This site uses cookies for analytics, personalized content and ads. By continuing to browse this site, you agree to this use. Learn more
Microsoft Logo
Gray Pipe
Developer Network Developer Network Developer
Sign in

Subscriber portal

Get tools
  • Downloads
    • Visual Studio
    • SDKs
    • Trial software
      • Free downloads
      • Office resources
      • SharePoint Server 2013 resources
      • SQL Server 2014 Express resources
      • Windows Server 2012 resources
  • Programs
    • Subscriptions
      • Overview
      • Administrators
    • Students
      • Microsoft Imagine
      • Microsoft Student Partners
    • ISV
    • Startups
    • Events
  • Community
    • Magazine
    • Forums
    • Blogs
    • Channel 9
  • Documentation
    • APIs and reference
    • Dev centers
    • Samples
    • Retired content
search clear
We’re sorry. The content you requested has been removed. You’ll be auto redirected in 1 second.
Security and Identity Cryptography Using Cryptography
Using Cryptography Other Extended C Code Examples
Other Extended C Code Examples
Other Extended C Code Examples
Sample Program Conventions
Acquiring a Cryptographic Context and Generating Keys
Encoding and Decoding
Hashing
Signing Data
Creating and Receiving Enveloped Data Messages
Encrypting and Decrypting
Using Certificates
Working with Certificate Stores
Other Extended C Code Examples
Verifying a CTL
Verifying Signed Messages by Using CTLs
Example C Program: Certificate Verification Operations
Example C Program: Working with Key Identifiers
Example C Program: Creating a Certificate Chain
Example C Program: Making a Certificate Request
Example C Program: ASN.1 Encoding and Decoding
Example C Program: Using CertOIDToAlgId and CertCompareIntegerBlob
Example C Program: Verifying the Signature of a PE File
Modifying Key Container Access
Extending CryptoAPI Functionality
Using CSPs: General Processes
Using Other CryptoAPI Tools
Using CAPICOM
Programming Certificate Services
Using Certificate Enrollment Control
TOC
Collapse the table of content
Expand the table of content
This documentation is archived and is not being maintained.
This documentation is archived and is not being maintained.

Other Extended C Code Examples

The following topics present other procedures and extended C code examples that use the CryptoAPI functions:

  • Verifying a CTL
  • Verifying Signed Messages by Using CTLs
  • Example C Program: Certificate Verification Operations
  • Example C Program: Working with Key Identifiers
  • Example C Program: Creating a Certificate Chain
  • Example C Program: Making a Certificate Request
  • Example C Program: ASN.1 Encoding and Decoding
  • Example C Program: Using CertOIDToAlgId and CertCompareIntegerBlob
  • Example C Program: Verifying the Signature of a PE File
  • Modifying Key Container Access

 

 

Show:
Print Export (0)
Print Share
IN THIS ARTICLE
    Is this page helpful?
    Additional feedback?
    1500 characters remaining
    Thank you! We appreciate your feedback.

    Dev centers

    • Windows
    • Office
    • Visual Studio
    • Microsoft Azure
    • More...

    Learning resources

    • Microsoft Virtual Academy
    • Channel 9
    • MSDN Magazine

    Community

    • Forums
    • Blogs
    • Codeplex

    Support

    • Self support

    Programs

    • BizSpark (for startups)
    • Microsoft Imagine (for students)
    United States (English)
    • Newsletter
    • Privacy & cookies
    • Terms of use
    • Trademarks
    logo © 2017 Microsoft
    © 2017 Microsoft