Cryptography Functions
A version of this page is also available for
4/8/2010
The following table shows the cryptography functions with a description of the purpose of each.
Programming element | Description |
---|---|
This function acquires a handle to the key container specified by the pszContainer parameter. |
|
This function acquires a handle to a specific key container within a particular cryptographic service provider (CSP). |
|
This function adds one to the reference count of an HCRYPTPROV handle. |
|
This function initiates the hashing of a stream of data. |
|
This function decrypts data that was previously encrypted with the CryptEncrypt function. |
|
This function generates cryptographic session keys derived from base data. |
|
This function destroys the hash object referenced by the hHash parameter. |
|
This function frees the handle referenced by the hKey parameter. |
|
This function makes an exact copy of a hash and the state the hash is in. |
|
This function makes an exact copy of a key and the state the key is in. |
|
This function encrypts data. |
|
This function retrieves the first or next available cryptographic service provider (CSP). |
|
This function retrieves the first or next type of cryptographic service provider (CSP) supported on the computer. |
|
This function exports cryptographic keys from of a cryptographic service provider (CSP) in a secure manner. |
|
This function generates a random cryptographic session key or a public/private key pair for use with the cryptographic service provider (CSP). |
|
This function fills a buffer with random bytes. |
|
This function finds the default cryptographic service provider (CSP) of a specified type either for the current user or the device. |
|
This function retrieves data that governs the operations of a hash object and retrieves the actual hash value. |
|
This function lets applications retrieve data that governs the operations of a key. |
|
This function retrieves parameters that govern the operations of a cryptographic service provider (CSP). |
|
This function retrieves a handle to a permanent user key pair, such as the user's signature key pair. |
|
This function adds data to a specified hash object. |
|
This function computes the cryptographic hash of a session key object. |
|
This function transfers a cryptographic key from a key binary large object (BLOB) to the cryptographic service provider (CSP). |
|
This function calculates the maximum number of bytes need for an encoded cryptographic message when it is given the message type, encoding parameters, and total length of the data to be encoded. |
|
This function closes a cryptographic message handle. |
|
This function performs a control operation after a message has been decoded by a final CryptMsgUpdate call. |
|
This function duplicates a cryptographic message handle by incrementing its reference count. |
|
This function acquires a message parameter after a cryptographic message has been encoded or decoded. |
|
This function opens a cryptographic message for decoding and returns a handle of the opened message. |
|
This function opens a cryptographic message for encoding and returns a handle of the opened message. |
|
This function adds contents to a cryptographic message. |
|
This function performs encryption on the data in a BLOB (Cryptography) structure. |
|
This function frees the handle to a cryptographic service provider (CSP) and the key container. |
|
This function customizes the operations of a hash object. |
|
This function customizes various aspects of a key's operations. |
|
This function specifies the current user default cryptographic service provider (CSP). |
|
This function specifies the default cryptographic service provider (CSP) for the current user or the local device. |
|
This function customizes the operations of a cryptographic service provider (CSP). |
|
This function signs data. |
|
This function decrypts and checks the integrity of the data in a BLOB (Cryptography) structure. |
|
This function verifies the signature of a hash object. |