The functions described in this chapter are used by applications to create, configure, and destroy cryptographic keys, as well as to exchange them with other users. The following table briefly describes each function.
Function | Description |
---|---|
CPDeriveKey | Creates a key derived from a password. |
CPDestroyKey | Destroys a key. |
CPDuplicateKey | Makes an exact copy of a key and the state the key is in. |
CPExportKey | Transfers a key from the CSP into a key blob in the application's memory space. |
CPGenKey | Creates a random key. |
CPGenRandom | Generates random data. |
CPGetKeyParam | Retrieves a key's parameters. |
CPGetUserKey | Gets a handle to the key exchange or signature key. |
CPImportKey | Transfers a key from a key blob to a CSP. |
CPSetKeyParam | Specifies a key's parameters. |