Using Win32 functions in Visual FoxPro Image Gallery
Cryptography Reference
..msdn
CertCloseStore
CertFindCertificateInStore
CertFreeCertificateContext
CertOpenSystemStore
CryptAcquireContext
CryptBinaryToString
CryptCreateHash
CryptDecrypt
CryptDeriveKey
CryptDestroyHash
CryptDestroyKey
CryptEncrypt
CryptEnumProviders
CryptEnumProviderTypes
CryptExportKey
CryptGenKey
CryptGenRandom
CryptGetDefaultProvider
CryptGetHashParam
CryptGetKeyParam
CryptGetProvParam
CryptHashData
CryptImportKey
CryptProtectData
CryptReleaseContext
CryptStringToBinary
CryptUnprotectData
WinVerifyTrust
Code examples:
A class that encrypts and decrypts files using Cryptography API Functions
CryptoAPI: Collection of Providers class
How to create MD-5 and SHA-1 hash values from a string
CryptCreateHash
..msdn    Add comment     W32 Constants      Translate this page
The CryptCreateHash function initiates the hashing of a stream of data. It creates and returns to the calling application a handle to a CSP hash object.
Code examples:
How to create MD-5 and SHA-1 hash values from a string
A class that encrypts and decrypts files using Cryptography API Functions
CryptoAPI: Collection of Providers class
Declaration:
BOOL WINAPI CryptCreateHash(
  HCRYPTPROV hProv,
  ALG_ID Algid,
  HCRYPTKEY hKey,
  DWORD dwFlags,
  HCRYPTHASH* phHash
);
FoxPro declaration:
DECLARE INTEGER CryptCreateHash IN advapi32;
    INTEGER   hProv,;
    INTEGER   Algid,;
    INTEGER   hKey,;
    INTEGER   dwFlags,;
    INTEGER @ phHash

Parameters:
hProv
[in] Handle of a cryptographic service provider (CSP) created by a call to CryptAcquireContext.

Algid
[in] ALG_ID that identifies the hash algorithm to use.

hKey
[in] If the type of hash algorithm is a keyed hash, such as the HMAC or MAC algorithm, the key for the hash is passed in this parameter. For nonkeyed algorithms, this parameter must be set to zero.

dwFlags
[in] Reserved for future use and must be zero.

phHash
[out] Address to which the function copies a handle to the new hash object.
Return value:
If the function succeeds, the function returns TRUE.
My comment:
The phHash handle is used in subsequent calls to CryptHashData and CryptHashSessionKey to hash session keys and other streams of data.

When you have finished using the hash object, release the handle by calling the CryptDestroyHash function.
Word Index links for the CryptCreateHash :
Translate this page:
  Spanish    Portuguese    German    French    Italian  
FreeTranslation.com offers instant, free translations of text or web pages.
Created: 2004-08-16 09:18:17
Modified: 2004-08-16 09:22:06
Visited in last 7 days: 101
User Contributed Notes:
There are no notes on this subject.


Copyright 2001-2014 News2News, Inc. Before reproducing or distributing any data from this site please ask for an approval from its owner. Unless otherwise specified, this page is for your personal and non-commercial use. The information on this page is presented AS IS, meaning that you may use it at your own risk. Microsoft Visual FoxPro and Windows are trade marks of Microsoft Corp. All other trademarks are the property of their respective owners. 

Privacy policy
Credits: PHP (4.4.9), an HTML-embedded scripting language, MySQL (5.1.68), the Open Source standard SQL database, AceHTML Freeware Version 4, freeware HTML Editor of choice.   Hosted by Korax Online Inc.
Google
Advertise here!