Base:
method
ImportFromEncryptedPem
System.Security.Cryptography.AsymmetricAlgorithm.ImportFromEncryptedPem(System.ReadOnlySpan<System.Char>, System.ReadOnlySpan<System.Char>)
2 overrides of ImportFromEncryptedPem
System.Security.Cryptography (2)
System\Security\Cryptography\ECDiffieHellmanWrapper.cs (1)
116public override void ImportFromEncryptedPem(ReadOnlySpan<char> input, ReadOnlySpan<char> password) =>
System\Security\Cryptography\ECDsaWrapper.cs (1)
154public override void ImportFromEncryptedPem(ReadOnlySpan<char> input, ReadOnlySpan<char> password) =>
3 references to ImportFromEncryptedPem
System.Security.Cryptography (3)
System\Security\Cryptography\ECAlgorithm.cs (1)
430/// If the contents are PEM-encoded, <see cref="ImportFromEncryptedPem(ReadOnlySpan{char}, ReadOnlySpan{char})" />
System\Security\Cryptography\ECDiffieHellmanWrapper.cs (1)
117_wrapped.ImportFromEncryptedPem(input, password);
System\Security\Cryptography\ECDsaWrapper.cs (1)
155_wrapped.ImportFromEncryptedPem(input, password);