Share via


HashAlgorithmInstrumentationListener Class

Retired Content

This content is outdated and is no longer being maintained. It is provided as a courtesy for individuals who are still using these technologies. This page may contain URLs that were valid when originally published, but now link to sites or pages that no longer exist.

Provides the concrete instrumentation for the logical events raised by a HashAlgorithmInstrumentationProvider object.

Namespace:  Microsoft.Practices.EnterpriseLibrary.Security.Cryptography.Instrumentation
Assembly:  Microsoft.Practices.EnterpriseLibrary.Security.Cryptography (in Microsoft.Practices.EnterpriseLibrary.Security.Cryptography.dll)

Syntax

'Declaration
<PerformanceCountersDefinitionAttribute("Enterprise Library Cryptography Counters", "CryptographyHelpResourceName")> _
<EventLogDefinitionAttribute("Application", "Enterprise Library Cryptography")> _
<HasInstallableResourcesAttribute> _
PublicClassHashAlgorithmInstrumentationListener _
    Inherits InstrumentationListener
[PerformanceCountersDefinitionAttribute("Enterprise Library Cryptography Counters", "CryptographyHelpResourceName")]
[EventLogDefinitionAttribute("Application", "Enterprise Library Cryptography")]
[HasInstallableResourcesAttribute]
publicclassHashAlgorithmInstrumentationListener : InstrumentationListener
[PerformanceCountersDefinitionAttribute(L"Enterprise Library Cryptography Counters", L"CryptographyHelpResourceName")]
[EventLogDefinitionAttribute(L"Application", L"Enterprise Library Cryptography")]
[HasInstallableResourcesAttribute]
publicref classHashAlgorithmInstrumentationListener : public InstrumentationListener
publicclass HashAlgorithmInstrumentationListener extends InstrumentationListener

Inheritance Hierarchy

System.Object
  Microsoft.Practices.EnterpriseLibrary.Common.Instrumentation.InstrumentationListener
    Microsoft.Practices.EnterpriseLibrary.Security.Cryptography.Instrumentation.HashAlgorithmInstrumentationListener

See Also

HashAlgorithmInstrumentationListener Members

Microsoft.Practices.EnterpriseLibrary.Security.Cryptography.Instrumentation Namespace

Retired Content

This content is outdated and is no longer being maintained. It is provided as a courtesy for individuals who are still using these technologies. This page may contain URLs that were valid when originally published, but now link to sites or pages that no longer exist.