Structure | Description |
---|---|
AssemblyHash | Represents a hash of an assembly's contents. Assembly hashes are used throughout the NGWS runtime to detect a change in the contents of an assembly. |
Enumeration | Description |
---|---|
AssemblyHashAlgorithm | An enumeration of all the hash algorithms used for hashing files and for generating the strong name.
A hash function H is a transformation that takes an input m and returns a fixed-size string, which is called the hash value h (that is, h = H (m)). Hash functions with just this property have a variety of general computational uses, but when employed in cryptography, the hash functions are usually chosen to have some additional properties. The basic requirements for a cryptographic hash function are:
The hash value represents concisely the longer message or document from which it was computed; this value is called the message digest. One can think of a message digest as a "digital fingerprint" of the larger document. Examples of well-known hash functions are MD2 and and SHA. |
AssemblyVersionCompatibility | Defines the different flavors of assembly version compatibility. The AssemblyVersionCompatibility defines the compatibility of an assembly with other versions of the same assembly, indicating if it cannot execute side-by-side with other versions (e.g., due to conflicts over a device driver).
If no compatibility is specified, an assembly is side-by-side compatible in all scopes. An assembly cannot be more specific with regard to exactly which previous versions it is not side-by-side compatible with. Hence, if the AssemblyVersionCompatibility is specified, it means the assembly is non side-by-side with all know versions. If not specified, it means it is side-by-side with all known versions. |
ProcessorID | Defines identification numbers for supported processors. |