Cryptography Structures
A version of this page is also available for
4/8/2010
The following table shows the Cryptography structures with a description of the purpose of each.
Programming element | Description |
---|---|
This structure is used for an arbitrary array of bytes. |
|
This structure contains one instance of information on how to access certification authority (CA) information and services for the issuer of the certificate in which the CERT_AUTHORITY_INFO_ACCESS extension appears. |
|
This structure contains an alternative name in one of a variety of name forms. |
|
This structure is used in encoding and decoding extensions for subject or issuer certificates. |
|
This structure appears as a certificate extension and indicates how to access certification authority (CA) information and services for the issuer of that certificate. |
|
This structure identifies the key used to sign a certificate. |
|
This structure identifies the key used to sign a certificate. |
|
This structure contains information indicating whether the certified subject can act as a certification authority (CA), an end entity, or both. |
|
This structure contains information indicating whether the certified subject can act as a certification authority (CA) or an end entity. |
|
This structure contains an array of simple certificate chains and a trust status structure that indicates summary validity data on all of the connected simple chains. |
|
This structure is a single element in a simple certificate chain. |
|
This structure sets parameters for building a non-default certificate chain engine. |
|
This structure establishes the searching and matching criteria that are used to build a certificate chain. |
|
This structure contains both the encoded and decoded representations of a certificate. |
|
This structure contains the extension information for a certificate. |
|
This structure is a flexible means of uniquely identifying a certificate. |
|
This structure contains the certificate information. |
|
This structure acts as a unique identifier of a certificate containing the issuer and issuer's serial number for a certificate. |
|
This structure contains optional additional information about the public key being certified. |
|
This structure contains data for the pvData member of a Value member of the CERT_EXTENSION structure associated with a CERT_KEY_CONTEXT_PROP_ID property. |
|
This structure contains restrictions imposed on the usage of a certificate's public key. |
|
This structure contains information stored in a Keygen request. |
|
This structure contains subject or issuer names. |
|
This structure contains an array of the CERT_POLICY_INFO structure. |
|
This structure contains a list of certificate policies that the certificate expressly supports, together with optional qualifier information pertaining to these policies. |
|
This structure contains an object identifier specifying a policy and an optional array of policy qualifiers. |
|
This structure contains an object identifier specifying the qualifier and qualifier-specific supplemental information. |
|
This structure indicates a valid time span for the private key corresponding to a certificate's public key. |
|
This structure contains a public key and its algorithm. |
|
This structure contains a relative distinguished name (RDN) consisting of an array of CERT_RDN_ATTR structures. |
|
This structure contains a single attribute of a relative distinguished name (RDN). |
|
This structure contains information for a certificate request. |
|
This structure contains encoded content to be signed and a BLOB (Cryptography) structure to hold the signature. |
|
This structure contains an array of chain elements and a summary trust status for the chain that the array represents. |
|
This structure contains information used by functions that work with system stores. |
|
This structure contains data to be passed to the CertOpenStore function when that function's dwFlags parameter is set to CERT_SYSTEM_STORE_RELOCATE_FLAG. |
|
This structure indicates a valid usage of a CTL. |
|
This structure contains trust information about a certificate in a certificate chain, summary trust information about a simple chain of certificates, or summary information about an array of simple chains. |
|
This structure provides parameters for finding issuer certificates used to build a certificate chain. |
|
This structure is used with the CryptMsgGetParam function to get information about a key transport, key agreement, or mail list envelope message recipient. |
|
This structure contains the content of the defined SignerInfo in signed or in signed and enveloped messages. |
|
This structure is used to add an unauthenticated attribute to a signer of a signed message. |
|
This structure contains information used to decrypt an enveloped message for a key transport recipient. |
|
This structure is used to delete an unauthenticated attribute of a signer of a signed message. |
|
This structure contains information about a key agreement recipient. |
|
This structure contains information that is used to verify a message signature. It contains the signer index and signer public key. |
|
This structure contains information that is needed to encode an enveloped message. |
|
This structure is used with hashed messages. |
|
This structure contains information that is used in key transport algorithms. |
|
This structure contains information that is used for previously distributed symmetric key-encryption keys (KEK). |
|
This structure contains information to be passed to CryptMsgOpenToEncode if dwMsgType is CMSG_SIGNED. |
|
This structure contains signer information. |
|
This structure contains the content of the PKCS #7 defined SignerInfo in signed messages. |
|
This structure is used to enable processing stream data rather than single block processing. |
|
This structure specifies an algorithm. |
|
This structure specifies an attribute having one or more values. |
|
This structure contains an array of attributes. |
|
This structure contains an array of bytes. |
|
This structure provides access to memory allocation and memory freeing callback functions. |
|
This structure contains fields that are passed as arguments to the CryptAcquireContext function to acquire a handle to a particular key container within a particular cryptographic service provider (CSP) or to create or destroy a key container. |
|
This structure contains data to be passed as the arguments to the CryptSetProvParam function. |
|
This structure contains an OID and a pointer to its related function. |
|
This structure contains information about an object identifier (OID). |
|
This structure is used for an arbitrary array of bytes. It provides flexibility for objects that can contain various data types. |
|
This structure contains an array of object identifiers (OIDs) for certificate trust list (CTL) extensions. |
|
This structure specifies the hash algorithm and the inner and outer strings that are to be used to calculate the HMAC hash. |
|
This structure holds information on the algorithms supported by a CSP. |
|
This structure holds information on the algorithms supported by a CSP. |
|
This structure, also known as the BLOBHEADER structure, indicates a key's BLOB (Cryptography) type and the algorithm that the key uses. |
|
This structure contains information specific to the particular public key contained in the key BLOB. |
|
This structure contains pointers to callback functions that can be used by CSP functions. |