The CryptCreateHash function initiates the hashing of a stream of data. It creates and returns to the calling application a handle to a CSP hash object. This handle is used in subsequent calls to CryptHashData and CryptHashSessionKey to hash session keys and other streams of data.
5/22/2015 8:49:17 AM - -80.66.20.18
The CryptHashData function adds data to a specified hash object. This function and CryptHashSessionKey can be called multiple times to compute the hash of long or discontinuous data streams. Before calling this function, CryptCreateHash must be called to create a handle of a hash object.
The CryptHashData function adds data to a specified hash object. This function and CryptHashSessionKey can be called multiple times to compute the hash of long or discontinuous data streams. Before calling this function, CryptCreateHash must be called to create a handle of a hash object.
12/16/2013 3:14:15 AM - -24.0.218.62
TODO - a short description
9/30/2013 1:39:31 PM - anonymous
The CryptCreateHash function initiates the hashing of a stream of data. It creates and returns to the calling application a handle to a CSP hash object. This handle is used in subsequent calls to CryptHashData and CryptHashSessionKey to hash session keys and other streams of data.
The CryptVerifySignature function verifies the signature of a hash object. Before calling this function, CryptCreateHash must be called to create the handle of a hash object. CryptHashData or CryptHashSessionKey is then used to add data or session keys to the hash object. After CryptVerifySignature has been completed, only CryptDestroyHash can be called using the hHash handle.
3/16/2007 7:31:46 AM - anonymous
The CryptCreateHash function initiates the hashing of a stream of data. It creates and returns to the calling application a handle to a CSP hash object. This handle is used in subsequent calls to CryptHashData and CryptHashSessionKey to hash session keys and other streams of data.
5/22/2015 8:49:17 AM - -80.66.20.18
The CryptHashData function adds data to a specified hash object. This function and CryptHashSessionKey can be called multiple times to compute the hash of long or discontinuous data streams. Before calling this function, CryptCreateHash must be called to create a handle of a hash object.
12/16/2013 3:14:15 AM - -24.0.218.62
TODO - a short description
9/30/2013 1:39:31 PM - anonymous
The CryptVerifySignature function verifies the signature of a hash object. Before calling this function, CryptCreateHash must be called to create the handle of a hash object. CryptHashData or CryptHashSessionKey is then used to add data or session keys to the hash object. After CryptVerifySignature has been completed, only CryptDestroyHash can be called using the hHash handle.
3/16/2007 7:31:46 AM - anonymous
The CryptDestroyHash function destroys the hash object referenced by the hHash parameter. After a hash object has been destroyed, it can no longer be used. The destruction of hash objects after their use is finished is recommended for security reasons.
4/9/2007 8:35:20 AM - flyhippo@flyhippo.org-194.186.67.226