Using Cryptography
The following topics provide information about using cryptography. These procedures and examples demonstrate CryptoAPI, CAPICOM, and Certificate Services tasks. The examples use cryptographic function calls, interfaces, and objects described in the Cryptography Reference.
Section | Description |
---|---|
Sample Program Conventions | Example program limitations; compile and link considerations; necessary key containers, keys, and certificates; retrieving data of unknown length; and general purpose functions |
Acquiring a Cryptographic Context and Generating Keys | Examples and procedures for acquiring a cryptographic context and generating keys |
Encoding and Decoding | Examples and procedures for encoding and decoding |
Hashing | Examples and procedures for hashing |
Signing Data | Examples and procedures for signing data |
Creating and Receiving Enveloped Data Messages | Examples and procedures for creating and receiving enveloped data messages |
Encrypting and Decrypting | Examples and procedures for encrypting and decrypting |
Using Certificates | Examples and procedures for using certificates |
Working with Certificate Stores | Examples and procedures for working with certificate stores |
Other Extended C Code Examples | Other procedures and examples that use CryptoAPI functions |
Extending CryptoAPI Functionality | Overviews on the use of OIDs for extending CryptoAPI functions |
Using CSPs: General Processes | Examples and procedures for using CSPs |
Using Other CryptoAPI Tools | Using CryptoAPI command-line tools |
Using CAPICOM | Information about using CAPICOM, a COM component that provides cryptographic functionality |
Programming Certificate Services | Information about using the Certificate Services programming elements |
Using Certificate Enrollment Control | Details and syntax for creating an instance of the Certificate Enrollment Control object, setting its properties, and using its methods |