center point. - The amount of rotation, in radians. - The center point. - The rotation matrix. - - - Creates a scaling matrix from the specified X and Y components. - The value to scale by on the X axis. - The value to scale by on the Y axis. - The scaling matrix. - - - Creates a scaling matrix that scales uniformly with the specified scale with an offset from the specified center. - The uniform scale to use. - The center offset. - The scaling matrix. - - - Creates a scaling matrix that is offset by a given center point. - The value to scale by on the X axis. - The value to scale by on the Y axis. - The center point. - The scaling matrix. - - - Creates a scaling matrix that scales uniformly with the given scale. - The uniform scale to use. - The scaling matrix. - - - Creates a scaling matrix from the specified vector scale. - The scale to use. - The scaling matrix. - - - Creates a scaling matrix from the specified vector scale with an offset from the specified center point. - The scale to use. - The center offset. - The scaling matrix. - - - Creates a skew matrix from the specified angles in radians. - The X angle, in radians. - The Y angle, in radians. - The skew matrix. - - - Creates a skew matrix from the specified angles in radians and a center point. - The X angle, in radians. - The Y angle, in radians. - The center point. - The skew matrix. - - - Creates a translation matrix from the specified 2-dimensional vector. - The translation position. - The translation matrix. - - - Creates a translation matrix from the specified X and Y components. - The X position. - The Y position. - The translation matrix. - - - Returns a value that indicates whether this instance and another 3x2 matrix are equal. - The other matrix. - true if the two matrices are equal; otherwise, false. - - - Returns a value that indicates whether this instance and a specified object are equal. - The object to compare with the current instance. - true if the current instance and obj are equal; otherwise, false```. If <code data-dev-comment-type="paramref">obj</code> isnull, the method returnsfalse`. - - - Calculates the determinant for this matrix. - The determinant. - - - Returns the hash code for this instance. - The hash code. - - - Gets the multiplicative identity matrix. - The multiplicative identify matrix. - - - Inverts the specified matrix. The return value indicates whether the operation succeeded. - The matrix to invert. - When this method returns, contains the inverted matrix if the operation succeeded. - true if matrix was converted successfully; otherwise, false. - - - Indicates whether the current matrix is the identity matrix. - true if the current matrix is the identity matrix; otherwise, false. - - - Performs a linear interpolation from one matrix to a second matrix based on a value that specifies the weighting of the second matrix. - The first matrix. - The second matrix. - The relative weighting of matrix2. - The interpolated matrix. - - - The first element of the first row. - - - - The second element of the first row. - - - - The first element of the second row. - - - - The second element of the second row. - - - - The first element of the third row. - - - - The second element of the third row. - - - - Returns the matrix that results from multiplying two matrices together. - The first matrix. - The second matrix. - The product matrix. - - - Returns the matrix that results from scaling all the elements of a specified matrix by a scalar factor. - The matrix to scale. - The scaling value to use. - The scaled matrix. - - - Negates the specified matrix by multiplying all its values by -1. - The matrix to negate. - The negated matrix. - - - Adds each element in one matrix with its corresponding element in a second matrix. - The first matrix. - The second matrix. - The matrix that contains the summed values. - - - Returns a value that indicates whether the specified matrices are equal. - The first matrix to compare. - The second matrix to compare. - true if value1 and value2 are equal; otherwise, false. - - - Returns a value that indicates whether the specified matrices are not equal. - The first matrix to compare. - The second matrix to compare. - true if value1 and value2 are not equal; otherwise, false. - - - Returns the matrix that results from multiplying two matrices together. - The first matrix. - The second matrix. - The product matrix. - - - Returns the matrix that results from scaling all the elements of a specified matrix by a scalar factor. - The matrix to scale. - The scaling value to use. - The scaled matrix. - - - Subtracts each element in a second matrix from its corresponding element in a first matrix. - The first matrix. - The second matrix. - The matrix containing the values that result from subtracting each element in value2 from its corresponding element in value1. - - - Negates the specified matrix by multiplying all its values by -1. - The matrix to negate. - The negated matrix. - - - Subtracts each element in a second matrix from its corresponding element in a first matrix. - The first matrix. - The second matrix. - The matrix containing the values that result from subtracting each element in value2 from its corresponding element in value1. - - - Returns a string that represents this matrix. - The string representation of this matrix. - - - Gets or sets the translation component of this matrix. - The translation component of the current instance. - - - Represents a 4x4 matrix. - - - Creates a object from a specified object. - A 3x2 matrix. - - - Creates a 4x4 matrix from the specified components. - The value to assign to the first element in the first row. - The value to assign to the second element in the first row. - The value to assign to the third element in the first row. - The value to assign to the fourth element in the first row. - The value to assign to the first element in the second row. - The value to assign to the second element in the second row. - The value to assign to the third element in the second row. - The value to assign to the third element in the second row. - The value to assign to the first element in the third row. - The value to assign to the second element in the third row. - The value to assign to the third element in the third row. - The value to assign to the fourth element in the third row. - The value to assign to the first element in the fourth row. - The value to assign to the second element in the fourth row. - The value to assign to the third element in the fourth row. - The value to assign to the fourth element in the fourth row. - - - Adds each element in one matrix with its corresponding element in a second matrix. - The first matrix. - The second matrix. - The matrix that contains the summed values of value1 and value2. - - - Creates a spherical billboard that rotates around a specified object position. - The position of the object that the billboard will rotate around. - The position of the camera. - The up vector of the camera. - The forward vector of the camera. - The created billboard. - - - Creates a cylindrical billboard that rotates around a specified axis. - The position of the object that the billboard will rotate around. - The position of the camera. - The axis to rotate the billboard around. - The forward vector of the camera. - The forward vector of the object. - The billboard matrix. - - - Creates a matrix that rotates around an arbitrary vector. - The axis to rotate around. - The angle to rotate around axis, in radians. - The rotation matrix. - - - Creates a rotation matrix from the specified Quaternion rotation value. - The source Quaternion. - The rotation matrix. - - - Creates a rotation matrix from the specified yaw, pitch, and roll. - The angle of rotation, in radians, around the Y axis. - The angle of rotation, in radians, around the X axis. - The angle of rotation, in radians, around the Z axis. - The rotation matrix. - - - Creates a view matrix. - The position of the camera. - The target towards which the camera is pointing. - The direction that is "up" from the camera's point of view. - The view matrix. - - - Creates an orthographic perspective matrix from the given view volume dimensions. - The width of the view volume. - The height of the view volume. - The minimum Z-value of the view volume. - The maximum Z-value of the view volume. - The orthographic projection matrix. - - - Creates a customized orthographic projection matrix. - The minimum X-value of the view volume. - The maximum X-value of the view volume. - The minimum Y-value of the view volume. - The maximum Y-value of the view volume. - The minimum Z-value of the view volume. - The maximum Z-value of the view volume. - The orthographic projection matrix. - - - Creates a perspective projection matrix from the given view volume dimensions. - The width of the view volume at the near view plane. - The height of the view volume at the near view plane. - The distance to the near view plane. - The distance to the far view plane. - The perspective projection matrix. - nearPlaneDistance is less than or equal to zero. -or- farPlaneDistance is less than or equal to zero. -or- nearPlaneDistance is greater than or equal to farPlaneDistance. - - - Creates a perspective projection matrix based on a field of view, aspect ratio, and near and far view plane distances. - The field of view in the y direction, in radians. - The aspect ratio, defined as view space width divided by height. - The distance to the near view plane. - The distance to the far view plane. - The perspective projection matrix. - fieldOfView is less than or equal to zero. -or- fieldOfView is greater than or equal to . nearPlaneDistance is less than or equal to zero. -or- farPlaneDistance is less than or equal to zero. -or- nearPlaneDistance is greater than or equal to farPlaneDistance. - - - Creates a customized perspective projection matrix. - The minimum x-value of the view volume at the near view plane. - The maximum x-value of the view volume at the near view plane. - The minimum y-value of the view volume at the near view plane. - The maximum y-value of the view volume at the near view plane. - The distance to the near view plane. - The distance to the far view plane. - The perspective projection matrix. - nearPlaneDistance is less than or equal to zero. -or- farPlaneDistance is less than or equal to zero. -or- nearPlaneDistance is greater than or equal to farPlaneDistance. - - - Creates a matrix that reflects the coordinate system about a specified plane. - The plane about which to create a reflection. - A new matrix expressing the reflection. - - - Creates a matrix for rotating points around the X axis. - The amount, in radians, by which to rotate around the X axis. - The rotation matrix. - - - Creates a matrix for rotating points around the X axis from a center point. - The amount, in radians, by which to rotate around the X axis. - The center point. - The rotation matrix. - - - The amount, in radians, by which to rotate around the Y axis from a center point. - The amount, in radians, by which to rotate around the Y-axis. - The center point. - The rotation matrix. - - - Creates a matrix for rotating points around the Y axis. - The amount, in radians, by which to rotate around the Y-axis. - The rotation matrix. - - - Creates a matrix for rotating points around the Z axis. - The amount, in radians, by which to rotate around the Z-axis. - The rotation matrix. - - - Creates a matrix for rotating points around the Z axis from a center point. - The amount, in radians, by which to rotate around the Z-axis. - The center point. - The rotation matrix. - - - Creates a scaling matrix from the specified vector scale. - The scale to use. - The scaling matrix. - - - Creates a uniform scaling matrix that scale equally on each axis. - The uniform scaling factor. - The scaling matrix. - - - Creates a scaling matrix with a center point. - The vector that contains the amount to scale on each axis. - The center point. - The scaling matrix. - - - Creates a uniform scaling matrix that scales equally on each axis with a center point. - The uniform scaling factor. - The center point. - The scaling matrix. - - - Creates a scaling matrix from the specified X, Y, and Z components. - The value to scale by on the X axis. - The value to scale by on the Y axis. - The value to scale by on the Z axis. - The scaling matrix. - - - Creates a scaling matrix that is offset by a given center point. - The value to scale by on the X axis. - The value to scale by on the Y axis. - The value to scale by on the Z axis. - The center point. - The scaling matrix. - - - Creates a matrix that flattens geometry into a specified plane as if casting a shadow from a specified light source. - The direction from which the light that will cast the shadow is coming. - The plane onto which the new matrix should flatten geometry so as to cast a shadow. - A new matrix that can be used to flatten geometry onto the specified plane from the specified direction. - - - Creates a translation matrix from the specified 3-dimensional vector. - The amount to translate in each axis. - The translation matrix. - - - Creates a translation matrix from the specified X, Y, and Z components. - The amount to translate on the X axis. - The amount to translate on the Y axis. - The amount to translate on the Z axis. - The translation matrix. - - - Creates a world matrix with the specified parameters. - The position of the object. - The forward direction of the object. - The upward direction of the object. Its value is usually [0, 1, 0]. - The world matrix. - - - Attempts to extract the scale, translation, and rotation components from the given scale, rotation, or translation matrix. The return value indicates whether the operation succeeded. - The source matrix. - When this method returns, contains the scaling component of the transformation matrix if the operation succeeded. - When this method returns, contains the rotation component of the transformation matrix if the operation succeeded. - When the method returns, contains the translation component of the transformation matrix if the operation succeeded. - true if matrix was decomposed successfully; otherwise, false. - - - Returns a value that indicates whether this instance and another 4x4 matrix are equal. - The other matrix. - true if the two matrices are equal; otherwise, false. - - - Returns a value that indicates whether this instance and a specified object are equal. - The object to compare with the current instance. - true if the current instance and obj are equal; otherwise, false```. If <code data-dev-comment-type="paramref">obj</code> isnull, the method returnsfalse`. - - - Calculates the determinant of the current 4x4 matrix. - The determinant. - - - Returns the hash code for this instance. - The hash code. - - - Gets the multiplicative identity matrix. - Gets the multiplicative identity matrix. - - - Inverts the specified matrix. The return value indicates whether the operation succeeded. - The matrix to invert. - When this method returns, contains the inverted matrix if the operation succeeded. - true if matrix was converted successfully; otherwise, false. - - - Indicates whether the current matrix is the identity matrix. - true if the current matrix is the identity matrix; otherwise, false. - - - Performs a linear interpolation from one matrix to a second matrix based on a value that specifies the weighting of the second matrix. - The first matrix. - The second matrix. - The relative weighting of matrix2. - The interpolated matrix. - - - The first element of the first row. - - - - The second element of the first row. - - - - The third element of the first row. - - - - The fourth element of the first row. - - - - The first element of the second row. - - - - The second element of the second row. - - - - The third element of the second row. - - - - The fourth element of the second row. - - - - The first element of the third row. - - - - The second element of the third row. - - - - The third element of the third row. - - - - The fourth element of the third row. - - - - The first element of the fourth row. - - - - The second element of the fourth row. - - - - The third element of the fourth row. - - - - The fourth element of the fourth row. - - - - Returns the matrix that results from multiplying two matrices together. - The first matrix. - The second matrix. - The product matrix. - - - Returns the matrix that results from scaling all the elements of a specified matrix by a scalar factor. - The matrix to scale. - The scaling value to use. - The scaled matrix. - - - Negates the specified matrix by multiplying all its values by -1. - The matrix to negate. - The negated matrix. - - - Adds each element in one matrix with its corresponding element in a second matrix. - The first matrix. - The second matrix. - The matrix that contains the summed values. - - - Returns a value that indicates whether the specified matrices are equal. - The first matrix to compare. - The second matrix to care - true if value1 and value2 are equal; otherwise, false. - - - Returns a value that indicates whether the specified matrices are not equal. - The first matrix to compare. - The second matrix to compare. - true if value1 and value2 are not equal; otherwise, false. - - - Returns the matrix that results from scaling all the elements of a specified matrix by a scalar factor. - The matrix to scale. - The scaling value to use. - The scaled matrix. - - - Returns the matrix that results from multiplying two matrices together. - The first matrix. - The second matrix. - The product matrix. - - - Subtracts each element in a second matrix from its corresponding element in a first matrix. - The first matrix. - The second matrix. - The matrix containing the values that result from subtracting each element in value2 from its corresponding element in value1. - - - Negates the specified matrix by multiplying all its values by -1. - The matrix to negate. - The negated matrix. - - - Subtracts each element in a second matrix from its corresponding element in a first matrix. - The first matrix. - The second matrix. - The matrix containing the values that result from subtracting each element in value2 from its corresponding element in value1. - - - Returns a string that represents this matrix. - The string representation of this matrix. - - - Transforms the specified matrix by applying the specified Quaternion rotation. - The matrix to transform. - The rotation t apply. - The transformed matrix. - - - Gets or sets the translation component of this matrix. - The translation component of the current instance. - - - Transposes the rows and columns of a matrix. - The matrix to transpose. - The transposed matrix. - - - Represents a three-dimensional plane. - - - Creates a object from a specified four-dimensional vector. - A vector whose first three elements describe the normal vector, and whose defines the distance along that normal from the origin. - - - Creates a object from a specified normal and the distance along the normal from the origin. - The plane's normal vector. - The plane's distance from the origin along its normal vector. - - - Creates a object from the X, Y, and Z components of its normal, and its distance from the origin on that normal. - The X component of the normal. - The Y component of the normal. - The Z component of the normal. - The distance of the plane along its normal from the origin. - - - Creates a object that contains three specified points. - The first point defining the plane. - The second point defining the plane. - The third point defining the plane. - The plane containing the three points. - - - The distance of the plane along its normal from the origin. - - - - Calculates the dot product of a plane and a 4-dimensional vector. - The plane. - The four-dimensional vector. - The dot product. - - - Returns the dot product of a specified three-dimensional vector and the normal vector of this plane plus the distance () value of the plane. - The plane. - The 3-dimensional vector. - The dot product. - - - Returns the dot product of a specified three-dimensional vector and the vector of this plane. - The plane. - The three-dimensional vector. - The dot product. - - - Returns a value that indicates whether this instance and a specified object are equal. - The object to compare with the current instance. - true if the current instance and obj are equal; otherwise, false```. If <code data-dev-comment-type="paramref">obj</code> isnull, the method returnsfalse`. - - - Returns a value that indicates whether this instance and another plane object are equal. - The other plane. - true if the two planes are equal; otherwise, false. - - - Returns the hash code for this instance. - The hash code. - - - The normal vector of the plane. - - - - Creates a new object whose normal vector is the source plane's normal vector normalized. - The source plane. - The normalized plane. - - - Returns a value that indicates whether two planes are equal. - The first plane to compare. - The second plane to compare. - true if value1 and value2 are equal; otherwise, false. - - - Returns a value that indicates whether two planes are not equal. - The first plane to compare. - The second plane to compare. - true if value1 and value2 are not equal; otherwise, false. - - - Returns the string representation of this plane object. - A string that represents this object. - - - Transforms a normalized plane by a 4x4 matrix. - The normalized plane to transform. - The transformation matrix to apply to plane. - The transformed plane. - - - Transforms a normalized plane by a Quaternion rotation. - The normalized plane to transform. - The Quaternion rotation to apply to the plane. - A new plane that results from applying the Quaternion rotation. - - - Represents a vector that is used to encode three-dimensional physical rotations. - - - Creates a quaternion from the specified vector and rotation parts. - The vector part of the quaternion. - The rotation part of the quaternion. - - - Constructs a quaternion from the specified components. - The value to assign to the X component of the quaternion. - The value to assign to the Y component of the quaternion. - The value to assign to the Z component of the quaternion. - The value to assign to the W component of the quaternion. - - - Adds each element in one quaternion with its corresponding element in a second quaternion. - The first quaternion. - The second quaternion. - The quaternion that contains the summed values of value1 and value2. - - - Concatenates two quaternions. - The first quaternion rotation in the series. - The second quaternion rotation in the series. - A new quaternion representing the concatenation of the value1 rotation followed by the value2 rotation. - - - Returns the conjugate of a specified quaternion. - The quaternion. - A new quaternion that is the conjugate of value. - - - Creates a quaternion from a vector and an angle to rotate about the vector. - The vector to rotate around. - The angle, in radians, to rotate around the vector. - The newly created quaternion. - - - Creates a quaternion from the specified rotation matrix. - The rotation matrix. - The newly created quaternion. - - - Creates a new quaternion from the given yaw, pitch, and roll. - The yaw angle, in radians, around the Y axis. - The pitch angle, in radians, around the X axis. - The roll angle, in radians, around the Z axis. - The resulting quaternion. - - - Divides one quaternion by a second quaternion. - The dividend. - The divisor. - The quaternion that results from dividing value1 by value2. - - - Calculates the dot product of two quaternions. - The first quaternion. - The second quaternion. - The dot product. - - - Returns a value that indicates whether this instance and another quaternion are equal. - The other quaternion. - true if the two quaternions are equal; otherwise, false. - - - Returns a value that indicates whether this instance and a specified object are equal. - The object to compare with the current instance. - true if the current instance and obj are equal; otherwise, false```. If <code data-dev-comment-type="paramref">obj</code> isnull, the method returnsfalse`. - - - Returns the hash code for this instance. - The hash code. - - - Gets a quaternion that represents no rotation. - A quaternion whose values are (0, 0, 0, 1). - - - Returns the inverse of a quaternion. - The quaternion. - The inverted quaternion. - - - Gets a value that indicates whether the current instance is the identity quaternion. - true if the current instance is the identity quaternion; otherwise, false. - - - Calculates the length of the quaternion. - The computed length of the quaternion. - - - Calculates the squared length of the quaternion. - The length squared of the quaternion. - - - Performs a linear interpolation between two quaternions based on a value that specifies the weighting of the second quaternion. - The first quaternion. - The second quaternion. - The relative weight of quaternion2 in the interpolation. - The interpolated quaternion. - - - Returns the quaternion that results from multiplying two quaternions together. - The first quaternion. - The second quaternion. - The product quaternion. - - - Returns the quaternion that results from scaling all the components of a specified quaternion by a scalar factor. - The source quaternion. - The scalar value. - The scaled quaternion. - - - Reverses the sign of each component of the quaternion. - The quaternion to negate. - The negated quaternion. - - - Divides each component of a specified by its length. - The quaternion to normalize. - The normalized quaternion. - - - Adds each element in one quaternion with its corresponding element in a second quaternion. - The first quaternion. - The second quaternion. - The quaternion that contains the summed values of value1 and value2. - - - Divides one quaternion by a second quaternion. - The dividend. - The divisor. - The quaternion that results from dividing value1 by value2. - - - Returns a value that indicates whether two quaternions are equal. - The first quaternion to compare. - The second quaternion to compare. - true if the two quaternions are equal; otherwise, false. - - - Returns a value that indicates whether two quaternions are not equal. - The first quaternion to compare. - The second quaternion to compare. - true if value1 and value2 are not equal; otherwise, false. - - - Returns the quaternion that results from scaling all the components of a specified quaternion by a scalar factor. - The source quaternion. - The scalar value. - The scaled quaternion. - - - Returns the quaternion that results from multiplying two quaternions together. - The first quaternion. - The second quaternion. - The product quaternion. - - - Subtracts each element in a second quaternion from its corresponding element in a first quaternion. - The first quaternion. - The second quaternion. - The quaternion containing the values that result from subtracting each element in value2 from its corresponding element in value1. - - - Reverses the sign of each component of the quaternion. - The quaternion to negate. - The negated quaternion. - - - Interpolates between two quaternions, using spherical linear interpolation. - The first quaternion. - The second quaternion. - The relative weight of the second quaternion in the interpolation. - The interpolated quaternion. - - - Subtracts each element in a second quaternion from its corresponding element in a first quaternion. - The first quaternion. - The second quaternion. - The quaternion containing the values that result from subtracting each element in value2 from its corresponding element in value1. - - - Returns a string that represents this quaternion. - The string representation of this quaternion. - - - The rotation component of the quaternion. - - - - The X value of the vector component of the quaternion. - - - - The Y value of the vector component of the quaternion. - - - - The Z value of the vector component of the quaternion. - - - - Represents a single vector of a specified numeric type that is suitable for low-level optimization of parallel algorithms. - The vector type. T can be any primitive numeric type. - - - Creates a vector whose components are of a specified type. - The numeric type that defines the type of the components in the vector. - - - Creates a vector from a specified array. - A numeric array. - values is null. - - - Creates a vector from a specified array starting at a specified index position. - A numeric array. - The starting index position from which to create the vector. - values is null. - index is less than zero. -or- The length of values minus index is less than . - - - Copies the vector instance to a specified destination array. - The array to receive a copy of the vector values. - destination is null. - The number of elements in the current vector is greater than the number of elements available in the destination array. - - - Copies the vector instance to a specified destination array starting at a specified index position. - The array to receive a copy of the vector values. - The starting index in destination at which to begin the copy operation. - destination is null. - The number of elements in the current instance is greater than the number of elements available from startIndex to the end of the destination array. - index is less than zero or greater than the last index in destination. - - - Returns the number of elements stored in the vector. - The number of elements stored in the vector. - Access to the property getter via reflection is not supported. - - - Returns a value that indicates whether this instance is equal to a specified vector. - The vector to compare with this instance. - true if the current instance and other are equal; otherwise, false. - - - Returns a value that indicates whether this instance is equal to a specified object. - The object to compare with this instance. - true if the current instance and obj are equal; otherwise, false. The method returns false if obj is null, or if obj is a vector of a different type than the current instance. - - - Returns the hash code for this instance. - The hash code. - - - Gets the element at a specified index. - The index of the element to return. - The element at index index. - index is less than zero. -or- index is greater than or equal to . - - - Returns a vector containing all ones. - A vector containing all ones. - - - Adds two vectors together. - The first vector to add. - The second vector to add. - The summed vector. - - - Returns a new vector by performing a bitwise And operation on each of the elements in two vectors. - The first vector. - The second vector. - The vector that results from the bitwise And of left and right. - - - Returns a new vector by performing a bitwise Or operation on each of the elements in two vectors. - The first vector. - The second vector. - The vector that results from the bitwise Or of the elements in left and right. - - - Divides the first vector by the second. - The first vector. - The second vector. - The vector that results from dividing left by right. - - - Returns a value that indicates whether each pair of elements in two specified vectors are equal. - The first vector to compare. - The second vector to compare. - true if left and right are equal; otherwise, false. - - - Returns a new vector by performing a bitwise XOr operation on each of the elements in two vectors. - The first vector. - The second vector. - The vector that results from the bitwise XOr of the elements in left and right. - - - Reinterprets the bits of the specified vector into a vector of type . - The vector to reinterpret. - The reinterpreted vector. - - - Reinterprets the bits of the specified vector into a vector of type . - The vector to reinterpret. - The reinterpreted vector. - - - Reinterprets the bits of the specified vector into a vector of type . - The vector to reinterpret. - The reinterpreted vector. - - - Reinterprets the bits of the specified vector into a vector of type . - The vector to reinterpret. - The reinterpreted vector. - - - Reinterprets the bits of the specified vector into a vector of type . - The vector to reinterpret. - The reinterpreted vector. - - - Reinterprets the bits of the specified vector into a vector of type . - The vector to reinterpret. - The reinterpreted vector. - - - Reinterprets the bits of the specified vector into a vector of type . - The vector to reinterpret. - The reinterpreted vector. - - - Reinterprets the bits of the specified vector into a vector of type . - The vector to reinterpret. - The reinterpreted vector. - - - Reinterprets the bits of the specified vector into a vector of type . - The vector to reinterpret. - The reinterpreted vector. - - - Reinterprets the bits of the specified vector into a vector of type . - The vector to reinterpret. - The reinterpreted vector. - - - Returns a value that indicates whether any single pair of elements in the specified vectors is equal. - The first vector to compare. - The second vector to compare. - true if any element pairs in left and right are equal. false if no element pairs are equal. - - - Multiplies two vectors together. - The first vector. - The second vector. - The product vector. - - - Multiplies a vector by a specified scalar value. - The source vector. - A scalar value. - The scaled vector. - - - Multiplies a vector by the given scalar. - The scalar value. - The source vector. - The scaled vector. - - - Returns a new vector whose elements are obtained by taking the one's complement of a specified vector's elements. - The source vector. - The one's complement vector. - - - Subtracts the second vector from the first. - The first vector. - The second vector. - The vector that results from subtracting right from left. - - - Negates a given vector. - The vector to negate. - The negated vector. - - - Returns the string representation of this vector using the specified format string to format individual elements and the specified format provider to define culture-specific formatting. - A or that defines the format of individual elements. - A format provider that supplies culture-specific formatting information. - The string representation of the current instance. - - - Returns the string representation of this vector using default formatting. - The string representation of this vector. - - - Returns the string representation of this vector using the specified format string to format individual elements. - A or that defines the format of individual elements. - The string representation of the current instance. - - - Returns a vector containing all zeroes. - A vector containing all zeroes. - - - Provides a collection of static convenience methods for creating, manipulating, combining, and converting generic vectors. - - - Returns a new vector whose elements are the absolute values of the given vector's elements. - The source vector. - The vector type. T can be any primitive numeric type. - The absolute value vector. - - - Returns a new vector whose values are the sum of each pair of elements from two given vectors. - The first vector. - The second vector. - The vector type. T can be any primitive numeric type. - The summed vector. - - - Returns a new vector by performing a bitwise And Not operation on each pair of corresponding elements in two vectors. - The first vector. - The second vector. - The vector type. T can be any primitive numeric type. - The resulting vector. - - - Reinterprets the bits of a specified vector into those of a vector of unsigned bytes. - The source vector. - The vector type. T can be any primitive numeric type. - The reinterpreted vector. - - - Reinterprets the bits of a specified vector into those of a double-precision floating-point vector. - The source vector. - The vector type. T can be any primitive numeric type. - The reinterpreted vector. - - - Reinterprets the bits of a specified vector into those of a vector of 16-bit integers. - The source vector. - The vector type. T can be any primitive numeric type. - The reinterpreted vector. - - - Reinterprets the bits of a specified vector into those of a vector of integers. - The source vector. - The vector type. T can be any primitive numeric type. - The reinterpreted vector. - - - Reinterprets the bits of a specified vector into those of a vector of long integers. - The source vector. - The vector type. T can be any primitive numeric type. - The reinterpreted vector. - - - Reinterprets the bits of a specified vector into those of a vector of signed bytes. - The source vector. - The vector type. T can be any primitive numeric type. - The reinterpreted vector. - - - Reinterprets the bits of a specified vector into those of a single-precision floating-point vector. - The source vector. - The vector type. T can be any primitive numeric type. - The reinterpreted vector. - - - Reinterprets the bits of a specified vector into those of a vector of unsigned 16-bit integers. - The source vector. - The vector type. T can be any primitive numeric type. - The reinterpreted vector. - - - Reinterprets the bits of a specified vector into those of a vector of unsigned integers. - The source vector. - The vector type. T can be any primitive numeric type. - The reinterpreted vector. - - - Reinterprets the bits of a specified vector into those of a vector of unsigned long integers. - The source vector. - The vector type. T can be any primitive numeric type. - The reinterpreted vector. - - - Returns a new vector by performing a bitwise And operation on each pair of elements in two vectors. - The first vector. - The second vector. - The vector type. T can be any primitive numeric type. - The resulting vector. - - - Returns a new vector by performing a bitwise Or operation on each pair of elements in two vectors. - The first vector. - The second vector. - The vector type. T can be any primitive numeric type. - The resulting vector. - - - Creates a new single-precision vector with elements selected between two specified single-precision source vectors based on an integral mask vector. - The integral mask vector used to drive selection. - The first source vector. - The second source vector. - The new vector with elements selected based on the mask. - - - Creates a new double-precision vector with elements selected between two specified double-precision source vectors based on an integral mask vector. - The integral mask vector used to drive selection. - The first source vector. - The second source vector. - The new vector with elements selected based on the mask. - - - Creates a new vector of a specified type with elements selected between two specified source vectors of the same type based on an integral mask vector. - The integral mask vector used to drive selection. - The first source vector. - The second source vector. - The vector type. T can be any primitive numeric type. - The new vector with elements selected based on the mask. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Returns a new vector whose values are the result of dividing the first vector's elements by the corresponding elements in the second vector. - The first vector. - The second vector. - The vector type. T can be any primitive numeric type. - The divided vector. - - - Returns the dot product of two vectors. - The first vector. - The second vector. - The vector type. T can be any primitive numeric type. - The dot product. - - - Returns a new integral vector whose elements signal whether the elements in two specified double-precision vectors are equal. - The first vector to compare. - The second vector to compare. - The resulting integral vector. - - - Returns a new integral vector whose elements signal whether the elements in two specified integral vectors are equal. - The first vector to compare. - The second vector to compare. - The resulting integral vector. - - - Returns a new vector whose elements signal whether the elements in two specified long integer vectors are equal. - The first vector to compare. - The second vector to compare. - The resulting long integer vector. - - - Returns a new integral vector whose elements signal whether the elements in two specified single-precision vectors are equal. - The first vector to compare. - The second vector to compare. - The resulting integral vector. - - - Returns a new vector of a specified type whose elements signal whether the elements in two specified vectors of the same type are equal. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - The resulting vector. - - - Returns a value that indicates whether each pair of elements in the given vectors is equal. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - true if all elements in left and right are equal; otherwise, false. - - - Returns a value that indicates whether any single pair of elements in the given vectors is equal. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - true if any element pair in left and right is equal; otherwise, false. - - - Returns a new integral vector whose elements signal whether the elements in one double-precision floating-point vector are greater than their corresponding elements in a second double-precision floating-point vector. - The first vector to compare. - The second vector to compare. - The resulting integral vector. - - - Returns a new integral vector whose elements signal whether the elements in one integral vector are greater than their corresponding elements in a second integral vector. - The first vector to compare. - The second vector to compare. - The resulting integral vector. - - - Returns a new long integer vector whose elements signal whether the elements in one long integer vector are greater than their corresponding elements in a second long integer vector. - The first vector to compare. - The second vector to compare. - The resulting long integer vector. - - - Returns a new integral vector whose elements signal whether the elements in one single-precision floating-point vector are greater than their corresponding elements in a second single-precision floating-point vector. - The first vector to compare. - The second vector to compare. - The resulting integral vector. - - - Returns a new vector whose elements signal whether the elements in one vector of a specified type are greater than their corresponding elements in the second vector of the same time. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - The resulting vector. - - - Returns a value that indicates whether all elements in the first vector are greater than the corresponding elements in the second vector. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - true if all elements in left are greater than the corresponding elements in right; otherwise, false. - - - Returns a value that indicates whether any element in the first vector is greater than the corresponding element in the second vector. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - true if any element in left is greater than the corresponding element in right; otherwise, false. - - - Returns a new integral vector whose elements signal whether the elements in one vector are greater than or equal to their corresponding elements in the single-precision floating-point second vector. - The first vector to compare. - The second vector to compare. - The resulting integral vector. - - - Returns a new long integer vector whose elements signal whether the elements in one long integer vector are greater than or equal to their corresponding elements in the second long integer vector. - The first vector to compare. - The second vector to compare. - The resulting long integer vector. - - - Returns a new integral vector whose elements signal whether the elements in one integral vector are greater than or equal to their corresponding elements in the second integral vector. - The first vector to compare. - The second vector to compare. - The resulting integral vector. - - - Returns a new integral vector whose elements signal whether the elements in one vector are greater than or equal to their corresponding elements in the second double-precision floating-point vector. - The first vector to compare. - The second vector to compare. - The resulting integral vector. - - - Returns a new vector whose elements signal whether the elements in one vector of a specified type are greater than or equal to their corresponding elements in the second vector of the same type. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - The resulting vector. - - - Returns a value that indicates whether all elements in the first vector are greater than or equal to all the corresponding elements in the second vector. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - true if all elements in left are greater than or equal to the corresponding elements in right; otherwise, false. - - - Returns a value that indicates whether any element in the first vector is greater than or equal to the corresponding element in the second vector. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - true if any element in left is greater than or equal to the corresponding element in right; otherwise, false. - - - Gets a value that indicates whether vector operations are subject to hardware acceleration through JIT intrinsic support. - true if vector operations are subject to hardware acceleration; otherwise, false. - - - Returns a new integral vector whose elements signal whether the elements in one double-precision floating-point vector are less than their corresponding elements in a second double-precision floating-point vector. - The first vector to compare. - The second vector to compare. - The resulting integral vector. - - - Returns a new integral vector whose elements signal whether the elements in one integral vector are less than their corresponding elements in a second integral vector. - The first vector to compare. - The second vector to compare. - The resulting integral vector - - - Returns a new long integer vector whose elements signal whether the elements in one long integer vector are less than their corresponding elements in a second long integer vector. - The first vector to compare. - The second vector to compare. - The resulting long integer vector. - - - Returns a new integral vector whose elements signal whether the elements in one single-precision vector are less than their corresponding elements in a second single-precision vector. - The first vector to compare. - The second vector to compare. - The resulting integral vector. - - - Returns a new vector of a specified type whose elements signal whether the elements in one vector are less than their corresponding elements in the second vector. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - The resulting vector. - - - Returns a value that indicates whether all of the elements in the first vector are less than their corresponding elements in the second vector. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - true if all of the elements in left are less than the corresponding elements in right; otherwise, false. - - - Returns a value that indicates whether any element in the first vector is less than the corresponding element in the second vector. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - true if any element in left is less than the corresponding element in right; otherwise, false. - - - Returns a new integral vector whose elements signal whether the elements in one double-precision floating-point vector are less than or equal to their corresponding elements in a second double-precision floating-point vector. - The first vector to compare. - The second vector to compare. - The resulting integral vector. - - - Returns a new integral vector whose elements signal whether the elements in one integral vector are less than or equal to their corresponding elements in a second integral vector. - The first vector to compare. - The second vector to compare. - The resulting integral vector. - - - Returns a new long integer vector whose elements signal whether the elements in one long integer vector are less or equal to their corresponding elements in a second long integer vector. - The first vector to compare. - The second vector to compare. - The resulting long integer vector. - - - Returns a new integral vector whose elements signal whether the elements in one single-precision floating-point vector are less than or equal to their corresponding elements in a second single-precision floating-point vector. - The first vector to compare. - The second vector to compare. - The resulting integral vector. - - - Returns a new vector whose elements signal whether the elements in one vector are less than or equal to their corresponding elements in the second vector. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - The resulting vector. - - - Returns a value that indicates whether all elements in the first vector are less than or equal to their corresponding elements in the second vector. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - true if all of the elements in left are less than or equal to the corresponding elements in right; otherwise, false. - - - Returns a value that indicates whether any element in the first vector is less than or equal to the corresponding element in the second vector. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - true if any element in left is less than or equal to the corresponding element in right; otherwise, false. - - - Returns a new vector whose elements are the maximum of each pair of elements in the two given vectors. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - The maximum vector. - - - Returns a new vector whose elements are the minimum of each pair of elements in the two given vectors. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - The minimum vector. - - - Returns a new vector whose values are a scalar value multiplied by each of the values of a specified vector. - The scalar value. - The vector. - The vector type. T can be any primitive numeric type. - The scaled vector. - - - Returns a new vector whose values are the product of each pair of elements in two specified vectors. - The first vector. - The second vector. - The vector type. T can be any primitive numeric type. - The product vector. - - - Returns a new vector whose values are the values of a specified vector each multiplied by a scalar value. - The vector. - The scalar value. - The vector type. T can be any primitive numeric type. - The scaled vector. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Returns a new vector whose elements are the negation of the corresponding element in the specified vector. - The source vector. - The vector type. T can be any primitive numeric type. - The negated vector. - - - Returns a new vector whose elements are obtained by taking the one's complement of a specified vector's elements. - The source vector. - The vector type. T can be any primitive numeric type. - The resulting vector. - - - Returns a new vector whose elements are the square roots of a specified vector's elements. - The source vector. - The vector type. T can be any primitive numeric type. - The square root vector. - - - Returns a new vector whose values are the difference between the elements in the second vector and their corresponding elements in the first vector. - The first vector. - The second vector. - The vector type. T can be any primitive numeric type. - The difference vector. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Returns a new vector by performing a bitwise exclusive Or (XOr) operation on each pair of elements in two vectors. - The first vector. - The second vector. - The vector type. T can be any primitive numeric type. - The resulting vector. - - - Represents a vector with two single-precision floating-point values. - - - Creates a new object whose two elements have the same value. - The value to assign to both elements. - - - Creates a vector whose elements have the specified values. - The value to assign to the field. - The value to assign to the field. - - - Returns a vector whose elements are the absolute values of each of the specified vector's elements. - A vector. - The absolute value vector. - - - Adds two vectors together. - The first vector to add. - The second vector to add. - The summed vector. - - - Restricts a vector between a minimum and a maximum value. - The vector to restrict. - The minimum value. - The maximum value. - The restricted vector. - - - Copies the elements of the vector to a specified array. - The destination array. - array is null. - The number of elements in the current instance is greater than in the array. - array is multidimensional. - - - Copies the elements of the vector to a specified array starting at a specified index position. - The destination array. - The index at which to copy the first element of the vector. - array is null. - The number of elements in the current instance is greater than in the array. - index is less than zero. -or- index is greater than or equal to the array length. - array is multidimensional. - - - Computes the Euclidean distance between the two given points. - The first point. - The second point. - The distance. - - - Returns the Euclidean distance squared between two specified points. - The first point. - The second point. - The distance squared. - - - Divides the first vector by the second. - The first vector. - The second vector. - The vector resulting from the division. - - - Divides the specified vector by a specified scalar value. - The vector. - The scalar value. - The vector that results from the division. - - - Returns the dot product of two vectors. - The first vector. - The second vector. - The dot product. - - - Returns a value that indicates whether this instance and a specified object are equal. - The object to compare with the current instance. - true if the current instance and obj are equal; otherwise, false```. If <code data-dev-comment-type="paramref">obj</code> isnull, the method returnsfalse`. - - - Returns a value that indicates whether this instance and another vector are equal. - The other vector. - true if the two vectors are equal; otherwise, false. - - - Returns the hash code for this instance. - The hash code. - - - Returns the length of the vector. - The vector's length. - - - Returns the length of the vector squared. - The vector's length squared. - - - Performs a linear interpolation between two vectors based on the given weighting. - The first vector. - The second vector. - A value between 0 and 1 that indicates the weight of value2. - The interpolated vector. - - - Returns a vector whose elements are the maximum of each of the pairs of elements in two specified vectors. - The first vector. - The second vector. - The maximized vector. - - - Returns a vector whose elements are the minimum of each of the pairs of elements in two specified vectors. - The first vector. - The second vector. - The minimized vector. - - - Multiplies two vectors together. - The first vector. - The second vector. - The product vector. - - - Multiplies a vector by a specified scalar. - The vector to multiply. - The scalar value. - The scaled vector. - - - Multiplies a scalar value by a specified vector. - The scaled value. - The vector. - The scaled vector. - - - Negates a specified vector. - The vector to negate. - The negated vector. - - - Returns a vector with the same direction as the specified vector, but with a length of one. - The vector to normalize. - The normalized vector. - - - Gets a vector whose 2 elements are equal to one. - A vector whose two elements are equal to one (that is, it returns the vector (1,1). - - - Adds two vectors together. - The first vector to add. - The second vector to add. - The summed vector. - - - Divides the first vector by the second. - The first vector. - The second vector. - The vector that results from dividing left by right. - - - Divides the specified vector by a specified scalar value. - The vector. - The scalar value. - The result of the division. - - - Returns a value that indicates whether each pair of elements in two specified vectors is equal. - The first vector to compare. - The second vector to compare. - true if left and right are equal; otherwise, false. - - - Returns a value that indicates whether two specified vectors are not equal. - The first vector to compare. - The second vector to compare. - true if left and right are not equal; otherwise, false. - - - Multiplies two vectors together. - The first vector. - The second vector. - The product vector. - - - Multiples the specified vector by the specified scalar value. - The vector. - The scalar value. - The scaled vector. - - - Multiples the scalar value by the specified vector. - The vector. - The scalar value. - The scaled vector. - - - Subtracts the second vector from the first. - The first vector. - The second vector. - The vector that results from subtracting right from left. - - - Negates the specified vector. - The vector to negate. - The negated vector. - - - Returns the reflection of a vector off a surface that has the specified normal. - The source vector. - The normal of the surface being reflected off. - The reflected vector. - - - Returns a vector whose elements are the square root of each of a specified vector's elements. - A vector. - The square root vector. - - - Subtracts the second vector from the first. - The first vector. - The second vector. - The difference vector. - - - Returns the string representation of the current instance using default formatting. - The string representation of the current instance. - - - Returns the string representation of the current instance using the specified format string to format individual elements. - A or that defines the format of individual elements. - The string representation of the current instance. - - - Returns the string representation of the current instance using the specified format string to format individual elements and the specified format provider to define culture-specific formatting. - A or that defines the format of individual elements. - A format provider that supplies culture-specific formatting information. - The string representation of the current instance. - - - Transforms a vector by a specified 3x2 matrix. - The vector to transform. - The transformation matrix. - The transformed vector. - - - Transforms a vector by a specified 4x4 matrix. - The vector to transform. - The transformation matrix. - The transformed vector. - - - Transforms a vector by the specified Quaternion rotation value. - The vector to rotate. - The rotation to apply. - The transformed vector. - - - Transforms a vector normal by the given 3x2 matrix. - The source vector. - The matrix. - The transformed vector. - - - Transforms a vector normal by the given 4x4 matrix. - The source vector. - The matrix. - The transformed vector. - - - Gets the vector (1,0). - The vector (1,0). - - - Gets the vector (0,1). - The vector (0,1). - - - The X component of the vector. - - - - The Y component of the vector. - - - - Returns a vector whose 2 elements are equal to zero. - A vector whose two elements are equal to zero (that is, it returns the vector (0,0). - - - Represents a vector with three single-precision floating-point values. - - - Creates a new object whose three elements have the same value. - The value to assign to all three elements. - - - Creates a new object from the specified object and the specified value. - The vector with two elements. - The additional value to assign to the field. - - - Creates a vector whose elements have the specified values. - The value to assign to the field. - The value to assign to the field. - The value to assign to the field. - - - Returns a vector whose elements are the absolute values of each of the specified vector's elements. - A vector. - The absolute value vector. - - - Adds two vectors together. - The first vector to add. - The second vector to add. - The summed vector. - - - Restricts a vector between a minimum and a maximum value. - The vector to restrict. - The minimum value. - The maximum value. - The restricted vector. - - - Copies the elements of the vector to a specified array. - The destination array. - array is null. - The number of elements in the current instance is greater than in the array. - array is multidimensional. - - - Copies the elements of the vector to a specified array starting at a specified index position. - The destination array. - The index at which to copy the first element of the vector. - array is null. - The number of elements in the current instance is greater than in the array. - index is less than zero. -or- index is greater than or equal to the array length. - array is multidimensional. - - - Computes the cross product of two vectors. - The first vector. - The second vector. - The cross product. - - - Computes the Euclidean distance between the two given points. - The first point. - The second point. - The distance. - - - Returns the Euclidean distance squared between two specified points. - The first point. - The second point. - The distance squared. - - - Divides the specified vector by a specified scalar value. - The vector. - The scalar value. - The vector that results from the division. - - - Divides the first vector by the second. - The first vector. - The second vector. - The vector resulting from the division. - - - Returns the dot product of two vectors. - The first vector. - The second vector. - The dot product. - - - Returns a value that indicates whether this instance and another vector are equal. - The other vector. - true if the two vectors are equal; otherwise, false. - - - Returns a value that indicates whether this instance and a specified object are equal. - The object to compare with the current instance. - true if the current instance and obj are equal; otherwise, false```. If <code data-dev-comment-type="paramref">obj</code> isnull, the method returnsfalse`. - - - Returns the hash code for this instance. - The hash code. - - - Returns the length of this vector object. - The vector's length. - - - Returns the length of the vector squared. - The vector's length squared. - - - Performs a linear interpolation between two vectors based on the given weighting. - The first vector. - The second vector. - A value between 0 and 1 that indicates the weight of value2. - The interpolated vector. - - - Returns a vector whose elements are the maximum of each of the pairs of elements in two specified vectors. - The first vector. - The second vector. - The maximized vector. - - - Returns a vector whose elements are the minimum of each of the pairs of elements in two specified vectors. - The first vector. - The second vector. - The minimized vector. - - - Multiplies a scalar value by a specified vector. - The scaled value. - The vector. - The scaled vector. - - - Multiplies two vectors together. - The first vector. - The second vector. - The product vector. - - - Multiplies a vector by a specified scalar. - The vector to multiply. - The scalar value. - The scaled vector. - - - Negates a specified vector. - The vector to negate. - The negated vector. - - - Returns a vector with the same direction as the specified vector, but with a length of one. - The vector to normalize. - The normalized vector. - - - Gets a vector whose 3 elements are equal to one. - A vector whose three elements are equal to one (that is, it returns the vector (1,1,1). - - - Adds two vectors together. - The first vector to add. - The second vector to add. - The summed vector. - - - Divides the first vector by the second. - The first vector. - The second vector. - The vector that results from dividing left by right. - - - Divides the specified vector by a specified scalar value. - The vector. - The scalar value. - The result of the division. - - - Returns a value that indicates whether each pair of elements in two specified vectors is equal. - The first vector to compare. - The second vector to compare. - true if left and right are equal; otherwise, false. - - - Returns a value that indicates whether two specified vectors are not equal. - The first vector to compare. - The second vector to compare. - true if left and right are not equal; otherwise, false. - - - Multiplies two vectors together. - The first vector. - The second vector. - The product vector. - - - Multiples the specified vector by the specified scalar value. - The vector. - The scalar value. - The scaled vector. - - - Multiples the scalar value by the specified vector. - The vector. - The scalar value. - The scaled vector. - - - Subtracts the second vector from the first. - The first vector. - The second vector. - The vector that results from subtracting right from left. - - - Negates the specified vector. - The vector to negate. - The negated vector. - - - Returns the reflection of a vector off a surface that has the specified normal. - The source vector. - The normal of the surface being reflected off. - The reflected vector. - - - Returns a vector whose elements are the square root of each of a specified vector's elements. - A vector. - The square root vector. - - - Subtracts the second vector from the first. - The first vector. - The second vector. - The difference vector. - - - Returns the string representation of the current instance using default formatting. - The string representation of the current instance. - - - Returns the string representation of the current instance using the specified format string to format individual elements. - A or that defines the format of individual elements. - The string representation of the current instance. - - - Returns the string representation of the current instance using the specified format string to format individual elements and the specified format provider to define culture-specific formatting. - A or that defines the format of individual elements. - A format provider that supplies culture-specific formatting information. - The string representation of the current instance. - - - Transforms a vector by a specified 4x4 matrix. - The vector to transform. - The transformation matrix. - The transformed vector. - - - Transforms a vector by the specified Quaternion rotation value. - The vector to rotate. - The rotation to apply. - The transformed vector. - - - Transforms a vector normal by the given 4x4 matrix. - The source vector. - The matrix. - The transformed vector. - - - Gets the vector (1,0,0). - The vector (1,0,0). - - - Gets the vector (0,1,0). - The vector (0,1,0).. - - - Gets the vector (0,0,1). - The vector (0,0,1). - - - The X component of the vector. - - - - The Y component of the vector. - - - - The Z component of the vector. - - - - Gets a vector whose 3 elements are equal to zero. - A vector whose three elements are equal to zero (that is, it returns the vector (0,0,0). - - - Represents a vector with four single-precision floating-point values. - - - Creates a new object whose four elements have the same value. - The value to assign to all four elements. - - - Constructs a new object from the specified object and a W component. - The vector to use for the X, Y, and Z components. - The W component. - - - Creates a new object from the specified object and a Z and a W component. - The vector to use for the X and Y components. - The Z component. - The W component. - - - Creates a vector whose elements have the specified values. - The value to assign to the field. - The value to assign to the field. - The value to assign to the field. - The value to assign to the field. - - - Returns a vector whose elements are the absolute values of each of the specified vector's elements. - A vector. - The absolute value vector. - - - Adds two vectors together. - The first vector to add. - The second vector to add. - The summed vector. - - - Restricts a vector between a minimum and a maximum value. - The vector to restrict. - The minimum value. - The maximum value. - The restricted vector. - - - Copies the elements of the vector to a specified array. - The destination array. - array is null. - The number of elements in the current instance is greater than in the array. - array is multidimensional. - - - Copies the elements of the vector to a specified array starting at a specified index position. - The destination array. - The index at which to copy the first element of the vector. - array is null. - The number of elements in the current instance is greater than in the array. - index is less than zero. -or- index is greater than or equal to the array length. - array is multidimensional. - - - Computes the Euclidean distance between the two given points. - The first point. - The second point. - The distance. - - - Returns the Euclidean distance squared between two specified points. - The first point. - The second point. - The distance squared. - - - Divides the first vector by the second. - The first vector. - The second vector. - The vector resulting from the division. - - - Divides the specified vector by a specified scalar value. - The vector. - The scalar value. - The vector that results from the division. - - - Returns the dot product of two vectors. - The first vector. - The second vector. - The dot product. - - - Returns a value that indicates whether this instance and another vector are equal. - The other vector. - true if the two vectors are equal; otherwise, false. - - - Returns a value that indicates whether this instance and a specified object are equal. - The object to compare with the current instance. - true if the current instance and obj are equal; otherwise, false```. If <code data-dev-comment-type="paramref">obj</code> isnull, the method returnsfalse`. - - - Returns the hash code for this instance. - The hash code. - - - Returns the length of this vector object. - The vector's length. - - - Returns the length of the vector squared. - The vector's length squared. - - - Performs a linear interpolation between two vectors based on the given weighting. - The first vector. - The second vector. - A value between 0 and 1 that indicates the weight of value2. - The interpolated vector. - - - Returns a vector whose elements are the maximum of each of the pairs of elements in two specified vectors. - The first vector. - The second vector. - The maximized vector. - - - Returns a vector whose elements are the minimum of each of the pairs of elements in two specified vectors. - The first vector. - The second vector. - The minimized vector. - - - Multiplies two vectors together. - The first vector. - The second vector. - The product vector. - - - Multiplies a vector by a specified scalar. - The vector to multiply. - The scalar value. - The scaled vector. - - - Multiplies a scalar value by a specified vector. - The scaled value. - The vector. - The scaled vector. - - - Negates a specified vector. - The vector to negate. - The negated vector. - - - Returns a vector with the same direction as the specified vector, but with a length of one. - The vector to normalize. - The normalized vector. - - - Gets a vector whose 4 elements are equal to one. - Returns . - - - Adds two vectors together. - The first vector to add. - The second vector to add. - The summed vector. - - - Divides the first vector by the second. - The first vector. - The second vector. - The vector that results from dividing left by right. - - - Divides the specified vector by a specified scalar value. - The vector. - The scalar value. - The result of the division. - - - Returns a value that indicates whether each pair of elements in two specified vectors is equal. - The first vector to compare. - The second vector to compare. - true if left and right are equal; otherwise, false. - - - Returns a value that indicates whether two specified vectors are not equal. - The first vector to compare. - The second vector to compare. - true if left and right are not equal; otherwise, false. - - - Multiplies two vectors together. - The first vector. - The second vector. - The product vector. - - - Multiples the specified vector by the specified scalar value. - The vector. - The scalar value. - The scaled vector. - - - Multiples the scalar value by the specified vector. - The vector. - The scalar value. - The scaled vector. - - - Subtracts the second vector from the first. - The first vector. - The second vector. - The vector that results from subtracting right from left. - - - Negates the specified vector. - The vector to negate. - The negated vector. - - - Returns a vector whose elements are the square root of each of a specified vector's elements. - A vector. - The square root vector. - - - Subtracts the second vector from the first. - The first vector. - The second vector. - The difference vector. - - - Returns the string representation of the current instance using default formatting. - The string representation of the current instance. - - - Returns the string representation of the current instance using the specified format string to format individual elements. - A or that defines the format of individual elements. - The string representation of the current instance. - - - Returns the string representation of the current instance using the specified format string to format individual elements and the specified format provider to define culture-specific formatting. - A or that defines the format of individual elements. - A format provider that supplies culture-specific formatting information. - The string representation of the current instance. - - - Transforms a four-dimensional vector by the specified Quaternion rotation value. - The vector to rotate. - The rotation to apply. - The transformed vector. - - - Transforms a four-dimensional vector by a specified 4x4 matrix. - The vector to transform. - The transformation matrix. - The transformed vector. - - - Transforms a three-dimensional vector by the specified Quaternion rotation value. - The vector to rotate. - The rotation to apply. - The transformed vector. - - - Transforms a two-dimensional vector by a specified 4x4 matrix. - The vector to transform. - The transformation matrix. - The transformed vector. - - - Transforms a two-dimensional vector by the specified Quaternion rotation value. - The vector to rotate. - The rotation to apply. - The transformed vector. - - - Transforms a three-dimensional vector by a specified 4x4 matrix. - The vector to transform. - The transformation matrix. - The transformed vector. - - - Gets the vector (0,0,0,1). - The vector (0,0,0,1). - - - Gets the vector (1,0,0,0). - The vector (1,0,0,0). - - - Gets the vector (0,1,0,0). - The vector (0,1,0,0).. - - - Gets a vector whose 4 elements are equal to zero. - The vector (0,0,1,0). - - - The W component of the vector. - - - - The X component of the vector. - - - - The Y component of the vector. - - - - The Z component of the vector. - - - - Gets a vector whose 4 elements are equal to zero. - A vector whose four elements are equal to zero (that is, it returns the vector (0,0,0,0). - - - \ No newline at end of file diff --git a/packages/System.Numerics.Vectors.4.4.0/ref/netcoreapp2.0/_._ b/packages/System.Numerics.Vectors.4.4.0/ref/netcoreapp2.0/_._ deleted file mode 100644 index e69de29b..00000000 diff --git a/packages/System.Numerics.Vectors.4.4.0/ref/netstandard1.0/System.Numerics.Vectors.dll b/packages/System.Numerics.Vectors.4.4.0/ref/netstandard1.0/System.Numerics.Vectors.dll deleted file mode 100644 index d174da04..00000000 Binary files a/packages/System.Numerics.Vectors.4.4.0/ref/netstandard1.0/System.Numerics.Vectors.dll and /dev/null differ diff --git a/packages/System.Numerics.Vectors.4.4.0/ref/netstandard1.0/System.Numerics.Vectors.xml b/packages/System.Numerics.Vectors.4.4.0/ref/netstandard1.0/System.Numerics.Vectors.xml deleted file mode 100644 index 51297939..00000000 --- a/packages/System.Numerics.Vectors.4.4.0/ref/netstandard1.0/System.Numerics.Vectors.xml +++ /dev/null @@ -1,2597 +0,0 @@ - - - - System.Numerics.Vectors - - - - Represents a 3x2 matrix. - - - Creates a 3x2 matrix from the specified components. - The value to assign to the first element in the first row. - The value to assign to the second element in the first row. - The value to assign to the first element in the second row. - The value to assign to the second element in the second row. - The value to assign to the first element in the third row. - The value to assign to the second element in the third row. - - - Adds each element in one matrix with its corresponding element in a second matrix. - The first matrix. - The second matrix. - The matrix that contains the summed values of value1 and value2. - - - Creates a rotation matrix using the given rotation in radians. - The amount of rotation, in radians. - The rotation matrix. - - - Creates a rotation matrix using the specified rotation in radians and a center point. - The amount of rotation, in radians. - The center point. - The rotation matrix. - - - Creates a scaling matrix from the specified X and Y components. - The value to scale by on the X axis. - The value to scale by on the Y axis. - The scaling matrix. - - - Creates a scaling matrix that scales uniformly with the specified scale with an offset from the specified center. - The uniform scale to use. - The center offset. - The scaling matrix. - - - Creates a scaling matrix that is offset by a given center point. - The value to scale by on the X axis. - The value to scale by on the Y axis. - The center point. - The scaling matrix. - - - Creates a scaling matrix that scales uniformly with the given scale. - The uniform scale to use. - The scaling matrix. - - - Creates a scaling matrix from the specified vector scale. - The scale to use. - The scaling matrix. - - - Creates a scaling matrix from the specified vector scale with an offset from the specified center point. - The scale to use. - The center offset. - The scaling matrix. - - - Creates a skew matrix from the specified angles in radians. - The X angle, in radians. - The Y angle, in radians. - The skew matrix. - - - Creates a skew matrix from the specified angles in radians and a center point. - The X angle, in radians. - The Y angle, in radians. - The center point. - The skew matrix. - - - Creates a translation matrix from the specified 2-dimensional vector. - The translation position. - The translation matrix. - - - Creates a translation matrix from the specified X and Y components. - The X position. - The Y position. - The translation matrix. - - - Returns a value that indicates whether this instance and another 3x2 matrix are equal. - The other matrix. - true if the two matrices are equal; otherwise, false. - - - Returns a value that indicates whether this instance and a specified object are equal. - The object to compare with the current instance. - true if the current instance and obj are equal; otherwise, false```. If <code data-dev-comment-type="paramref">obj</code> isnull, the method returnsfalse`. - - - Calculates the determinant for this matrix. - The determinant. - - - Returns the hash code for this instance. - The hash code. - - - Gets the multiplicative identity matrix. - The multiplicative identify matrix. - - - Inverts the specified matrix. The return value indicates whether the operation succeeded. - The matrix to invert. - When this method returns, contains the inverted matrix if the operation succeeded. - true if matrix was converted successfully; otherwise, false. - - - Indicates whether the current matrix is the identity matrix. - true if the current matrix is the identity matrix; otherwise, false. - - - Performs a linear interpolation from one matrix to a second matrix based on a value that specifies the weighting of the second matrix. - The first matrix. - The second matrix. - The relative weighting of matrix2. - The interpolated matrix. - - - The first element of the first row. - - - - The second element of the first row. - - - - The first element of the second row. - - - - The second element of the second row. - - - - The first element of the third row. - - - - The second element of the third row. - - - - Returns the matrix that results from multiplying two matrices together. - The first matrix. - The second matrix. - The product matrix. - - - Returns the matrix that results from scaling all the elements of a specified matrix by a scalar factor. - The matrix to scale. - The scaling value to use. - The scaled matrix. - - - Negates the specified matrix by multiplying all its values by -1. - The matrix to negate. - The negated matrix. - - - Adds each element in one matrix with its corresponding element in a second matrix. - The first matrix. - The second matrix. - The matrix that contains the summed values. - - - Returns a value that indicates whether the specified matrices are equal. - The first matrix to compare. - The second matrix to compare. - true if value1 and value2 are equal; otherwise, false. - - - Returns a value that indicates whether the specified matrices are not equal. - The first matrix to compare. - The second matrix to compare. - true if value1 and value2 are not equal; otherwise, false. - - - Returns the matrix that results from multiplying two matrices together. - The first matrix. - The second matrix. - The product matrix. - - - Returns the matrix that results from scaling all the elements of a specified matrix by a scalar factor. - The matrix to scale. - The scaling value to use. - The scaled matrix. - - - Subtracts each element in a second matrix from its corresponding element in a first matrix. - The first matrix. - The second matrix. - The matrix containing the values that result from subtracting each element in value2 from its corresponding element in value1. - - - Negates the specified matrix by multiplying all its values by -1. - The matrix to negate. - The negated matrix. - - - Subtracts each element in a second matrix from its corresponding element in a first matrix. - The first matrix. - The second matrix. - The matrix containing the values that result from subtracting each element in value2 from its corresponding element in value1. - - - Returns a string that represents this matrix. - The string representation of this matrix. - - - Gets or sets the translation component of this matrix. - The translation component of the current instance. - - - Represents a 4x4 matrix. - - - Creates a object from a specified object. - A 3x2 matrix. - - - Creates a 4x4 matrix from the specified components. - The value to assign to the first element in the first row. - The value to assign to the second element in the first row. - The value to assign to the third element in the first row. - The value to assign to the fourth element in the first row. - The value to assign to the first element in the second row. - The value to assign to the second element in the second row. - The value to assign to the third element in the second row. - The value to assign to the third element in the second row. - The value to assign to the first element in the third row. - The value to assign to the second element in the third row. - The value to assign to the third element in the third row. - The value to assign to the fourth element in the third row. - The value to assign to the first element in the fourth row. - The value to assign to the second element in the fourth row. - The value to assign to the third element in the fourth row. - The value to assign to the fourth element in the fourth row. - - - Adds each element in one matrix with its corresponding element in a second matrix. - The first matrix. - The second matrix. - The matrix that contains the summed values of value1 and value2. - - - Creates a spherical billboard that rotates around a specified object position. - The position of the object that the billboard will rotate around. - The position of the camera. - The up vector of the camera. - The forward vector of the camera. - The created billboard. - - - Creates a cylindrical billboard that rotates around a specified axis. - The position of the object that the billboard will rotate around. - The position of the camera. - The axis to rotate the billboard around. - The forward vector of the camera. - The forward vector of the object. - The billboard matrix. - - - Creates a matrix that rotates around an arbitrary vector. - The axis to rotate around. - The angle to rotate around axis, in radians. - The rotation matrix. - - - Creates a rotation matrix from the specified Quaternion rotation value. - The source Quaternion. - The rotation matrix. - - - Creates a rotation matrix from the specified yaw, pitch, and roll. - The angle of rotation, in radians, around the Y axis. - The angle of rotation, in radians, around the X axis. - The angle of rotation, in radians, around the Z axis. - The rotation matrix. - - - Creates a view matrix. - The position of the camera. - The target towards which the camera is pointing. - The direction that is "up" from the camera's point of view. - The view matrix. - - - Creates an orthographic perspective matrix from the given view volume dimensions. - The width of the view volume. - The height of the view volume. - The minimum Z-value of the view volume. - The maximum Z-value of the view volume. - The orthographic projection matrix. - - - Creates a customized orthographic projection matrix. - The minimum X-value of the view volume. - The maximum X-value of the view volume. - The minimum Y-value of the view volume. - The maximum Y-value of the view volume. - The minimum Z-value of the view volume. - The maximum Z-value of the view volume. - The orthographic projection matrix. - - - Creates a perspective projection matrix from the given view volume dimensions. - The width of the view volume at the near view plane. - The height of the view volume at the near view plane. - The distance to the near view plane. - The distance to the far view plane. - The perspective projection matrix. - nearPlaneDistance is less than or equal to zero. -or- farPlaneDistance is less than or equal to zero. -or- nearPlaneDistance is greater than or equal to farPlaneDistance. - - - Creates a perspective projection matrix based on a field of view, aspect ratio, and near and far view plane distances. - The field of view in the y direction, in radians. - The aspect ratio, defined as view space width divided by height. - The distance to the near view plane. - The distance to the far view plane. - The perspective projection matrix. - fieldOfView is less than or equal to zero. -or- fieldOfView is greater than or equal to . nearPlaneDistance is less than or equal to zero. -or- farPlaneDistance is less than or equal to zero. -or- nearPlaneDistance is greater than or equal to farPlaneDistance. - - - Creates a customized perspective projection matrix. - The minimum x-value of the view volume at the near view plane. - The maximum x-value of the view volume at the near view plane. - The minimum y-value of the view volume at the near view plane. - The maximum y-value of the view volume at the near view plane. - The distance to the near view plane. - The distance to the far view plane. - The perspective projection matrix. - nearPlaneDistance is less than or equal to zero. -or- farPlaneDistance is less than or equal to zero. -or- nearPlaneDistance is greater than or equal to farPlaneDistance. - - - Creates a matrix that reflects the coordinate system about a specified plane. - The plane about which to create a reflection. - A new matrix expressing the reflection. - - - Creates a matrix for rotating points around the X axis. - The amount, in radians, by which to rotate around the X axis. - The rotation matrix. - - - Creates a matrix for rotating points around the X axis from a center point. - The amount, in radians, by which to rotate around the X axis. - The center point. - The rotation matrix. - - - The amount, in radians, by which to rotate around the Y axis from a center point. - The amount, in radians, by which to rotate around the Y-axis. - The center point. - The rotation matrix. - - - Creates a matrix for rotating points around the Y axis. - The amount, in radians, by which to rotate around the Y-axis. - The rotation matrix. - - - Creates a matrix for rotating points around the Z axis. - The amount, in radians, by which to rotate around the Z-axis. - The rotation matrix. - - - Creates a matrix for rotating points around the Z axis from a center point. - The amount, in radians, by which to rotate around the Z-axis. - The center point. - The rotation matrix. - - - Creates a scaling matrix from the specified vector scale. - The scale to use. - The scaling matrix. - - - Creates a uniform scaling matrix that scale equally on each axis. - The uniform scaling factor. - The scaling matrix. - - - Creates a scaling matrix with a center point. - The vector that contains the amount to scale on each axis. - The center point. - The scaling matrix. - - - Creates a uniform scaling matrix that scales equally on each axis with a center point. - The uniform scaling factor. - The center point. - The scaling matrix. - - - Creates a scaling matrix from the specified X, Y, and Z components. - The value to scale by on the X axis. - The value to scale by on the Y axis. - The value to scale by on the Z axis. - The scaling matrix. - - - Creates a scaling matrix that is offset by a given center point. - The value to scale by on the X axis. - The value to scale by on the Y axis. - The value to scale by on the Z axis. - The center point. - The scaling matrix. - - - Creates a matrix that flattens geometry into a specified plane as if casting a shadow from a specified light source. - The direction from which the light that will cast the shadow is coming. - The plane onto which the new matrix should flatten geometry so as to cast a shadow. - A new matrix that can be used to flatten geometry onto the specified plane from the specified direction. - - - Creates a translation matrix from the specified 3-dimensional vector. - The amount to translate in each axis. - The translation matrix. - - - Creates a translation matrix from the specified X, Y, and Z components. - The amount to translate on the X axis. - The amount to translate on the Y axis. - The amount to translate on the Z axis. - The translation matrix. - - - Creates a world matrix with the specified parameters. - The position of the object. - The forward direction of the object. - The upward direction of the object. Its value is usually [0, 1, 0]. - The world matrix. - - - Attempts to extract the scale, translation, and rotation components from the given scale, rotation, or translation matrix. The return value indicates whether the operation succeeded. - The source matrix. - When this method returns, contains the scaling component of the transformation matrix if the operation succeeded. - When this method returns, contains the rotation component of the transformation matrix if the operation succeeded. - When the method returns, contains the translation component of the transformation matrix if the operation succeeded. - true if matrix was decomposed successfully; otherwise, false. - - - Returns a value that indicates whether this instance and another 4x4 matrix are equal. - The other matrix. - true if the two matrices are equal; otherwise, false. - - - Returns a value that indicates whether this instance and a specified object are equal. - The object to compare with the current instance. - true if the current instance and obj are equal; otherwise, false```. If <code data-dev-comment-type="paramref">obj</code> isnull, the method returnsfalse`. - - - Calculates the determinant of the current 4x4 matrix. - The determinant. - - - Returns the hash code for this instance. - The hash code. - - - Gets the multiplicative identity matrix. - Gets the multiplicative identity matrix. - - - Inverts the specified matrix. The return value indicates whether the operation succeeded. - The matrix to invert. - When this method returns, contains the inverted matrix if the operation succeeded. - true if matrix was converted successfully; otherwise, false. - - - Indicates whether the current matrix is the identity matrix. - true if the current matrix is the identity matrix; otherwise, false. - - - Performs a linear interpolation from one matrix to a second matrix based on a value that specifies the weighting of the second matrix. - The first matrix. - The second matrix. - The relative weighting of matrix2. - The interpolated matrix. - - - The first element of the first row. - - - - The second element of the first row. - - - - The third element of the first row. - - - - The fourth element of the first row. - - - - The first element of the second row. - - - - The second element of the second row. - - - - The third element of the second row. - - - - The fourth element of the second row. - - - - The first element of the third row. - - - - The second element of the third row. - - - - The third element of the third row. - - - - The fourth element of the third row. - - - - The first element of the fourth row. - - - - The second element of the fourth row. - - - - The third element of the fourth row. - - - - The fourth element of the fourth row. - - - - Returns the matrix that results from multiplying two matrices together. - The first matrix. - The second matrix. - The product matrix. - - - Returns the matrix that results from scaling all the elements of a specified matrix by a scalar factor. - The matrix to scale. - The scaling value to use. - The scaled matrix. - - - Negates the specified matrix by multiplying all its values by -1. - The matrix to negate. - The negated matrix. - - - Adds each element in one matrix with its corresponding element in a second matrix. - The first matrix. - The second matrix. - The matrix that contains the summed values. - - - Returns a value that indicates whether the specified matrices are equal. - The first matrix to compare. - The second matrix to care - true if value1 and value2 are equal; otherwise, false. - - - Returns a value that indicates whether the specified matrices are not equal. - The first matrix to compare. - The second matrix to compare. - true if value1 and value2 are not equal; otherwise, false. - - - Returns the matrix that results from scaling all the elements of a specified matrix by a scalar factor. - The matrix to scale. - The scaling value to use. - The scaled matrix. - - - Returns the matrix that results from multiplying two matrices together. - The first matrix. - The second matrix. - The product matrix. - - - Subtracts each element in a second matrix from its corresponding element in a first matrix. - The first matrix. - The second matrix. - The matrix containing the values that result from subtracting each element in value2 from its corresponding element in value1. - - - Negates the specified matrix by multiplying all its values by -1. - The matrix to negate. - The negated matrix. - - - Subtracts each element in a second matrix from its corresponding element in a first matrix. - The first matrix. - The second matrix. - The matrix containing the values that result from subtracting each element in value2 from its corresponding element in value1. - - - Returns a string that represents this matrix. - The string representation of this matrix. - - - Transforms the specified matrix by applying the specified Quaternion rotation. - The matrix to transform. - The rotation t apply. - The transformed matrix. - - - Gets or sets the translation component of this matrix. - The translation component of the current instance. - - - Transposes the rows and columns of a matrix. - The matrix to transpose. - The transposed matrix. - - - Represents a three-dimensional plane. - - - Creates a object from a specified four-dimensional vector. - A vector whose first three elements describe the normal vector, and whose defines the distance along that normal from the origin. - - - Creates a object from a specified normal and the distance along the normal from the origin. - The plane's normal vector. - The plane's distance from the origin along its normal vector. - - - Creates a object from the X, Y, and Z components of its normal, and its distance from the origin on that normal. - The X component of the normal. - The Y component of the normal. - The Z component of the normal. - The distance of the plane along its normal from the origin. - - - Creates a object that contains three specified points. - The first point defining the plane. - The second point defining the plane. - The third point defining the plane. - The plane containing the three points. - - - The distance of the plane along its normal from the origin. - - - - Calculates the dot product of a plane and a 4-dimensional vector. - The plane. - The four-dimensional vector. - The dot product. - - - Returns the dot product of a specified three-dimensional vector and the normal vector of this plane plus the distance () value of the plane. - The plane. - The 3-dimensional vector. - The dot product. - - - Returns the dot product of a specified three-dimensional vector and the vector of this plane. - The plane. - The three-dimensional vector. - The dot product. - - - Returns a value that indicates whether this instance and a specified object are equal. - The object to compare with the current instance. - true if the current instance and obj are equal; otherwise, false```. If <code data-dev-comment-type="paramref">obj</code> isnull, the method returnsfalse`. - - - Returns a value that indicates whether this instance and another plane object are equal. - The other plane. - true if the two planes are equal; otherwise, false. - - - Returns the hash code for this instance. - The hash code. - - - The normal vector of the plane. - - - - Creates a new object whose normal vector is the source plane's normal vector normalized. - The source plane. - The normalized plane. - - - Returns a value that indicates whether two planes are equal. - The first plane to compare. - The second plane to compare. - true if value1 and value2 are equal; otherwise, false. - - - Returns a value that indicates whether two planes are not equal. - The first plane to compare. - The second plane to compare. - true if value1 and value2 are not equal; otherwise, false. - - - Returns the string representation of this plane object. - A string that represents this object. - - - Transforms a normalized plane by a 4x4 matrix. - The normalized plane to transform. - The transformation matrix to apply to plane. - The transformed plane. - - - Transforms a normalized plane by a Quaternion rotation. - The normalized plane to transform. - The Quaternion rotation to apply to the plane. - A new plane that results from applying the Quaternion rotation. - - - Represents a vector that is used to encode three-dimensional physical rotations. - - - Creates a quaternion from the specified vector and rotation parts. - The vector part of the quaternion. - The rotation part of the quaternion. - - - Constructs a quaternion from the specified components. - The value to assign to the X component of the quaternion. - The value to assign to the Y component of the quaternion. - The value to assign to the Z component of the quaternion. - The value to assign to the W component of the quaternion. - - - Adds each element in one quaternion with its corresponding element in a second quaternion. - The first quaternion. - The second quaternion. - The quaternion that contains the summed values of value1 and value2. - - - Concatenates two quaternions. - The first quaternion rotation in the series. - The second quaternion rotation in the series. - A new quaternion representing the concatenation of the value1 rotation followed by the value2 rotation. - - - Returns the conjugate of a specified quaternion. - The quaternion. - A new quaternion that is the conjugate of value. - - - Creates a quaternion from a vector and an angle to rotate about the vector. - The vector to rotate around. - The angle, in radians, to rotate around the vector. - The newly created quaternion. - - - Creates a quaternion from the specified rotation matrix. - The rotation matrix. - The newly created quaternion. - - - Creates a new quaternion from the given yaw, pitch, and roll. - The yaw angle, in radians, around the Y axis. - The pitch angle, in radians, around the X axis. - The roll angle, in radians, around the Z axis. - The resulting quaternion. - - - Divides one quaternion by a second quaternion. - The dividend. - The divisor. - The quaternion that results from dividing value1 by value2. - - - Calculates the dot product of two quaternions. - The first quaternion. - The second quaternion. - The dot product. - - - Returns a value that indicates whether this instance and another quaternion are equal. - The other quaternion. - true if the two quaternions are equal; otherwise, false. - - - Returns a value that indicates whether this instance and a specified object are equal. - The object to compare with the current instance. - true if the current instance and obj are equal; otherwise, false```. If <code data-dev-comment-type="paramref">obj</code> isnull, the method returnsfalse`. - - - Returns the hash code for this instance. - The hash code. - - - Gets a quaternion that represents no rotation. - A quaternion whose values are (0, 0, 0, 1). - - - Returns the inverse of a quaternion. - The quaternion. - The inverted quaternion. - - - Gets a value that indicates whether the current instance is the identity quaternion. - true if the current instance is the identity quaternion; otherwise, false. - - - Calculates the length of the quaternion. - The computed length of the quaternion. - - - Calculates the squared length of the quaternion. - The length squared of the quaternion. - - - Performs a linear interpolation between two quaternions based on a value that specifies the weighting of the second quaternion. - The first quaternion. - The second quaternion. - The relative weight of quaternion2 in the interpolation. - The interpolated quaternion. - - - Returns the quaternion that results from multiplying two quaternions together. - The first quaternion. - The second quaternion. - The product quaternion. - - - Returns the quaternion that results from scaling all the components of a specified quaternion by a scalar factor. - The source quaternion. - The scalar value. - The scaled quaternion. - - - Reverses the sign of each component of the quaternion. - The quaternion to negate. - The negated quaternion. - - - Divides each component of a specified by its length. - The quaternion to normalize. - The normalized quaternion. - - - Adds each element in one quaternion with its corresponding element in a second quaternion. - The first quaternion. - The second quaternion. - The quaternion that contains the summed values of value1 and value2. - - - Divides one quaternion by a second quaternion. - The dividend. - The divisor. - The quaternion that results from dividing value1 by value2. - - - Returns a value that indicates whether two quaternions are equal. - The first quaternion to compare. - The second quaternion to compare. - true if the two quaternions are equal; otherwise, false. - - - Returns a value that indicates whether two quaternions are not equal. - The first quaternion to compare. - The second quaternion to compare. - true if value1 and value2 are not equal; otherwise, false. - - - Returns the quaternion that results from scaling all the components of a specified quaternion by a scalar factor. - The source quaternion. - The scalar value. - The scaled quaternion. - - - Returns the quaternion that results from multiplying two quaternions together. - The first quaternion. - The second quaternion. - The product quaternion. - - - Subtracts each element in a second quaternion from its corresponding element in a first quaternion. - The first quaternion. - The second quaternion. - The quaternion containing the values that result from subtracting each element in value2 from its corresponding element in value1. - - - Reverses the sign of each component of the quaternion. - The quaternion to negate. - The negated quaternion. - - - Interpolates between two quaternions, using spherical linear interpolation. - The first quaternion. - The second quaternion. - The relative weight of the second quaternion in the interpolation. - The interpolated quaternion. - - - Subtracts each element in a second quaternion from its corresponding element in a first quaternion. - The first quaternion. - The second quaternion. - The quaternion containing the values that result from subtracting each element in value2 from its corresponding element in value1. - - - Returns a string that represents this quaternion. - The string representation of this quaternion. - - - The rotation component of the quaternion. - - - - The X value of the vector component of the quaternion. - - - - The Y value of the vector component of the quaternion. - - - - The Z value of the vector component of the quaternion. - - - - Represents a single vector of a specified numeric type that is suitable for low-level optimization of parallel algorithms. - The vector type. T can be any primitive numeric type. - - - Creates a vector whose components are of a specified type. - The numeric type that defines the type of the components in the vector. - - - Creates a vector from a specified array. - A numeric array. - values is null. - - - Creates a vector from a specified array starting at a specified index position. - A numeric array. - The starting index position from which to create the vector. - values is null. - index is less than zero. -or- The length of values minus index is less than . - - - Copies the vector instance to a specified destination array. - The array to receive a copy of the vector values. - destination is null. - The number of elements in the current vector is greater than the number of elements available in the destination array. - - - Copies the vector instance to a specified destination array starting at a specified index position. - The array to receive a copy of the vector values. - The starting index in destination at which to begin the copy operation. - destination is null. - The number of elements in the current instance is greater than the number of elements available from startIndex to the end of the destination array. - index is less than zero or greater than the last index in destination. - - - Returns the number of elements stored in the vector. - The number of elements stored in the vector. - Access to the property getter via reflection is not supported. - - - Returns a value that indicates whether this instance is equal to a specified vector. - The vector to compare with this instance. - true if the current instance and other are equal; otherwise, false. - - - Returns a value that indicates whether this instance is equal to a specified object. - The object to compare with this instance. - true if the current instance and obj are equal; otherwise, false. The method returns false if obj is null, or if obj is a vector of a different type than the current instance. - - - Returns the hash code for this instance. - The hash code. - - - Gets the element at a specified index. - The index of the element to return. - The element at index index. - index is less than zero. -or- index is greater than or equal to . - - - Returns a vector containing all ones. - A vector containing all ones. - - - Adds two vectors together. - The first vector to add. - The second vector to add. - The summed vector. - - - Returns a new vector by performing a bitwise And operation on each of the elements in two vectors. - The first vector. - The second vector. - The vector that results from the bitwise And of left and right. - - - Returns a new vector by performing a bitwise Or operation on each of the elements in two vectors. - The first vector. - The second vector. - The vector that results from the bitwise Or of the elements in left and right. - - - Divides the first vector by the second. - The first vector. - The second vector. - The vector that results from dividing left by right. - - - Returns a value that indicates whether each pair of elements in two specified vectors are equal. - The first vector to compare. - The second vector to compare. - true if left and right are equal; otherwise, false. - - - Returns a new vector by performing a bitwise XOr operation on each of the elements in two vectors. - The first vector. - The second vector. - The vector that results from the bitwise XOr of the elements in left and right. - - - Reinterprets the bits of the specified vector into a vector of type . - The vector to reinterpret. - The reinterpreted vector. - - - Reinterprets the bits of the specified vector into a vector of type . - The vector to reinterpret. - The reinterpreted vector. - - - Reinterprets the bits of the specified vector into a vector of type . - The vector to reinterpret. - The reinterpreted vector. - - - Reinterprets the bits of the specified vector into a vector of type . - The vector to reinterpret. - The reinterpreted vector. - - - Reinterprets the bits of the specified vector into a vector of type . - The vector to reinterpret. - The reinterpreted vector. - - - Reinterprets the bits of the specified vector into a vector of type . - The vector to reinterpret. - The reinterpreted vector. - - - Reinterprets the bits of the specified vector into a vector of type . - The vector to reinterpret. - The reinterpreted vector. - - - Reinterprets the bits of the specified vector into a vector of type . - The vector to reinterpret. - The reinterpreted vector. - - - Reinterprets the bits of the specified vector into a vector of type . - The vector to reinterpret. - The reinterpreted vector. - - - Reinterprets the bits of the specified vector into a vector of type . - The vector to reinterpret. - The reinterpreted vector. - - - Returns a value that indicates whether any single pair of elements in the specified vectors is equal. - The first vector to compare. - The second vector to compare. - true if any element pairs in left and right are equal. false if no element pairs are equal. - - - Multiplies two vectors together. - The first vector. - The second vector. - The product vector. - - - Multiplies a vector by a specified scalar value. - The source vector. - A scalar value. - The scaled vector. - - - Multiplies a vector by the given scalar. - The scalar value. - The source vector. - The scaled vector. - - - Returns a new vector whose elements are obtained by taking the one's complement of a specified vector's elements. - The source vector. - The one's complement vector. - - - Subtracts the second vector from the first. - The first vector. - The second vector. - The vector that results from subtracting right from left. - - - Negates a given vector. - The vector to negate. - The negated vector. - - - Returns the string representation of this vector using the specified format string to format individual elements and the specified format provider to define culture-specific formatting. - A or that defines the format of individual elements. - A format provider that supplies culture-specific formatting information. - The string representation of the current instance. - - - Returns the string representation of this vector using default formatting. - The string representation of this vector. - - - Returns the string representation of this vector using the specified format string to format individual elements. - A or that defines the format of individual elements. - The string representation of the current instance. - - - Returns a vector containing all zeroes. - A vector containing all zeroes. - - - Provides a collection of static convenience methods for creating, manipulating, combining, and converting generic vectors. - - - Returns a new vector whose elements are the absolute values of the given vector's elements. - The source vector. - The vector type. T can be any primitive numeric type. - The absolute value vector. - - - Returns a new vector whose values are the sum of each pair of elements from two given vectors. - The first vector. - The second vector. - The vector type. T can be any primitive numeric type. - The summed vector. - - - Returns a new vector by performing a bitwise And Not operation on each pair of corresponding elements in two vectors. - The first vector. - The second vector. - The vector type. T can be any primitive numeric type. - The resulting vector. - - - Reinterprets the bits of a specified vector into those of a vector of unsigned bytes. - The source vector. - The vector type. T can be any primitive numeric type. - The reinterpreted vector. - - - Reinterprets the bits of a specified vector into those of a double-precision floating-point vector. - The source vector. - The vector type. T can be any primitive numeric type. - The reinterpreted vector. - - - Reinterprets the bits of a specified vector into those of a vector of 16-bit integers. - The source vector. - The vector type. T can be any primitive numeric type. - The reinterpreted vector. - - - Reinterprets the bits of a specified vector into those of a vector of integers. - The source vector. - The vector type. T can be any primitive numeric type. - The reinterpreted vector. - - - Reinterprets the bits of a specified vector into those of a vector of long integers. - The source vector. - The vector type. T can be any primitive numeric type. - The reinterpreted vector. - - - Reinterprets the bits of a specified vector into those of a vector of signed bytes. - The source vector. - The vector type. T can be any primitive numeric type. - The reinterpreted vector. - - - Reinterprets the bits of a specified vector into those of a single-precision floating-point vector. - The source vector. - The vector type. T can be any primitive numeric type. - The reinterpreted vector. - - - Reinterprets the bits of a specified vector into those of a vector of unsigned 16-bit integers. - The source vector. - The vector type. T can be any primitive numeric type. - The reinterpreted vector. - - - Reinterprets the bits of a specified vector into those of a vector of unsigned integers. - The source vector. - The vector type. T can be any primitive numeric type. - The reinterpreted vector. - - - Reinterprets the bits of a specified vector into those of a vector of unsigned long integers. - The source vector. - The vector type. T can be any primitive numeric type. - The reinterpreted vector. - - - Returns a new vector by performing a bitwise And operation on each pair of elements in two vectors. - The first vector. - The second vector. - The vector type. T can be any primitive numeric type. - The resulting vector. - - - Returns a new vector by performing a bitwise Or operation on each pair of elements in two vectors. - The first vector. - The second vector. - The vector type. T can be any primitive numeric type. - The resulting vector. - - - Creates a new single-precision vector with elements selected between two specified single-precision source vectors based on an integral mask vector. - The integral mask vector used to drive selection. - The first source vector. - The second source vector. - The new vector with elements selected based on the mask. - - - Creates a new double-precision vector with elements selected between two specified double-precision source vectors based on an integral mask vector. - The integral mask vector used to drive selection. - The first source vector. - The second source vector. - The new vector with elements selected based on the mask. - - - Creates a new vector of a specified type with elements selected between two specified source vectors of the same type based on an integral mask vector. - The integral mask vector used to drive selection. - The first source vector. - The second source vector. - The vector type. T can be any primitive numeric type. - The new vector with elements selected based on the mask. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Returns a new vector whose values are the result of dividing the first vector's elements by the corresponding elements in the second vector. - The first vector. - The second vector. - The vector type. T can be any primitive numeric type. - The divided vector. - - - Returns the dot product of two vectors. - The first vector. - The second vector. - The vector type. T can be any primitive numeric type. - The dot product. - - - Returns a new integral vector whose elements signal whether the elements in two specified double-precision vectors are equal. - The first vector to compare. - The second vector to compare. - The resulting integral vector. - - - Returns a new integral vector whose elements signal whether the elements in two specified integral vectors are equal. - The first vector to compare. - The second vector to compare. - The resulting integral vector. - - - Returns a new vector whose elements signal whether the elements in two specified long integer vectors are equal. - The first vector to compare. - The second vector to compare. - The resulting long integer vector. - - - Returns a new integral vector whose elements signal whether the elements in two specified single-precision vectors are equal. - The first vector to compare. - The second vector to compare. - The resulting integral vector. - - - Returns a new vector of a specified type whose elements signal whether the elements in two specified vectors of the same type are equal. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - The resulting vector. - - - Returns a value that indicates whether each pair of elements in the given vectors is equal. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - true if all elements in left and right are equal; otherwise, false. - - - Returns a value that indicates whether any single pair of elements in the given vectors is equal. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - true if any element pair in left and right is equal; otherwise, false. - - - Returns a new integral vector whose elements signal whether the elements in one double-precision floating-point vector are greater than their corresponding elements in a second double-precision floating-point vector. - The first vector to compare. - The second vector to compare. - The resulting integral vector. - - - Returns a new integral vector whose elements signal whether the elements in one integral vector are greater than their corresponding elements in a second integral vector. - The first vector to compare. - The second vector to compare. - The resulting integral vector. - - - Returns a new long integer vector whose elements signal whether the elements in one long integer vector are greater than their corresponding elements in a second long integer vector. - The first vector to compare. - The second vector to compare. - The resulting long integer vector. - - - Returns a new integral vector whose elements signal whether the elements in one single-precision floating-point vector are greater than their corresponding elements in a second single-precision floating-point vector. - The first vector to compare. - The second vector to compare. - The resulting integral vector. - - - Returns a new vector whose elements signal whether the elements in one vector of a specified type are greater than their corresponding elements in the second vector of the same time. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - The resulting vector. - - - Returns a value that indicates whether all elements in the first vector are greater than the corresponding elements in the second vector. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - true if all elements in left are greater than the corresponding elements in right; otherwise, false. - - - Returns a value that indicates whether any element in the first vector is greater than the corresponding element in the second vector. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - true if any element in left is greater than the corresponding element in right; otherwise, false. - - - Returns a new integral vector whose elements signal whether the elements in one vector are greater than or equal to their corresponding elements in the single-precision floating-point second vector. - The first vector to compare. - The second vector to compare. - The resulting integral vector. - - - Returns a new long integer vector whose elements signal whether the elements in one long integer vector are greater than or equal to their corresponding elements in the second long integer vector. - The first vector to compare. - The second vector to compare. - The resulting long integer vector. - - - Returns a new integral vector whose elements signal whether the elements in one integral vector are greater than or equal to their corresponding elements in the second integral vector. - The first vector to compare. - The second vector to compare. - The resulting integral vector. - - - Returns a new integral vector whose elements signal whether the elements in one vector are greater than or equal to their corresponding elements in the second double-precision floating-point vector. - The first vector to compare. - The second vector to compare. - The resulting integral vector. - - - Returns a new vector whose elements signal whether the elements in one vector of a specified type are greater than or equal to their corresponding elements in the second vector of the same type. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - The resulting vector. - - - Returns a value that indicates whether all elements in the first vector are greater than or equal to all the corresponding elements in the second vector. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - true if all elements in left are greater than or equal to the corresponding elements in right; otherwise, false. - - - Returns a value that indicates whether any element in the first vector is greater than or equal to the corresponding element in the second vector. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - true if any element in left is greater than or equal to the corresponding element in right; otherwise, false. - - - Gets a value that indicates whether vector operations are subject to hardware acceleration through JIT intrinsic support. - true if vector operations are subject to hardware acceleration; otherwise, false. - - - Returns a new integral vector whose elements signal whether the elements in one double-precision floating-point vector are less than their corresponding elements in a second double-precision floating-point vector. - The first vector to compare. - The second vector to compare. - The resulting integral vector. - - - Returns a new integral vector whose elements signal whether the elements in one integral vector are less than their corresponding elements in a second integral vector. - The first vector to compare. - The second vector to compare. - The resulting integral vector - - - Returns a new long integer vector whose elements signal whether the elements in one long integer vector are less than their corresponding elements in a second long integer vector. - The first vector to compare. - The second vector to compare. - The resulting long integer vector. - - - Returns a new integral vector whose elements signal whether the elements in one single-precision vector are less than their corresponding elements in a second single-precision vector. - The first vector to compare. - The second vector to compare. - The resulting integral vector. - - - Returns a new vector of a specified type whose elements signal whether the elements in one vector are less than their corresponding elements in the second vector. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - The resulting vector. - - - Returns a value that indicates whether all of the elements in the first vector are less than their corresponding elements in the second vector. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - true if all of the elements in left are less than the corresponding elements in right; otherwise, false. - - - Returns a value that indicates whether any element in the first vector is less than the corresponding element in the second vector. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - true if any element in left is less than the corresponding element in right; otherwise, false. - - - Returns a new integral vector whose elements signal whether the elements in one double-precision floating-point vector are less than or equal to their corresponding elements in a second double-precision floating-point vector. - The first vector to compare. - The second vector to compare. - The resulting integral vector. - - - Returns a new integral vector whose elements signal whether the elements in one integral vector are less than or equal to their corresponding elements in a second integral vector. - The first vector to compare. - The second vector to compare. - The resulting integral vector. - - - Returns a new long integer vector whose elements signal whether the elements in one long integer vector are less or equal to their corresponding elements in a second long integer vector. - The first vector to compare. - The second vector to compare. - The resulting long integer vector. - - - Returns a new integral vector whose elements signal whether the elements in one single-precision floating-point vector are less than or equal to their corresponding elements in a second single-precision floating-point vector. - The first vector to compare. - The second vector to compare. - The resulting integral vector. - - - Returns a new vector whose elements signal whether the elements in one vector are less than or equal to their corresponding elements in the second vector. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - The resulting vector. - - - Returns a value that indicates whether all elements in the first vector are less than or equal to their corresponding elements in the second vector. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - true if all of the elements in left are less than or equal to the corresponding elements in right; otherwise, false. - - - Returns a value that indicates whether any element in the first vector is less than or equal to the corresponding element in the second vector. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - true if any element in left is less than or equal to the corresponding element in right; otherwise, false. - - - Returns a new vector whose elements are the maximum of each pair of elements in the two given vectors. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - The maximum vector. - - - Returns a new vector whose elements are the minimum of each pair of elements in the two given vectors. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - The minimum vector. - - - Returns a new vector whose values are a scalar value multiplied by each of the values of a specified vector. - The scalar value. - The vector. - The vector type. T can be any primitive numeric type. - The scaled vector. - - - Returns a new vector whose values are the product of each pair of elements in two specified vectors. - The first vector. - The second vector. - The vector type. T can be any primitive numeric type. - The product vector. - - - Returns a new vector whose values are the values of a specified vector each multiplied by a scalar value. - The vector. - The scalar value. - The vector type. T can be any primitive numeric type. - The scaled vector. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Returns a new vector whose elements are the negation of the corresponding element in the specified vector. - The source vector. - The vector type. T can be any primitive numeric type. - The negated vector. - - - Returns a new vector whose elements are obtained by taking the one's complement of a specified vector's elements. - The source vector. - The vector type. T can be any primitive numeric type. - The resulting vector. - - - Returns a new vector whose elements are the square roots of a specified vector's elements. - The source vector. - The vector type. T can be any primitive numeric type. - The square root vector. - - - Returns a new vector whose values are the difference between the elements in the second vector and their corresponding elements in the first vector. - The first vector. - The second vector. - The vector type. T can be any primitive numeric type. - The difference vector. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Returns a new vector by performing a bitwise exclusive Or (XOr) operation on each pair of elements in two vectors. - The first vector. - The second vector. - The vector type. T can be any primitive numeric type. - The resulting vector. - - - Represents a vector with two single-precision floating-point values. - - - Creates a new object whose two elements have the same value. - The value to assign to both elements. - - - Creates a vector whose elements have the specified values. - The value to assign to the field. - The value to assign to the field. - - - Returns a vector whose elements are the absolute values of each of the specified vector's elements. - A vector. - The absolute value vector. - - - Adds two vectors together. - The first vector to add. - The second vector to add. - The summed vector. - - - Restricts a vector between a minimum and a maximum value. - The vector to restrict. - The minimum value. - The maximum value. - The restricted vector. - - - Copies the elements of the vector to a specified array. - The destination array. - array is null. - The number of elements in the current instance is greater than in the array. - array is multidimensional. - - - Copies the elements of the vector to a specified array starting at a specified index position. - The destination array. - The index at which to copy the first element of the vector. - array is null. - The number of elements in the current instance is greater than in the array. - index is less than zero. -or- index is greater than or equal to the array length. - array is multidimensional. - - - Computes the Euclidean distance between the two given points. - The first point. - The second point. - The distance. - - - Returns the Euclidean distance squared between two specified points. - The first point. - The second point. - The distance squared. - - - Divides the first vector by the second. - The first vector. - The second vector. - The vector resulting from the division. - - - Divides the specified vector by a specified scalar value. - The vector. - The scalar value. - The vector that results from the division. - - - Returns the dot product of two vectors. - The first vector. - The second vector. - The dot product. - - - Returns a value that indicates whether this instance and a specified object are equal. - The object to compare with the current instance. - true if the current instance and obj are equal; otherwise, false```. If <code data-dev-comment-type="paramref">obj</code> isnull, the method returnsfalse`. - - - Returns a value that indicates whether this instance and another vector are equal. - The other vector. - true if the two vectors are equal; otherwise, false. - - - Returns the hash code for this instance. - The hash code. - - - Returns the length of the vector. - The vector's length. - - - Returns the length of the vector squared. - The vector's length squared. - - - Performs a linear interpolation between two vectors based on the given weighting. - The first vector. - The second vector. - A value between 0 and 1 that indicates the weight of value2. - The interpolated vector. - - - Returns a vector whose elements are the maximum of each of the pairs of elements in two specified vectors. - The first vector. - The second vector. - The maximized vector. - - - Returns a vector whose elements are the minimum of each of the pairs of elements in two specified vectors. - The first vector. - The second vector. - The minimized vector. - - - Multiplies two vectors together. - The first vector. - The second vector. - The product vector. - - - Multiplies a vector by a specified scalar. - The vector to multiply. - The scalar value. - The scaled vector. - - - Multiplies a scalar value by a specified vector. - The scaled value. - The vector. - The scaled vector. - - - Negates a specified vector. - The vector to negate. - The negated vector. - - - Returns a vector with the same direction as the specified vector, but with a length of one. - The vector to normalize. - The normalized vector. - - - Gets a vector whose 2 elements are equal to one. - A vector whose two elements are equal to one (that is, it returns the vector (1,1). - - - Adds two vectors together. - The first vector to add. - The second vector to add. - The summed vector. - - - Divides the first vector by the second. - The first vector. - The second vector. - The vector that results from dividing left by right. - - - Divides the specified vector by a specified scalar value. - The vector. - The scalar value. - The result of the division. - - - Returns a value that indicates whether each pair of elements in two specified vectors is equal. - The first vector to compare. - The second vector to compare. - true if left and right are equal; otherwise, false. - - - Returns a value that indicates whether two specified vectors are not equal. - The first vector to compare. - The second vector to compare. - true if left and right are not equal; otherwise, false. - - - Multiplies two vectors together. - The first vector. - The second vector. - The product vector. - - - Multiples the specified vector by the specified scalar value. - The vector. - The scalar value. - The scaled vector. - - - Multiples the scalar value by the specified vector. - The vector. - The scalar value. - The scaled vector. - - - Subtracts the second vector from the first. - The first vector. - The second vector. - The vector that results from subtracting right from left. - - - Negates the specified vector. - The vector to negate. - The negated vector. - - - Returns the reflection of a vector off a surface that has the specified normal. - The source vector. - The normal of the surface being reflected off. - The reflected vector. - - - Returns a vector whose elements are the square root of each of a specified vector's elements. - A vector. - The square root vector. - - - Subtracts the second vector from the first. - The first vector. - The second vector. - The difference vector. - - - Returns the string representation of the current instance using default formatting. - The string representation of the current instance. - - - Returns the string representation of the current instance using the specified format string to format individual elements. - A or that defines the format of individual elements. - The string representation of the current instance. - - - Returns the string representation of the current instance using the specified format string to format individual elements and the specified format provider to define culture-specific formatting. - A or that defines the format of individual elements. - A format provider that supplies culture-specific formatting information. - The string representation of the current instance. - - - Transforms a vector by a specified 3x2 matrix. - The vector to transform. - The transformation matrix. - The transformed vector. - - - Transforms a vector by a specified 4x4 matrix. - The vector to transform. - The transformation matrix. - The transformed vector. - - - Transforms a vector by the specified Quaternion rotation value. - The vector to rotate. - The rotation to apply. - The transformed vector. - - - Transforms a vector normal by the given 3x2 matrix. - The source vector. - The matrix. - The transformed vector. - - - Transforms a vector normal by the given 4x4 matrix. - The source vector. - The matrix. - The transformed vector. - - - Gets the vector (1,0). - The vector (1,0). - - - Gets the vector (0,1). - The vector (0,1). - - - The X component of the vector. - - - - The Y component of the vector. - - - - Returns a vector whose 2 elements are equal to zero. - A vector whose two elements are equal to zero (that is, it returns the vector (0,0). - - - Represents a vector with three single-precision floating-point values. - - - Creates a new object whose three elements have the same value. - The value to assign to all three elements. - - - Creates a new object from the specified object and the specified value. - The vector with two elements. - The additional value to assign to the field. - - - Creates a vector whose elements have the specified values. - The value to assign to the field. - The value to assign to the field. - The value to assign to the field. - - - Returns a vector whose elements are the absolute values of each of the specified vector's elements. - A vector. - The absolute value vector. - - - Adds two vectors together. - The first vector to add. - The second vector to add. - The summed vector. - - - Restricts a vector between a minimum and a maximum value. - The vector to restrict. - The minimum value. - The maximum value. - The restricted vector. - - - Copies the elements of the vector to a specified array. - The destination array. - array is null. - The number of elements in the current instance is greater than in the array. - array is multidimensional. - - - Copies the elements of the vector to a specified array starting at a specified index position. - The destination array. - The index at which to copy the first element of the vector. - array is null. - The number of elements in the current instance is greater than in the array. - index is less than zero. -or- index is greater than or equal to the array length. - array is multidimensional. - - - Computes the cross product of two vectors. - The first vector. - The second vector. - The cross product. - - - Computes the Euclidean distance between the two given points. - The first point. - The second point. - The distance. - - - Returns the Euclidean distance squared between two specified points. - The first point. - The second point. - The distance squared. - - - Divides the specified vector by a specified scalar value. - The vector. - The scalar value. - The vector that results from the division. - - - Divides the first vector by the second. - The first vector. - The second vector. - The vector resulting from the division. - - - Returns the dot product of two vectors. - The first vector. - The second vector. - The dot product. - - - Returns a value that indicates whether this instance and another vector are equal. - The other vector. - true if the two vectors are equal; otherwise, false. - - - Returns a value that indicates whether this instance and a specified object are equal. - The object to compare with the current instance. - true if the current instance and obj are equal; otherwise, false```. If <code data-dev-comment-type="paramref">obj</code> isnull, the method returnsfalse`. - - - Returns the hash code for this instance. - The hash code. - - - Returns the length of this vector object. - The vector's length. - - - Returns the length of the vector squared. - The vector's length squared. - - - Performs a linear interpolation between two vectors based on the given weighting. - The first vector. - The second vector. - A value between 0 and 1 that indicates the weight of value2. - The interpolated vector. - - - Returns a vector whose elements are the maximum of each of the pairs of elements in two specified vectors. - The first vector. - The second vector. - The maximized vector. - - - Returns a vector whose elements are the minimum of each of the pairs of elements in two specified vectors. - The first vector. - The second vector. - The minimized vector. - - - Multiplies a scalar value by a specified vector. - The scaled value. - The vector. - The scaled vector. - - - Multiplies two vectors together. - The first vector. - The second vector. - The product vector. - - - Multiplies a vector by a specified scalar. - The vector to multiply. - The scalar value. - The scaled vector. - - - Negates a specified vector. - The vector to negate. - The negated vector. - - - Returns a vector with the same direction as the specified vector, but with a length of one. - The vector to normalize. - The normalized vector. - - - Gets a vector whose 3 elements are equal to one. - A vector whose three elements are equal to one (that is, it returns the vector (1,1,1). - - - Adds two vectors together. - The first vector to add. - The second vector to add. - The summed vector. - - - Divides the first vector by the second. - The first vector. - The second vector. - The vector that results from dividing left by right. - - - Divides the specified vector by a specified scalar value. - The vector. - The scalar value. - The result of the division. - - - Returns a value that indicates whether each pair of elements in two specified vectors is equal. - The first vector to compare. - The second vector to compare. - true if left and right are equal; otherwise, false. - - - Returns a value that indicates whether two specified vectors are not equal. - The first vector to compare. - The second vector to compare. - true if left and right are not equal; otherwise, false. - - - Multiplies two vectors together. - The first vector. - The second vector. - The product vector. - - - Multiples the specified vector by the specified scalar value. - The vector. - The scalar value. - The scaled vector. - - - Multiples the scalar value by the specified vector. - The vector. - The scalar value. - The scaled vector. - - - Subtracts the second vector from the first. - The first vector. - The second vector. - The vector that results from subtracting right from left. - - - Negates the specified vector. - The vector to negate. - The negated vector. - - - Returns the reflection of a vector off a surface that has the specified normal. - The source vector. - The normal of the surface being reflected off. - The reflected vector. - - - Returns a vector whose elements are the square root of each of a specified vector's elements. - A vector. - The square root vector. - - - Subtracts the second vector from the first. - The first vector. - The second vector. - The difference vector. - - - Returns the string representation of the current instance using default formatting. - The string representation of the current instance. - - - Returns the string representation of the current instance using the specified format string to format individual elements. - A or that defines the format of individual elements. - The string representation of the current instance. - - - Returns the string representation of the current instance using the specified format string to format individual elements and the specified format provider to define culture-specific formatting. - A or that defines the format of individual elements. - A format provider that supplies culture-specific formatting information. - The string representation of the current instance. - - - Transforms a vector by a specified 4x4 matrix. - The vector to transform. - The transformation matrix. - The transformed vector. - - - Transforms a vector by the specified Quaternion rotation value. - The vector to rotate. - The rotation to apply. - The transformed vector. - - - Transforms a vector normal by the given 4x4 matrix. - The source vector. - The matrix. - The transformed vector. - - - Gets the vector (1,0,0). - The vector (1,0,0). - - - Gets the vector (0,1,0). - The vector (0,1,0).. - - - Gets the vector (0,0,1). - The vector (0,0,1). - - - The X component of the vector. - - - - The Y component of the vector. - - - - The Z component of the vector. - - - - Gets a vector whose 3 elements are equal to zero. - A vector whose three elements are equal to zero (that is, it returns the vector (0,0,0). - - - Represents a vector with four single-precision floating-point values. - - - Creates a new object whose four elements have the same value. - The value to assign to all four elements. - - - Constructs a new object from the specified object and a W component. - The vector to use for the X, Y, and Z components. - The W component. - - - Creates a new object from the specified object and a Z and a W component. - The vector to use for the X and Y components. - The Z component. - The W component. - - - Creates a vector whose elements have the specified values. - The value to assign to the field. - The value to assign to the field. - The value to assign to the field. - The value to assign to the field. - - - Returns a vector whose elements are the absolute values of each of the specified vector's elements. - A vector. - The absolute value vector. - - - Adds two vectors together. - The first vector to add. - The second vector to add. - The summed vector. - - - Restricts a vector between a minimum and a maximum value. - The vector to restrict. - The minimum value. - The maximum value. - The restricted vector. - - - Copies the elements of the vector to a specified array. - The destination array. - array is null. - The number of elements in the current instance is greater than in the array. - array is multidimensional. - - - Copies the elements of the vector to a specified array starting at a specified index position. - The destination array. - The index at which to copy the first element of the vector. - array is null. - The number of elements in the current instance is greater than in the array. - index is less than zero. -or- index is greater than or equal to the array length. - array is multidimensional. - - - Computes the Euclidean distance between the two given points. - The first point. - The second point. - The distance. - - - Returns the Euclidean distance squared between two specified points. - The first point. - The second point. - The distance squared. - - - Divides the first vector by the second. - The first vector. - The second vector. - The vector resulting from the division. - - - Divides the specified vector by a specified scalar value. - The vector. - The scalar value. - The vector that results from the division. - - - Returns the dot product of two vectors. - The first vector. - The second vector. - The dot product. - - - Returns a value that indicates whether this instance and another vector are equal. - The other vector. - true if the two vectors are equal; otherwise, false. - - - Returns a value that indicates whether this instance and a specified object are equal. - The object to compare with the current instance. - true if the current instance and obj are equal; otherwise, false```. If <code data-dev-comment-type="paramref">obj</code> isnull, the method returnsfalse`. - - - Returns the hash code for this instance. - The hash code. - - - Returns the length of this vector object. - The vector's length. - - - Returns the length of the vector squared. - The vector's length squared. - - - Performs a linear interpolation between two vectors based on the given weighting. - The first vector. - The second vector. - A value between 0 and 1 that indicates the weight of value2. - The interpolated vector. - - - Returns a vector whose elements are the maximum of each of the pairs of elements in two specified vectors. - The first vector. - The second vector. - The maximized vector. - - - Returns a vector whose elements are the minimum of each of the pairs of elements in two specified vectors. - The first vector. - The second vector. - The minimized vector. - - - Multiplies two vectors together. - The first vector. - The second vector. - The product vector. - - - Multiplies a vector by a specified scalar. - The vector to multiply. - The scalar value. - The scaled vector. - - - Multiplies a scalar value by a specified vector. - The scaled value. - The vector. - The scaled vector. - - - Negates a specified vector. - The vector to negate. - The negated vector. - - - Returns a vector with the same direction as the specified vector, but with a length of one. - The vector to normalize. - The normalized vector. - - - Gets a vector whose 4 elements are equal to one. - Returns . - - - Adds two vectors together. - The first vector to add. - The second vector to add. - The summed vector. - - - Divides the first vector by the second. - The first vector. - The second vector. - The vector that results from dividing left by right. - - - Divides the specified vector by a specified scalar value. - The vector. - The scalar value. - The result of the division. - - - Returns a value that indicates whether each pair of elements in two specified vectors is equal. - The first vector to compare. - The second vector to compare. - true if left and right are equal; otherwise, false. - - - Returns a value that indicates whether two specified vectors are not equal. - The first vector to compare. - The second vector to compare. - true if left and right are not equal; otherwise, false. - - - Multiplies two vectors together. - The first vector. - The second vector. - The product vector. - - - Multiples the specified vector by the specified scalar value. - The vector. - The scalar value. - The scaled vector. - - - Multiples the scalar value by the specified vector. - The vector. - The scalar value. - The scaled vector. - - - Subtracts the second vector from the first. - The first vector. - The second vector. - The vector that results from subtracting right from left. - - - Negates the specified vector. - The vector to negate. - The negated vector. - - - Returns a vector whose elements are the square root of each of a specified vector's elements. - A vector. - The square root vector. - - - Subtracts the second vector from the first. - The first vector. - The second vector. - The difference vector. - - - Returns the string representation of the current instance using default formatting. - The string representation of the current instance. - - - Returns the string representation of the current instance using the specified format string to format individual elements. - A or that defines the format of individual elements. - The string representation of the current instance. - - - Returns the string representation of the current instance using the specified format string to format individual elements and the specified format provider to define culture-specific formatting. - A or that defines the format of individual elements. - A format provider that supplies culture-specific formatting information. - The string representation of the current instance. - - - Transforms a four-dimensional vector by the specified Quaternion rotation value. - The vector to rotate. - The rotation to apply. - The transformed vector. - - - Transforms a four-dimensional vector by a specified 4x4 matrix. - The vector to transform. - The transformation matrix. - The transformed vector. - - - Transforms a three-dimensional vector by the specified Quaternion rotation value. - The vector to rotate. - The rotation to apply. - The transformed vector. - - - Transforms a two-dimensional vector by a specified 4x4 matrix. - The vector to transform. - The transformation matrix. - The transformed vector. - - - Transforms a two-dimensional vector by the specified Quaternion rotation value. - The vector to rotate. - The rotation to apply. - The transformed vector. - - - Transforms a three-dimensional vector by a specified 4x4 matrix. - The vector to transform. - The transformation matrix. - The transformed vector. - - - Gets the vector (0,0,0,1). - The vector (0,0,0,1). - - - Gets the vector (1,0,0,0). - The vector (1,0,0,0). - - - Gets the vector (0,1,0,0). - The vector (0,1,0,0).. - - - Gets a vector whose 4 elements are equal to zero. - The vector (0,0,1,0). - - - The W component of the vector. - - - - The X component of the vector. - - - - The Y component of the vector. - - - - The Z component of the vector. - - - - Gets a vector whose 4 elements are equal to zero. - A vector whose four elements are equal to zero (that is, it returns the vector (0,0,0,0). - - - \ No newline at end of file diff --git a/packages/System.Numerics.Vectors.4.4.0/ref/netstandard2.0/System.Numerics.Vectors.dll b/packages/System.Numerics.Vectors.4.4.0/ref/netstandard2.0/System.Numerics.Vectors.dll deleted file mode 100644 index ba0aa0cf..00000000 Binary files a/packages/System.Numerics.Vectors.4.4.0/ref/netstandard2.0/System.Numerics.Vectors.dll and /dev/null differ diff --git a/packages/System.Numerics.Vectors.4.4.0/ref/netstandard2.0/System.Numerics.Vectors.xml b/packages/System.Numerics.Vectors.4.4.0/ref/netstandard2.0/System.Numerics.Vectors.xml deleted file mode 100644 index 51297939..00000000 --- a/packages/System.Numerics.Vectors.4.4.0/ref/netstandard2.0/System.Numerics.Vectors.xml +++ /dev/null @@ -1,2597 +0,0 @@ - - - - System.Numerics.Vectors - - - - Represents a 3x2 matrix. - - - Creates a 3x2 matrix from the specified components. - The value to assign to the first element in the first row. - The value to assign to the second element in the first row. - The value to assign to the first element in the second row. - The value to assign to the second element in the second row. - The value to assign to the first element in the third row. - The value to assign to the second element in the third row. - - - Adds each element in one matrix with its corresponding element in a second matrix. - The first matrix. - The second matrix. - The matrix that contains the summed values of value1 and value2. - - - Creates a rotation matrix using the given rotation in radians. - The amount of rotation, in radians. - The rotation matrix. - - - Creates a rotation matrix using the specified rotation in radians and a center point. - The amount of rotation, in radians. - The center point. - The rotation matrix. - - - Creates a scaling matrix from the specified X and Y components. - The value to scale by on the X axis. - The value to scale by on the Y axis. - The scaling matrix. - - - Creates a scaling matrix that scales uniformly with the specified scale with an offset from the specified center. - The uniform scale to use. - The center offset. - The scaling matrix. - - - Creates a scaling matrix that is offset by a given center point. - The value to scale by on the X axis. - The value to scale by on the Y axis. - The center point. - The scaling matrix. - - - Creates a scaling matrix that scales uniformly with the given scale. - The uniform scale to use. - The scaling matrix. - - - Creates a scaling matrix from the specified vector scale. - The scale to use. - The scaling matrix. - - - Creates a scaling matrix from the specified vector scale with an offset from the specified center point. - The scale to use. - The center offset. - The scaling matrix. - - - Creates a skew matrix from the specified angles in radians. - The X angle, in radians. - The Y angle, in radians. - The skew matrix. - - - Creates a skew matrix from the specified angles in radians and a center point. - The X angle, in radians. - The Y angle, in radians. - The center point. - The skew matrix. - - - Creates a translation matrix from the specified 2-dimensional vector. - The translation position. - The translation matrix. - - - Creates a translation matrix from the specified X and Y components. - The X position. - The Y position. - The translation matrix. - - - Returns a value that indicates whether this instance and another 3x2 matrix are equal. - The other matrix. - true if the two matrices are equal; otherwise, false. - - - Returns a value that indicates whether this instance and a specified object are equal. - The object to compare with the current instance. - true if the current instance and obj are equal; otherwise, false```. If <code data-dev-comment-type="paramref">obj</code> isnull, the method returnsfalse`. - - - Calculates the determinant for this matrix. - The determinant. - - - Returns the hash code for this instance. - The hash code. - - - Gets the multiplicative identity matrix. - The multiplicative identify matrix. - - - Inverts the specified matrix. The return value indicates whether the operation succeeded. - The matrix to invert. - When this method returns, contains the inverted matrix if the operation succeeded. - true if matrix was converted successfully; otherwise, false. - - - Indicates whether the current matrix is the identity matrix. - true if the current matrix is the identity matrix; otherwise, false. - - - Performs a linear interpolation from one matrix to a second matrix based on a value that specifies the weighting of the second matrix. - The first matrix. - The second matrix. - The relative weighting of matrix2. - The interpolated matrix. - - - The first element of the first row. - - - - The second element of the first row. - - - - The first element of the second row. - - - - The second element of the second row. - - - - The first element of the third row. - - - - The second element of the third row. - - - - Returns the matrix that results from multiplying two matrices together. - The first matrix. - The second matrix. - The product matrix. - - - Returns the matrix that results from scaling all the elements of a specified matrix by a scalar factor. - The matrix to scale. - The scaling value to use. - The scaled matrix. - - - Negates the specified matrix by multiplying all its values by -1. - The matrix to negate. - The negated matrix. - - - Adds each element in one matrix with its corresponding element in a second matrix. - The first matrix. - The second matrix. - The matrix that contains the summed values. - - - Returns a value that indicates whether the specified matrices are equal. - The first matrix to compare. - The second matrix to compare. - true if value1 and value2 are equal; otherwise, false. - - - Returns a value that indicates whether the specified matrices are not equal. - The first matrix to compare. - The second matrix to compare. - true if value1 and value2 are not equal; otherwise, false. - - - Returns the matrix that results from multiplying two matrices together. - The first matrix. - The second matrix. - The product matrix. - - - Returns the matrix that results from scaling all the elements of a specified matrix by a scalar factor. - The matrix to scale. - The scaling value to use. - The scaled matrix. - - - Subtracts each element in a second matrix from its corresponding element in a first matrix. - The first matrix. - The second matrix. - The matrix containing the values that result from subtracting each element in value2 from its corresponding element in value1. - - - Negates the specified matrix by multiplying all its values by -1. - The matrix to negate. - The negated matrix. - - - Subtracts each element in a second matrix from its corresponding element in a first matrix. - The first matrix. - The second matrix. - The matrix containing the values that result from subtracting each element in value2 from its corresponding element in value1. - - - Returns a string that represents this matrix. - The string representation of this matrix. - - - Gets or sets the translation component of this matrix. - The translation component of the current instance. - - - Represents a 4x4 matrix. - - - Creates a object from a specified object. - A 3x2 matrix. - - - Creates a 4x4 matrix from the specified components. - The value to assign to the first element in the first row. - The value to assign to the second element in the first row. - The value to assign to the third element in the first row. - The value to assign to the fourth element in the first row. - The value to assign to the first element in the second row. - The value to assign to the second element in the second row. - The value to assign to the third element in the second row. - The value to assign to the third element in the second row. - The value to assign to the first element in the third row. - The value to assign to the second element in the third row. - The value to assign to the third element in the third row. - The value to assign to the fourth element in the third row. - The value to assign to the first element in the fourth row. - The value to assign to the second element in the fourth row. - The value to assign to the third element in the fourth row. - The value to assign to the fourth element in the fourth row. - - - Adds each element in one matrix with its corresponding element in a second matrix. - The first matrix. - The second matrix. - The matrix that contains the summed values of value1 and value2. - - - Creates a spherical billboard that rotates around a specified object position. - The position of the object that the billboard will rotate around. - The position of the camera. - The up vector of the camera. - The forward vector of the camera. - The created billboard. - - - Creates a cylindrical billboard that rotates around a specified axis. - The position of the object that the billboard will rotate around. - The position of the camera. - The axis to rotate the billboard around. - The forward vector of the camera. - The forward vector of the object. - The billboard matrix. - - - Creates a matrix that rotates around an arbitrary vector. - The axis to rotate around. - The angle to rotate around axis, in radians. - The rotation matrix. - - - Creates a rotation matrix from the specified Quaternion rotation value. - The source Quaternion. - The rotation matrix. - - - Creates a rotation matrix from the specified yaw, pitch, and roll. - The angle of rotation, in radians, around the Y axis. - The angle of rotation, in radians, around the X axis. - The angle of rotation, in radians, around the Z axis. - The rotation matrix. - - - Creates a view matrix. - The position of the camera. - The target towards which the camera is pointing. - The direction that is "up" from the camera's point of view. - The view matrix. - - - Creates an orthographic perspective matrix from the given view volume dimensions. - The width of the view volume. - The height of the view volume. - The minimum Z-value of the view volume. - The maximum Z-value of the view volume. - The orthographic projection matrix. - - - Creates a customized orthographic projection matrix. - The minimum X-value of the view volume. - The maximum X-value of the view volume. - The minimum Y-value of the view volume. - The maximum Y-value of the view volume. - The minimum Z-value of the view volume. - The maximum Z-value of the view volume. - The orthographic projection matrix. - - - Creates a perspective projection matrix from the given view volume dimensions. - The width of the view volume at the near view plane. - The height of the view volume at the near view plane. - The distance to the near view plane. - The distance to the far view plane. - The perspective projection matrix. - nearPlaneDistance is less than or equal to zero. -or- farPlaneDistance is less than or equal to zero. -or- nearPlaneDistance is greater than or equal to farPlaneDistance. - - - Creates a perspective projection matrix based on a field of view, aspect ratio, and near and far view plane distances. - The field of view in the y direction, in radians. - The aspect ratio, defined as view space width divided by height. - The distance to the near view plane. - The distance to the far view plane. - The perspective projection matrix. - fieldOfView is less than or equal to zero. -or- fieldOfView is greater than or equal to . nearPlaneDistance is less than or equal to zero. -or- farPlaneDistance is less than or equal to zero. -or- nearPlaneDistance is greater than or equal to farPlaneDistance. - - - Creates a customized perspective projection matrix. - The minimum x-value of the view volume at the near view plane. - The maximum x-value of the view volume at the near view plane. - The minimum y-value of the view volume at the near view plane. - The maximum y-value of the view volume at the near view plane. - The distance to the near view plane. - The distance to the far view plane. - The perspective projection matrix. - nearPlaneDistance is less than or equal to zero. -or- farPlaneDistance is less than or equal to zero. -or- nearPlaneDistance is greater than or equal to farPlaneDistance. - - - Creates a matrix that reflects the coordinate system about a specified plane. - The plane about which to create a reflection. - A new matrix expressing the reflection. - - - Creates a matrix for rotating points around the X axis. - The amount, in radians, by which to rotate around the X axis. - The rotation matrix. - - - Creates a matrix for rotating points around the X axis from a center point. - The amount, in radians, by which to rotate around the X axis. - The center point. - The rotation matrix. - - - The amount, in radians, by which to rotate around the Y axis from a center point. - The amount, in radians, by which to rotate around the Y-axis. - The center point. - The rotation matrix. - - - Creates a matrix for rotating points around the Y axis. - The amount, in radians, by which to rotate around the Y-axis. - The rotation matrix. - - - Creates a matrix for rotating points around the Z axis. - The amount, in radians, by which to rotate around the Z-axis. - The rotation matrix. - - - Creates a matrix for rotating points around the Z axis from a center point. - The amount, in radians, by which to rotate around the Z-axis. - The center point. - The rotation matrix. - - - Creates a scaling matrix from the specified vector scale. - The scale to use. - The scaling matrix. - - - Creates a uniform scaling matrix that scale equally on each axis. - The uniform scaling factor. - The scaling matrix. - - - Creates a scaling matrix with a center point. - The vector that contains the amount to scale on each axis. - The center point. - The scaling matrix. - - - Creates a uniform scaling matrix that scales equally on each axis with a center point. - The uniform scaling factor. - The center point. - The scaling matrix. - - - Creates a scaling matrix from the specified X, Y, and Z components. - The value to scale by on the X axis. - The value to scale by on the Y axis. - The value to scale by on the Z axis. - The scaling matrix. - - - Creates a scaling matrix that is offset by a given center point. - The value to scale by on the X axis. - The value to scale by on the Y axis. - The value to scale by on the Z axis. - The center point. - The scaling matrix. - - - Creates a matrix that flattens geometry into a specified plane as if casting a shadow from a specified light source. - The direction from which the light that will cast the shadow is coming. - The plane onto which the new matrix should flatten geometry so as to cast a shadow. - A new matrix that can be used to flatten geometry onto the specified plane from the specified direction. - - - Creates a translation matrix from the specified 3-dimensional vector. - The amount to translate in each axis. - The translation matrix. - - - Creates a translation matrix from the specified X, Y, and Z components. - The amount to translate on the X axis. - The amount to translate on the Y axis. - The amount to translate on the Z axis. - The translation matrix. - - - Creates a world matrix with the specified parameters. - The position of the object. - The forward direction of the object. - The upward direction of the object. Its value is usually [0, 1, 0]. - The world matrix. - - - Attempts to extract the scale, translation, and rotation components from the given scale, rotation, or translation matrix. The return value indicates whether the operation succeeded. - The source matrix. - When this method returns, contains the scaling component of the transformation matrix if the operation succeeded. - When this method returns, contains the rotation component of the transformation matrix if the operation succeeded. - When the method returns, contains the translation component of the transformation matrix if the operation succeeded. - true if matrix was decomposed successfully; otherwise, false. - - - Returns a value that indicates whether this instance and another 4x4 matrix are equal. - The other matrix. - true if the two matrices are equal; otherwise, false. - - - Returns a value that indicates whether this instance and a specified object are equal. - The object to compare with the current instance. - true if the current instance and obj are equal; otherwise, false```. If <code data-dev-comment-type="paramref">obj</code> isnull, the method returnsfalse`. - - - Calculates the determinant of the current 4x4 matrix. - The determinant. - - - Returns the hash code for this instance. - The hash code. - - - Gets the multiplicative identity matrix. - Gets the multiplicative identity matrix. - - - Inverts the specified matrix. The return value indicates whether the operation succeeded. - The matrix to invert. - When this method returns, contains the inverted matrix if the operation succeeded. - true if matrix was converted successfully; otherwise, false. - - - Indicates whether the current matrix is the identity matrix. - true if the current matrix is the identity matrix; otherwise, false. - - - Performs a linear interpolation from one matrix to a second matrix based on a value that specifies the weighting of the second matrix. - The first matrix. - The second matrix. - The relative weighting of matrix2. - The interpolated matrix. - - - The first element of the first row. - - - - The second element of the first row. - - - - The third element of the first row. - - - - The fourth element of the first row. - - - - The first element of the second row. - - - - The second element of the second row. - - - - The third element of the second row. - - - - The fourth element of the second row. - - - - The first element of the third row. - - - - The second element of the third row. - - - - The third element of the third row. - - - - The fourth element of the third row. - - - - The first element of the fourth row. - - - - The second element of the fourth row. - - - - The third element of the fourth row. - - - - The fourth element of the fourth row. - - - - Returns the matrix that results from multiplying two matrices together. - The first matrix. - The second matrix. - The product matrix. - - - Returns the matrix that results from scaling all the elements of a specified matrix by a scalar factor. - The matrix to scale. - The scaling value to use. - The scaled matrix. - - - Negates the specified matrix by multiplying all its values by -1. - The matrix to negate. - The negated matrix. - - - Adds each element in one matrix with its corresponding element in a second matrix. - The first matrix. - The second matrix. - The matrix that contains the summed values. - - - Returns a value that indicates whether the specified matrices are equal. - The first matrix to compare. - The second matrix to care - true if value1 and value2 are equal; otherwise, false. - - - Returns a value that indicates whether the specified matrices are not equal. - The first matrix to compare. - The second matrix to compare. - true if value1 and value2 are not equal; otherwise, false. - - - Returns the matrix that results from scaling all the elements of a specified matrix by a scalar factor. - The matrix to scale. - The scaling value to use. - The scaled matrix. - - - Returns the matrix that results from multiplying two matrices together. - The first matrix. - The second matrix. - The product matrix. - - - Subtracts each element in a second matrix from its corresponding element in a first matrix. - The first matrix. - The second matrix. - The matrix containing the values that result from subtracting each element in value2 from its corresponding element in value1. - - - Negates the specified matrix by multiplying all its values by -1. - The matrix to negate. - The negated matrix. - - - Subtracts each element in a second matrix from its corresponding element in a first matrix. - The first matrix. - The second matrix. - The matrix containing the values that result from subtracting each element in value2 from its corresponding element in value1. - - - Returns a string that represents this matrix. - The string representation of this matrix. - - - Transforms the specified matrix by applying the specified Quaternion rotation. - The matrix to transform. - The rotation t apply. - The transformed matrix. - - - Gets or sets the translation component of this matrix. - The translation component of the current instance. - - - Transposes the rows and columns of a matrix. - The matrix to transpose. - The transposed matrix. - - - Represents a three-dimensional plane. - - - Creates a object from a specified four-dimensional vector. - A vector whose first three elements describe the normal vector, and whose defines the distance along that normal from the origin. - - - Creates a object from a specified normal and the distance along the normal from the origin. - The plane's normal vector. - The plane's distance from the origin along its normal vector. - - - Creates a object from the X, Y, and Z components of its normal, and its distance from the origin on that normal. - The X component of the normal. - The Y component of the normal. - The Z component of the normal. - The distance of the plane along its normal from the origin. - - - Creates a object that contains three specified points. - The first point defining the plane. - The second point defining the plane. - The third point defining the plane. - The plane containing the three points. - - - The distance of the plane along its normal from the origin. - - - - Calculates the dot product of a plane and a 4-dimensional vector. - The plane. - The four-dimensional vector. - The dot product. - - - Returns the dot product of a specified three-dimensional vector and the normal vector of this plane plus the distance () value of the plane. - The plane. - The 3-dimensional vector. - The dot product. - - - Returns the dot product of a specified three-dimensional vector and the vector of this plane. - The plane. - The three-dimensional vector. - The dot product. - - - Returns a value that indicates whether this instance and a specified object are equal. - The object to compare with the current instance. - true if the current instance and obj are equal; otherwise, false```. If <code data-dev-comment-type="paramref">obj</code> isnull, the method returnsfalse`. - - - Returns a value that indicates whether this instance and another plane object are equal. - The other plane. - true if the two planes are equal; otherwise, false. - - - Returns the hash code for this instance. - The hash code. - - - The normal vector of the plane. - - - - Creates a new object whose normal vector is the source plane's normal vector normalized. - The source plane. - The normalized plane. - - - Returns a value that indicates whether two planes are equal. - The first plane to compare. - The second plane to compare. - true if value1 and value2 are equal; otherwise, false. - - - Returns a value that indicates whether two planes are not equal. - The first plane to compare. - The second plane to compare. - true if value1 and value2 are not equal; otherwise, false. - - - Returns the string representation of this plane object. - A string that represents this object. - - - Transforms a normalized plane by a 4x4 matrix. - The normalized plane to transform. - The transformation matrix to apply to plane. - The transformed plane. - - - Transforms a normalized plane by a Quaternion rotation. - The normalized plane to transform. - The Quaternion rotation to apply to the plane. - A new plane that results from applying the Quaternion rotation. - - - Represents a vector that is used to encode three-dimensional physical rotations. - - - Creates a quaternion from the specified vector and rotation parts. - The vector part of the quaternion. - The rotation part of the quaternion. - - - Constructs a quaternion from the specified components. - The value to assign to the X component of the quaternion. - The value to assign to the Y component of the quaternion. - The value to assign to the Z component of the quaternion. - The value to assign to the W component of the quaternion. - - - Adds each element in one quaternion with its corresponding element in a second quaternion. - The first quaternion. - The second quaternion. - The quaternion that contains the summed values of value1 and value2. - - - Concatenates two quaternions. - The first quaternion rotation in the series. - The second quaternion rotation in the series. - A new quaternion representing the concatenation of the value1 rotation followed by the value2 rotation. - - - Returns the conjugate of a specified quaternion. - The quaternion. - A new quaternion that is the conjugate of value. - - - Creates a quaternion from a vector and an angle to rotate about the vector. - The vector to rotate around. - The angle, in radians, to rotate around the vector. - The newly created quaternion. - - - Creates a quaternion from the specified rotation matrix. - The rotation matrix. - The newly created quaternion. - - - Creates a new quaternion from the given yaw, pitch, and roll. - The yaw angle, in radians, around the Y axis. - The pitch angle, in radians, around the X axis. - The roll angle, in radians, around the Z axis. - The resulting quaternion. - - - Divides one quaternion by a second quaternion. - The dividend. - The divisor. - The quaternion that results from dividing value1 by value2. - - - Calculates the dot product of two quaternions. - The first quaternion. - The second quaternion. - The dot product. - - - Returns a value that indicates whether this instance and another quaternion are equal. - The other quaternion. - true if the two quaternions are equal; otherwise, false. - - - Returns a value that indicates whether this instance and a specified object are equal. - The object to compare with the current instance. - true if the current instance and obj are equal; otherwise, false```. If <code data-dev-comment-type="paramref">obj</code> isnull, the method returnsfalse`. - - - Returns the hash code for this instance. - The hash code. - - - Gets a quaternion that represents no rotation. - A quaternion whose values are (0, 0, 0, 1). - - - Returns the inverse of a quaternion. - The quaternion. - The inverted quaternion. - - - Gets a value that indicates whether the current instance is the identity quaternion. - true if the current instance is the identity quaternion; otherwise, false. - - - Calculates the length of the quaternion. - The computed length of the quaternion. - - - Calculates the squared length of the quaternion. - The length squared of the quaternion. - - - Performs a linear interpolation between two quaternions based on a value that specifies the weighting of the second quaternion. - The first quaternion. - The second quaternion. - The relative weight of quaternion2 in the interpolation. - The interpolated quaternion. - - - Returns the quaternion that results from multiplying two quaternions together. - The first quaternion. - The second quaternion. - The product quaternion. - - - Returns the quaternion that results from scaling all the components of a specified quaternion by a scalar factor. - The source quaternion. - The scalar value. - The scaled quaternion. - - - Reverses the sign of each component of the quaternion. - The quaternion to negate. - The negated quaternion. - - - Divides each component of a specified by its length. - The quaternion to normalize. - The normalized quaternion. - - - Adds each element in one quaternion with its corresponding element in a second quaternion. - The first quaternion. - The second quaternion. - The quaternion that contains the summed values of value1 and value2. - - - Divides one quaternion by a second quaternion. - The dividend. - The divisor. - The quaternion that results from dividing value1 by value2. - - - Returns a value that indicates whether two quaternions are equal. - The first quaternion to compare. - The second quaternion to compare. - true if the two quaternions are equal; otherwise, false. - - - Returns a value that indicates whether two quaternions are not equal. - The first quaternion to compare. - The second quaternion to compare. - true if value1 and value2 are not equal; otherwise, false. - - - Returns the quaternion that results from scaling all the components of a specified quaternion by a scalar factor. - The source quaternion. - The scalar value. - The scaled quaternion. - - - Returns the quaternion that results from multiplying two quaternions together. - The first quaternion. - The second quaternion. - The product quaternion. - - - Subtracts each element in a second quaternion from its corresponding element in a first quaternion. - The first quaternion. - The second quaternion. - The quaternion containing the values that result from subtracting each element in value2 from its corresponding element in value1. - - - Reverses the sign of each component of the quaternion. - The quaternion to negate. - The negated quaternion. - - - Interpolates between two quaternions, using spherical linear interpolation. - The first quaternion. - The second quaternion. - The relative weight of the second quaternion in the interpolation. - The interpolated quaternion. - - - Subtracts each element in a second quaternion from its corresponding element in a first quaternion. - The first quaternion. - The second quaternion. - The quaternion containing the values that result from subtracting each element in value2 from its corresponding element in value1. - - - Returns a string that represents this quaternion. - The string representation of this quaternion. - - - The rotation component of the quaternion. - - - - The X value of the vector component of the quaternion. - - - - The Y value of the vector component of the quaternion. - - - - The Z value of the vector component of the quaternion. - - - - Represents a single vector of a specified numeric type that is suitable for low-level optimization of parallel algorithms. - The vector type. T can be any primitive numeric type. - - - Creates a vector whose components are of a specified type. - The numeric type that defines the type of the components in the vector. - - - Creates a vector from a specified array. - A numeric array. - values is null. - - - Creates a vector from a specified array starting at a specified index position. - A numeric array. - The starting index position from which to create the vector. - values is null. - index is less than zero. -or- The length of values minus index is less than . - - - Copies the vector instance to a specified destination array. - The array to receive a copy of the vector values. - destination is null. - The number of elements in the current vector is greater than the number of elements available in the destination array. - - - Copies the vector instance to a specified destination array starting at a specified index position. - The array to receive a copy of the vector values. - The starting index in destination at which to begin the copy operation. - destination is null. - The number of elements in the current instance is greater than the number of elements available from startIndex to the end of the destination array. - index is less than zero or greater than the last index in destination. - - - Returns the number of elements stored in the vector. - The number of elements stored in the vector. - Access to the property getter via reflection is not supported. - - - Returns a value that indicates whether this instance is equal to a specified vector. - The vector to compare with this instance. - true if the current instance and other are equal; otherwise, false. - - - Returns a value that indicates whether this instance is equal to a specified object. - The object to compare with this instance. - true if the current instance and obj are equal; otherwise, false. The method returns false if obj is null, or if obj is a vector of a different type than the current instance. - - - Returns the hash code for this instance. - The hash code. - - - Gets the element at a specified index. - The index of the element to return. - The element at index index. - index is less than zero. -or- index is greater than or equal to . - - - Returns a vector containing all ones. - A vector containing all ones. - - - Adds two vectors together. - The first vector to add. - The second vector to add. - The summed vector. - - - Returns a new vector by performing a bitwise And operation on each of the elements in two vectors. - The first vector. - The second vector. - The vector that results from the bitwise And of left and right. - - - Returns a new vector by performing a bitwise Or operation on each of the elements in two vectors. - The first vector. - The second vector. - The vector that results from the bitwise Or of the elements in left and right. - - - Divides the first vector by the second. - The first vector. - The second vector. - The vector that results from dividing left by right. - - - Returns a value that indicates whether each pair of elements in two specified vectors are equal. - The first vector to compare. - The second vector to compare. - true if left and right are equal; otherwise, false. - - - Returns a new vector by performing a bitwise XOr operation on each of the elements in two vectors. - The first vector. - The second vector. - The vector that results from the bitwise XOr of the elements in left and right. - - - Reinterprets the bits of the specified vector into a vector of type . - The vector to reinterpret. - The reinterpreted vector. - - - Reinterprets the bits of the specified vector into a vector of type . - The vector to reinterpret. - The reinterpreted vector. - - - Reinterprets the bits of the specified vector into a vector of type . - The vector to reinterpret. - The reinterpreted vector. - - - Reinterprets the bits of the specified vector into a vector of type . - The vector to reinterpret. - The reinterpreted vector. - - - Reinterprets the bits of the specified vector into a vector of type . - The vector to reinterpret. - The reinterpreted vector. - - - Reinterprets the bits of the specified vector into a vector of type . - The vector to reinterpret. - The reinterpreted vector. - - - Reinterprets the bits of the specified vector into a vector of type . - The vector to reinterpret. - The reinterpreted vector. - - - Reinterprets the bits of the specified vector into a vector of type . - The vector to reinterpret. - The reinterpreted vector. - - - Reinterprets the bits of the specified vector into a vector of type . - The vector to reinterpret. - The reinterpreted vector. - - - Reinterprets the bits of the specified vector into a vector of type . - The vector to reinterpret. - The reinterpreted vector. - - - Returns a value that indicates whether any single pair of elements in the specified vectors is equal. - The first vector to compare. - The second vector to compare. - true if any element pairs in left and right are equal. false if no element pairs are equal. - - - Multiplies two vectors together. - The first vector. - The second vector. - The product vector. - - - Multiplies a vector by a specified scalar value. - The source vector. - A scalar value. - The scaled vector. - - - Multiplies a vector by the given scalar. - The scalar value. - The source vector. - The scaled vector. - - - Returns a new vector whose elements are obtained by taking the one's complement of a specified vector's elements. - The source vector. - The one's complement vector. - - - Subtracts the second vector from the first. - The first vector. - The second vector. - The vector that results from subtracting right from left. - - - Negates a given vector. - The vector to negate. - The negated vector. - - - Returns the string representation of this vector using the specified format string to format individual elements and the specified format provider to define culture-specific formatting. - A or that defines the format of individual elements. - A format provider that supplies culture-specific formatting information. - The string representation of the current instance. - - - Returns the string representation of this vector using default formatting. - The string representation of this vector. - - - Returns the string representation of this vector using the specified format string to format individual elements. - A or that defines the format of individual elements. - The string representation of the current instance. - - - Returns a vector containing all zeroes. - A vector containing all zeroes. - - - Provides a collection of static convenience methods for creating, manipulating, combining, and converting generic vectors. - - - Returns a new vector whose elements are the absolute values of the given vector's elements. - The source vector. - The vector type. T can be any primitive numeric type. - The absolute value vector. - - - Returns a new vector whose values are the sum of each pair of elements from two given vectors. - The first vector. - The second vector. - The vector type. T can be any primitive numeric type. - The summed vector. - - - Returns a new vector by performing a bitwise And Not operation on each pair of corresponding elements in two vectors. - The first vector. - The second vector. - The vector type. T can be any primitive numeric type. - The resulting vector. - - - Reinterprets the bits of a specified vector into those of a vector of unsigned bytes. - The source vector. - The vector type. T can be any primitive numeric type. - The reinterpreted vector. - - - Reinterprets the bits of a specified vector into those of a double-precision floating-point vector. - The source vector. - The vector type. T can be any primitive numeric type. - The reinterpreted vector. - - - Reinterprets the bits of a specified vector into those of a vector of 16-bit integers. - The source vector. - The vector type. T can be any primitive numeric type. - The reinterpreted vector. - - - Reinterprets the bits of a specified vector into those of a vector of integers. - The source vector. - The vector type. T can be any primitive numeric type. - The reinterpreted vector. - - - Reinterprets the bits of a specified vector into those of a vector of long integers. - The source vector. - The vector type. T can be any primitive numeric type. - The reinterpreted vector. - - - Reinterprets the bits of a specified vector into those of a vector of signed bytes. - The source vector. - The vector type. T can be any primitive numeric type. - The reinterpreted vector. - - - Reinterprets the bits of a specified vector into those of a single-precision floating-point vector. - The source vector. - The vector type. T can be any primitive numeric type. - The reinterpreted vector. - - - Reinterprets the bits of a specified vector into those of a vector of unsigned 16-bit integers. - The source vector. - The vector type. T can be any primitive numeric type. - The reinterpreted vector. - - - Reinterprets the bits of a specified vector into those of a vector of unsigned integers. - The source vector. - The vector type. T can be any primitive numeric type. - The reinterpreted vector. - - - Reinterprets the bits of a specified vector into those of a vector of unsigned long integers. - The source vector. - The vector type. T can be any primitive numeric type. - The reinterpreted vector. - - - Returns a new vector by performing a bitwise And operation on each pair of elements in two vectors. - The first vector. - The second vector. - The vector type. T can be any primitive numeric type. - The resulting vector. - - - Returns a new vector by performing a bitwise Or operation on each pair of elements in two vectors. - The first vector. - The second vector. - The vector type. T can be any primitive numeric type. - The resulting vector. - - - Creates a new single-precision vector with elements selected between two specified single-precision source vectors based on an integral mask vector. - The integral mask vector used to drive selection. - The first source vector. - The second source vector. - The new vector with elements selected based on the mask. - - - Creates a new double-precision vector with elements selected between two specified double-precision source vectors based on an integral mask vector. - The integral mask vector used to drive selection. - The first source vector. - The second source vector. - The new vector with elements selected based on the mask. - - - Creates a new vector of a specified type with elements selected between two specified source vectors of the same type based on an integral mask vector. - The integral mask vector used to drive selection. - The first source vector. - The second source vector. - The vector type. T can be any primitive numeric type. - The new vector with elements selected based on the mask. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Returns a new vector whose values are the result of dividing the first vector's elements by the corresponding elements in the second vector. - The first vector. - The second vector. - The vector type. T can be any primitive numeric type. - The divided vector. - - - Returns the dot product of two vectors. - The first vector. - The second vector. - The vector type. T can be any primitive numeric type. - The dot product. - - - Returns a new integral vector whose elements signal whether the elements in two specified double-precision vectors are equal. - The first vector to compare. - The second vector to compare. - The resulting integral vector. - - - Returns a new integral vector whose elements signal whether the elements in two specified integral vectors are equal. - The first vector to compare. - The second vector to compare. - The resulting integral vector. - - - Returns a new vector whose elements signal whether the elements in two specified long integer vectors are equal. - The first vector to compare. - The second vector to compare. - The resulting long integer vector. - - - Returns a new integral vector whose elements signal whether the elements in two specified single-precision vectors are equal. - The first vector to compare. - The second vector to compare. - The resulting integral vector. - - - Returns a new vector of a specified type whose elements signal whether the elements in two specified vectors of the same type are equal. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - The resulting vector. - - - Returns a value that indicates whether each pair of elements in the given vectors is equal. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - true if all elements in left and right are equal; otherwise, false. - - - Returns a value that indicates whether any single pair of elements in the given vectors is equal. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - true if any element pair in left and right is equal; otherwise, false. - - - Returns a new integral vector whose elements signal whether the elements in one double-precision floating-point vector are greater than their corresponding elements in a second double-precision floating-point vector. - The first vector to compare. - The second vector to compare. - The resulting integral vector. - - - Returns a new integral vector whose elements signal whether the elements in one integral vector are greater than their corresponding elements in a second integral vector. - The first vector to compare. - The second vector to compare. - The resulting integral vector. - - - Returns a new long integer vector whose elements signal whether the elements in one long integer vector are greater than their corresponding elements in a second long integer vector. - The first vector to compare. - The second vector to compare. - The resulting long integer vector. - - - Returns a new integral vector whose elements signal whether the elements in one single-precision floating-point vector are greater than their corresponding elements in a second single-precision floating-point vector. - The first vector to compare. - The second vector to compare. - The resulting integral vector. - - - Returns a new vector whose elements signal whether the elements in one vector of a specified type are greater than their corresponding elements in the second vector of the same time. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - The resulting vector. - - - Returns a value that indicates whether all elements in the first vector are greater than the corresponding elements in the second vector. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - true if all elements in left are greater than the corresponding elements in right; otherwise, false. - - - Returns a value that indicates whether any element in the first vector is greater than the corresponding element in the second vector. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - true if any element in left is greater than the corresponding element in right; otherwise, false. - - - Returns a new integral vector whose elements signal whether the elements in one vector are greater than or equal to their corresponding elements in the single-precision floating-point second vector. - The first vector to compare. - The second vector to compare. - The resulting integral vector. - - - Returns a new long integer vector whose elements signal whether the elements in one long integer vector are greater than or equal to their corresponding elements in the second long integer vector. - The first vector to compare. - The second vector to compare. - The resulting long integer vector. - - - Returns a new integral vector whose elements signal whether the elements in one integral vector are greater than or equal to their corresponding elements in the second integral vector. - The first vector to compare. - The second vector to compare. - The resulting integral vector. - - - Returns a new integral vector whose elements signal whether the elements in one vector are greater than or equal to their corresponding elements in the second double-precision floating-point vector. - The first vector to compare. - The second vector to compare. - The resulting integral vector. - - - Returns a new vector whose elements signal whether the elements in one vector of a specified type are greater than or equal to their corresponding elements in the second vector of the same type. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - The resulting vector. - - - Returns a value that indicates whether all elements in the first vector are greater than or equal to all the corresponding elements in the second vector. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - true if all elements in left are greater than or equal to the corresponding elements in right; otherwise, false. - - - Returns a value that indicates whether any element in the first vector is greater than or equal to the corresponding element in the second vector. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - true if any element in left is greater than or equal to the corresponding element in right; otherwise, false. - - - Gets a value that indicates whether vector operations are subject to hardware acceleration through JIT intrinsic support. - true if vector operations are subject to hardware acceleration; otherwise, false. - - - Returns a new integral vector whose elements signal whether the elements in one double-precision floating-point vector are less than their corresponding elements in a second double-precision floating-point vector. - The first vector to compare. - The second vector to compare. - The resulting integral vector. - - - Returns a new integral vector whose elements signal whether the elements in one integral vector are less than their corresponding elements in a second integral vector. - The first vector to compare. - The second vector to compare. - The resulting integral vector - - - Returns a new long integer vector whose elements signal whether the elements in one long integer vector are less than their corresponding elements in a second long integer vector. - The first vector to compare. - The second vector to compare. - The resulting long integer vector. - - - Returns a new integral vector whose elements signal whether the elements in one single-precision vector are less than their corresponding elements in a second single-precision vector. - The first vector to compare. - The second vector to compare. - The resulting integral vector. - - - Returns a new vector of a specified type whose elements signal whether the elements in one vector are less than their corresponding elements in the second vector. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - The resulting vector. - - - Returns a value that indicates whether all of the elements in the first vector are less than their corresponding elements in the second vector. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - true if all of the elements in left are less than the corresponding elements in right; otherwise, false. - - - Returns a value that indicates whether any element in the first vector is less than the corresponding element in the second vector. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - true if any element in left is less than the corresponding element in right; otherwise, false. - - - Returns a new integral vector whose elements signal whether the elements in one double-precision floating-point vector are less than or equal to their corresponding elements in a second double-precision floating-point vector. - The first vector to compare. - The second vector to compare. - The resulting integral vector. - - - Returns a new integral vector whose elements signal whether the elements in one integral vector are less than or equal to their corresponding elements in a second integral vector. - The first vector to compare. - The second vector to compare. - The resulting integral vector. - - - Returns a new long integer vector whose elements signal whether the elements in one long integer vector are less or equal to their corresponding elements in a second long integer vector. - The first vector to compare. - The second vector to compare. - The resulting long integer vector. - - - Returns a new integral vector whose elements signal whether the elements in one single-precision floating-point vector are less than or equal to their corresponding elements in a second single-precision floating-point vector. - The first vector to compare. - The second vector to compare. - The resulting integral vector. - - - Returns a new vector whose elements signal whether the elements in one vector are less than or equal to their corresponding elements in the second vector. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - The resulting vector. - - - Returns a value that indicates whether all elements in the first vector are less than or equal to their corresponding elements in the second vector. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - true if all of the elements in left are less than or equal to the corresponding elements in right; otherwise, false. - - - Returns a value that indicates whether any element in the first vector is less than or equal to the corresponding element in the second vector. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - true if any element in left is less than or equal to the corresponding element in right; otherwise, false. - - - Returns a new vector whose elements are the maximum of each pair of elements in the two given vectors. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - The maximum vector. - - - Returns a new vector whose elements are the minimum of each pair of elements in the two given vectors. - The first vector to compare. - The second vector to compare. - The vector type. T can be any primitive numeric type. - The minimum vector. - - - Returns a new vector whose values are a scalar value multiplied by each of the values of a specified vector. - The scalar value. - The vector. - The vector type. T can be any primitive numeric type. - The scaled vector. - - - Returns a new vector whose values are the product of each pair of elements in two specified vectors. - The first vector. - The second vector. - The vector type. T can be any primitive numeric type. - The product vector. - - - Returns a new vector whose values are the values of a specified vector each multiplied by a scalar value. - The vector. - The scalar value. - The vector type. T can be any primitive numeric type. - The scaled vector. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Returns a new vector whose elements are the negation of the corresponding element in the specified vector. - The source vector. - The vector type. T can be any primitive numeric type. - The negated vector. - - - Returns a new vector whose elements are obtained by taking the one's complement of a specified vector's elements. - The source vector. - The vector type. T can be any primitive numeric type. - The resulting vector. - - - Returns a new vector whose elements are the square roots of a specified vector's elements. - The source vector. - The vector type. T can be any primitive numeric type. - The square root vector. - - - Returns a new vector whose values are the difference between the elements in the second vector and their corresponding elements in the first vector. - The first vector. - The second vector. - The vector type. T can be any primitive numeric type. - The difference vector. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Returns a new vector by performing a bitwise exclusive Or (XOr) operation on each pair of elements in two vectors. - The first vector. - The second vector. - The vector type. T can be any primitive numeric type. - The resulting vector. - - - Represents a vector with two single-precision floating-point values. - - - Creates a new object whose two elements have the same value. - The value to assign to both elements. - - - Creates a vector whose elements have the specified values. - The value to assign to the field. - The value to assign to the field. - - - Returns a vector whose elements are the absolute values of each of the specified vector's elements. - A vector. - The absolute value vector. - - - Adds two vectors together. - The first vector to add. - The second vector to add. - The summed vector. - - - Restricts a vector between a minimum and a maximum value. - The vector to restrict. - The minimum value. - The maximum value. - The restricted vector. - - - Copies the elements of the vector to a specified array. - The destination array. - array is null. - The number of elements in the current instance is greater than in the array. - array is multidimensional. - - - Copies the elements of the vector to a specified array starting at a specified index position. - The destination array. - The index at which to copy the first element of the vector. - array is null. - The number of elements in the current instance is greater than in the array. - index is less than zero. -or- index is greater than or equal to the array length. - array is multidimensional. - - - Computes the Euclidean distance between the two given points. - The first point. - The second point. - The distance. - - - Returns the Euclidean distance squared between two specified points. - The first point. - The second point. - The distance squared. - - - Divides the first vector by the second. - The first vector. - The second vector. - The vector resulting from the division. - - - Divides the specified vector by a specified scalar value. - The vector. - The scalar value. - The vector that results from the division. - - - Returns the dot product of two vectors. - The first vector. - The second vector. - The dot product. - - - Returns a value that indicates whether this instance and a specified object are equal. - The object to compare with the current instance. - true if the current instance and obj are equal; otherwise, false```. If <code data-dev-comment-type="paramref">obj</code> isnull, the method returnsfalse`. - - - Returns a value that indicates whether this instance and another vector are equal. - The other vector. - true if the two vectors are equal; otherwise, false. - - - Returns the hash code for this instance. - The hash code. - - - Returns the length of the vector. - The vector's length. - - - Returns the length of the vector squared. - The vector's length squared. - - - Performs a linear interpolation between two vectors based on the given weighting. - The first vector. - The second vector. - A value between 0 and 1 that indicates the weight of value2. - The interpolated vector. - - - Returns a vector whose elements are the maximum of each of the pairs of elements in two specified vectors. - The first vector. - The second vector. - The maximized vector. - - - Returns a vector whose elements are the minimum of each of the pairs of elements in two specified vectors. - The first vector. - The second vector. - The minimized vector. - - - Multiplies two vectors together. - The first vector. - The second vector. - The product vector. - - - Multiplies a vector by a specified scalar. - The vector to multiply. - The scalar value. - The scaled vector. - - - Multiplies a scalar value by a specified vector. - The scaled value. - The vector. - The scaled vector. - - - Negates a specified vector. - The vector to negate. - The negated vector. - - - Returns a vector with the same direction as the specified vector, but with a length of one. - The vector to normalize. - The normalized vector. - - - Gets a vector whose 2 elements are equal to one. - A vector whose two elements are equal to one (that is, it returns the vector (1,1). - - - Adds two vectors together. - The first vector to add. - The second vector to add. - The summed vector. - - - Divides the first vector by the second. - The first vector. - The second vector. - The vector that results from dividing left by right. - - - Divides the specified vector by a specified scalar value. - The vector. - The scalar value. - The result of the division. - - - Returns a value that indicates whether each pair of elements in two specified vectors is equal. - The first vector to compare. - The second vector to compare. - true if left and right are equal; otherwise, false. - - - Returns a value that indicates whether two specified vectors are not equal. - The first vector to compare. - The second vector to compare. - true if left and right are not equal; otherwise, false. - - - Multiplies two vectors together. - The first vector. - The second vector. - The product vector. - - - Multiples the specified vector by the specified scalar value. - The vector. - The scalar value. - The scaled vector. - - - Multiples the scalar value by the specified vector. - The vector. - The scalar value. - The scaled vector. - - - Subtracts the second vector from the first. - The first vector. - The second vector. - The vector that results from subtracting right from left. - - - Negates the specified vector. - The vector to negate. - The negated vector. - - - Returns the reflection of a vector off a surface that has the specified normal. - The source vector. - The normal of the surface being reflected off. - The reflected vector. - - - Returns a vector whose elements are the square root of each of a specified vector's elements. - A vector. - The square root vector. - - - Subtracts the second vector from the first. - The first vector. - The second vector. - The difference vector. - - - Returns the string representation of the current instance using default formatting. - The string representation of the current instance. - - - Returns the string representation of the current instance using the specified format string to format individual elements. - A or that defines the format of individual elements. - The string representation of the current instance. - - - Returns the string representation of the current instance using the specified format string to format individual elements and the specified format provider to define culture-specific formatting. - A or that defines the format of individual elements. - A format provider that supplies culture-specific formatting information. - The string representation of the current instance. - - - Transforms a vector by a specified 3x2 matrix. - The vector to transform. - The transformation matrix. - The transformed vector. - - - Transforms a vector by a specified 4x4 matrix. - The vector to transform. - The transformation matrix. - The transformed vector. - - - Transforms a vector by the specified Quaternion rotation value. - The vector to rotate. - The rotation to apply. - The transformed vector. - - - Transforms a vector normal by the given 3x2 matrix. - The source vector. - The matrix. - The transformed vector. - - - Transforms a vector normal by the given 4x4 matrix. - The source vector. - The matrix. - The transformed vector. - - - Gets the vector (1,0). - The vector (1,0). - - - Gets the vector (0,1). - The vector (0,1). - - - The X component of the vector. - - - - The Y component of the vector. - - - - Returns a vector whose 2 elements are equal to zero. - A vector whose two elements are equal to zero (that is, it returns the vector (0,0). - - - Represents a vector with three single-precision floating-point values. - - - Creates a new object whose three elements have the same value. - The value to assign to all three elements. - - - Creates a new object from the specified object and the specified value. - The vector with two elements. - The additional value to assign to the field. - - - Creates a vector whose elements have the specified values. - The value to assign to the field. - The value to assign to the field. - The value to assign to the field. - - - Returns a vector whose elements are the absolute values of each of the specified vector's elements. - A vector. - The absolute value vector. - - - Adds two vectors together. - The first vector to add. - The second vector to add. - The summed vector. - - - Restricts a vector between a minimum and a maximum value. - The vector to restrict. - The minimum value. - The maximum value. - The restricted vector. - - - Copies the elements of the vector to a specified array. - The destination array. - array is null. - The number of elements in the current instance is greater than in the array. - array is multidimensional. - - - Copies the elements of the vector to a specified array starting at a specified index position. - The destination array. - The index at which to copy the first element of the vector. - array is null. - The number of elements in the current instance is greater than in the array. - index is less than zero. -or- index is greater than or equal to the array length. - array is multidimensional. - - - Computes the cross product of two vectors. - The first vector. - The second vector. - The cross product. - - - Computes the Euclidean distance between the two given points. - The first point. - The second point. - The distance. - - - Returns the Euclidean distance squared between two specified points. - The first point. - The second point. - The distance squared. - - - Divides the specified vector by a specified scalar value. - The vector. - The scalar value. - The vector that results from the division. - - - Divides the first vector by the second. - The first vector. - The second vector. - The vector resulting from the division. - - - Returns the dot product of two vectors. - The first vector. - The second vector. - The dot product. - - - Returns a value that indicates whether this instance and another vector are equal. - The other vector. - true if the two vectors are equal; otherwise, false. - - - Returns a value that indicates whether this instance and a specified object are equal. - The object to compare with the current instance. - true if the current instance and obj are equal; otherwise, false```. If <code data-dev-comment-type="paramref">obj</code> isnull, the method returnsfalse`. - - - Returns the hash code for this instance. - The hash code. - - - Returns the length of this vector object. - The vector's length. - - - Returns the length of the vector squared. - The vector's length squared. - - - Performs a linear interpolation between two vectors based on the given weighting. - The first vector. - The second vector. - A value between 0 and 1 that indicates the weight of value2. - The interpolated vector. - - - Returns a vector whose elements are the maximum of each of the pairs of elements in two specified vectors. - The first vector. - The second vector. - The maximized vector. - - - Returns a vector whose elements are the minimum of each of the pairs of elements in two specified vectors. - The first vector. - The second vector. - The minimized vector. - - - Multiplies a scalar value by a specified vector. - The scaled value. - The vector. - The scaled vector. - - - Multiplies two vectors together. - The first vector. - The second vector. - The product vector. - - - Multiplies a vector by a specified scalar. - The vector to multiply. - The scalar value. - The scaled vector. - - - Negates a specified vector. - The vector to negate. - The negated vector. - - - Returns a vector with the same direction as the specified vector, but with a length of one. - The vector to normalize. - The normalized vector. - - - Gets a vector whose 3 elements are equal to one. - A vector whose three elements are equal to one (that is, it returns the vector (1,1,1). - - - Adds two vectors together. - The first vector to add. - The second vector to add. - The summed vector. - - - Divides the first vector by the second. - The first vector. - The second vector. - The vector that results from dividing left by right. - - - Divides the specified vector by a specified scalar value. - The vector. - The scalar value. - The result of the division. - - - Returns a value that indicates whether each pair of elements in two specified vectors is equal. - The first vector to compare. - The second vector to compare. - true if left and right are equal; otherwise, false. - - - Returns a value that indicates whether two specified vectors are not equal. - The first vector to compare. - The second vector to compare. - true if left and right are not equal; otherwise, false. - - - Multiplies two vectors together. - The first vector. - The second vector. - The product vector. - - - Multiples the specified vector by the specified scalar value. - The vector. - The scalar value. - The scaled vector. - - - Multiples the scalar value by the specified vector. - The vector. - The scalar value. - The scaled vector. - - - Subtracts the second vector from the first. - The first vector. - The second vector. - The vector that results from subtracting right from left. - - - Negates the specified vector. - The vector to negate. - The negated vector. - - - Returns the reflection of a vector off a surface that has the specified normal. - The source vector. - The normal of the surface being reflected off. - The reflected vector. - - - Returns a vector whose elements are the square root of each of a specified vector's elements. - A vector. - The square root vector. - - - Subtracts the second vector from the first. - The first vector. - The second vector. - The difference vector. - - - Returns the string representation of the current instance using default formatting. - The string representation of the current instance. - - - Returns the string representation of the current instance using the specified format string to format individual elements. - A or that defines the format of individual elements. - The string representation of the current instance. - - - Returns the string representation of the current instance using the specified format string to format individual elements and the specified format provider to define culture-specific formatting. - A or that defines the format of individual elements. - A format provider that supplies culture-specific formatting information. - The string representation of the current instance. - - - Transforms a vector by a specified 4x4 matrix. - The vector to transform. - The transformation matrix. - The transformed vector. - - - Transforms a vector by the specified Quaternion rotation value. - The vector to rotate. - The rotation to apply. - The transformed vector. - - - Transforms a vector normal by the given 4x4 matrix. - The source vector. - The matrix. - The transformed vector. - - - Gets the vector (1,0,0). - The vector (1,0,0). - - - Gets the vector (0,1,0). - The vector (0,1,0).. - - - Gets the vector (0,0,1). - The vector (0,0,1). - - - The X component of the vector. - - - - The Y component of the vector. - - - - The Z component of the vector. - - - - Gets a vector whose 3 elements are equal to zero. - A vector whose three elements are equal to zero (that is, it returns the vector (0,0,0). - - - Represents a vector with four single-precision floating-point values. - - - Creates a new object whose four elements have the same value. - The value to assign to all four elements. - - - Constructs a new object from the specified object and a W component. - The vector to use for the X, Y, and Z components. - The W component. - - - Creates a new object from the specified object and a Z and a W component. - The vector to use for the X and Y components. - The Z component. - The W component. - - - Creates a vector whose elements have the specified values. - The value to assign to the field. - The value to assign to the field. - The value to assign to the field. - The value to assign to the field. - - - Returns a vector whose elements are the absolute values of each of the specified vector's elements. - A vector. - The absolute value vector. - - - Adds two vectors together. - The first vector to add. - The second vector to add. - The summed vector. - - - Restricts a vector between a minimum and a maximum value. - The vector to restrict. - The minimum value. - The maximum value. - The restricted vector. - - - Copies the elements of the vector to a specified array. - The destination array. - array is null. - The number of elements in the current instance is greater than in the array. - array is multidimensional. - - - Copies the elements of the vector to a specified array starting at a specified index position. - The destination array. - The index at which to copy the first element of the vector. - array is null. - The number of elements in the current instance is greater than in the array. - index is less than zero. -or- index is greater than or equal to the array length. - array is multidimensional. - - - Computes the Euclidean distance between the two given points. - The first point. - The second point. - The distance. - - - Returns the Euclidean distance squared between two specified points. - The first point. - The second point. - The distance squared. - - - Divides the first vector by the second. - The first vector. - The second vector. - The vector resulting from the division. - - - Divides the specified vector by a specified scalar value. - The vector. - The scalar value. - The vector that results from the division. - - - Returns the dot product of two vectors. - The first vector. - The second vector. - The dot product. - - - Returns a value that indicates whether this instance and another vector are equal. - The other vector. - true if the two vectors are equal; otherwise, false. - - - Returns a value that indicates whether this instance and a specified object are equal. - The object to compare with the current instance. - true if the current instance and obj are equal; otherwise, false```. If <code data-dev-comment-type="paramref">obj</code> isnull, the method returnsfalse`. - - - Returns the hash code for this instance. - The hash code. - - - Returns the length of this vector object. - The vector's length. - - - Returns the length of the vector squared. - The vector's length squared. - - - Performs a linear interpolation between two vectors based on the given weighting. - The first vector. - The second vector. - A value between 0 and 1 that indicates the weight of value2. - The interpolated vector. - - - Returns a vector whose elements are the maximum of each of the pairs of elements in two specified vectors. - The first vector. - The second vector. - The maximized vector. - - - Returns a vector whose elements are the minimum of each of the pairs of elements in two specified vectors. - The first vector. - The second vector. - The minimized vector. - - - Multiplies two vectors together. - The first vector. - The second vector. - The product vector. - - - Multiplies a vector by a specified scalar. - The vector to multiply. - The scalar value. - The scaled vector. - - - Multiplies a scalar value by a specified vector. - The scaled value. - The vector. - The scaled vector. - - - Negates a specified vector. - The vector to negate. - The negated vector. - - - Returns a vector with the same direction as the specified vector, but with a length of one. - The vector to normalize. - The normalized vector. - - - Gets a vector whose 4 elements are equal to one. - Returns . - - - Adds two vectors together. - The first vector to add. - The second vector to add. - The summed vector. - - - Divides the first vector by the second. - The first vector. - The second vector. - The vector that results from dividing left by right. - - - Divides the specified vector by a specified scalar value. - The vector. - The scalar value. - The result of the division. - - - Returns a value that indicates whether each pair of elements in two specified vectors is equal. - The first vector to compare. - The second vector to compare. - true if left and right are equal; otherwise, false. - - - Returns a value that indicates whether two specified vectors are not equal. - The first vector to compare. - The second vector to compare. - true if left and right are not equal; otherwise, false. - - - Multiplies two vectors together. - The first vector. - The second vector. - The product vector. - - - Multiples the specified vector by the specified scalar value. - The vector. - The scalar value. - The scaled vector. - - - Multiples the scalar value by the specified vector. - The vector. - The scalar value. - The scaled vector. - - - Subtracts the second vector from the first. - The first vector. - The second vector. - The vector that results from subtracting right from left. - - - Negates the specified vector. - The vector to negate. - The negated vector. - - - Returns a vector whose elements are the square root of each of a specified vector's elements. - A vector. - The square root vector. - - - Subtracts the second vector from the first. - The first vector. - The second vector. - The difference vector. - - - Returns the string representation of the current instance using default formatting. - The string representation of the current instance. - - - Returns the string representation of the current instance using the specified format string to format individual elements. - A or that defines the format of individual elements. - The string representation of the current instance. - - - Returns the string representation of the current instance using the specified format string to format individual elements and the specified format provider to define culture-specific formatting. - A or that defines the format of individual elements. - A format provider that supplies culture-specific formatting information. - The string representation of the current instance. - - - Transforms a four-dimensional vector by the specified Quaternion rotation value. - The vector to rotate. - The rotation to apply. - The transformed vector. - - - Transforms a four-dimensional vector by a specified 4x4 matrix. - The vector to transform. - The transformation matrix. - The transformed vector. - - - Transforms a three-dimensional vector by the specified Quaternion rotation value. - The vector to rotate. - The rotation to apply. - The transformed vector. - - - Transforms a two-dimensional vector by a specified 4x4 matrix. - The vector to transform. - The transformation matrix. - The transformed vector. - - - Transforms a two-dimensional vector by the specified Quaternion rotation value. - The vector to rotate. - The rotation to apply. - The transformed vector. - - - Transforms a three-dimensional vector by a specified 4x4 matrix. - The vector to transform. - The transformation matrix. - The transformed vector. - - - Gets the vector (0,0,0,1). - The vector (0,0,0,1). - - - Gets the vector (1,0,0,0). - The vector (1,0,0,0). - - - Gets the vector (0,1,0,0). - The vector (0,1,0,0).. - - - Gets a vector whose 4 elements are equal to zero. - The vector (0,0,1,0). - - - The W component of the vector. - - - - The X component of the vector. - - - - The Y component of the vector. - - - - The Z component of the vector. - - - - Gets a vector whose 4 elements are equal to zero. - A vector whose four elements are equal to zero (that is, it returns the vector (0,0,0,0). - - - \ No newline at end of file diff --git a/packages/System.Numerics.Vectors.4.4.0/ref/xamarinios10/_._ b/packages/System.Numerics.Vectors.4.4.0/ref/xamarinios10/_._ deleted file mode 100644 index e69de29b..00000000 diff --git a/packages/System.Numerics.Vectors.4.4.0/ref/xamarinmac20/_._ b/packages/System.Numerics.Vectors.4.4.0/ref/xamarinmac20/_._ deleted file mode 100644 index e69de29b..00000000 diff --git a/packages/System.Numerics.Vectors.4.4.0/ref/xamarintvos10/_._ b/packages/System.Numerics.Vectors.4.4.0/ref/xamarintvos10/_._ deleted file mode 100644 index e69de29b..00000000 diff --git a/packages/System.Numerics.Vectors.4.4.0/ref/xamarinwatchos10/_._ b/packages/System.Numerics.Vectors.4.4.0/ref/xamarinwatchos10/_._ deleted file mode 100644 index e69de29b..00000000 diff --git a/packages/System.Numerics.Vectors.4.4.0/useSharedDesignerContext.txt b/packages/System.Numerics.Vectors.4.4.0/useSharedDesignerContext.txt deleted file mode 100644 index e69de29b..00000000 diff --git a/packages/System.Numerics.Vectors.4.4.0/version.txt b/packages/System.Numerics.Vectors.4.4.0/version.txt deleted file mode 100644 index 1ca86a08..00000000 --- a/packages/System.Numerics.Vectors.4.4.0/version.txt +++ /dev/null @@ -1 +0,0 @@ -8321c729934c0f8be754953439b88e6e1c120c24 diff --git a/packages/System.Runtime.CompilerServices.Unsafe.4.5.0/.signature.p7s b/packages/System.Runtime.CompilerServices.Unsafe.4.5.0/.signature.p7s deleted file mode 100644 index 836f297f..00000000 Binary files a/packages/System.Runtime.CompilerServices.Unsafe.4.5.0/.signature.p7s and /dev/null differ diff --git a/packages/System.Runtime.CompilerServices.Unsafe.4.5.0/LICENSE.TXT b/packages/System.Runtime.CompilerServices.Unsafe.4.5.0/LICENSE.TXT deleted file mode 100644 index 984713a4..00000000 --- a/packages/System.Runtime.CompilerServices.Unsafe.4.5.0/LICENSE.TXT +++ /dev/null @@ -1,23 +0,0 @@ -The MIT License (MIT) - -Copyright (c) .NET Foundation and Contributors - -All rights reserved. - -Permission is hereby granted, free of charge, to any person obtaining a copy -of this software and associated documentation files (the "Software"), to deal -in the Software without restriction, including without limitation the rights -to use, copy, modify, merge, publish, distribute, sublicense, and/or sell -copies of the Software, and to permit persons to whom the Software is -furnished to do so, subject to the following conditions: - -The above copyright notice and this permission notice shall be included in all -copies or substantial portions of the Software. - -THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR -IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, -FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE -AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER -LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, -OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE -SOFTWARE. diff --git a/packages/System.Runtime.CompilerServices.Unsafe.4.5.0/System.Runtime.CompilerServices.Unsafe.4.5.0.nupkg b/packages/System.Runtime.CompilerServices.Unsafe.4.5.0/System.Runtime.CompilerServices.Unsafe.4.5.0.nupkg deleted file mode 100644 index afebe659..00000000 Binary files a/packages/System.Runtime.CompilerServices.Unsafe.4.5.0/System.Runtime.CompilerServices.Unsafe.4.5.0.nupkg and /dev/null differ diff --git a/packages/System.Runtime.CompilerServices.Unsafe.4.5.0/THIRD-PARTY-NOTICES.TXT b/packages/System.Runtime.CompilerServices.Unsafe.4.5.0/THIRD-PARTY-NOTICES.TXT deleted file mode 100644 index db542ca2..00000000 --- a/packages/System.Runtime.CompilerServices.Unsafe.4.5.0/THIRD-PARTY-NOTICES.TXT +++ /dev/null @@ -1,309 +0,0 @@ -.NET Core uses third-party libraries or other resources that may be -distributed under licenses different than the .NET Core software. - -In the event that we accidentally failed to list a required notice, please -bring it to our attention. Post an issue or email us: - - dotnet@microsoft.com - -The attached notices are provided for information only. - -License notice for Slicing-by-8 -------------------------------- - -http://sourceforge.net/projects/slicing-by-8/ - -Copyright (c) 2004-2006 Intel Corporation - All Rights Reserved - - -This software program is licensed subject to the BSD License, available at -http://www.opensource.org/licenses/bsd-license.html. - - -License notice for Unicode data -------------------------------- - -http://www.unicode.org/copyright.html#License - -Copyright © 1991-2017 Unicode, Inc. All rights reserved. -Distributed under the Terms of Use in http://www.unicode.org/copyright.html. - -Permission is hereby granted, free of charge, to any person obtaining -a copy of the Unicode data files and any associated documentation -(the "Data Files") or Unicode software and any associated documentation -(the "Software") to deal in the Data Files or Software -without restriction, including without limitation the rights to use, -copy, modify, merge, publish, distribute, and/or sell copies of -the Data Files or Software, and to permit persons to whom the Data Files -or Software are furnished to do so, provided that either -(a) this copyright and permission notice appear with all copies -of the Data Files or Software, or -(b) this copyright and permission notice appear in associated -Documentation. - -THE DATA FILES AND SOFTWARE ARE PROVIDED "AS IS", WITHOUT WARRANTY OF -ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE -WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND -NONINFRINGEMENT OF THIRD PARTY RIGHTS. -IN NO EVENT SHALL THE COPYRIGHT HOLDER OR HOLDERS INCLUDED IN THIS -NOTICE BE LIABLE FOR ANY CLAIM, OR ANY SPECIAL INDIRECT OR CONSEQUENTIAL -DAMAGES, OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, -DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER -TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR -PERFORMANCE OF THE DATA FILES OR SOFTWARE. - -Except as contained in this notice, the name of a copyright holder -shall not be used in advertising or otherwise to promote the sale, -use or other dealings in these Data Files or Software without prior -written authorization of the copyright holder. - -License notice for Zlib ------------------------ - -https://github.com/madler/zlib -http://zlib.net/zlib_license.html - -/* zlib.h -- interface of the 'zlib' general purpose compression library - version 1.2.11, January 15th, 2017 - - Copyright (C) 1995-2017 Jean-loup Gailly and Mark Adler - - This software is provided 'as-is', without any express or implied - warranty. In no event will the authors be held liable for any damages - arising from the use of this software. - - Permission is granted to anyone to use this software for any purpose, - including commercial applications, and to alter it and redistribute it - freely, subject to the following restrictions: - - 1. The origin of this software must not be misrepresented; you must not - claim that you wrote the original software. If you use this software - in a product, an acknowledgment in the product documentation would be - appreciated but is not required. - 2. Altered source versions must be plainly marked as such, and must not be - misrepresented as being the original software. - 3. This notice may not be removed or altered from any source distribution. - - Jean-loup Gailly Mark Adler - jloup@gzip.org madler@alumni.caltech.edu - -*/ - -License notice for Mono -------------------------------- - -http://www.mono-project.com/docs/about-mono/ - -Copyright (c) .NET Foundation Contributors - -MIT License - -Permission is hereby granted, free of charge, to any person obtaining a copy -of this software and associated documentation files (the Software), to deal -in the Software without restriction, including without limitation the rights -to use, copy, modify, merge, publish, distribute, sublicense, and/or sell -copies of the Software, and to permit persons to whom the Software is -furnished to do so, subject to the following conditions: - -The above copyright notice and this permission notice shall be included in all -copies or substantial portions of the Software. - -THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, -EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF -MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND -NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE -LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION -OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION -WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. - -License notice for International Organization for Standardization ------------------------------------------------------------------ - -Portions (C) International Organization for Standardization 1986: - Permission to copy in any form is granted for use with - conforming SGML systems and applications as defined in - ISO 8879, provided this notice is included in all copies. - -License notice for Intel ------------------------- - -"Copyright (c) 2004-2006 Intel Corporation - All Rights Reserved - -Redistribution and use in source and binary forms, with or without -modification, are permitted provided that the following conditions are met: - -1. Redistributions of source code must retain the above copyright notice, this -list of conditions and the following disclaimer. - -2. Redistributions in binary form must reproduce the above copyright notice, -this list of conditions and the following disclaimer in the documentation -and/or other materials provided with the distribution. - -THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" -AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE -IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE -DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE -FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL -DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR -SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER -CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, -OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE -OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. - -License notice for Xamarin and Novell -------------------------------------- - -Copyright (c) 2015 Xamarin, Inc (http://www.xamarin.com) - -Permission is hereby granted, free of charge, to any person obtaining a copy -of this software and associated documentation files (the "Software"), to deal -in the Software without restriction, including without limitation the rights -to use, copy, modify, merge, publish, distribute, sublicense, and/or sell -copies of the Software, and to permit persons to whom the Software is -furnished to do so, subject to the following conditions: - -The above copyright notice and this permission notice shall be included in -all copies or substantial portions of the Software. - -THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR -IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, -FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE -AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER -LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, -OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN -THE SOFTWARE. - -Copyright (c) 2011 Novell, Inc (http://www.novell.com) - -Permission is hereby granted, free of charge, to any person obtaining a copy -of this software and associated documentation files (the "Software"), to deal -in the Software without restriction, including without limitation the rights -to use, copy, modify, merge, publish, distribute, sublicense, and/or sell -copies of the Software, and to permit persons to whom the Software is -furnished to do so, subject to the following conditions: - -The above copyright notice and this permission notice shall be included in -all copies or substantial portions of the Software. - -THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR -IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, -FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE -AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER -LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, -OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN -THE SOFTWARE. - -Third party notice for W3C --------------------------- - -"W3C SOFTWARE AND DOCUMENT NOTICE AND LICENSE -Status: This license takes effect 13 May, 2015. -This work is being provided by the copyright holders under the following license. -License -By obtaining and/or copying this work, you (the licensee) agree that you have read, understood, and will comply with the following terms and conditions. -Permission to copy, modify, and distribute this work, with or without modification, for any purpose and without fee or royalty is hereby granted, provided that you include the following on ALL copies of the work or portions thereof, including modifications: -The full text of this NOTICE in a location viewable to users of the redistributed or derivative work. -Any pre-existing intellectual property disclaimers, notices, or terms and conditions. If none exist, the W3C Software and Document Short Notice should be included. -Notice of any changes or modifications, through a copyright statement on the new code or document such as "This software or document includes material copied from or derived from [title and URI of the W3C document]. Copyright © [YEAR] W3C® (MIT, ERCIM, Keio, Beihang)." -Disclaimers -THIS WORK IS PROVIDED "AS IS," AND COPYRIGHT HOLDERS MAKE NO REPRESENTATIONS OR WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO, WARRANTIES OF MERCHANTABILITY OR FITNESS FOR ANY PARTICULAR PURPOSE OR THAT THE USE OF THE SOFTWARE OR DOCUMENT WILL NOT INFRINGE ANY THIRD PARTY PATENTS, COPYRIGHTS, TRADEMARKS OR OTHER RIGHTS. -COPYRIGHT HOLDERS WILL NOT BE LIABLE FOR ANY DIRECT, INDIRECT, SPECIAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF ANY USE OF THE SOFTWARE OR DOCUMENT. -The name and trademarks of copyright holders may NOT be used in advertising or publicity pertaining to the work without specific, written prior permission. Title to copyright in this work will at all times remain with copyright holders." - -License notice for Bit Twiddling Hacks --------------------------------------- - -Bit Twiddling Hacks - -By Sean Eron Anderson -seander@cs.stanford.edu - -Individually, the code snippets here are in the public domain (unless otherwise -noted) — feel free to use them however you please. The aggregate collection and -descriptions are © 1997-2005 Sean Eron Anderson. The code and descriptions are -distributed in the hope that they will be useful, but WITHOUT ANY WARRANTY and -without even the implied warranty of merchantability or fitness for a particular -purpose. - -License notice for Brotli --------------------------------------- - -Copyright (c) 2009, 2010, 2013-2016 by the Brotli Authors. - -Permission is hereby granted, free of charge, to any person obtaining a copy -of this software and associated documentation files (the "Software"), to deal -in the Software without restriction, including without limitation the rights -to use, copy, modify, merge, publish, distribute, sublicense, and/or sell -copies of the Software, and to permit persons to whom the Software is -furnished to do so, subject to the following conditions: - -The above copyright notice and this permission notice shall be included in -all copies or substantial portions of the Software. - -THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR -IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, -FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE -AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER -LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, -OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN -THE SOFTWARE. - -compress_fragment.c: -Copyright (c) 2011, Google Inc. -All rights reserved. - -Redistribution and use in source and binary forms, with or without -modification, are permitted provided that the following conditions are -met: - - * Redistributions of source code must retain the above copyright -notice, this list of conditions and the following disclaimer. - * Redistributions in binary form must reproduce the above -copyright notice, this list of conditions and the following disclaimer -in the documentation and/or other materials provided with the -distribution. - * Neither the name of Google Inc. nor the names of its -contributors may be used to endorse or promote products derived from -this software without specific prior written permission. - -THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS -""AS IS"" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT -LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR -A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT -OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, -SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT -LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, -DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY -THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT -(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE -OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. - -decode_fuzzer.c: -Copyright (c) 2015 The Chromium Authors. All rights reserved. - -Redistribution and use in source and binary forms, with or without -modification, are permitted provided that the following conditions are -met: - - * Redistributions of source code must retain the above copyright -notice, this list of conditions and the following disclaimer. - * Redistributions in binary form must reproduce the above -copyright notice, this list of conditions and the following disclaimer -in the documentation and/or other materials provided with the -distribution. - * Neither the name of Google Inc. nor the names of its -contributors may be used to endorse or promote products derived from -this software without specific prior written permission. - -THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS -""AS IS"" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT -LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR -A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT -OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, -SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT -LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, -DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY -THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT -(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE -OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE." - diff --git a/packages/System.Runtime.CompilerServices.Unsafe.4.5.0/lib/netcoreapp2.0/System.Runtime.CompilerServices.Unsafe.dll b/packages/System.Runtime.CompilerServices.Unsafe.4.5.0/lib/netcoreapp2.0/System.Runtime.CompilerServices.Unsafe.dll deleted file mode 100644 index 55d867e6..00000000 Binary files a/packages/System.Runtime.CompilerServices.Unsafe.4.5.0/lib/netcoreapp2.0/System.Runtime.CompilerServices.Unsafe.dll and /dev/null differ diff --git a/packages/System.Runtime.CompilerServices.Unsafe.4.5.0/lib/netcoreapp2.0/System.Runtime.CompilerServices.Unsafe.xml b/packages/System.Runtime.CompilerServices.Unsafe.4.5.0/lib/netcoreapp2.0/System.Runtime.CompilerServices.Unsafe.xml deleted file mode 100644 index 6a7cfcff..00000000 --- a/packages/System.Runtime.CompilerServices.Unsafe.4.5.0/lib/netcoreapp2.0/System.Runtime.CompilerServices.Unsafe.xml +++ /dev/null @@ -1,200 +0,0 @@ - - - System.Runtime.CompilerServices.Unsafe - - - - Contains generic, low-level functionality for manipulating pointers. - - - Adds an element offset to the given reference. - The reference to add the offset to. - The offset to add. - The type of reference. - A new reference that reflects the addition of offset to pointer. - - - Adds an element offset to the given reference. - The reference to add the offset to. - The offset to add. - The type of reference. - A new reference that reflects the addition of offset to pointer. - - - Adds a byte offset to the given reference. - The reference to add the offset to. - The offset to add. - The type of reference. - A new reference that reflects the addition of byte offset to pointer. - - - Determines whether the specified references point to the same location. - The first reference to compare. - The second reference to compare. - The type of reference. - true if left and right point to the same location; otherwise, false. - - - Casts the given object to the specified type. - The object to cast. - The type which the object will be cast to. - The original object, casted to the given type. - - - Reinterprets the given reference as a reference to a value of type TTo. - The reference to reinterpret. - The type of reference to reinterpret.. - The desired type of the reference. - A reference to a value of type TTo. - - - Returns a pointer to the given by-ref parameter. - The object whose pointer is obtained. - The type of object. - A pointer to the given value. - - - Reinterprets the given location as a reference to a value of type T. - The location of the value to reference. - The type of the interpreted location. - A reference to a value of type T. - - - Determines the byte offset from origin to target from the given references. - The reference to origin. - The reference to target. - The type of reference. - Byte offset from origin to target i.e. target - origin. - - - Copies a value of type T to the given location. - The location to copy to. - A reference to the value to copy. - The type of value to copy. - - - Copies a value of type T to the given location. - The location to copy to. - A pointer to the value to copy. - The type of value to copy. - - - Copies bytes from the source address to the destination address. - The destination address to copy to. - The source address to copy from. - The number of bytes to copy. - - - Copies bytes from the source address to the destination address. - The destination address to copy to. - The source address to copy from. - The number of bytes to copy. - - - Copies bytes from the source address to the destination address -without assuming architecture dependent alignment of the addresses. - The destination address to copy to. - The source address to copy from. - The number of bytes to copy. - - - Copies bytes from the source address to the destination address -without assuming architecture dependent alignment of the addresses. - The destination address to copy to. - The source address to copy from. - The number of bytes to copy. - - - Initializes a block of memory at the given location with a given initial value. - The address of the start of the memory block to initialize. - The value to initialize the block to. - The number of bytes to initialize. - - - Initializes a block of memory at the given location with a given initial value. - The address of the start of the memory block to initialize. - The value to initialize the block to. - The number of bytes to initialize. - - - Initializes a block of memory at the given location with a given initial value -without assuming architecture dependent alignment of the address. - The address of the start of the memory block to initialize. - The value to initialize the block to. - The number of bytes to initialize. - - - Initializes a block of memory at the given location with a given initial value -without assuming architecture dependent alignment of the address. - The address of the start of the memory block to initialize. - The value to initialize the block to. - The number of bytes to initialize. - - - Reads a value of type T from the given location. - The location to read from. - The type to read. - An object of type T read from the given location. - - - Reads a value of type T from the given location -without assuming architecture dependent alignment of the addresses. - The location to read from. - The type to read. - An object of type T read from the given location. - - - Reads a value of type T from the given location -without assuming architecture dependent alignment of the addresses. - The location to read from. - The type to read. - An object of type T read from the given location. - - - Returns the size of an object of the given type parameter. - The type of object whose size is retrieved. - The size of an object of type T. - - - Subtracts an element offset from the given reference. - The reference to subtract the offset from. - The offset to subtract. - The type of reference. - A new reference that reflects the subraction of offset from pointer. - - - Subtracts an element offset from the given reference. - The reference to subtract the offset from. - The offset to subtract. - The type of reference. - A new reference that reflects the subraction of offset from pointer. - - - Subtracts a byte offset from the given reference. - The reference to subtract the offset from. - - The type of reference. - A new reference that reflects the subraction of byte offset from pointer. - - - Writes a value of type T to the given location. - The location to write to. - The value to write. - The type of value to write. - - - Writes a value of type T to the given location -without assuming architecture dependent alignment of the addresses. - The location to write to. - The value to write. - The type of value to write. - - - Writes a value of type T to the given location -without assuming architecture dependent alignment of the addresses. - The location to write to. - The value to write. - The type of value to write. - - - \ No newline at end of file diff --git a/packages/System.Runtime.CompilerServices.Unsafe.4.5.0/lib/netstandard1.0/System.Runtime.CompilerServices.Unsafe.dll b/packages/System.Runtime.CompilerServices.Unsafe.4.5.0/lib/netstandard1.0/System.Runtime.CompilerServices.Unsafe.dll deleted file mode 100644 index 63403d72..00000000 Binary files a/packages/System.Runtime.CompilerServices.Unsafe.4.5.0/lib/netstandard1.0/System.Runtime.CompilerServices.Unsafe.dll and /dev/null differ diff --git a/packages/System.Runtime.CompilerServices.Unsafe.4.5.0/lib/netstandard1.0/System.Runtime.CompilerServices.Unsafe.xml b/packages/System.Runtime.CompilerServices.Unsafe.4.5.0/lib/netstandard1.0/System.Runtime.CompilerServices.Unsafe.xml deleted file mode 100644 index 6a7cfcff..00000000 --- a/packages/System.Runtime.CompilerServices.Unsafe.4.5.0/lib/netstandard1.0/System.Runtime.CompilerServices.Unsafe.xml +++ /dev/null @@ -1,200 +0,0 @@ - - - System.Runtime.CompilerServices.Unsafe - - - - Contains generic, low-level functionality for manipulating pointers. - - - Adds an element offset to the given reference. - The reference to add the offset to. - The offset to add. - The type of reference. - A new reference that reflects the addition of offset to pointer. - - - Adds an element offset to the given reference. - The reference to add the offset to. - The offset to add. - The type of reference. - A new reference that reflects the addition of offset to pointer. - - - Adds a byte offset to the given reference. - The reference to add the offset to. - The offset to add. - The type of reference. - A new reference that reflects the addition of byte offset to pointer. - - - Determines whether the specified references point to the same location. - The first reference to compare. - The second reference to compare. - The type of reference. - true if left and right point to the same location; otherwise, false. - - - Casts the given object to the specified type. - The object to cast. - The type which the object will be cast to. - The original object, casted to the given type. - - - Reinterprets the given reference as a reference to a value of type TTo. - The reference to reinterpret. - The type of reference to reinterpret.. - The desired type of the reference. - A reference to a value of type TTo. - - - Returns a pointer to the given by-ref parameter. - The object whose pointer is obtained. - The type of object. - A pointer to the given value. - - - Reinterprets the given location as a reference to a value of type T. - The location of the value to reference. - The type of the interpreted location. - A reference to a value of type T. - - - Determines the byte offset from origin to target from the given references. - The reference to origin. - The reference to target. - The type of reference. - Byte offset from origin to target i.e. target - origin. - - - Copies a value of type T to the given location. - The location to copy to. - A reference to the value to copy. - The type of value to copy. - - - Copies a value of type T to the given location. - The location to copy to. - A pointer to the value to copy. - The type of value to copy. - - - Copies bytes from the source address to the destination address. - The destination address to copy to. - The source address to copy from. - The number of bytes to copy. - - - Copies bytes from the source address to the destination address. - The destination address to copy to. - The source address to copy from. - The number of bytes to copy. - - - Copies bytes from the source address to the destination address -without assuming architecture dependent alignment of the addresses. - The destination address to copy to. - The source address to copy from. - The number of bytes to copy. - - - Copies bytes from the source address to the destination address -without assuming architecture dependent alignment of the addresses. - The destination address to copy to. - The source address to copy from. - The number of bytes to copy. - - - Initializes a block of memory at the given location with a given initial value. - The address of the start of the memory block to initialize. - The value to initialize the block to. - The number of bytes to initialize. - - - Initializes a block of memory at the given location with a given initial value. - The address of the start of the memory block to initialize. - The value to initialize the block to. - The number of bytes to initialize. - - - Initializes a block of memory at the given location with a given initial value -without assuming architecture dependent alignment of the address. - The address of the start of the memory block to initialize. - The value to initialize the block to. - The number of bytes to initialize. - - - Initializes a block of memory at the given location with a given initial value -without assuming architecture dependent alignment of the address. - The address of the start of the memory block to initialize. - The value to initialize the block to. - The number of bytes to initialize. - - - Reads a value of type T from the given location. - The location to read from. - The type to read. - An object of type T read from the given location. - - - Reads a value of type T from the given location -without assuming architecture dependent alignment of the addresses. - The location to read from. - The type to read. - An object of type T read from the given location. - - - Reads a value of type T from the given location -without assuming architecture dependent alignment of the addresses. - The location to read from. - The type to read. - An object of type T read from the given location. - - - Returns the size of an object of the given type parameter. - The type of object whose size is retrieved. - The size of an object of type T. - - - Subtracts an element offset from the given reference. - The reference to subtract the offset from. - The offset to subtract. - The type of reference. - A new reference that reflects the subraction of offset from pointer. - - - Subtracts an element offset from the given reference. - The reference to subtract the offset from. - The offset to subtract. - The type of reference. - A new reference that reflects the subraction of offset from pointer. - - - Subtracts a byte offset from the given reference. - The reference to subtract the offset from. - - The type of reference. - A new reference that reflects the subraction of byte offset from pointer. - - - Writes a value of type T to the given location. - The location to write to. - The value to write. - The type of value to write. - - - Writes a value of type T to the given location -without assuming architecture dependent alignment of the addresses. - The location to write to. - The value to write. - The type of value to write. - - - Writes a value of type T to the given location -without assuming architecture dependent alignment of the addresses. - The location to write to. - The value to write. - The type of value to write. - - - \ No newline at end of file diff --git a/packages/System.Runtime.CompilerServices.Unsafe.4.5.0/lib/netstandard2.0/System.Runtime.CompilerServices.Unsafe.dll b/packages/System.Runtime.CompilerServices.Unsafe.4.5.0/lib/netstandard2.0/System.Runtime.CompilerServices.Unsafe.dll deleted file mode 100644 index 0b459034..00000000 Binary files a/packages/System.Runtime.CompilerServices.Unsafe.4.5.0/lib/netstandard2.0/System.Runtime.CompilerServices.Unsafe.dll and /dev/null differ diff --git a/packages/System.Runtime.CompilerServices.Unsafe.4.5.0/lib/netstandard2.0/System.Runtime.CompilerServices.Unsafe.xml b/packages/System.Runtime.CompilerServices.Unsafe.4.5.0/lib/netstandard2.0/System.Runtime.CompilerServices.Unsafe.xml deleted file mode 100644 index 6a7cfcff..00000000 --- a/packages/System.Runtime.CompilerServices.Unsafe.4.5.0/lib/netstandard2.0/System.Runtime.CompilerServices.Unsafe.xml +++ /dev/null @@ -1,200 +0,0 @@ - - - System.Runtime.CompilerServices.Unsafe - - - - Contains generic, low-level functionality for manipulating pointers. - - - Adds an element offset to the given reference. - The reference to add the offset to. - The offset to add. - The type of reference. - A new reference that reflects the addition of offset to pointer. - - - Adds an element offset to the given reference. - The reference to add the offset to. - The offset to add. - The type of reference. - A new reference that reflects the addition of offset to pointer. - - - Adds a byte offset to the given reference. - The reference to add the offset to. - The offset to add. - The type of reference. - A new reference that reflects the addition of byte offset to pointer. - - - Determines whether the specified references point to the same location. - The first reference to compare. - The second reference to compare. - The type of reference. - true if left and right point to the same location; otherwise, false. - - - Casts the given object to the specified type. - The object to cast. - The type which the object will be cast to. - The original object, casted to the given type. - - - Reinterprets the given reference as a reference to a value of type TTo. - The reference to reinterpret. - The type of reference to reinterpret.. - The desired type of the reference. - A reference to a value of type TTo. - - - Returns a pointer to the given by-ref parameter. - The object whose pointer is obtained. - The type of object. - A pointer to the given value. - - - Reinterprets the given location as a reference to a value of type T. - The location of the value to reference. - The type of the interpreted location. - A reference to a value of type T. - - - Determines the byte offset from origin to target from the given references. - The reference to origin. - The reference to target. - The type of reference. - Byte offset from origin to target i.e. target - origin. - - - Copies a value of type T to the given location. - The location to copy to. - A reference to the value to copy. - The type of value to copy. - - - Copies a value of type T to the given location. - The location to copy to. - A pointer to the value to copy. - The type of value to copy. - - - Copies bytes from the source address to the destination address. - The destination address to copy to. - The source address to copy from. - The number of bytes to copy. - - - Copies bytes from the source address to the destination address. - The destination address to copy to. - The source address to copy from. - The number of bytes to copy. - - - Copies bytes from the source address to the destination address -without assuming architecture dependent alignment of the addresses. - The destination address to copy to. - The source address to copy from. - The number of bytes to copy. - - - Copies bytes from the source address to the destination address -without assuming architecture dependent alignment of the addresses. - The destination address to copy to. - The source address to copy from. - The number of bytes to copy. - - - Initializes a block of memory at the given location with a given initial value. - The address of the start of the memory block to initialize. - The value to initialize the block to. - The number of bytes to initialize. - - - Initializes a block of memory at the given location with a given initial value. - The address of the start of the memory block to initialize. - The value to initialize the block to. - The number of bytes to initialize. - - - Initializes a block of memory at the given location with a given initial value -without assuming architecture dependent alignment of the address. - The address of the start of the memory block to initialize. - The value to initialize the block to. - The number of bytes to initialize. - - - Initializes a block of memory at the given location with a given initial value -without assuming architecture dependent alignment of the address. - The address of the start of the memory block to initialize. - The value to initialize the block to. - The number of bytes to initialize. - - - Reads a value of type T from the given location. - The location to read from. - The type to read. - An object of type T read from the given location. - - - Reads a value of type T from the given location -without assuming architecture dependent alignment of the addresses. - The location to read from. - The type to read. - An object of type T read from the given location. - - - Reads a value of type T from the given location -without assuming architecture dependent alignment of the addresses. - The location to read from. - The type to read. - An object of type T read from the given location. - - - Returns the size of an object of the given type parameter. - The type of object whose size is retrieved. - The size of an object of type T. - - - Subtracts an element offset from the given reference. - The reference to subtract the offset from. - The offset to subtract. - The type of reference. - A new reference that reflects the subraction of offset from pointer. - - - Subtracts an element offset from the given reference. - The reference to subtract the offset from. - The offset to subtract. - The type of reference. - A new reference that reflects the subraction of offset from pointer. - - - Subtracts a byte offset from the given reference. - The reference to subtract the offset from. - - The type of reference. - A new reference that reflects the subraction of byte offset from pointer. - - - Writes a value of type T to the given location. - The location to write to. - The value to write. - The type of value to write. - - - Writes a value of type T to the given location -without assuming architecture dependent alignment of the addresses. - The location to write to. - The value to write. - The type of value to write. - - - Writes a value of type T to the given location -without assuming architecture dependent alignment of the addresses. - The location to write to. - The value to write. - The type of value to write. - - - \ No newline at end of file diff --git a/packages/System.Runtime.CompilerServices.Unsafe.4.5.0/lib/uap10.0.16300/_._ b/packages/System.Runtime.CompilerServices.Unsafe.4.5.0/lib/uap10.0.16300/_._ deleted file mode 100644 index e69de29b..00000000 diff --git a/packages/System.Runtime.CompilerServices.Unsafe.4.5.0/ref/netstandard1.0/System.Runtime.CompilerServices.Unsafe.dll b/packages/System.Runtime.CompilerServices.Unsafe.4.5.0/ref/netstandard1.0/System.Runtime.CompilerServices.Unsafe.dll deleted file mode 100644 index 87614511..00000000 Binary files a/packages/System.Runtime.CompilerServices.Unsafe.4.5.0/ref/netstandard1.0/System.Runtime.CompilerServices.Unsafe.dll and /dev/null differ diff --git a/packages/System.Runtime.CompilerServices.Unsafe.4.5.0/ref/netstandard1.0/System.Runtime.CompilerServices.Unsafe.xml b/packages/System.Runtime.CompilerServices.Unsafe.4.5.0/ref/netstandard1.0/System.Runtime.CompilerServices.Unsafe.xml deleted file mode 100644 index 6a7cfcff..00000000 --- a/packages/System.Runtime.CompilerServices.Unsafe.4.5.0/ref/netstandard1.0/System.Runtime.CompilerServices.Unsafe.xml +++ /dev/null @@ -1,200 +0,0 @@ - - - System.Runtime.CompilerServices.Unsafe - - - - Contains generic, low-level functionality for manipulating pointers. - - - Adds an element offset to the given reference. - The reference to add the offset to. - The offset to add. - The type of reference. - A new reference that reflects the addition of offset to pointer. - - - Adds an element offset to the given reference. - The reference to add the offset to. - The offset to add. - The type of reference. - A new reference that reflects the addition of offset to pointer. - - - Adds a byte offset to the given reference. - The reference to add the offset to. - The offset to add. - The type of reference. - A new reference that reflects the addition of byte offset to pointer. - - - Determines whether the specified references point to the same location. - The first reference to compare. - The second reference to compare. - The type of reference. - true if left and right point to the same location; otherwise, false. - - - Casts the given object to the specified type. - The object to cast. - The type which the object will be cast to. - The original object, casted to the given type. - - - Reinterprets the given reference as a reference to a value of type TTo. - The reference to reinterpret. - The type of reference to reinterpret.. - The desired type of the reference. - A reference to a value of type TTo. - - - Returns a pointer to the given by-ref parameter. - The object whose pointer is obtained. - The type of object. - A pointer to the given value. - - - Reinterprets the given location as a reference to a value of type T. - The location of the value to reference. - The type of the interpreted location. - A reference to a value of type T. - - - Determines the byte offset from origin to target from the given references. - The reference to origin. - The reference to target. - The type of reference. - Byte offset from origin to target i.e. target - origin. - - - Copies a value of type T to the given location. - The location to copy to. - A reference to the value to copy. - The type of value to copy. - - - Copies a value of type T to the given location. - The location to copy to. - A pointer to the value to copy. - The type of value to copy. - - - Copies bytes from the source address to the destination address. - The destination address to copy to. - The source address to copy from. - The number of bytes to copy. - - - Copies bytes from the source address to the destination address. - The destination address to copy to. - The source address to copy from. - The number of bytes to copy. - - - Copies bytes from the source address to the destination address -without assuming architecture dependent alignment of the addresses. - The destination address to copy to. - The source address to copy from. - The number of bytes to copy. - - - Copies bytes from the source address to the destination address -without assuming architecture dependent alignment of the addresses. - The destination address to copy to. - The source address to copy from. - The number of bytes to copy. - - - Initializes a block of memory at the given location with a given initial value. - The address of the start of the memory block to initialize. - The value to initialize the block to. - The number of bytes to initialize. - - - Initializes a block of memory at the given location with a given initial value. - The address of the start of the memory block to initialize. - The value to initialize the block to. - The number of bytes to initialize. - - - Initializes a block of memory at the given location with a given initial value -without assuming architecture dependent alignment of the address. - The address of the start of the memory block to initialize. - The value to initialize the block to. - The number of bytes to initialize. - - - Initializes a block of memory at the given location with a given initial value -without assuming architecture dependent alignment of the address. - The address of the start of the memory block to initialize. - The value to initialize the block to. - The number of bytes to initialize. - - - Reads a value of type T from the given location. - The location to read from. - The type to read. - An object of type T read from the given location. - - - Reads a value of type T from the given location -without assuming architecture dependent alignment of the addresses. - The location to read from. - The type to read. - An object of type T read from the given location. - - - Reads a value of type T from the given location -without assuming architecture dependent alignment of the addresses. - The location to read from. - The type to read. - An object of type T read from the given location. - - - Returns the size of an object of the given type parameter. - The type of object whose size is retrieved. - The size of an object of type T. - - - Subtracts an element offset from the given reference. - The reference to subtract the offset from. - The offset to subtract. - The type of reference. - A new reference that reflects the subraction of offset from pointer. - - - Subtracts an element offset from the given reference. - The reference to subtract the offset from. - The offset to subtract. - The type of reference. - A new reference that reflects the subraction of offset from pointer. - - - Subtracts a byte offset from the given reference. - The reference to subtract the offset from. - - The type of reference. - A new reference that reflects the subraction of byte offset from pointer. - - - Writes a value of type T to the given location. - The location to write to. - The value to write. - The type of value to write. - - - Writes a value of type T to the given location -without assuming architecture dependent alignment of the addresses. - The location to write to. - The value to write. - The type of value to write. - - - Writes a value of type T to the given location -without assuming architecture dependent alignment of the addresses. - The location to write to. - The value to write. - The type of value to write. - - - \ No newline at end of file diff --git a/packages/System.Runtime.CompilerServices.Unsafe.4.5.0/ref/netstandard2.0/System.Runtime.CompilerServices.Unsafe.dll b/packages/System.Runtime.CompilerServices.Unsafe.4.5.0/ref/netstandard2.0/System.Runtime.CompilerServices.Unsafe.dll deleted file mode 100644 index e7637d87..00000000 Binary files a/packages/System.Runtime.CompilerServices.Unsafe.4.5.0/ref/netstandard2.0/System.Runtime.CompilerServices.Unsafe.dll and /dev/null differ diff --git a/packages/System.Runtime.CompilerServices.Unsafe.4.5.0/ref/netstandard2.0/System.Runtime.CompilerServices.Unsafe.xml b/packages/System.Runtime.CompilerServices.Unsafe.4.5.0/ref/netstandard2.0/System.Runtime.CompilerServices.Unsafe.xml deleted file mode 100644 index 6a7cfcff..00000000 --- a/packages/System.Runtime.CompilerServices.Unsafe.4.5.0/ref/netstandard2.0/System.Runtime.CompilerServices.Unsafe.xml +++ /dev/null @@ -1,200 +0,0 @@ - - - System.Runtime.CompilerServices.Unsafe - - - - Contains generic, low-level functionality for manipulating pointers. - - - Adds an element offset to the given reference. - The reference to add the offset to. - The offset to add. - The type of reference. - A new reference that reflects the addition of offset to pointer. - - - Adds an element offset to the given reference. - The reference to add the offset to. - The offset to add. - The type of reference. - A new reference that reflects the addition of offset to pointer. - - - Adds a byte offset to the given reference. - The reference to add the offset to. - The offset to add. - The type of reference. - A new reference that reflects the addition of byte offset to pointer. - - - Determines whether the specified references point to the same location. - The first reference to compare. - The second reference to compare. - The type of reference. - true if left and right point to the same location; otherwise, false. - - - Casts the given object to the specified type. - The object to cast. - The type which the object will be cast to. - The original object, casted to the given type. - - - Reinterprets the given reference as a reference to a value of type TTo. - The reference to reinterpret. - The type of reference to reinterpret.. - The desired type of the reference. - A reference to a value of type TTo. - - - Returns a pointer to the given by-ref parameter. - The object whose pointer is obtained. - The type of object. - A pointer to the given value. - - - Reinterprets the given location as a reference to a value of type T. - The location of the value to reference. - The type of the interpreted location. - A reference to a value of type T. - - - Determines the byte offset from origin to target from the given references. - The reference to origin. - The reference to target. - The type of reference. - Byte offset from origin to target i.e. target - origin. - - - Copies a value of type T to the given location. - The location to copy to. - A reference to the value to copy. - The type of value to copy. - - - Copies a value of type T to the given location. - The location to copy to. - A pointer to the value to copy. - The type of value to copy. - - - Copies bytes from the source address to the destination address. - The destination address to copy to. - The source address to copy from. - The number of bytes to copy. - - - Copies bytes from the source address to the destination address. - The destination address to copy to. - The source address to copy from. - The number of bytes to copy. - - - Copies bytes from the source address to the destination address -without assuming architecture dependent alignment of the addresses. - The destination address to copy to. - The source address to copy from. - The number of bytes to copy. - - - Copies bytes from the source address to the destination address -without assuming architecture dependent alignment of the addresses. - The destination address to copy to. - The source address to copy from. - The number of bytes to copy. - - - Initializes a block of memory at the given location with a given initial value. - The address of the start of the memory block to initialize. - The value to initialize the block to. - The number of bytes to initialize. - - - Initializes a block of memory at the given location with a given initial value. - The address of the start of the memory block to initialize. - The value to initialize the block to. - The number of bytes to initialize. - - - Initializes a block of memory at the given location with a given initial value -without assuming architecture dependent alignment of the address. - The address of the start of the memory block to initialize. - The value to initialize the block to. - The number of bytes to initialize. - - - Initializes a block of memory at the given location with a given initial value -without assuming architecture dependent alignment of the address. - The address of the start of the memory block to initialize. - The value to initialize the block to. - The number of bytes to initialize. - - - Reads a value of type T from the given location. - The location to read from. - The type to read. - An object of type T read from the given location. - - - Reads a value of type T from the given location -without assuming architecture dependent alignment of the addresses. - The location to read from. - The type to read. - An object of type T read from the given location. - - - Reads a value of type T from the given location -without assuming architecture dependent alignment of the addresses. - The location to read from. - The type to read. - An object of type T read from the given location. - - - Returns the size of an object of the given type parameter. - The type of object whose size is retrieved. - The size of an object of type T. - - - Subtracts an element offset from the given reference. - The reference to subtract the offset from. - The offset to subtract. - The type of reference. - A new reference that reflects the subraction of offset from pointer. - - - Subtracts an element offset from the given reference. - The reference to subtract the offset from. - The offset to subtract. - The type of reference. - A new reference that reflects the subraction of offset from pointer. - - - Subtracts a byte offset from the given reference. - The reference to subtract the offset from. - - The type of reference. - A new reference that reflects the subraction of byte offset from pointer. - - - Writes a value of type T to the given location. - The location to write to. - The value to write. - The type of value to write. - - - Writes a value of type T to the given location -without assuming architecture dependent alignment of the addresses. - The location to write to. - The value to write. - The type of value to write. - - - Writes a value of type T to the given location -without assuming architecture dependent alignment of the addresses. - The location to write to. - The value to write. - The type of value to write. - - - \ No newline at end of file diff --git a/packages/System.Runtime.CompilerServices.Unsafe.4.5.0/ref/uap10.0.16300/_._ b/packages/System.Runtime.CompilerServices.Unsafe.4.5.0/ref/uap10.0.16300/_._ deleted file mode 100644 index e69de29b..00000000 diff --git a/packages/System.Runtime.CompilerServices.Unsafe.4.5.0/useSharedDesignerContext.txt b/packages/System.Runtime.CompilerServices.Unsafe.4.5.0/useSharedDesignerContext.txt deleted file mode 100644 index e69de29b..00000000 diff --git a/packages/System.Runtime.CompilerServices.Unsafe.4.5.0/version.txt b/packages/System.Runtime.CompilerServices.Unsafe.4.5.0/version.txt deleted file mode 100644 index 47004a02..00000000 --- a/packages/System.Runtime.CompilerServices.Unsafe.4.5.0/version.txt +++ /dev/null @@ -1 +0,0 @@ -30ab651fcb4354552bd4891619a0bdd81e0ebdbf diff --git a/packages/System.ValueTuple.4.5.0/.signature.p7s b/packages/System.ValueTuple.4.5.0/.signature.p7s deleted file mode 100644 index 21c6417f..00000000 Binary files a/packages/System.ValueTuple.4.5.0/.signature.p7s and /dev/null differ diff --git a/packages/System.ValueTuple.4.5.0/LICENSE.TXT b/packages/System.ValueTuple.4.5.0/LICENSE.TXT deleted file mode 100644 index 984713a4..00000000 --- a/packages/System.ValueTuple.4.5.0/LICENSE.TXT +++ /dev/null @@ -1,23 +0,0 @@ -The MIT License (MIT) - -Copyright (c) .NET Foundation and Contributors - -All rights reserved. - -Permission is hereby granted, free of charge, to any person obtaining a copy -of this software and associated documentation files (the "Software"), to deal -in the Software without restriction, including without limitation the rights -to use, copy, modify, merge, publish, distribute, sublicense, and/or sell -copies of the Software, and to permit persons to whom the Software is -furnished to do so, subject to the following conditions: - -The above copyright notice and this permission notice shall be included in all -copies or substantial portions of the Software. - -THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR -IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, -FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE -AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER -LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, -OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE -SOFTWARE. diff --git a/packages/System.ValueTuple.4.5.0/System.ValueTuple.4.5.0.nupkg b/packages/System.ValueTuple.4.5.0/System.ValueTuple.4.5.0.nupkg deleted file mode 100644 index cd6a8368..00000000 Binary files a/packages/System.ValueTuple.4.5.0/System.ValueTuple.4.5.0.nupkg and /dev/null differ diff --git a/packages/System.ValueTuple.4.5.0/THIRD-PARTY-NOTICES.TXT b/packages/System.ValueTuple.4.5.0/THIRD-PARTY-NOTICES.TXT deleted file mode 100644 index db542ca2..00000000 --- a/packages/System.ValueTuple.4.5.0/THIRD-PARTY-NOTICES.TXT +++ /dev/null @@ -1,309 +0,0 @@ -.NET Core uses third-party libraries or other resources that may be -distributed under licenses different than the .NET Core software. - -In the event that we accidentally failed to list a required notice, please -bring it to our attention. Post an issue or email us: - - dotnet@microsoft.com - -The attached notices are provided for information only. - -License notice for Slicing-by-8 -------------------------------- - -http://sourceforge.net/projects/slicing-by-8/ - -Copyright (c) 2004-2006 Intel Corporation - All Rights Reserved - - -This software program is licensed subject to the BSD License, available at -http://www.opensource.org/licenses/bsd-license.html. - - -License notice for Unicode data -------------------------------- - -http://www.unicode.org/copyright.html#License - -Copyright © 1991-2017 Unicode, Inc. All rights reserved. -Distributed under the Terms of Use in http://www.unicode.org/copyright.html. - -Permission is hereby granted, free of charge, to any person obtaining -a copy of the Unicode data files and any associated documentation -(the "Data Files") or Unicode software and any associated documentation -(the "Software") to deal in the Data Files or Software -without restriction, including without limitation the rights to use, -copy, modify, merge, publish, distribute, and/or sell copies of -the Data Files or Software, and to permit persons to whom the Data Files -or Software are furnished to do so, provided that either -(a) this copyright and permission notice appear with all copies -of the Data Files or Software, or -(b) this copyright and permission notice appear in associated -Documentation. - -THE DATA FILES AND SOFTWARE ARE PROVIDED "AS IS", WITHOUT WARRANTY OF -ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE -WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND -NONINFRINGEMENT OF THIRD PARTY RIGHTS. -IN NO EVENT SHALL THE COPYRIGHT HOLDER OR HOLDERS INCLUDED IN THIS -NOTICE BE LIABLE FOR ANY CLAIM, OR ANY SPECIAL INDIRECT OR CONSEQUENTIAL -DAMAGES, OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, -DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER -TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR -PERFORMANCE OF THE DATA FILES OR SOFTWARE. - -Except as contained in this notice, the name of a copyright holder -shall not be used in advertising or otherwise to promote the sale, -use or other dealings in these Data Files or Software without prior -written authorization of the copyright holder. - -License notice for Zlib ------------------------ - -https://github.com/madler/zlib -http://zlib.net/zlib_license.html - -/* zlib.h -- interface of the 'zlib' general purpose compression library - version 1.2.11, January 15th, 2017 - - Copyright (C) 1995-2017 Jean-loup Gailly and Mark Adler - - This software is provided 'as-is', without any express or implied - warranty. In no event will the authors be held liable for any damages - arising from the use of this software. - - Permission is granted to anyone to use this software for any purpose, - including commercial applications, and to alter it and redistribute it - freely, subject to the following restrictions: - - 1. The origin of this software must not be misrepresented; you must not - claim that you wrote the original software. If you use this software - in a product, an acknowledgment in the product documentation would be - appreciated but is not required. - 2. Altered source versions must be plainly marked as such, and must not be - misrepresented as being the original software. - 3. This notice may not be removed or altered from any source distribution. - - Jean-loup Gailly Mark Adler - jloup@gzip.org madler@alumni.caltech.edu - -*/ - -License notice for Mono -------------------------------- - -http://www.mono-project.com/docs/about-mono/ - -Copyright (c) .NET Foundation Contributors - -MIT License - -Permission is hereby granted, free of charge, to any person obtaining a copy -of this software and associated documentation files (the Software), to deal -in the Software without restriction, including without limitation the rights -to use, copy, modify, merge, publish, distribute, sublicense, and/or sell -copies of the Software, and to permit persons to whom the Software is -furnished to do so, subject to the following conditions: - -The above copyright notice and this permission notice shall be included in all -copies or substantial portions of the Software. - -THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, -EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF -MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND -NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE -LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION -OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION -WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. - -License notice for International Organization for Standardization ------------------------------------------------------------------ - -Portions (C) International Organization for Standardization 1986: - Permission to copy in any form is granted for use with - conforming SGML systems and applications as defined in - ISO 8879, provided this notice is included in all copies. - -License notice for Intel ------------------------- - -"Copyright (c) 2004-2006 Intel Corporation - All Rights Reserved - -Redistribution and use in source and binary forms, with or without -modification, are permitted provided that the following conditions are met: - -1. Redistributions of source code must retain the above copyright notice, this -list of conditions and the following disclaimer. - -2. Redistributions in binary form must reproduce the above copyright notice, -this list of conditions and the following disclaimer in the documentation -and/or other materials provided with the distribution. - -THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" -AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE -IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE -DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE -FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL -DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR -SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER -CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, -OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE -OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. - -License notice for Xamarin and Novell -------------------------------------- - -Copyright (c) 2015 Xamarin, Inc (http://www.xamarin.com) - -Permission is hereby granted, free of charge, to any person obtaining a copy -of this software and associated documentation files (the "Software"), to deal -in the Software without restriction, including without limitation the rights -to use, copy, modify, merge, publish, distribute, sublicense, and/or sell -copies of the Software, and to permit persons to whom the Software is -furnished to do so, subject to the following conditions: - -The above copyright notice and this permission notice shall be included in -all copies or substantial portions of the Software. - -THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR -IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, -FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE -AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER -LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, -OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN -THE SOFTWARE. - -Copyright (c) 2011 Novell, Inc (http://www.novell.com) - -Permission is hereby granted, free of charge, to any person obtaining a copy -of this software and associated documentation files (the "Software"), to deal -in the Software without restriction, including without limitation the rights -to use, copy, modify, merge, publish, distribute, sublicense, and/or sell -copies of the Software, and to permit persons to whom the Software is -furnished to do so, subject to the following conditions: - -The above copyright notice and this permission notice shall be included in -all copies or substantial portions of the Software. - -THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR -IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, -FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE -AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER -LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, -OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN -THE SOFTWARE. - -Third party notice for W3C --------------------------- - -"W3C SOFTWARE AND DOCUMENT NOTICE AND LICENSE -Status: This license takes effect 13 May, 2015. -This work is being provided by the copyright holders under the following license. -License -By obtaining and/or copying this work, you (the licensee) agree that you have read, understood, and will comply with the following terms and conditions. -Permission to copy, modify, and distribute this work, with or without modification, for any purpose and without fee or royalty is hereby granted, provided that you include the following on ALL copies of the work or portions thereof, including modifications: -The full text of this NOTICE in a location viewable to users of the redistributed or derivative work. -Any pre-existing intellectual property disclaimers, notices, or terms and conditions. If none exist, the W3C Software and Document Short Notice should be included. -Notice of any changes or modifications, through a copyright statement on the new code or document such as "This software or document includes material copied from or derived from [title and URI of the W3C document]. Copyright © [YEAR] W3C® (MIT, ERCIM, Keio, Beihang)." -Disclaimers -THIS WORK IS PROVIDED "AS IS," AND COPYRIGHT HOLDERS MAKE NO REPRESENTATIONS OR WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO, WARRANTIES OF MERCHANTABILITY OR FITNESS FOR ANY PARTICULAR PURPOSE OR THAT THE USE OF THE SOFTWARE OR DOCUMENT WILL NOT INFRINGE ANY THIRD PARTY PATENTS, COPYRIGHTS, TRADEMARKS OR OTHER RIGHTS. -COPYRIGHT HOLDERS WILL NOT BE LIABLE FOR ANY DIRECT, INDIRECT, SPECIAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF ANY USE OF THE SOFTWARE OR DOCUMENT. -The name and trademarks of copyright holders may NOT be used in advertising or publicity pertaining to the work without specific, written prior permission. Title to copyright in this work will at all times remain with copyright holders." - -License notice for Bit Twiddling Hacks --------------------------------------- - -Bit Twiddling Hacks - -By Sean Eron Anderson -seander@cs.stanford.edu - -Individually, the code snippets here are in the public domain (unless otherwise -noted) — feel free to use them however you please. The aggregate collection and -descriptions are © 1997-2005 Sean Eron Anderson. The code and descriptions are -distributed in the hope that they will be useful, but WITHOUT ANY WARRANTY and -without even the implied warranty of merchantability or fitness for a particular -purpose. - -License notice for Brotli --------------------------------------- - -Copyright (c) 2009, 2010, 2013-2016 by the Brotli Authors. - -Permission is hereby granted, free of charge, to any person obtaining a copy -of this software and associated documentation files (the "Software"), to deal -in the Software without restriction, including without limitation the rights -to use, copy, modify, merge, publish, distribute, sublicense, and/or sell -copies of the Software, and to permit persons to whom the Software is -furnished to do so, subject to the following conditions: - -The above copyright notice and this permission notice shall be included in -all copies or substantial portions of the Software. - -THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR -IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, -FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE -AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER -LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, -OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN -THE SOFTWARE. - -compress_fragment.c: -Copyright (c) 2011, Google Inc. -All rights reserved. - -Redistribution and use in source and binary forms, with or without -modification, are permitted provided that the following conditions are -met: - - * Redistributions of source code must retain the above copyright -notice, this list of conditions and the following disclaimer. - * Redistributions in binary form must reproduce the above -copyright notice, this list of conditions and the following disclaimer -in the documentation and/or other materials provided with the -distribution. - * Neither the name of Google Inc. nor the names of its -contributors may be used to endorse or promote products derived from -this software without specific prior written permission. - -THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS -""AS IS"" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT -LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR -A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT -OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, -SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT -LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, -DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY -THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT -(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE -OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. - -decode_fuzzer.c: -Copyright (c) 2015 The Chromium Authors. All rights reserved. - -Redistribution and use in source and binary forms, with or without -modification, are permitted provided that the following conditions are -met: - - * Redistributions of source code must retain the above copyright -notice, this list of conditions and the following disclaimer. - * Redistributions in binary form must reproduce the above -copyright notice, this list of conditions and the following disclaimer -in the documentation and/or other materials provided with the -distribution. - * Neither the name of Google Inc. nor the names of its -contributors may be used to endorse or promote products derived from -this software without specific prior written permission. - -THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS -""AS IS"" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT -LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR -A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT -OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, -SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT -LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, -DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY -THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT -(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE -OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE." - diff --git a/packages/System.ValueTuple.4.5.0/lib/MonoAndroid10/_._ b/packages/System.ValueTuple.4.5.0/lib/MonoAndroid10/_._ deleted file mode 100644 index e69de29b..00000000 diff --git a/packages/System.ValueTuple.4.5.0/lib/MonoTouch10/_._ b/packages/System.ValueTuple.4.5.0/lib/MonoTouch10/_._ deleted file mode 100644 index e69de29b..00000000 diff --git a/packages/System.ValueTuple.4.5.0/lib/net461/System.ValueTuple.dll b/packages/System.ValueTuple.4.5.0/lib/net461/System.ValueTuple.dll deleted file mode 100644 index 1cadbf3e..00000000 Binary files a/packages/System.ValueTuple.4.5.0/lib/net461/System.ValueTuple.dll and /dev/null differ diff --git a/packages/System.ValueTuple.4.5.0/lib/net461/System.ValueTuple.xml b/packages/System.ValueTuple.4.5.0/lib/net461/System.ValueTuple.xml deleted file mode 100644 index 6dcce66f..00000000 --- a/packages/System.ValueTuple.4.5.0/lib/net461/System.ValueTuple.xml +++ /dev/null @@ -1,1299 +0,0 @@ - - - - System.ValueTuple - - - - - Indicates that the use of on a member is meant to be treated as a tuple with element names. - - - - - Initializes a new instance of the class. - - - Specifies, in a pre-order depth-first traversal of a type's - construction, which occurrences are - meant to carry element names. - - - This constructor is meant to be used on types that contain an - instantiation of that contains - element names. For instance, if C is a generic type with - two type parameters, then a use of the constructed type C{, might be intended to - treat the first type argument as a tuple with element names and the - second as a tuple without element names. In which case, the - appropriate attribute specification should use a - transformNames value of { "name1", "name2", null, null, - null }. - - - - - Specifies, in a pre-order depth-first traversal of a type's - construction, which elements are - meant to carry element names. - - - - - Provides extension methods for instances to interop with C# tuples features (deconstruction syntax, converting from and to ). - - - - - Deconstruct a properly nested with 1 elements. - - - - - Deconstruct a properly nested with 2 elements. - - - - - Deconstruct a properly nested with 3 elements. - - - - - Deconstruct a properly nested with 4 elements. - - - - - Deconstruct a properly nested with 5 elements. - - - - - Deconstruct a properly nested with 6 elements. - - - - - Deconstruct a properly nested with 7 elements. - - - - - Deconstruct a properly nested with 8 elements. - - - - - Deconstruct a properly nested with 9 elements. - - - - - Deconstruct a properly nested with 10 elements. - - - - - Deconstruct a properly nested with 11 elements. - - - - - Deconstruct a properly nested with 12 elements. - - - - - Deconstruct a properly nested with 13 elements. - - - - - Deconstruct a properly nested with 14 elements. - - - - - Deconstruct a properly nested with 15 elements. - - - - - Deconstruct a properly nested with 16 elements. - - - - - Deconstruct a properly nested with 17 elements. - - - - - Deconstruct a properly nested with 18 elements. - - - - - Deconstruct a properly nested with 19 elements. - - - - - Deconstruct a properly nested with 20 elements. - - - - - Deconstruct a properly nested with 21 elements. - - - - - Make a properly nested from a properly nested with 1 element. - - - - - Make a properly nested from a properly nested with 2 elements. - - - - - Make a properly nested from a properly nested with 3 elements. - - - - - Make a properly nested from a properly nested with 4 elements. - - - - - Make a properly nested from a properly nested with 5 elements. - - - - - Make a properly nested from a properly nested with 6 elements. - - - - - Make a properly nested from a properly nested with 7 elements. - - - - - Make a properly nested from a properly nested with 8 elements. - - - - - Make a properly nested from a properly nested with 9 elements. - - - - - Make a properly nested from a properly nested with 10 elements. - - - - - Make a properly nested from a properly nested with 11 elements. - - - - - Make a properly nested from a properly nested with 12 elements. - - - - - Make a properly nested from a properly nested with 13 elements. - - - - - Make a properly nested from a properly nested with 14 elements. - - - - - Make a properly nested from a properly nested with 15 elements. - - - - - Make a properly nested from a properly nested with 16 elements. - - - - - Make a properly nested from a properly nested with 17 elements. - - - - - Make a properly nested from a properly nested with 18 elements. - - - - - Make a properly nested from a properly nested with 19 elements. - - - - - Make a properly nested from a properly nested with 20 elements. - - - - - Make a properly nested from a properly nested with 21 elements. - - - - - Make a properly nested from a properly nested with 1 element. - - - - - Make a properly nested from a properly nested with 2 elements. - - - - - Make a properly nested from a properly nested with 3 elements. - - - - - Make a properly nested from a properly nested with 4 elements. - - - - - Make a properly nested from a properly nested with 5 elements. - - - - - Make a properly nested from a properly nested with 6 elements. - - - - - Make a properly nested from a properly nested with 7 elements. - - - - - Make a properly nested from a properly nested with 8 elements. - - - - - Make a properly nested from a properly nested with 9 elements. - - - - - Make a properly nested from a properly nested with 10 elements. - - - - - Make a properly nested from a properly nested with 11 elements. - - - - - Make a properly nested from a properly nested with 12 elements. - - - - - Make a properly nested from a properly nested with 13 elements. - - - - - Make a properly nested from a properly nested with 14 elements. - - - - - Make a properly nested from a properly nested with 15 elements. - - - - - Make a properly nested from a properly nested with 16 elements. - - - - - Make a properly nested from a properly nested with 17 elements. - - - - - Make a properly nested from a properly nested with 18 elements. - - - - - Make a properly nested from a properly nested with 19 elements. - - - - - Make a properly nested from a properly nested with 20 elements. - - - - - Make a properly nested from a properly nested with 21 elements. - - - - - Helper so we can call some tuple methods recursively without knowing the underlying types. - - - - - The ValueTuple types (from arity 0 to 8) comprise the runtime implementation that underlies tuples in C# and struct tuples in F#. - Aside from created via language syntax, they are most easily created via the ValueTuple.Create factory methods. - The System.ValueTuple types differ from the System.Tuple types in that: - - they are structs rather than classes, - - they are mutable rather than readonly, and - - their members (such as Item1, Item2, etc) are fields rather than properties. - - - - - Returns a value that indicates whether the current instance is equal to a specified object. - - The object to compare with this instance. - if is a . - - - Returns a value indicating whether this instance is equal to a specified value. - An instance to compare to this instance. - true if has the same value as this instance; otherwise, false. - - - Compares this instance to a specified instance and returns an indication of their relative values. - An instance to compare. - - A signed number indicating the relative values of this instance and . - Returns less than zero if this instance is less than , zero if this - instance is equal to , and greater than zero if this instance is greater - than . - - - - Returns the hash code for this instance. - A 32-bit signed integer hash code. - - - - Returns a string that represents the value of this instance. - - The string representation of this instance. - - The string returned by this method takes the form (). - - - - Creates a new struct 0-tuple. - A 0-tuple. - - - Creates a new struct 1-tuple, or singleton. - The type of the first component of the tuple. - The value of the first component of the tuple. - A 1-tuple (singleton) whose value is (item1). - - - Creates a new struct 2-tuple, or pair. - The type of the first component of the tuple. - The type of the second component of the tuple. - The value of the first component of the tuple. - The value of the second component of the tuple. - A 2-tuple (pair) whose value is (item1, item2). - - - Creates a new struct 3-tuple, or triple. - The type of the first component of the tuple. - The type of the second component of the tuple. - The type of the third component of the tuple. - The value of the first component of the tuple. - The value of the second component of the tuple. - The value of the third component of the tuple. - A 3-tuple (triple) whose value is (item1, item2, item3). - - - Creates a new struct 4-tuple, or quadruple. - The type of the first component of the tuple. - The type of the second component of the tuple. - The type of the third component of the tuple. - The type of the fourth component of the tuple. - The value of the first component of the tuple. - The value of the second component of the tuple. - The value of the third component of the tuple. - The value of the fourth component of the tuple. - A 4-tuple (quadruple) whose value is (item1, item2, item3, item4). - - - Creates a new struct 5-tuple, or quintuple. - The type of the first component of the tuple. - The type of the second component of the tuple. - The type of the third component of the tuple. - The type of the fourth component of the tuple. - The type of the fifth component of the tuple. - The value of the first component of the tuple. - The value of the second component of the tuple. - The value of the third component of the tuple. - The value of the fourth component of the tuple. - The value of the fifth component of the tuple. - A 5-tuple (quintuple) whose value is (item1, item2, item3, item4, item5). - - - Creates a new struct 6-tuple, or sextuple. - The type of the first component of the tuple. - The type of the second component of the tuple. - The type of the third component of the tuple. - The type of the fourth component of the tuple. - The type of the fifth component of the tuple. - The type of the sixth component of the tuple. - The value of the first component of the tuple. - The value of the second component of the tuple. - The value of the third component of the tuple. - The value of the fourth component of the tuple. - The value of the fifth component of the tuple. - The value of the sixth component of the tuple. - A 6-tuple (sextuple) whose value is (item1, item2, item3, item4, item5, item6). - - - Creates a new struct 7-tuple, or septuple. - The type of the first component of the tuple. - The type of the second component of the tuple. - The type of the third component of the tuple. - The type of the fourth component of the tuple. - The type of the fifth component of the tuple. - The type of the sixth component of the tuple. - The type of the seventh component of the tuple. - The value of the first component of the tuple. - The value of the second component of the tuple. - The value of the third component of the tuple. - The value of the fourth component of the tuple. - The value of the fifth component of the tuple. - The value of the sixth component of the tuple. - The value of the seventh component of the tuple. - A 7-tuple (septuple) whose value is (item1, item2, item3, item4, item5, item6, item7). - - - Creates a new struct 8-tuple, or octuple. - The type of the first component of the tuple. - The type of the second component of the tuple. - The type of the third component of the tuple. - The type of the fourth component of the tuple. - The type of the fifth component of the tuple. - The type of the sixth component of the tuple. - The type of the seventh component of the tuple. - The type of the eighth component of the tuple. - The value of the first component of the tuple. - The value of the second component of the tuple. - The value of the third component of the tuple. - The value of the fourth component of the tuple. - The value of the fifth component of the tuple. - The value of the sixth component of the tuple. - The value of the seventh component of the tuple. - The value of the eighth component of the tuple. - An 8-tuple (octuple) whose value is (item1, item2, item3, item4, item5, item6, item7, item8). - - - Represents a 1-tuple, or singleton, as a value type. - The type of the tuple's only component. - - - - The current instance's first component. - - - - - Initializes a new instance of the value type. - - The value of the tuple's first component. - - - - Returns a value that indicates whether the current instance is equal to a specified object. - - The object to compare with this instance. - if the current instance is equal to the specified object; otherwise, . - - The parameter is considered to be equal to the current instance under the following conditions: - - It is a value type. - Its components are of the same types as those of the current instance. - Its components are equal to those of the current instance. Equality is determined by the default object equality comparer for each component. - - - - - - Returns a value that indicates whether the current - instance is equal to a specified . - - The tuple to compare with this instance. - if the current instance is equal to the specified tuple; otherwise, . - - The parameter is considered to be equal to the current instance if each of its field - is equal to that of the current instance, using the default comparer for that field's type. - - - - Compares this instance to a specified instance and returns an indication of their relative values. - An instance to compare. - - A signed number indicating the relative values of this instance and . - Returns less than zero if this instance is less than , zero if this - instance is equal to , and greater than zero if this instance is greater - than . - - - - - Returns the hash code for the current instance. - - A 32-bit signed integer hash code. - - - - Returns a string that represents the value of this instance. - - The string representation of this instance. - - The string returned by this method takes the form (Item1), - where Item1 represents the value of . If the field is , - it is represented as . - - - - - Represents a 2-tuple, or pair, as a value type. - - The type of the tuple's first component. - The type of the tuple's second component. - - - - The current instance's first component. - - - - - The current instance's second component. - - - - - Initializes a new instance of the value type. - - The value of the tuple's first component. - The value of the tuple's second component. - - - - Returns a value that indicates whether the current instance is equal to a specified object. - - The object to compare with this instance. - if the current instance is equal to the specified object; otherwise, . - - - The parameter is considered to be equal to the current instance under the following conditions: - - It is a value type. - Its components are of the same types as those of the current instance. - Its components are equal to those of the current instance. Equality is determined by the default object equality comparer for each component. - - - - - - Returns a value that indicates whether the current instance is equal to a specified . - - The tuple to compare with this instance. - if the current instance is equal to the specified tuple; otherwise, . - - The parameter is considered to be equal to the current instance if each of its fields - are equal to that of the current instance, using the default comparer for that field's type. - - - - - Returns a value that indicates whether the current instance is equal to a specified object based on a specified comparison method. - - The object to compare with this instance. - An object that defines the method to use to evaluate whether the two objects are equal. - if the current instance is equal to the specified object; otherwise, . - - - This member is an explicit interface member implementation. It can be used only when the - instance is cast to an interface. - - The implementation is called only if other is not , - and if it can be successfully cast (in C#) or converted (in Visual Basic) to a - whose components are of the same types as those of the current instance. The IStructuralEquatable.Equals(Object, IEqualityComparer) method - first passes the values of the objects to be compared to the - implementation. If this method call returns , the method is - called again and passed the values of the two instances. - - - - Compares this instance to a specified instance and returns an indication of their relative values. - An instance to compare. - - A signed number indicating the relative values of this instance and . - Returns less than zero if this instance is less than , zero if this - instance is equal to , and greater than zero if this instance is greater - than . - - - - - Returns the hash code for the current instance. - - A 32-bit signed integer hash code. - - - - Returns a string that represents the value of this instance. - - The string representation of this instance. - - The string returned by this method takes the form (Item1, Item2), - where Item1 and Item2 represent the values of the - and fields. If either field value is , - it is represented as . - - - - - Represents a 3-tuple, or triple, as a value type. - - The type of the tuple's first component. - The type of the tuple's second component. - The type of the tuple's third component. - - - - The current instance's first component. - - - - - The current instance's second component. - - - - - The current instance's third component. - - - - - Initializes a new instance of the value type. - - The value of the tuple's first component. - The value of the tuple's second component. - The value of the tuple's third component. - - - - Returns a value that indicates whether the current instance is equal to a specified object. - - The object to compare with this instance. - if the current instance is equal to the specified object; otherwise, . - - The parameter is considered to be equal to the current instance under the following conditions: - - It is a value type. - Its components are of the same types as those of the current instance. - Its components are equal to those of the current instance. Equality is determined by the default object equality comparer for each component. - - - - - - Returns a value that indicates whether the current - instance is equal to a specified . - - The tuple to compare with this instance. - if the current instance is equal to the specified tuple; otherwise, . - - The parameter is considered to be equal to the current instance if each of its fields - are equal to that of the current instance, using the default comparer for that field's type. - - - - Compares this instance to a specified instance and returns an indication of their relative values. - An instance to compare. - - A signed number indicating the relative values of this instance and . - Returns less than zero if this instance is less than , zero if this - instance is equal to , and greater than zero if this instance is greater - than . - - - - - Returns the hash code for the current instance. - - A 32-bit signed integer hash code. - - - - Returns a string that represents the value of this instance. - - The string representation of this instance. - - The string returned by this method takes the form (Item1, Item2, Item3). - If any field value is , it is represented as . - - - - - Represents a 4-tuple, or quadruple, as a value type. - - The type of the tuple's first component. - The type of the tuple's second component. - The type of the tuple's third component. - The type of the tuple's fourth component. - - - - The current instance's first component. - - - - - The current instance's second component. - - - - - The current instance's third component. - - - - - The current instance's fourth component. - - - - - Initializes a new instance of the value type. - - The value of the tuple's first component. - The value of the tuple's second component. - The value of the tuple's third component. - The value of the tuple's fourth component. - - - - Returns a value that indicates whether the current instance is equal to a specified object. - - The object to compare with this instance. - if the current instance is equal to the specified object; otherwise, . - - The parameter is considered to be equal to the current instance under the following conditions: - - It is a value type. - Its components are of the same types as those of the current instance. - Its components are equal to those of the current instance. Equality is determined by the default object equality comparer for each component. - - - - - - Returns a value that indicates whether the current - instance is equal to a specified . - - The tuple to compare with this instance. - if the current instance is equal to the specified tuple; otherwise, . - - The parameter is considered to be equal to the current instance if each of its fields - are equal to that of the current instance, using the default comparer for that field's type. - - - - Compares this instance to a specified instance and returns an indication of their relative values. - An instance to compare. - - A signed number indicating the relative values of this instance and . - Returns less than zero if this instance is less than , zero if this - instance is equal to , and greater than zero if this instance is greater - than . - - - - - Returns the hash code for the current instance. - - A 32-bit signed integer hash code. - - - - Returns a string that represents the value of this instance. - - The string representation of this instance. - - The string returned by this method takes the form (Item1, Item2, Item3, Item4). - If any field value is , it is represented as . - - - - - Represents a 5-tuple, or quintuple, as a value type. - - The type of the tuple's first component. - The type of the tuple's second component. - The type of the tuple's third component. - The type of the tuple's fourth component. - The type of the tuple's fifth component. - - - - The current instance's first component. - - - - - The current instance's second component. - - - - - The current instance's third component. - - - - - The current instance's fourth component. - - - - - The current instance's fifth component. - - - - - Initializes a new instance of the value type. - - The value of the tuple's first component. - The value of the tuple's second component. - The value of the tuple's third component. - The value of the tuple's fourth component. - The value of the tuple's fifth component. - - - - Returns a value that indicates whether the current instance is equal to a specified object. - - The object to compare with this instance. - if the current instance is equal to the specified object; otherwise, . - - The parameter is considered to be equal to the current instance under the following conditions: - - It is a value type. - Its components are of the same types as those of the current instance. - Its components are equal to those of the current instance. Equality is determined by the default object equality comparer for each component. - - - - - - Returns a value that indicates whether the current - instance is equal to a specified . - - The tuple to compare with this instance. - if the current instance is equal to the specified tuple; otherwise, . - - The parameter is considered to be equal to the current instance if each of its fields - are equal to that of the current instance, using the default comparer for that field's type. - - - - Compares this instance to a specified instance and returns an indication of their relative values. - An instance to compare. - - A signed number indicating the relative values of this instance and . - Returns less than zero if this instance is less than , zero if this - instance is equal to , and greater than zero if this instance is greater - than . - - - - - Returns the hash code for the current instance. - - A 32-bit signed integer hash code. - - - - Returns a string that represents the value of this instance. - - The string representation of this instance. - - The string returned by this method takes the form (Item1, Item2, Item3, Item4, Item5). - If any field value is , it is represented as . - - - - - Represents a 6-tuple, or sixtuple, as a value type. - - The type of the tuple's first component. - The type of the tuple's second component. - The type of the tuple's third component. - The type of the tuple's fourth component. - The type of the tuple's fifth component. - The type of the tuple's sixth component. - - - - The current instance's first component. - - - - - The current instance's second component. - - - - - The current instance's third component. - - - - - The current instance's fourth component. - - - - - The current instance's fifth component. - - - - - The current instance's sixth component. - - - - - Initializes a new instance of the value type. - - The value of the tuple's first component. - The value of the tuple's second component. - The value of the tuple's third component. - The value of the tuple's fourth component. - The value of the tuple's fifth component. - The value of the tuple's sixth component. - - - - Returns a value that indicates whether the current instance is equal to a specified object. - - The object to compare with this instance. - if the current instance is equal to the specified object; otherwise, . - - The parameter is considered to be equal to the current instance under the following conditions: - - It is a value type. - Its components are of the same types as those of the current instance. - Its components are equal to those of the current instance. Equality is determined by the default object equality comparer for each component. - - - - - - Returns a value that indicates whether the current - instance is equal to a specified . - - The tuple to compare with this instance. - if the current instance is equal to the specified tuple; otherwise, . - - The parameter is considered to be equal to the current instance if each of its fields - are equal to that of the current instance, using the default comparer for that field's type. - - - - Compares this instance to a specified instance and returns an indication of their relative values. - An instance to compare. - - A signed number indicating the relative values of this instance and . - Returns less than zero if this instance is less than , zero if this - instance is equal to , and greater than zero if this instance is greater - than . - - - - - Returns the hash code for the current instance. - - A 32-bit signed integer hash code. - - - - Returns a string that represents the value of this instance. - - The string representation of this instance. - - The string returned by this method takes the form (Item1, Item2, Item3, Item4, Item5, Item6). - If any field value is , it is represented as . - - - - - Represents a 7-tuple, or sentuple, as a value type. - - The type of the tuple's first component. - The type of the tuple's second component. - The type of the tuple's third component. - The type of the tuple's fourth component. - The type of the tuple's fifth component. - The type of the tuple's sixth component. - The type of the tuple's seventh component. - - - - The current instance's first component. - - - - - The current instance's second component. - - - - - The current instance's third component. - - - - - The current instance's fourth component. - - - - - The current instance's fifth component. - - - - - The current instance's sixth component. - - - - - The current instance's seventh component. - - - - - Initializes a new instance of the value type. - - The value of the tuple's first component. - The value of the tuple's second component. - The value of the tuple's third component. - The value of the tuple's fourth component. - The value of the tuple's fifth component. - The value of the tuple's sixth component. - The value of the tuple's seventh component. - - - - Returns a value that indicates whether the current instance is equal to a specified object. - - The object to compare with this instance. - if the current instance is equal to the specified object; otherwise, . - - The parameter is considered to be equal to the current instance under the following conditions: - - It is a value type. - Its components are of the same types as those of the current instance. - Its components are equal to those of the current instance. Equality is determined by the default object equality comparer for each component. - - - - - - Returns a value that indicates whether the current - instance is equal to a specified . - - The tuple to compare with this instance. - if the current instance is equal to the specified tuple; otherwise, . - - The parameter is considered to be equal to the current instance if each of its fields - are equal to that of the current instance, using the default comparer for that field's type. - - - - Compares this instance to a specified instance and returns an indication of their relative values. - An instance to compare. - - A signed number indicating the relative values of this instance and . - Returns less than zero if this instance is less than , zero if this - instance is equal to , and greater than zero if this instance is greater - than . - - - - - Returns the hash code for the current instance. - - A 32-bit signed integer hash code. - - - - Returns a string that represents the value of this instance. - - The string representation of this instance. - - The string returned by this method takes the form (Item1, Item2, Item3, Item4, Item5, Item6, Item7). - If any field value is , it is represented as . - - - - - Represents an 8-tuple, or octuple, as a value type. - - The type of the tuple's first component. - The type of the tuple's second component. - The type of the tuple's third component. - The type of the tuple's fourth component. - The type of the tuple's fifth component. - The type of the tuple's sixth component. - The type of the tuple's seventh component. - The type of the tuple's eighth component. - - - - The current instance's first component. - - - - - The current instance's second component. - - - - - The current instance's third component. - - - - - The current instance's fourth component. - - - - - The current instance's fifth component. - - - - - The current instance's sixth component. - - - - - The current instance's seventh component. - - - - - The current instance's eighth component. - - - - - Initializes a new instance of the value type. - - The value of the tuple's first component. - The value of the tuple's second component. - The value of the tuple's third component. - The value of the tuple's fourth component. - The value of the tuple's fifth component. - The value of the tuple's sixth component. - The value of the tuple's seventh component. - The value of the tuple's eight component. - - - - Returns a value that indicates whether the current instance is equal to a specified object. - - The object to compare with this instance. - if the current instance is equal to the specified object; otherwise, . - - The parameter is considered to be equal to the current instance under the following conditions: - - It is a value type. - Its components are of the same types as those of the current instance. - Its components are equal to those of the current instance. Equality is determined by the default object equality comparer for each component. - - - - - - Returns a value that indicates whether the current - instance is equal to a specified . - - The tuple to compare with this instance. - if the current instance is equal to the specified tuple; otherwise, . - - The parameter is considered to be equal to the current instance if each of its fields - are equal to that of the current instance, using the default comparer for that field's type. - - - - Compares this instance to a specified instance and returns an indication of their relative values. - An instance to compare. - - A signed number indicating the relative values of this instance and . - Returns less than zero if this instance is less than , zero if this - instance is equal to , and greater than zero if this instance is greater - than . - - - - - Returns the hash code for the current instance. - - A 32-bit signed integer hash code. - - - - Returns a string that represents the value of this instance. - - The string representation of this instance. - - The string returned by this method takes the form (Item1, Item2, Item3, Item4, Item5, Item6, Item7, Rest). - If any field value is , it is represented as . - - - - diff --git a/packages/System.ValueTuple.4.5.0/lib/net47/System.ValueTuple.dll b/packages/System.ValueTuple.4.5.0/lib/net47/System.ValueTuple.dll deleted file mode 100644 index 4ce28fde..00000000 Binary files a/packages/System.ValueTuple.4.5.0/lib/net47/System.ValueTuple.dll and /dev/null differ diff --git a/packages/System.ValueTuple.4.5.0/lib/net47/System.ValueTuple.xml b/packages/System.ValueTuple.4.5.0/lib/net47/System.ValueTuple.xml deleted file mode 100644 index 1151832f..00000000 --- a/packages/System.ValueTuple.4.5.0/lib/net47/System.ValueTuple.xml +++ /dev/null @@ -1,8 +0,0 @@ - - - - System.ValueTuple - - - - diff --git a/packages/System.ValueTuple.4.5.0/lib/netcoreapp2.0/_._ b/packages/System.ValueTuple.4.5.0/lib/netcoreapp2.0/_._ deleted file mode 100644 index e69de29b..00000000 diff --git a/packages/System.ValueTuple.4.5.0/lib/netstandard1.0/System.ValueTuple.dll b/packages/System.ValueTuple.4.5.0/lib/netstandard1.0/System.ValueTuple.dll deleted file mode 100644 index 65fa9eee..00000000 Binary files a/packages/System.ValueTuple.4.5.0/lib/netstandard1.0/System.ValueTuple.dll and /dev/null differ diff --git a/packages/System.ValueTuple.4.5.0/lib/netstandard1.0/System.ValueTuple.xml b/packages/System.ValueTuple.4.5.0/lib/netstandard1.0/System.ValueTuple.xml deleted file mode 100644 index 6dcce66f..00000000 --- a/packages/System.ValueTuple.4.5.0/lib/netstandard1.0/System.ValueTuple.xml +++ /dev/null @@ -1,1299 +0,0 @@ - - - - System.ValueTuple - - - - - Indicates that the use of on a member is meant to be treated as a tuple with element names. - - - - - Initializes a new instance of the class. - - - Specifies, in a pre-order depth-first traversal of a type's - construction, which occurrences are - meant to carry element names. - - - This constructor is meant to be used on types that contain an - instantiation of that contains - element names. For instance, if C is a generic type with - two type parameters, then a use of the constructed type C{, might be intended to - treat the first type argument as a tuple with element names and the - second as a tuple without element names. In which case, the - appropriate attribute specification should use a - transformNames value of { "name1", "name2", null, null, - null }. - - - - - Specifies, in a pre-order depth-first traversal of a type's - construction, which elements are - meant to carry element names. - - - - - Provides extension methods for instances to interop with C# tuples features (deconstruction syntax, converting from and to ). - - - - - Deconstruct a properly nested with 1 elements. - - - - - Deconstruct a properly nested with 2 elements. - - - - - Deconstruct a properly nested with 3 elements. - - - - - Deconstruct a properly nested with 4 elements. - - - - - Deconstruct a properly nested with 5 elements. - - - - - Deconstruct a properly nested with 6 elements. - - - - - Deconstruct a properly nested with 7 elements. - - - - - Deconstruct a properly nested with 8 elements. - - - - - Deconstruct a properly nested with 9 elements. - - - - - Deconstruct a properly nested with 10 elements. - - - - - Deconstruct a properly nested with 11 elements. - - - - - Deconstruct a properly nested with 12 elements. - - - - - Deconstruct a properly nested with 13 elements. - - - - - Deconstruct a properly nested with 14 elements. - - - - - Deconstruct a properly nested with 15 elements. - - - - - Deconstruct a properly nested with 16 elements. - - - - - Deconstruct a properly nested with 17 elements. - - - - - Deconstruct a properly nested with 18 elements. - - - - - Deconstruct a properly nested with 19 elements. - - - - - Deconstruct a properly nested with 20 elements. - - - - - Deconstruct a properly nested with 21 elements. - - - - - Make a properly nested from a properly nested with 1 element. - - - - - Make a properly nested from a properly nested with 2 elements. - - - - - Make a properly nested from a properly nested with 3 elements. - - - - - Make a properly nested from a properly nested with 4 elements. - - - - - Make a properly nested from a properly nested with 5 elements. - - - - - Make a properly nested from a properly nested with 6 elements. - - - - - Make a properly nested from a properly nested with 7 elements. - - - - - Make a properly nested from a properly nested with 8 elements. - - - - - Make a properly nested from a properly nested with 9 elements. - - - - - Make a properly nested from a properly nested with 10 elements. - - - - - Make a properly nested from a properly nested with 11 elements. - - - - - Make a properly nested from a properly nested with 12 elements. - - - - - Make a properly nested from a properly nested with 13 elements. - - - - - Make a properly nested from a properly nested with 14 elements. - - - - - Make a properly nested from a properly nested with 15 elements. - - - - - Make a properly nested from a properly nested with 16 elements. - - - - - Make a properly nested from a properly nested with 17 elements. - - - - - Make a properly nested from a properly nested with 18 elements. - - - - - Make a properly nested from a properly nested with 19 elements. - - - - - Make a properly nested from a properly nested with 20 elements. - - - - - Make a properly nested from a properly nested with 21 elements. - - - - - Make a properly nested from a properly nested with 1 element. - - - - - Make a properly nested from a properly nested with 2 elements. - - - - - Make a properly nested from a properly nested with 3 elements. - - - - - Make a properly nested from a properly nested with 4 elements. - - - - - Make a properly nested from a properly nested with 5 elements. - - - - - Make a properly nested from a properly nested with 6 elements. - - - - - Make a properly nested from a properly nested with 7 elements. - - - - - Make a properly nested from a properly nested with 8 elements. - - - - - Make a properly nested from a properly nested with 9 elements. - - - - - Make a properly nested from a properly nested with 10 elements. - - - - - Make a properly nested from a properly nested with 11 elements. - - - - - Make a properly nested from a properly nested with 12 elements. - - - - - Make a properly nested from a properly nested with 13 elements. - - - - - Make a properly nested from a properly nested with 14 elements. - - - - - Make a properly nested from a properly nested with 15 elements. - - - - - Make a properly nested from a properly nested with 16 elements. - - - - - Make a properly nested from a properly nested with 17 elements. - - - - - Make a properly nested from a properly nested with 18 elements. - - - - - Make a properly nested from a properly nested with 19 elements. - - - - - Make a properly nested from a properly nested with 20 elements. - - - - - Make a properly nested from a properly nested with 21 elements. - - - - - Helper so we can call some tuple methods recursively without knowing the underlying types. - - - - - The ValueTuple types (from arity 0 to 8) comprise the runtime implementation that underlies tuples in C# and struct tuples in F#. - Aside from created via language syntax, they are most easily created via the ValueTuple.Create factory methods. - The System.ValueTuple types differ from the System.Tuple types in that: - - they are structs rather than classes, - - they are mutable rather than readonly, and - - their members (such as Item1, Item2, etc) are fields rather than properties. - - - - - Returns a value that indicates whether the current instance is equal to a specified object. - - The object to compare with this instance. - if is a . - - - Returns a value indicating whether this instance is equal to a specified value. - An instance to compare to this instance. - true if has the same value as this instance; otherwise, false. - - - Compares this instance to a specified instance and returns an indication of their relative values. - An instance to compare. - - A signed number indicating the relative values of this instance and . - Returns less than zero if this instance is less than , zero if this - instance is equal to , and greater than zero if this instance is greater - than . - - - - Returns the hash code for this instance. - A 32-bit signed integer hash code. - - - - Returns a string that represents the value of this instance. - - The string representation of this instance. - - The string returned by this method takes the form (). - - - - Creates a new struct 0-tuple. - A 0-tuple. - - - Creates a new struct 1-tuple, or singleton. - The type of the first component of the tuple. - The value of the first component of the tuple. - A 1-tuple (singleton) whose value is (item1). - - - Creates a new struct 2-tuple, or pair. - The type of the first component of the tuple. - The type of the second component of the tuple. - The value of the first component of the tuple. - The value of the second component of the tuple. - A 2-tuple (pair) whose value is (item1, item2). - - - Creates a new struct 3-tuple, or triple. - The type of the first component of the tuple. - The type of the second component of the tuple. - The type of the third component of the tuple. - The value of the first component of the tuple. - The value of the second component of the tuple. - The value of the third component of the tuple. - A 3-tuple (triple) whose value is (item1, item2, item3). - - - Creates a new struct 4-tuple, or quadruple. - The type of the first component of the tuple. - The type of the second component of the tuple. - The type of the third component of the tuple. - The type of the fourth component of the tuple. - The value of the first component of the tuple. - The value of the second component of the tuple. - The value of the third component of the tuple. - The value of the fourth component of the tuple. - A 4-tuple (quadruple) whose value is (item1, item2, item3, item4). - - - Creates a new struct 5-tuple, or quintuple. - The type of the first component of the tuple. - The type of the second component of the tuple. - The type of the third component of the tuple. - The type of the fourth component of the tuple. - The type of the fifth component of the tuple. - The value of the first component of the tuple. - The value of the second component of the tuple. - The value of the third component of the tuple. - The value of the fourth component of the tuple. - The value of the fifth component of the tuple. - A 5-tuple (quintuple) whose value is (item1, item2, item3, item4, item5). - - - Creates a new struct 6-tuple, or sextuple. - The type of the first component of the tuple. - The type of the second component of the tuple. - The type of the third component of the tuple. - The type of the fourth component of the tuple. - The type of the fifth component of the tuple. - The type of the sixth component of the tuple. - The value of the first component of the tuple. - The value of the second component of the tuple. - The value of the third component of the tuple. - The value of the fourth component of the tuple. - The value of the fifth component of the tuple. - The value of the sixth component of the tuple. - A 6-tuple (sextuple) whose value is (item1, item2, item3, item4, item5, item6). - - - Creates a new struct 7-tuple, or septuple. - The type of the first component of the tuple. - The type of the second component of the tuple. - The type of the third component of the tuple. - The type of the fourth component of the tuple. - The type of the fifth component of the tuple. - The type of the sixth component of the tuple. - The type of the seventh component of the tuple. - The value of the first component of the tuple. - The value of the second component of the tuple. - The value of the third component of the tuple. - The value of the fourth component of the tuple. - The value of the fifth component of the tuple. - The value of the sixth component of the tuple. - The value of the seventh component of the tuple. - A 7-tuple (septuple) whose value is (item1, item2, item3, item4, item5, item6, item7). - - - Creates a new struct 8-tuple, or octuple. - The type of the first component of the tuple. - The type of the second component of the tuple. - The type of the third component of the tuple. - The type of the fourth component of the tuple. - The type of the fifth component of the tuple. - The type of the sixth component of the tuple. - The type of the seventh component of the tuple. - The type of the eighth component of the tuple. - The value of the first component of the tuple. - The value of the second component of the tuple. - The value of the third component of the tuple. - The value of the fourth component of the tuple. - The value of the fifth component of the tuple. - The value of the sixth component of the tuple. - The value of the seventh component of the tuple. - The value of the eighth component of the tuple. - An 8-tuple (octuple) whose value is (item1, item2, item3, item4, item5, item6, item7, item8). - - - Represents a 1-tuple, or singleton, as a value type. - The type of the tuple's only component. - - - - The current instance's first component. - - - - - Initializes a new instance of the value type. - - The value of the tuple's first component. - - - - Returns a value that indicates whether the current instance is equal to a specified object. - - The object to compare with this instance. - if the current instance is equal to the specified object; otherwise, . - - The parameter is considered to be equal to the current instance under the following conditions: - - It is a value type. - Its components are of the same types as those of the current instance. - Its components are equal to those of the current instance. Equality is determined by the default object equality comparer for each component. - - - - - - Returns a value that indicates whether the current - instance is equal to a specified . - - The tuple to compare with this instance. - if the current instance is equal to the specified tuple; otherwise, . - - The parameter is considered to be equal to the current instance if each of its field - is equal to that of the current instance, using the default comparer for that field's type. - - - - Compares this instance to a specified instance and returns an indication of their relative values. - An instance to compare. - - A signed number indicating the relative values of this instance and . - Returns less than zero if this instance is less than , zero if this - instance is equal to , and greater than zero if this instance is greater - than . - - - - - Returns the hash code for the current instance. - - A 32-bit signed integer hash code. - - - - Returns a string that represents the value of this instance. - - The string representation of this instance. - - The string returned by this method takes the form (Item1), - where Item1 represents the value of . If the field is , - it is represented as . - - - - - Represents a 2-tuple, or pair, as a value type. - - The type of the tuple's first component. - The type of the tuple's second component. - - - - The current instance's first component. - - - - - The current instance's second component. - - - - - Initializes a new instance of the value type. - - The value of the tuple's first component. - The value of the tuple's second component. - - - - Returns a value that indicates whether the current instance is equal to a specified object. - - The object to compare with this instance. - if the current instance is equal to the specified object; otherwise, . - - - The parameter is considered to be equal to the current instance under the following conditions: - - It is a value type. - Its components are of the same types as those of the current instance. - Its components are equal to those of the current instance. Equality is determined by the default object equality comparer for each component. - - - - - - Returns a value that indicates whether the current instance is equal to a specified . - - The tuple to compare with this instance. - if the current instance is equal to the specified tuple; otherwise, . - - The parameter is considered to be equal to the current instance if each of its fields - are equal to that of the current instance, using the default comparer for that field's type. - - - - - Returns a value that indicates whether the current instance is equal to a specified object based on a specified comparison method. - - The object to compare with this instance. - An object that defines the method to use to evaluate whether the two objects are equal. - if the current instance is equal to the specified object; otherwise, . - - - This member is an explicit interface member implementation. It can be used only when the - instance is cast to an interface. - - The implementation is called only if other is not , - and if it can be successfully cast (in C#) or converted (in Visual Basic) to a - whose components are of the same types as those of the current instance. The IStructuralEquatable.Equals(Object, IEqualityComparer) method - first passes the values of the objects to be compared to the - implementation. If this method call returns , the method is - called again and passed the values of the two instances. - - - - Compares this instance to a specified instance and returns an indication of their relative values. - An instance to compare. - - A signed number indicating the relative values of this instance and . - Returns less than zero if this instance is less than , zero if this - instance is equal to , and greater than zero if this instance is greater - than . - - - - - Returns the hash code for the current instance. - - A 32-bit signed integer hash code. - - - - Returns a string that represents the value of this instance. - - The string representation of this instance. - - The string returned by this method takes the form (Item1, Item2), - where Item1 and Item2 represent the values of the - and fields. If either field value is , - it is represented as . - - - - - Represents a 3-tuple, or triple, as a value type. - - The type of the tuple's first component. - The type of the tuple's second component. - The type of the tuple's third component. - - - - The current instance's first component. - - - - - The current instance's second component. - - - - - The current instance's third component. - - - - - Initializes a new instance of the value type. - - The value of the tuple's first component. - The value of the tuple's second component. - The value of the tuple's third component. - - - - Returns a value that indicates whether the current instance is equal to a specified object. - - The object to compare with this instance. - if the current instance is equal to the specified object; otherwise, . - - The parameter is considered to be equal to the current instance under the following conditions: - - It is a value type. - Its components are of the same types as those of the current instance. - Its components are equal to those of the current instance. Equality is determined by the default object equality comparer for each component. - - - - - - Returns a value that indicates whether the current - instance is equal to a specified . - - The tuple to compare with this instance. - if the current instance is equal to the specified tuple; otherwise, . - - The parameter is considered to be equal to the current instance if each of its fields - are equal to that of the current instance, using the default comparer for that field's type. - - - - Compares this instance to a specified instance and returns an indication of their relative values. - An instance to compare. - - A signed number indicating the relative values of this instance and . - Returns less than zero if this instance is less than , zero if this - instance is equal to , and greater than zero if this instance is greater - than . - - - - - Returns the hash code for the current instance. - - A 32-bit signed integer hash code. - - - - Returns a string that represents the value of this instance. - - The string representation of this instance. - - The string returned by this method takes the form (Item1, Item2, Item3). - If any field value is , it is represented as . - - - - - Represents a 4-tuple, or quadruple, as a value type. - - The type of the tuple's first component. - The type of the tuple's second component. - The type of the tuple's third component. - The type of the tuple's fourth component. - - - - The current instance's first component. - - - - - The current instance's second component. - - - - - The current instance's third component. - - - - - The current instance's fourth component. - - - - - Initializes a new instance of the value type. - - The value of the tuple's first component. - The value of the tuple's second component. - The value of the tuple's third component. - The value of the tuple's fourth component. - - - - Returns a value that indicates whether the current instance is equal to a specified object. - - The object to compare with this instance. - if the current instance is equal to the specified object; otherwise, . - - The parameter is considered to be equal to the current instance under the following conditions: - - It is a value type. - Its components are of the same types as those of the current instance. - Its components are equal to those of the current instance. Equality is determined by the default object equality comparer for each component. - - - - - - Returns a value that indicates whether the current - instance is equal to a specified . - - The tuple to compare with this instance. - if the current instance is equal to the specified tuple; otherwise, . - - The parameter is considered to be equal to the current instance if each of its fields - are equal to that of the current instance, using the default comparer for that field's type. - - - - Compares this instance to a specified instance and returns an indication of their relative values. - An instance to compare. - - A signed number indicating the relative values of this instance and . - Returns less than zero if this instance is less than , zero if this - instance is equal to , and greater than zero if this instance is greater - than . - - - - - Returns the hash code for the current instance. - - A 32-bit signed integer hash code. - - - - Returns a string that represents the value of this instance. - - The string representation of this instance. - - The string returned by this method takes the form (Item1, Item2, Item3, Item4). - If any field value is , it is represented as . - - - - - Represents a 5-tuple, or quintuple, as a value type. - - The type of the tuple's first component. - The type of the tuple's second component. - The type of the tuple's third component. - The type of the tuple's fourth component. - The type of the tuple's fifth component. - - - - The current instance's first component. - - - - - The current instance's second component. - - - - - The current instance's third component. - - - - - The current instance's fourth component. - - - - - The current instance's fifth component. - - - - - Initializes a new instance of the value type. - - The value of the tuple's first component. - The value of the tuple's second component. - The value of the tuple's third component. - The value of the tuple's fourth component. - The value of the tuple's fifth component. - - - - Returns a value that indicates whether the current instance is equal to a specified object. - - The object to compare with this instance. - if the current instance is equal to the specified object; otherwise, . - - The parameter is considered to be equal to the current instance under the following conditions: - - It is a value type. - Its components are of the same types as those of the current instance. - Its components are equal to those of the current instance. Equality is determined by the default object equality comparer for each component. - - - - - - Returns a value that indicates whether the current - instance is equal to a specified . - - The tuple to compare with this instance. - if the current instance is equal to the specified tuple; otherwise, . - - The parameter is considered to be equal to the current instance if each of its fields - are equal to that of the current instance, using the default comparer for that field's type. - - - - Compares this instance to a specified instance and returns an indication of their relative values. - An instance to compare. - - A signed number indicating the relative values of this instance and . - Returns less than zero if this instance is less than , zero if this - instance is equal to , and greater than zero if this instance is greater - than . - - - - - Returns the hash code for the current instance. - - A 32-bit signed integer hash code. - - - - Returns a string that represents the value of this instance. - - The string representation of this instance. - - The string returned by this method takes the form (Item1, Item2, Item3, Item4, Item5). - If any field value is , it is represented as . - - - - - Represents a 6-tuple, or sixtuple, as a value type. - - The type of the tuple's first component. - The type of the tuple's second component. - The type of the tuple's third component. - The type of the tuple's fourth component. - The type of the tuple's fifth component. - The type of the tuple's sixth component. - - - - The current instance's first component. - - - - - The current instance's second component. - - - - - The current instance's third component. - - - - - The current instance's fourth component. - - - - - The current instance's fifth component. - - - - - The current instance's sixth component. - - - - - Initializes a new instance of the value type. - - The value of the tuple's first component. - The value of the tuple's second component. - The value of the tuple's third component. - The value of the tuple's fourth component. - The value of the tuple's fifth component. - The value of the tuple's sixth component. - - - - Returns a value that indicates whether the current instance is equal to a specified object. - - The object to compare with this instance. - if the current instance is equal to the specified object; otherwise, . - - The parameter is considered to be equal to the current instance under the following conditions: - - It is a value type. - Its components are of the same types as those of the current instance. - Its components are equal to those of the current instance. Equality is determined by the default object equality comparer for each component. - - - - - - Returns a value that indicates whether the current - instance is equal to a specified . - - The tuple to compare with this instance. - if the current instance is equal to the specified tuple; otherwise, . - - The parameter is considered to be equal to the current instance if each of its fields - are equal to that of the current instance, using the default comparer for that field's type. - - - - Compares this instance to a specified instance and returns an indication of their relative values. - An instance to compare. - - A signed number indicating the relative values of this instance and . - Returns less than zero if this instance is less than , zero if this - instance is equal to , and greater than zero if this instance is greater - than . - - - - - Returns the hash code for the current instance. - - A 32-bit signed integer hash code. - - - - Returns a string that represents the value of this instance. - - The string representation of this instance. - - The string returned by this method takes the form (Item1, Item2, Item3, Item4, Item5, Item6). - If any field value is , it is represented as . - - - - - Represents a 7-tuple, or sentuple, as a value type. - - The type of the tuple's first component. - The type of the tuple's second component. - The type of the tuple's third component. - The type of the tuple's fourth component. - The type of the tuple's fifth component. - The type of the tuple's sixth component. - The type of the tuple's seventh component. - - - - The current instance's first component. - - - - - The current instance's second component. - - - - - The current instance's third component. - - - - - The current instance's fourth component. - - - - - The current instance's fifth component. - - - - - The current instance's sixth component. - - - - - The current instance's seventh component. - - - - - Initializes a new instance of the value type. - - The value of the tuple's first component. - The value of the tuple's second component. - The value of the tuple's third component. - The value of the tuple's fourth component. - The value of the tuple's fifth component. - The value of the tuple's sixth component. - The value of the tuple's seventh component. - - - - Returns a value that indicates whether the current instance is equal to a specified object. - - The object to compare with this instance. - if the current instance is equal to the specified object; otherwise, . - - The parameter is considered to be equal to the current instance under the following conditions: - - It is a value type. - Its components are of the same types as those of the current instance. - Its components are equal to those of the current instance. Equality is determined by the default object equality comparer for each component. - - - - - - Returns a value that indicates whether the current - instance is equal to a specified . - - The tuple to compare with this instance. - if the current instance is equal to the specified tuple; otherwise, . - - The parameter is considered to be equal to the current instance if each of its fields - are equal to that of the current instance, using the default comparer for that field's type. - - - - Compares this instance to a specified instance and returns an indication of their relative values. - An instance to compare. - - A signed number indicating the relative values of this instance and . - Returns less than zero if this instance is less than , zero if this - instance is equal to , and greater than zero if this instance is greater - than . - - - - - Returns the hash code for the current instance. - - A 32-bit signed integer hash code. - - - - Returns a string that represents the value of this instance. - - The string representation of this instance. - - The string returned by this method takes the form (Item1, Item2, Item3, Item4, Item5, Item6, Item7). - If any field value is , it is represented as . - - - - - Represents an 8-tuple, or octuple, as a value type. - - The type of the tuple's first component. - The type of the tuple's second component. - The type of the tuple's third component. - The type of the tuple's fourth component. - The type of the tuple's fifth component. - The type of the tuple's sixth component. - The type of the tuple's seventh component. - The type of the tuple's eighth component. - - - - The current instance's first component. - - - - - The current instance's second component. - - - - - The current instance's third component. - - - - - The current instance's fourth component. - - - - - The current instance's fifth component. - - - - - The current instance's sixth component. - - - - - The current instance's seventh component. - - - - - The current instance's eighth component. - - - - - Initializes a new instance of the value type. - - The value of the tuple's first component. - The value of the tuple's second component. - The value of the tuple's third component. - The value of the tuple's fourth component. - The value of the tuple's fifth component. - The value of the tuple's sixth component. - The value of the tuple's seventh component. - The value of the tuple's eight component. - - - - Returns a value that indicates whether the current instance is equal to a specified object. - - The object to compare with this instance. - if the current instance is equal to the specified object; otherwise, . - - The parameter is considered to be equal to the current instance under the following conditions: - - It is a value type. - Its components are of the same types as those of the current instance. - Its components are equal to those of the current instance. Equality is determined by the default object equality comparer for each component. - - - - - - Returns a value that indicates whether the current - instance is equal to a specified . - - The tuple to compare with this instance. - if the current instance is equal to the specified tuple; otherwise, . - - The parameter is considered to be equal to the current instance if each of its fields - are equal to that of the current instance, using the default comparer for that field's type. - - - - Compares this instance to a specified instance and returns an indication of their relative values. - An instance to compare. - - A signed number indicating the relative values of this instance and . - Returns less than zero if this instance is less than , zero if this - instance is equal to , and greater than zero if this instance is greater - than . - - - - - Returns the hash code for the current instance. - - A 32-bit signed integer hash code. - - - - Returns a string that represents the value of this instance. - - The string representation of this instance. - - The string returned by this method takes the form (Item1, Item2, Item3, Item4, Item5, Item6, Item7, Rest). - If any field value is , it is represented as . - - - - diff --git a/packages/System.ValueTuple.4.5.0/lib/netstandard2.0/_._ b/packages/System.ValueTuple.4.5.0/lib/netstandard2.0/_._ deleted file mode 100644 index e69de29b..00000000 diff --git a/packages/System.ValueTuple.4.5.0/lib/portable-net40+sl4+win8+wp8/System.ValueTuple.dll b/packages/System.ValueTuple.4.5.0/lib/portable-net40+sl4+win8+wp8/System.ValueTuple.dll deleted file mode 100644 index b63769a4..00000000 Binary files a/packages/System.ValueTuple.4.5.0/lib/portable-net40+sl4+win8+wp8/System.ValueTuple.dll and /dev/null differ diff --git a/packages/System.ValueTuple.4.5.0/lib/portable-net40+sl4+win8+wp8/System.ValueTuple.xml b/packages/System.ValueTuple.4.5.0/lib/portable-net40+sl4+win8+wp8/System.ValueTuple.xml deleted file mode 100644 index 6dcce66f..00000000 --- a/packages/System.ValueTuple.4.5.0/lib/portable-net40+sl4+win8+wp8/System.ValueTuple.xml +++ /dev/null @@ -1,1299 +0,0 @@ - - - - System.ValueTuple - - - - - Indicates that the use of on a member is meant to be treated as a tuple with element names. - - - - - Initializes a new instance of the class. - - - Specifies, in a pre-order depth-first traversal of a type's - construction, which occurrences are - meant to carry element names. - - - This constructor is meant to be used on types that contain an - instantiation of that contains - element names. For instance, if C is a generic type with - two type parameters, then a use of the constructed type C{, might be intended to - treat the first type argument as a tuple with element names and the - second as a tuple without element names. In which case, the - appropriate attribute specification should use a - transformNames value of { "name1", "name2", null, null, - null }. - - - - - Specifies, in a pre-order depth-first traversal of a type's - construction, which elements are - meant to carry element names. - - - - - Provides extension methods for instances to interop with C# tuples features (deconstruction syntax, converting from and to ). - - - - - Deconstruct a properly nested with 1 elements. - - - - - Deconstruct a properly nested with 2 elements. - - - - - Deconstruct a properly nested with 3 elements. - - - - - Deconstruct a properly nested with 4 elements. - - - - - Deconstruct a properly nested with 5 elements. - - - - - Deconstruct a properly nested with 6 elements. - - - - - Deconstruct a properly nested with 7 elements. - - - - - Deconstruct a properly nested with 8 elements. - - - - - Deconstruct a properly nested with 9 elements. - - - - - Deconstruct a properly nested with 10 elements. - - - - - Deconstruct a properly nested with 11 elements. - - - - - Deconstruct a properly nested with 12 elements. - - - - - Deconstruct a properly nested with 13 elements. - - - - - Deconstruct a properly nested with 14 elements. - - - - - Deconstruct a properly nested with 15 elements. - - - - - Deconstruct a properly nested with 16 elements. - - - - - Deconstruct a properly nested with 17 elements. - - - - - Deconstruct a properly nested with 18 elements. - - - - - Deconstruct a properly nested with 19 elements. - - - - - Deconstruct a properly nested with 20 elements. - - - - - Deconstruct a properly nested with 21 elements. - - - - - Make a properly nested from a properly nested with 1 element. - - - - - Make a properly nested from a properly nested with 2 elements. - - - - - Make a properly nested from a properly nested with 3 elements. - - - - - Make a properly nested from a properly nested with 4 elements. - - - - - Make a properly nested from a properly nested with 5 elements. - - - - - Make a properly nested from a properly nested with 6 elements. - - - - - Make a properly nested from a properly nested with 7 elements. - - - - - Make a properly nested from a properly nested with 8 elements. - - - - - Make a properly nested from a properly nested with 9 elements. - - - - - Make a properly nested from a properly nested with 10 elements. - - - - - Make a properly nested from a properly nested with 11 elements. - - - - - Make a properly nested from a properly nested with 12 elements. - - - - - Make a properly nested from a properly nested with 13 elements. - - - - - Make a properly nested from a properly nested with 14 elements. - - - - - Make a properly nested from a properly nested with 15 elements. - - - - - Make a properly nested from a properly nested with 16 elements. - - - - - Make a properly nested from a properly nested with 17 elements. - - - - - Make a properly nested from a properly nested with 18 elements. - - - - - Make a properly nested from a properly nested with 19 elements. - - - - - Make a properly nested from a properly nested with 20 elements. - - - - - Make a properly nested from a properly nested with 21 elements. - - - - - Make a properly nested from a properly nested with 1 element. - - - - - Make a properly nested from a properly nested with 2 elements. - - - - - Make a properly nested from a properly nested with 3 elements. - - - - - Make a properly nested from a properly nested with 4 elements. - - - - - Make a properly nested from a properly nested with 5 elements. - - - - - Make a properly nested from a properly nested with 6 elements. - - - - - Make a properly nested from a properly nested with 7 elements. - - - - - Make a properly nested from a properly nested with 8 elements. - - - - - Make a properly nested from a properly nested with 9 elements. - - - - - Make a properly nested from a properly nested with 10 elements. - - - - - Make a properly nested from a properly nested with 11 elements. - - - - - Make a properly nested from a properly nested with 12 elements. - - - - - Make a properly nested from a properly nested with 13 elements. - - - - - Make a properly nested from a properly nested with 14 elements. - - - - - Make a properly nested from a properly nested with 15 elements. - - - - - Make a properly nested from a properly nested with 16 elements. - - - - - Make a properly nested from a properly nested with 17 elements. - - - - - Make a properly nested from a properly nested with 18 elements. - - - - - Make a properly nested from a properly nested with 19 elements. - - - - - Make a properly nested from a properly nested with 20 elements. - - - - - Make a properly nested from a properly nested with 21 elements. - - - - - Helper so we can call some tuple methods recursively without knowing the underlying types. - - - - - The ValueTuple types (from arity 0 to 8) comprise the runtime implementation that underlies tuples in C# and struct tuples in F#. - Aside from created via language syntax, they are most easily created via the ValueTuple.Create factory methods. - The System.ValueTuple types differ from the System.Tuple types in that: - - they are structs rather than classes, - - they are mutable rather than readonly, and - - their members (such as Item1, Item2, etc) are fields rather than properties. - - - - - Returns a value that indicates whether the current instance is equal to a specified object. - - The object to compare with this instance. - if is a . - - - Returns a value indicating whether this instance is equal to a specified value. - An instance to compare to this instance. - true if has the same value as this instance; otherwise, false. - - - Compares this instance to a specified instance and returns an indication of their relative values. - An instance to compare. - - A signed number indicating the relative values of this instance and . - Returns less than zero if this instance is less than , zero if this - instance is equal to , and greater than zero if this instance is greater - than . - - - - Returns the hash code for this instance. - A 32-bit signed integer hash code. - - - - Returns a string that represents the value of this instance. - - The string representation of this instance. - - The string returned by this method takes the form (). - - - - Creates a new struct 0-tuple. - A 0-tuple. - - - Creates a new struct 1-tuple, or singleton. - The type of the first component of the tuple. - The value of the first component of the tuple. - A 1-tuple (singleton) whose value is (item1). - - - Creates a new struct 2-tuple, or pair. - The type of the first component of the tuple. - The type of the second component of the tuple. - The value of the first component of the tuple. - The value of the second component of the tuple. - A 2-tuple (pair) whose value is (item1, item2). - - - Creates a new struct 3-tuple, or triple. - The type of the first component of the tuple. - The type of the second component of the tuple. - The type of the third component of the tuple. - The value of the first component of the tuple. - The value of the second component of the tuple. - The value of the third component of the tuple. - A 3-tuple (triple) whose value is (item1, item2, item3). - - - Creates a new struct 4-tuple, or quadruple. - The type of the first component of the tuple. - The type of the second component of the tuple. - The type of the third component of the tuple. - The type of the fourth component of the tuple. - The value of the first component of the tuple. - The value of the second component of the tuple. - The value of the third component of the tuple. - The value of the fourth component of the tuple. - A 4-tuple (quadruple) whose value is (item1, item2, item3, item4). - - - Creates a new struct 5-tuple, or quintuple. - The type of the first component of the tuple. - The type of the second component of the tuple. - The type of the third component of the tuple. - The type of the fourth component of the tuple. - The type of the fifth component of the tuple. - The value of the first component of the tuple. - The value of the second component of the tuple. - The value of the third component of the tuple. - The value of the fourth component of the tuple. - The value of the fifth component of the tuple. - A 5-tuple (quintuple) whose value is (item1, item2, item3, item4, item5). - - - Creates a new struct 6-tuple, or sextuple. - The type of the first component of the tuple. - The type of the second component of the tuple. - The type of the third component of the tuple. - The type of the fourth component of the tuple. - The type of the fifth component of the tuple. - The type of the sixth component of the tuple. - The value of the first component of the tuple. - The value of the second component of the tuple. - The value of the third component of the tuple. - The value of the fourth component of the tuple. - The value of the fifth component of the tuple. - The value of the sixth component of the tuple. - A 6-tuple (sextuple) whose value is (item1, item2, item3, item4, item5, item6). - - - Creates a new struct 7-tuple, or septuple. - The type of the first component of the tuple. - The type of the second component of the tuple. - The type of the third component of the tuple. - The type of the fourth component of the tuple. - The type of the fifth component of the tuple. - The type of the sixth component of the tuple. - The type of the seventh component of the tuple. - The value of the first component of the tuple. - The value of the second component of the tuple. - The value of the third component of the tuple. - The value of the fourth component of the tuple. - The value of the fifth component of the tuple. - The value of the sixth component of the tuple. - The value of the seventh component of the tuple. - A 7-tuple (septuple) whose value is (item1, item2, item3, item4, item5, item6, item7). - - - Creates a new struct 8-tuple, or octuple. - The type of the first component of the tuple. - The type of the second component of the tuple. - The type of the third component of the tuple. - The type of the fourth component of the tuple. - The type of the fifth component of the tuple. - The type of the sixth component of the tuple. - The type of the seventh component of the tuple. - The type of the eighth component of the tuple. - The value of the first component of the tuple. - The value of the second component of the tuple. - The value of the third component of the tuple. - The value of the fourth component of the tuple. - The value of the fifth component of the tuple. - The value of the sixth component of the tuple. - The value of the seventh component of the tuple. - The value of the eighth component of the tuple. - An 8-tuple (octuple) whose value is (item1, item2, item3, item4, item5, item6, item7, item8). - - - Represents a 1-tuple, or singleton, as a value type. - The type of the tuple's only component. - - - - The current instance's first component. - - - - - Initializes a new instance of the value type. - - The value of the tuple's first component. - - - - Returns a value that indicates whether the current instance is equal to a specified object. - - The object to compare with this instance. - if the current instance is equal to the specified object; otherwise, . - - The parameter is considered to be equal to the current instance under the following conditions: - - It is a value type. - Its components are of the same types as those of the current instance. - Its components are equal to those of the current instance. Equality is determined by the default object equality comparer for each component. - - - - - - Returns a value that indicates whether the current - instance is equal to a specified . - - The tuple to compare with this instance. - if the current instance is equal to the specified tuple; otherwise, . - - The parameter is considered to be equal to the current instance if each of its field - is equal to that of the current instance, using the default comparer for that field's type. - - - - Compares this instance to a specified instance and returns an indication of their relative values. - An instance to compare. - - A signed number indicating the relative values of this instance and . - Returns less than zero if this instance is less than , zero if this - instance is equal to , and greater than zero if this instance is greater - than . - - - - - Returns the hash code for the current instance. - - A 32-bit signed integer hash code. - - - - Returns a string that represents the value of this instance. - - The string representation of this instance. - - The string returned by this method takes the form (Item1), - where Item1 represents the value of . If the field is , - it is represented as . - - - - - Represents a 2-tuple, or pair, as a value type. - - The type of the tuple's first component. - The type of the tuple's second component. - - - - The current instance's first component. - - - - - The current instance's second component. - - - - - Initializes a new instance of the value type. - - The value of the tuple's first component. - The value of the tuple's second component. - - - - Returns a value that indicates whether the current instance is equal to a specified object. - - The object to compare with this instance. - if the current instance is equal to the specified object; otherwise, . - - - The parameter is considered to be equal to the current instance under the following conditions: - - It is a value type. - Its components are of the same types as those of the current instance. - Its components are equal to those of the current instance. Equality is determined by the default object equality comparer for each component. - - - - - - Returns a value that indicates whether the current instance is equal to a specified . - - The tuple to compare with this instance. - if the current instance is equal to the specified tuple; otherwise, . - - The parameter is considered to be equal to the current instance if each of its fields - are equal to that of the current instance, using the default comparer for that field's type. - - - - - Returns a value that indicates whether the current instance is equal to a specified object based on a specified comparison method. - - The object to compare with this instance. - An object that defines the method to use to evaluate whether the two objects are equal. - if the current instance is equal to the specified object; otherwise, . - - - This member is an explicit interface member implementation. It can be used only when the - instance is cast to an interface. - - The implementation is called only if other is not , - and if it can be successfully cast (in C#) or converted (in Visual Basic) to a - whose components are of the same types as those of the current instance. The IStructuralEquatable.Equals(Object, IEqualityComparer) method - first passes the values of the objects to be compared to the - implementation. If this method call returns , the method is - called again and passed the values of the two instances. - - - - Compares this instance to a specified instance and returns an indication of their relative values. - An instance to compare. - - A signed number indicating the relative values of this instance and . - Returns less than zero if this instance is less than , zero if this - instance is equal to , and greater than zero if this instance is greater - than . - - - - - Returns the hash code for the current instance. - - A 32-bit signed integer hash code. - - - - Returns a string that represents the value of this instance. - - The string representation of this instance. - - The string returned by this method takes the form (Item1, Item2), - where Item1 and Item2 represent the values of the - and fields. If either field value is , - it is represented as . - - - - - Represents a 3-tuple, or triple, as a value type. - - The type of the tuple's first component. - The type of the tuple's second component. - The type of the tuple's third component. - - - - The current instance's first component. - - - - - The current instance's second component. - - - - - The current instance's third component. - - - - - Initializes a new instance of the value type. - - The value of the tuple's first component. - The value of the tuple's second component. - The value of the tuple's third component. - - - - Returns a value that indicates whether the current instance is equal to a specified object. - - The object to compare with this instance. - if the current instance is equal to the specified object; otherwise, . - - The parameter is considered to be equal to the current instance under the following conditions: - - It is a value type. - Its components are of the same types as those of the current instance. - Its components are equal to those of the current instance. Equality is determined by the default object equality comparer for each component. - - - - - - Returns a value that indicates whether the current - instance is equal to a specified . - - The tuple to compare with this instance. - if the current instance is equal to the specified tuple; otherwise, . - - The parameter is considered to be equal to the current instance if each of its fields - are equal to that of the current instance, using the default comparer for that field's type. - - - - Compares this instance to a specified instance and returns an indication of their relative values. - An instance to compare. - - A signed number indicating the relative values of this instance and . - Returns less than zero if this instance is less than , zero if this - instance is equal to , and greater than zero if this instance is greater - than . - - - - - Returns the hash code for the current instance. - - A 32-bit signed integer hash code. - - - - Returns a string that represents the value of this instance. - - The string representation of this instance. - - The string returned by this method takes the form (Item1, Item2, Item3). - If any field value is , it is represented as . - - - - - Represents a 4-tuple, or quadruple, as a value type. - - The type of the tuple's first component. - The type of the tuple's second component. - The type of the tuple's third component. - The type of the tuple's fourth component. - - - - The current instance's first component. - - - - - The current instance's second component. - - - - - The current instance's third component. - - - - - The current instance's fourth component. - - - - - Initializes a new instance of the value type. - - The value of the tuple's first component. - The value of the tuple's second component. - The value of the tuple's third component. - The value of the tuple's fourth component. - - - - Returns a value that indicates whether the current instance is equal to a specified object. - - The object to compare with this instance. - if the current instance is equal to the specified object; otherwise, . - - The parameter is considered to be equal to the current instance under the following conditions: - - It is a value type. - Its components are of the same types as those of the current instance. - Its components are equal to those of the current instance. Equality is determined by the default object equality comparer for each component. - - - - - - Returns a value that indicates whether the current - instance is equal to a specified . - - The tuple to compare with this instance. - if the current instance is equal to the specified tuple; otherwise, . - - The parameter is considered to be equal to the current instance if each of its fields - are equal to that of the current instance, using the default comparer for that field's type. - - - - Compares this instance to a specified instance and returns an indication of their relative values. - An instance to compare. - - A signed number indicating the relative values of this instance and . - Returns less than zero if this instance is less than , zero if this - instance is equal to , and greater than zero if this instance is greater - than . - - - - - Returns the hash code for the current instance. - - A 32-bit signed integer hash code. - - - - Returns a string that represents the value of this instance. - - The string representation of this instance. - - The string returned by this method takes the form (Item1, Item2, Item3, Item4). - If any field value is , it is represented as . - - - - - Represents a 5-tuple, or quintuple, as a value type. - - The type of the tuple's first component. - The type of the tuple's second component. - The type of the tuple's third component. - The type of the tuple's fourth component. - The type of the tuple's fifth component. - - - - The current instance's first component. - - - - - The current instance's second component. - - - - - The current instance's third component. - - - - - The current instance's fourth component. - - - - - The current instance's fifth component. - - - - - Initializes a new instance of the value type. - - The value of the tuple's first component. - The value of the tuple's second component. - The value of the tuple's third component. - The value of the tuple's fourth component. - The value of the tuple's fifth component. - - - - Returns a value that indicates whether the current instance is equal to a specified object. - - The object to compare with this instance. - if the current instance is equal to the specified object; otherwise, . - - The parameter is considered to be equal to the current instance under the following conditions: - - It is a value type. - Its components are of the same types as those of the current instance. - Its components are equal to those of the current instance. Equality is determined by the default object equality comparer for each component. - - - - - - Returns a value that indicates whether the current - instance is equal to a specified . - - The tuple to compare with this instance. - if the current instance is equal to the specified tuple; otherwise, . - - The parameter is considered to be equal to the current instance if each of its fields - are equal to that of the current instance, using the default comparer for that field's type. - - - - Compares this instance to a specified instance and returns an indication of their relative values. - An instance to compare. - - A signed number indicating the relative values of this instance and . - Returns less than zero if this instance is less than , zero if this - instance is equal to , and greater than zero if this instance is greater - than . - - - - - Returns the hash code for the current instance. - - A 32-bit signed integer hash code. - - - - Returns a string that represents the value of this instance. - - The string representation of this instance. - - The string returned by this method takes the form (Item1, Item2, Item3, Item4, Item5). - If any field value is , it is represented as . - - - - - Represents a 6-tuple, or sixtuple, as a value type. - - The type of the tuple's first component. - The type of the tuple's second component. - The type of the tuple's third component. - The type of the tuple's fourth component. - The type of the tuple's fifth component. - The type of the tuple's sixth component. - - - - The current instance's first component. - - - - - The current instance's second component. - - - - - The current instance's third component. - - - - - The current instance's fourth component. - - - - - The current instance's fifth component. - - - - - The current instance's sixth component. - - - - - Initializes a new instance of the value type. - - The value of the tuple's first component. - The value of the tuple's second component. - The value of the tuple's third component. - The value of the tuple's fourth component. - The value of the tuple's fifth component. - The value of the tuple's sixth component. - - - - Returns a value that indicates whether the current instance is equal to a specified object. - - The object to compare with this instance. - if the current instance is equal to the specified object; otherwise, . - - The parameter is considered to be equal to the current instance under the following conditions: - - It is a value type. - Its components are of the same types as those of the current instance. - Its components are equal to those of the current instance. Equality is determined by the default object equality comparer for each component. - - - - - - Returns a value that indicates whether the current - instance is equal to a specified . - - The tuple to compare with this instance. - if the current instance is equal to the specified tuple; otherwise, . - - The parameter is considered to be equal to the current instance if each of its fields - are equal to that of the current instance, using the default comparer for that field's type. - - - - Compares this instance to a specified instance and returns an indication of their relative values. - An instance to compare. - - A signed number indicating the relative values of this instance and . - Returns less than zero if this instance is less than , zero if this - instance is equal to , and greater than zero if this instance is greater - than . - - - - - Returns the hash code for the current instance. - - A 32-bit signed integer hash code. - - - - Returns a string that represents the value of this instance. - - The string representation of this instance. - - The string returned by this method takes the form (Item1, Item2, Item3, Item4, Item5, Item6). - If any field value is , it is represented as . - - - - - Represents a 7-tuple, or sentuple, as a value type. - - The type of the tuple's first component. - The type of the tuple's second component. - The type of the tuple's third component. - The type of the tuple's fourth component. - The type of the tuple's fifth component. - The type of the tuple's sixth component. - The type of the tuple's seventh component. - - - - The current instance's first component. - - - - - The current instance's second component. - - - - - The current instance's third component. - - - - - The current instance's fourth component. - - - - - The current instance's fifth component. - - - - - The current instance's sixth component. - - - - - The current instance's seventh component. - - - - - Initializes a new instance of the value type. - - The value of the tuple's first component. - The value of the tuple's second component. - The value of the tuple's third component. - The value of the tuple's fourth component. - The value of the tuple's fifth component. - The value of the tuple's sixth component. - The value of the tuple's seventh component. - - - - Returns a value that indicates whether the current instance is equal to a specified object. - - The object to compare with this instance. - if the current instance is equal to the specified object; otherwise, . - - The parameter is considered to be equal to the current instance under the following conditions: - - It is a value type. - Its components are of the same types as those of the current instance. - Its components are equal to those of the current instance. Equality is determined by the default object equality comparer for each component. - - - - - - Returns a value that indicates whether the current - instance is equal to a specified . - - The tuple to compare with this instance. - if the current instance is equal to the specified tuple; otherwise, . - - The parameter is considered to be equal to the current instance if each of its fields - are equal to that of the current instance, using the default comparer for that field's type. - - - - Compares this instance to a specified instance and returns an indication of their relative values. - An instance to compare. - - A signed number indicating the relative values of this instance and . - Returns less than zero if this instance is less than , zero if this - instance is equal to , and greater than zero if this instance is greater - than . - - - - - Returns the hash code for the current instance. - - A 32-bit signed integer hash code. - - - - Returns a string that represents the value of this instance. - - The string representation of this instance. - - The string returned by this method takes the form (Item1, Item2, Item3, Item4, Item5, Item6, Item7). - If any field value is , it is represented as . - - - - - Represents an 8-tuple, or octuple, as a value type. - - The type of the tuple's first component. - The type of the tuple's second component. - The type of the tuple's third component. - The type of the tuple's fourth component. - The type of the tuple's fifth component. - The type of the tuple's sixth component. - The type of the tuple's seventh component. - The type of the tuple's eighth component. - - - - The current instance's first component. - - - - - The current instance's second component. - - - - - The current instance's third component. - - - - - The current instance's fourth component. - - - - - The current instance's fifth component. - - - - - The current instance's sixth component. - - - - - The current instance's seventh component. - - - - - The current instance's eighth component. - - - - - Initializes a new instance of the value type. - - The value of the tuple's first component. - The value of the tuple's second component. - The value of the tuple's third component. - The value of the tuple's fourth component. - The value of the tuple's fifth component. - The value of the tuple's sixth component. - The value of the tuple's seventh component. - The value of the tuple's eight component. - - - - Returns a value that indicates whether the current instance is equal to a specified object. - - The object to compare with this instance. - if the current instance is equal to the specified object; otherwise, . - - The parameter is considered to be equal to the current instance under the following conditions: - - It is a value type. - Its components are of the same types as those of the current instance. - Its components are equal to those of the current instance. Equality is determined by the default object equality comparer for each component. - - - - - - Returns a value that indicates whether the current - instance is equal to a specified . - - The tuple to compare with this instance. - if the current instance is equal to the specified tuple; otherwise, . - - The parameter is considered to be equal to the current instance if each of its fields - are equal to that of the current instance, using the default comparer for that field's type. - - - - Compares this instance to a specified instance and returns an indication of their relative values. - An instance to compare. - - A signed number indicating the relative values of this instance and . - Returns less than zero if this instance is less than , zero if this - instance is equal to , and greater than zero if this instance is greater - than . - - - - - Returns the hash code for the current instance. - - A 32-bit signed integer hash code. - - - - Returns a string that represents the value of this instance. - - The string representation of this instance. - - The string returned by this method takes the form (Item1, Item2, Item3, Item4, Item5, Item6, Item7, Rest). - If any field value is , it is represented as . - - - - diff --git a/packages/System.ValueTuple.4.5.0/lib/uap10.0.16299/_._ b/packages/System.ValueTuple.4.5.0/lib/uap10.0.16299/_._ deleted file mode 100644 index e69de29b..00000000 diff --git a/packages/System.ValueTuple.4.5.0/lib/xamarinios10/_._ b/packages/System.ValueTuple.4.5.0/lib/xamarinios10/_._ deleted file mode 100644 index e69de29b..00000000 diff --git a/packages/System.ValueTuple.4.5.0/lib/xamarinmac20/_._ b/packages/System.ValueTuple.4.5.0/lib/xamarinmac20/_._ deleted file mode 100644 index e69de29b..00000000 diff --git a/packages/System.ValueTuple.4.5.0/lib/xamarintvos10/_._ b/packages/System.ValueTuple.4.5.0/lib/xamarintvos10/_._ deleted file mode 100644 index e69de29b..00000000 diff --git a/packages/System.ValueTuple.4.5.0/lib/xamarinwatchos10/_._ b/packages/System.ValueTuple.4.5.0/lib/xamarinwatchos10/_._ deleted file mode 100644 index e69de29b..00000000 diff --git a/packages/System.ValueTuple.4.5.0/ref/MonoAndroid10/_._ b/packages/System.ValueTuple.4.5.0/ref/MonoAndroid10/_._ deleted file mode 100644 index e69de29b..00000000 diff --git a/packages/System.ValueTuple.4.5.0/ref/MonoTouch10/_._ b/packages/System.ValueTuple.4.5.0/ref/MonoTouch10/_._ deleted file mode 100644 index e69de29b..00000000 diff --git a/packages/System.ValueTuple.4.5.0/ref/net461/System.ValueTuple.dll b/packages/System.ValueTuple.4.5.0/ref/net461/System.ValueTuple.dll deleted file mode 100644 index ba8aeb6b..00000000 Binary files a/packages/System.ValueTuple.4.5.0/ref/net461/System.ValueTuple.dll and /dev/null differ diff --git a/packages/System.ValueTuple.4.5.0/ref/net47/System.ValueTuple.dll b/packages/System.ValueTuple.4.5.0/ref/net47/System.ValueTuple.dll deleted file mode 100644 index ed3bd7bf..00000000 Binary files a/packages/System.ValueTuple.4.5.0/ref/net47/System.ValueTuple.dll and /dev/null differ diff --git a/packages/System.ValueTuple.4.5.0/ref/netcoreapp2.0/_._ b/packages/System.ValueTuple.4.5.0/ref/netcoreapp2.0/_._ deleted file mode 100644 index e69de29b..00000000 diff --git a/packages/System.ValueTuple.4.5.0/ref/netstandard2.0/_._ b/packages/System.ValueTuple.4.5.0/ref/netstandard2.0/_._ deleted file mode 100644 index e69de29b..00000000 diff --git a/packages/System.ValueTuple.4.5.0/ref/portable-net40+sl4+win8+wp8/System.ValueTuple.dll b/packages/System.ValueTuple.4.5.0/ref/portable-net40+sl4+win8+wp8/System.ValueTuple.dll deleted file mode 100644 index 8c72a7ae..00000000 Binary files a/packages/System.ValueTuple.4.5.0/ref/portable-net40+sl4+win8+wp8/System.ValueTuple.dll and /dev/null differ diff --git a/packages/System.ValueTuple.4.5.0/ref/uap10.0.16299/_._ b/packages/System.ValueTuple.4.5.0/ref/uap10.0.16299/_._ deleted file mode 100644 index e69de29b..00000000 diff --git a/packages/System.ValueTuple.4.5.0/ref/xamarinios10/_._ b/packages/System.ValueTuple.4.5.0/ref/xamarinios10/_._ deleted file mode 100644 index e69de29b..00000000 diff --git a/packages/System.ValueTuple.4.5.0/ref/xamarinmac20/_._ b/packages/System.ValueTuple.4.5.0/ref/xamarinmac20/_._ deleted file mode 100644 index e69de29b..00000000 diff --git a/packages/System.ValueTuple.4.5.0/ref/xamarintvos10/_._ b/packages/System.ValueTuple.4.5.0/ref/xamarintvos10/_._ deleted file mode 100644 index e69de29b..00000000 diff --git a/packages/System.ValueTuple.4.5.0/ref/xamarinwatchos10/_._ b/packages/System.ValueTuple.4.5.0/ref/xamarinwatchos10/_._ deleted file mode 100644 index e69de29b..00000000 diff --git a/packages/System.ValueTuple.4.5.0/useSharedDesignerContext.txt b/packages/System.ValueTuple.4.5.0/useSharedDesignerContext.txt deleted file mode 100644 index e69de29b..00000000 diff --git a/packages/System.ValueTuple.4.5.0/version.txt b/packages/System.ValueTuple.4.5.0/version.txt deleted file mode 100644 index 47004a02..00000000 --- a/packages/System.ValueTuple.4.5.0/version.txt +++ /dev/null @@ -1 +0,0 @@ -30ab651fcb4354552bd4891619a0bdd81e0ebdbf diff --git a/packages/lz4net.1.0.15.93/.signature.p7s b/packages/lz4net.1.0.15.93/.signature.p7s deleted file mode 100644 index a363ec12..00000000 Binary files a/packages/lz4net.1.0.15.93/.signature.p7s and /dev/null differ diff --git a/packages/lz4net.1.0.15.93/lib/net2/LZ4.dll b/packages/lz4net.1.0.15.93/lib/net2/LZ4.dll deleted file mode 100644 index f1aeba34..00000000 Binary files a/packages/lz4net.1.0.15.93/lib/net2/LZ4.dll and /dev/null differ diff --git a/packages/lz4net.1.0.15.93/lib/net4-client/LZ4.dll b/packages/lz4net.1.0.15.93/lib/net4-client/LZ4.dll deleted file mode 100644 index 89240f4e..00000000 Binary files a/packages/lz4net.1.0.15.93/lib/net4-client/LZ4.dll and /dev/null differ diff --git a/packages/lz4net.1.0.15.93/lib/netstandard1.0/LZ4.dll b/packages/lz4net.1.0.15.93/lib/netstandard1.0/LZ4.dll deleted file mode 100644 index 39622de2..00000000 Binary files a/packages/lz4net.1.0.15.93/lib/netstandard1.0/LZ4.dll and /dev/null differ diff --git a/packages/lz4net.1.0.15.93/lib/portable-net4+win8+wpa81+MonoAndroid+MonoTouch+Xamarin.iOS/LZ4.dll b/packages/lz4net.1.0.15.93/lib/portable-net4+win8+wpa81+MonoAndroid+MonoTouch+Xamarin.iOS/LZ4.dll deleted file mode 100644 index c8ffcec8..00000000 Binary files a/packages/lz4net.1.0.15.93/lib/portable-net4+win8+wpa81+MonoAndroid+MonoTouch+Xamarin.iOS/LZ4.dll and /dev/null differ diff --git a/packages/lz4net.1.0.15.93/lib/portable-net4+win8+wpa81+MonoAndroid+MonoTouch+Xamarin.iOS/LZ4pn.dll b/packages/lz4net.1.0.15.93/lib/portable-net4+win8+wpa81+MonoAndroid+MonoTouch+Xamarin.iOS/LZ4pn.dll deleted file mode 100644 index d617f63e..00000000 Binary files a/packages/lz4net.1.0.15.93/lib/portable-net4+win8+wpa81+MonoAndroid+MonoTouch+Xamarin.iOS/LZ4pn.dll and /dev/null differ diff --git a/packages/lz4net.1.0.15.93/lib/portable-net4+win8+wpa81+sl5+wp8+MonoAndroid+MonoTouch+Xamarin.iOS/LZ4.dll b/packages/lz4net.1.0.15.93/lib/portable-net4+win8+wpa81+sl5+wp8+MonoAndroid+MonoTouch+Xamarin.iOS/LZ4.dll deleted file mode 100644 index 42602a00..00000000 Binary files a/packages/lz4net.1.0.15.93/lib/portable-net4+win8+wpa81+sl5+wp8+MonoAndroid+MonoTouch+Xamarin.iOS/LZ4.dll and /dev/null differ diff --git a/packages/lz4net.1.0.15.93/lz4net.1.0.15.93.nupkg b/packages/lz4net.1.0.15.93/lz4net.1.0.15.93.nupkg deleted file mode 100644 index 4dfc725e..00000000 Binary files a/packages/lz4net.1.0.15.93/lz4net.1.0.15.93.nupkg and /dev/null differ