Wine windows crypto api




















Please rate your experience Yes No. Any additional feedback? Note Although an application can communicate directly with any of the five functional areas, it cannot communicate directly with a CSP. In this article. To acquire the context and the key container of a private key associated with the public key of a certificate, use CryptAcquireCertificatePrivateKey.

With the appropriate setting of dwFlags , this function can also create and destroy key containers and can provide access to a CSP with a temporary key container if access to a private key is not required.

A pointer to a handle of a CSP. The key container name. This is a null-terminated string that identifies the key container to the CSP. This name is independent of the method used to store the keys. Some CSPs store their key containers internally in hardware , some use the system registry, and others use the file system. However, for hardware-based CSPs, such as a smart card CSP, can be access publicly available information in the specfied container.

If this parameter is NULL , the user default provider is used. For more information, see Cryptographic Service Provider Contexts. For a list of available cryptographic providers, see Cryptographic Provider Names. The default CSP can change between operating system releases.

To ensure interoperability on different operating system platforms, the CSP should be explicitly set by using this parameter instead of using the default CSP. Specifies the type of provider to acquire.

Defined provider types are discussed in Cryptographic Provider Types. Flag values. This parameter is usually set to zero, but some applications set one or more of the following flags.

This form is used to connect to the CSP to query its capabilities but not to actually use its keys. If the pszContainer parameter is not NULL and not blank, then this flag implies that access to only the publicly available information within the specified container is required. Attempts to access private information for example, the CryptSignHash function will fail. When CryptAcquireContext is called, many CSPs require input from the owning user before granting access to the private keys in the key container.

Unsolicited bulk mail or bulk advertising. Any link to or advocacy of virus, spyware, malware, or phishing sites. Any other inappropriate content or behavior as defined by the Terms of Use or Code of Conduct.

Any image, link, or discussion related to child pornography, child nudity, or other child abuse or exploitation. User Moderator Replied on September 30, Hello,. However, we suggest that you run a system file check and repair system files. Was this reply helpful? The function calls the provided callback function for each system store location found.

CertFindCertificateInStore Finds the first or next certificate context in a certificate store that matches a search criteria established by the dwFindType and its associated pvFindPara. CertFindChainInStore Finds the first or next certificate in a store that meets the specified criteria. If the reference count becomes zero, memory allocated for the chain is released.

CertFreeCertificateContext Frees a certificate context by decrementing its reference count. When the reference count goes to zero, CertFreeCertificateContext frees the memory used by a certificate context. CertGetCertificateChain Builds a certificate chain context starting from an end certificate and going back, if possible, to a trusted root certificate. CertGetCertificateContextProperty Retrieves the information contained in an extended property of a certificate context. CertGetIssuerCertificateFromStore Retrieves the certificate context from the certificate store for the first or next issuer of the specified subject certificate.

The new Certificate Chain Verification Functions are recommended instead of the use of this function. CertGetStoreProperty Retrieves a store property. CertGetSubjectCertificateFromStore Returns from a certificate store a subject certificate context uniquely identified by its issuer and serial number.

CertGetValidUsages Returns an array of usages that consist of the intersection of the valid usages for all certificates in an array of certificates.

CertIsStrongHashToSign Determines whether the specified hash algorithm and the public key in the signing certificate can be used to perform strong signing. CertOpenStore Opens a certificate store by using a specified store provider type. To open certificate stores with more complex requirements, such as file-based or memory-based stores, use CertOpenStore.

CertRegisterPhysicalStore Adds a physical store to a registry system store collection. CertRegisterSystemStore Registers a system store. CertResyncCertificateChainEngine Resyncs the certificate chain engine, which resynchronizes the stores the store's engine and updates the engine caches. CertSelectCertificateChains Retrieves certificate chains based on specified selection criteria. The result can be persisted to storage so that the certificate and properties can be retrieved at a later time.

The result can be persisted to storage so that the CTL and properties can be retrieved later. CertUnregisterPhysicalStore can also be used to delete the physical store. CertVerifyCertificateChainPolicy Checks a certificate chain to verify its validity, including its compliance with any specified validity policy criteria. CertVerifyCTLUsage Verifies that a subject is trusted for a specified usage by finding a signed and time-valid certificate trust list CTL with the usage identifiers that contain the subject.

CertVerifyRevocation Checks the revocation status of the certificates contained in the rgpvContext array. If a certificate in the list is found to be revoked, no further checking is done. CertVerifySubjectCertificateContext The CertVerifySubjectCertificateContext function performs the enabled verification checks on a certificate by checking the validity of the certificate's issuer. The new Certificate Chain Verification Functions are recommended instead of this function.

CertVerifyValidityNesting The CertVerifyValidityNesting function verifies that a subject certificate's time validity nests correctly within its issuer's time validity. CryptCreateHash Initiates the hashing of a stream of data.

It creates and returns to the calling application a handle to a cryptographic service provider CSP hash object.



0コメント

  • 1000 / 1000