Using Win32 functions in Visual FoxPro Image Gallery
Function Groups:
All Functions 1306
Atom 1
Authentication 14
Authorization 6
Bitmap 9
Brush 2
Clipboard 20
Color 1
COM 6
Common Dialog Box 12
Console 12
Coordinate Space and Transformation 9
Cryptography Reference 28
Cursor 5
Data Decompression Library 3
Debugging 2
Desktop Window Manager (DWM) 1
Device Context 13
Device Input and Output 1
Dialog Box 6
DNS Functions 1
Dynamic-Link Library 6
Error Handling 10
Event Logging 10
Extensible Storage Engine (ESE, Jet Blue) 23
File Management 49
File Mapping 4
File System 19
Filled Shape 2
Font and Text 13
GDI+ 6
GDI+ Bitmap 10
GDI+ Brush 4
GDI+ Font 9
GDI+ Graphics 28
GDI+ Image 20
GDI+ ImageAttributes 3
GDI+ Matrix 10
GDI+ PathGradient Brush 3
GDI+ Pen 2
GDI+ StringFormat 2
GDI+ Text 2
Handle and Object 4
Hook 2
HTTP Functions (WinHTTP) 12
Icon 7
Internet Functions (WinInet) 49
IP Helper 24
Kernel Transaction Manager 3
Keyboard Input 22
Mailslot 3
Memory Management 26
Menu 18
Message and Message Queue 12
Metafile 6
Monitor Configuration (Vista) 8
Mouse Input 8
MSHTML Reference 1
Multilingual User Interface 4
Multiple Display Monitors 2
National Language Support 20
Network Management 34
ODBC API 30
Painting and Drawing 17
Path 3
Performance Monitoring 12
Pipe 5
PnP Configuration Manager 6
Power Management 6
Printing and Print Spooler 35
Process and Thread 31
Raw Input 4
Region 7
Registry 21
Remote Access Service (RAS) 5
Remote Application Programming (RAPI) 49
Remote Procedure Call (RPC) 7
Resource 10
Security 22
Service 11
Setup API functions 7
Shell Functions 39
Shell Lightweight Utility APIs -- misc. functions 2
Shell Lightweight Utility APIs -- Path Functions 20
Shell Lightweight Utility APIs -- string functions 4
Simple MAPI 9
String 10
Synchronization 13
System Information 23
System Shutdown 5
Terminal Services 10
Time 16
Unicode and Character Set 2
URL Monikers 7
Version Information 2
Virtual Hard Disk (Win7) 4
Window 37
Window Class 8
Window Procedure 3
Window Property 3
Window Station and Desktop 7
Windows Controls 8
Windows Multimedia 76
Windows Networking 18
Windows Sockets 2 (Winsock) 38
Cryptography Reference            ..msdn    Add comment
CertCloseStore Closes a certificate store handle and reduces the reference count on the store.
CertFindCertificateInStore Finds the first or next certificate context in a certificate store that matches a search criteria established by the dwFindType and its associated pvFindPara.
CertFreeCertificateContext Frees a certificate context by decrementing its reference count.
CertOpenSystemStore This is a simplified function that opens the most common system certificate store.
CryptAcquireContext The CryptAcquireContext function is used to acquire a handle to a particular key container within a particular cryptographic service provider (CSP). This returned handle is used in calls to CryptoAPI functions that use the selected CSP.
CryptBinaryToString Converts an array of bytes into a formatted string.
CryptCreateHash The CryptCreateHash function initiates the hashing of a stream of data. It creates and returns to the calling application a handle to a CSP hash object.
CryptDecrypt Decrypts data previously encrypted using the CryptEncrypt function.
CryptDeriveKey Generates cryptographic session keys derived from a base data value.
CryptDestroyHash The CryptDestroyHash function destroys the hash object referenced by the hHash parameter. After a hash object has been destroyed, it can no longer be used.
CryptDestroyKey Releases the handle referenced by the hKey parameter. After a key handle has been released, it becomes invalid and cannot be used again.
CryptEncrypt Encrypts data. The algorithm used to encrypt the data is designated by the key held by the CSP module and is referenced by the hKey parameter.
CryptEnumProviders Retrieves the first or next available cryptographic service providers (CSPs). Used in a loop, this function can retrieve in sequence all of the CSPs available on a computer.
CryptEnumProviderTypes Retrieves the first or next types of cryptographic service provider (CSP) supported on the computer. Used in a loop, this function retrieves in sequence all of the CSP types available on a computer.
CryptExportKey Exports a cryptographic key or a key pair from a cryptographic service provider (CSP) in a secure manner.
CryptGenKey Generates a random cryptographic session key or a public/private key pair. A handle to the key or key pair is returned in phKey. This handle can then be used as needed with any CryptoAPI function that requires a key handle.
CryptGenRandom Fills a buffer with cryptographically random bytes.
CryptGetDefaultProvider Finds the default cryptographic service provider (CSP) of a specified provider type. The CSP can be the default for either for the current user or for the computer (LocalMachine).
CryptGetHashParam Retrieves data that governs the operations of a hash object. The actual hash value can be retrieved by using this function.
CryptGetKeyParam Retrieves data that governs the operations of a key.
CryptGetProvParam Retrieves parameters that govern the operations of a cryptographic service provider (CSP).
CryptHashData Adds data to a specified hash object.
CryptImportKey Transfers a cryptographic key from a key BLOB into a cryptographic service provider (CSP).
CryptProtectData Performs encryption on the data in a DATA_BLOB structure. Scoped to local computer, or to user credentials.
CryptReleaseContext The CryptReleaseContext function releases the handle of a cryptographic service provider (CSP) and a key container.
CryptStringToBinary Converts a formatted string into an array of bytes.
CryptUnprotectData Decrypts and does an integrity check of the data in a DATA_BLOB structure. Scoped to local computer, or to user credentials.
WinVerifyTrust Performs a trust verification action on a specified object. The function passes the inquiry to a trust provider that supports the action identifier, if one exists.
Code examples:
CryptoAPI: Collection of Providers class
A class that encrypts and decrypts files using Cryptography API Functions
Generating random cryptographic keys
How to create MD-5 and SHA-1 hash values from a string
Verifying a file using the Authenticode policy provider
How to fill a buffer with random bytes using Cryptography API Functions
How to perform Base64 encoding/decoding using Cryptography API Functions
User Contributed Notes:
There are no notes on this subject.



Copyright 2001-2017 News2News, Inc. Before reproducing or distributing any data from this site please ask for an approval from its owner. Unless otherwise specified, this page is for your personal and non-commercial use. The information on this page is presented AS IS, meaning that you may use it at your own risk. Microsoft Visual FoxPro and Windows are trade marks of Microsoft Corp. All other trademarks are the property of their respective owners. 

Privacy policy
Credits: PHP (4.4.9), an HTML-embedded scripting language, MySQL (5.6.37), the Open Source standard SQL database, AceHTML Freeware Version 4, freeware HTML Editor of choice.   Hosted by Korax Online Inc.
Last Topics Visited (54.80.137.168)
4 sec.Function: 'GetTextAlign'
7 sec.Function: 'GetDiskFreeSpaceEx'
10 sec.Function: 'mixerGetDevCaps'
13 sec.Function: 'EndPage'
16 sec.Function: 'GetPrivateProfileString'
19 sec.
Function group: 'GDI+ PathGradient Brush'
21 sec.
Function group: 'Internet Functions (WinInet)'
26 sec.Function: 'FindMediaType'
30 sec.Function: 'PathFileExists'
33 sec.Function: 'CopyFileTransacted'
Google
Advertise here!