This function signs all data contained in the set of input buffers using the private key specified in the context. The CSP can require that the cryptographic context include access credentials for aut...
This function initializes the staged sign data function. For staged operations, a combination operation selecting both a digesting algorithm and a signing algorithm must be specified. The CSP can requ...
This function continues the staged signing process over all data contained in the set of input buffers. Signing is performed using the private key specified in the context.
This function unwraps the wrapped key using the context. The wrapped key can be a symmetric key or a private key. If the unwrapping algorithm is a symmetric algorithm, then a symmetric context must be...
This function verifies all data contained in the set of input buffers based on the input signature. Verifying can include digesting the data and decrypting the digest (from the signature) or verifying...
This function initializes the staged verify data function. For staged operations, a combination operation selecting both a digesting algorithm and a verification algorithm must be specified.
This function continues the staged verification process over all data contained in the set of input. Verification will be based on the signature presented as input when finalizing the staged verificat...
This function continues the staged process of verifying the message authentication code over all data in the set of input buffers. Verification will be based on the authentication code presented as in...
This function wraps the supplied key using the context. It allows a key to be exported from a CSP. Four types of wrapping exist: Wrap a symmetric key with a symmetric key. Wrap a symmetric key with an...