This function verifies all data contained in the set of input buffers based on the input signature. Verifying can include digesting the data and decrypting the digest (from the signature) or verifying...
This function initializes the staged verify data function. For staged operations, a combination operation selecting both a digesting algorithm and a verification algorithm must be specified.
This function continues the staged verification process over all data contained in the set of input. Verification will be based on the signature presented as input when finalizing the staged verificat...
This function continues the staged process of verifying the message authentication code over all data in the set of input buffers. Verification will be based on the authentication code presented as in...
This function wraps the supplied key using the context. It allows a key to be exported from a CSP. Four types of wrapping exist: Wrap a symmetric key with a symmetric key. Wrap a symmetric key with an...
These functions can only be called from languages that support the double_complex and float_complex data types. csin() and csinf() compute the sine of a complex number. ccos() and ccosf() return the c...
This function allows applications to call authorization computation module-specific operations that have been exported. Such operations might include queries or services specific to the domain represe...
This function returns the module attach handle identifying the service module that is managing the specified cryptographic context. The entry point to this function is provided to a service module in ...
This function edits the stored ACL associated with the target key. The ACL is modified according to the edit mode and information provided in AclEdit. The caller must be authorized to modify the targe...