Important: |
---|
This is retired content. This content is outdated and is no longer being maintained. It is provided as a courtesy for individuals who are still using these technologies. This content may contain URLs that were valid when originally published, but now link to sites or pages that no longer exist. |
The following table describes the CSP functions. Each function in the table corresponds directly to a CryptoAPI function.
Function | Description |
---|---|
Acquires a handle to a particular key container within the CSP. |
|
Creates a hash object and returns a handle to it. |
|
Decrypts a section of ciphertext using the specified encryption key. |
|
Creates a key from a password. |
|
Destroys a hash object. |
|
Destroys a key. |
|
Makes an exact copy of a hash object and the state the hash is in. |
|
Makes an exact copy of a key, including the state of a key. |
|
Encrypts a section of plaintext using the specified encryption key. |
|
Transfers a key from the CSP into a key BLOB in the application's memory. |
|
Creates a random key. |
|
Generates random data. |
|
Retrieves a hash object parameter. |
|
Retrieves a key's parameters. |
|
Retrieves attributes of the CSP. |
|
Gets a handle to the key exchange or signature key. |
|
Hashes a block of data and adds it to the specified hash object. |
|
Hashes a session key and adds it to the specified hash object. |
|
Transfers a key from a key BLOB to a CSP. |
|
Frees the handle acquired by CPAcquireContext. |
|
Sets a hash object parameter. |
|
Specifies a key's parameters. |
|
Sets specific attributes of a CSP. |
|
Signs the specified hash object. |
|
Verifies a digital signature. |