Download Microsoft Edge More info. Contents Exit focus mode. Please rate your experience Yes No. Any additional feedback? In this article. Sample Program Conventions. Example program limitations; compile and link considerations; necessary key containers, keys, and certificates; retrieving data of unknown length; and general purpose functions.
Each of the functional areas has a key word in its function name that indicates its functional area. Applications use functions in all of these areas. These functions, taken together, make up CryptoAPI.
The base cryptographic functions use the CSPs for the necessary cryptographic algorithms and for the generation and secure storage of cryptographic keys. Although an application can communicate directly with any of the five functional areas, it cannot communicate directly with a CSP.
All application-to-CSP communications occur through the base cryptographic functions. United States English. Ask a question. Quick access. Search related threads. Remove From My Forums. Asked by:. Archived Forums.
0コメント