This site uses cookies for analytics, personalized content and ads. By continuing to browse this site, you agree to this use. Learn more
Microsoft Logo
Gray Pipe
Developer Network Developer Network Developer
Sign in

Subscriber portal

Get tools
  • Downloads
    • Visual Studio
    • SDKs
    • Trial software
      • Free downloads
      • Office resources
      • SharePoint Server 2013 resources
      • SQL Server 2014 Express resources
      • Windows Server 2012 resources
  • Programs
    • Subscriptions
      • Overview
      • Administrators
    • Students
      • Microsoft Imagine
      • Microsoft Student Partners
    • ISV
    • Startups
    • Events
  • Community
    • Magazine
    • Forums
    • Blogs
    • Channel 9
  • Documentation
    • APIs and reference
    • Dev centers
    • Samples
    • Retired content
search clear
We’re sorry. The content you requested has been removed. You’ll be auto redirected in 1 second.
Security and Identity Cryptography Using Cryptography
Using Cryptography Acquiring a Cryptographic Context and Generating Keys
Acquiring a Cryptographic Context and Generating Keys
Acquiring a Cryptographic Context and Generating Keys
Sample Program Conventions
Acquiring a Cryptographic Context and Generating Keys
Example C Program: Creating a Key Container and Generating Keys
Example C Program: Using CryptAcquireContext
Example C Program: Enumerating CSP Providers and Provider Types
Example C Program: Deriving a Session Key from a Password
Example C Program: Duplicating a Session Key
Example C Program: Importing a Plaintext Key
Example C Program: Setting and Getting Session Key Parameters
Working with Keys from Various CSPs
Procedure for Storing a Session Key
Procedure for Storing Session Keys Using a Backup Authority
Example C Program: Exporting a Session Key
Encoding and Decoding
Hashing
Signing Data
Creating and Receiving Enveloped Data Messages
Encrypting and Decrypting
Using Certificates
Working with Certificate Stores
Other Extended C Code Examples
Extending CryptoAPI Functionality
Using CSPs: General Processes
Using Other CryptoAPI Tools
Using CAPICOM
Programming Certificate Services
Using Certificate Enrollment Control
TOC
Collapse the table of content
Expand the table of content
This documentation is archived and is not being maintained.
This documentation is archived and is not being maintained.

Acquiring a Cryptographic Context and Generating Keys

This section includes:

  • Example C Program: Creating a Key Container and Generating Keys.
  • Example C Program: Using CryptAcquireContext.
  • Example C Program: Enumerating CSP Providers and Provider Types.
  • Example C Program: Deriving a Session Key from a Password.
  • Example C Program: Duplicating a Session Key.
  • Example C Program: Setting and Getting Session Key Parameters.
  • Working with Keys from Various CSPs.
  • Procedure for Storing a Session Key.
  • Procedure for Storing Session Keys Using a Backup Authority.
  • Example C Program: Exporting a Session Key.

 

 

Show:
Print Export (0)
Print Share
IN THIS ARTICLE
    Is this page helpful?
    Additional feedback?
    1500 characters remaining
    Thank you! We appreciate your feedback.

    Dev centers

    • Windows
    • Office
    • Visual Studio
    • Microsoft Azure
    • More...

    Learning resources

    • Microsoft Virtual Academy
    • Channel 9
    • MSDN Magazine

    Community

    • Forums
    • Blogs
    • Codeplex

    Support

    • Self support

    Programs

    • BizSpark (for startups)
    • Microsoft Imagine (for students)
    United States (English)
    • Newsletter
    • Privacy & cookies
    • Terms of use
    • Trademarks
    logo © 2017 Microsoft
    © 2017 Microsoft