Rediger

Del via


Using Cryptography

The following topics provide information about using cryptography. These procedures and examples demonstrate CryptoAPI, CAPICOM, and Certificate Services tasks. The examples use cryptographic function calls, interfaces, and objects described in the Cryptography Reference.

Section Description
Sample Program Conventions Example program limitations; compile and link considerations; necessary key containers, keys, and certificates; retrieving data of unknown length; and general purpose functions
Acquiring a Cryptographic Context and Generating Keys Examples and procedures for acquiring a cryptographic context and generating keys
Encoding and Decoding Examples and procedures for encoding and decoding
Hashing Examples and procedures for hashing
Signing Data Examples and procedures for signing data
Creating and Receiving Enveloped Data Messages Examples and procedures for creating and receiving enveloped data messages
Encrypting and Decrypting Examples and procedures for encrypting and decrypting
Using Certificates Examples and procedures for using certificates
Working with Certificate Stores Examples and procedures for working with certificate stores
Other Extended C Code Examples Other procedures and examples that use CryptoAPI functions
Extending CryptoAPI Functionality Overviews on the use of OIDs for extending CryptoAPI functions
Using CSPs: General Processes Examples and procedures for using CSPs
Using Other CryptoAPI Tools Using CryptoAPI command-line tools
Using CAPICOM Information about using CAPICOM, a COM component that provides cryptographic functionality
Programming Certificate Services Information about using the Certificate Services programming elements
Using Certificate Enrollment Control Details and syntax for creating an instance of the Certificate Enrollment Control object, setting its properties, and using its methods