System.Security.Cryptography.Xml
Index was out of range. Must be non-negative and less than the size of the collection.
String cannot be empty or null.
A certificate chain could not be built to a trusted root authority.
Bad wrapped key size.
A Cipher Data element should have either a CipherValue or a CipherReference element.
Could not create hash algorithm object.
Could not create the XML transformation identified by the URI {0}.
Failed to create signing key.
A DigestMethod must be specified on a Reference prior to generating XML.
A Reference must contain a DigestValue.
An XmlDocument context is required for enveloped transforms.
Malformed element {0}.
Malformed encryption property element.
The key size should be a non negative integer.
Malformed reference element.
The length of the signature with a MAC should be less than the hash output length.
The length in bits of the signature with a MAC should be a multiple of 8.
X509 issuer serial number is invalid.
A KeyInfo element is required to check the signature.
The length of the encrypted data in Key Wrap is either 32, 40 or 48 bytes.
Signing key is not loaded.
Symmetric algorithm is not specified.
Cipher data is not specified.
Unable to retrieve the decryption key.
Unable to retrieve the encryption key.
The specified cryptographic transform is not supported.
At least one Reference element is required.
The Reference type must be set in an EncryptedReference object.
An XmlDocument context is required to resolve the Reference Uri {0}.
SignatureDescription could not be created for the signature algorithm supplied.
The key does not fit the SignatureMethod.
A signature method is required.
Signature requires a SignatureValue.
Signature requires a SignedInfo.
The input type was invalid for this transform.
Type of input object is invalid.
Unknown transform has been encountered.
Unable to resolve Uri {0}.
The specified Uri is not supported.
A Uri attribute is required for a CipherReference element.
Null Context property encountered.
IRelDecryptor is required.
Issuer node is required.
License node is required.
Unable to decrypt grant content.
The certificate key algorithm is not supported.
Actual hash value: {0}
Beginning canonicalization using "{0}" ({1}).
Beginning signature computation.
Beginning signature verification.
Building and verifying the X509 chain for certificate {0}.
Canonicalization transform is using resolver {0} and base URI "{1}".
Output of canonicalization transform: {0}
Certificate chain:
Checking signature format using format validator "[{0}] {1}.{2}".
Checking signature on SignedInfo with id "{0}".
Signature format validation was successful.
Signature format validation failed.
Found key usages "{0}" in extension {1} on certificate {2}.
No namespaces are being propagated.
Propagating namespace {0}="{1}".
Raw signature: {0}
Reference {0} hashed with "{1}" ({2}) has hash value {3}, expected hash value {4}.
Revocation mode for chain building: {0}.
Revocation flag for chain building: {0}.
Calculating signature with key {0} using signature description {1}, hash algorithm {2}, and asymmetric signature formatter {3}.
Calculating signature using keyed hash algorithm {0}.
Hashing reference {0}, Uri "{1}", Id "{2}", Type "{3}" with hash algorithm "{4}" ({5}).
Transformed reference contents: {0}
Canonicalization method "{0}" is not on the safe list. Safe canonicalization methods are: {1}.
URL retrieval timeout for chain building: {0}.
Verification failed checking {0}.
references
SignedInfo
X509 chain verification
X509 key usage verification
Verification flags for chain building: {0}.
Verification time for chain building: {0}.
Verification with key {0} was successful.
Verification with key {0} was not successful.
Processing reference {0}, Uri "{1}", Id "{2}", Type "{3}".
Verifying SignedInfo using key {0}, signature description {1}, hash algorithm {2}, and asymmetric signature deformatter {3}.
Verifying SignedInfo using keyed hash algorithm {0}.
Error building X509 chain: {0}: {1}.
Using context: {0}
Signed xml recursion limit hit while trying to decrypt the key. Reference {0} hashed with "{1}" and ({2}).
Transform method "{0}" is not on the safe list. Safe transform methods are: {1}.
{0} and {1} can only occur in combination
{0} is missing
{0} must contain child element {1}
Root element must be {0} element in namespace {1}
Base type for all platform-specific API attributes.
Records the platform that the project targeted.
Records the operating system (and minimum version) that supports an API. Multiple attributes can be
applied to indicate support on multiple operating systems.
Callers can apply a
or use guards to prevent calls to APIs on unsupported operating systems.
A given platform should only be specified once.
Marks APIs that were removed in a given operating system version.
Primarily used by OS bindings to indicate APIs that are only available in
earlier versions.
Annotates a custom guard field, property or method with a supported platform name and optional version.
Multiple attributes can be applied to indicate guard for multiple supported platforms.
Callers can apply a to a field, property or method
and use that field, property or method in a conditional or assert statements in order to safely call platform specific APIs.
The type of the field or property should be boolean, the method return type should be boolean in order to be used as platform guard.
Annotates the custom guard field, property or method with an unsupported platform name and optional version.
Multiple attributes can be applied to indicate guard for multiple unsupported platforms.
Callers can apply a to a field, property or method
and use that field, property or method in a conditional or assert statements as a guard to safely call APIs unsupported on those platforms.
The type of the field or property should be boolean, the method return type should be boolean in order to be used as platform guard.