The CryptDecrypt function is used to decrypt data that was previously encrypted via the CryptEncrypt function.
BOOL CRYPTFUNC CryptDecrypt(
HCRYPTKEY hKey, | |
HCRYPTHASH hHash, | |
BOOL Final, | |
DWORD dwFlags, | |
BYTE *pbData, | |
DWORD *pdwDataLen | |
); |
This key specifies the decryption algorithm that is used.
If no hash is to be done, this parameter must be zero.
The number of encrypted bytes in this buffer is specified by pdwDataLen.
When a block cipher is used, this data length must be a multiple of the block size, unless this is the final section of data to be decrypted and the Final flag is TRUE.
If data is to be decrypted and hashed simultaneously, a handle to a hash object can be passed in the hHash parameter. The hash value will be updated with the decrypted plaintext. This option is useful when simultaneously decrypting and verifying a signature.
Prior to calling CryptDecrypt, the application should obtain a handle to the hash object by calling the CryptCreateHash function. Once the decryption is complete, the hash value can be obtained (through CryptGetHashParam) or it can be signed (through CryptSignHash), or it can be used to verify a digital signature (through CryptVerifySignature).
When a large amount of data needs to be decrypted, it can be done in sections. This is done by calling CryptDecrypt repeatedly. The Final parameter should be set to TRUE only on the last invocation of CryptDecrypt, so the decryption engine can properly finish the decryption process. The following extra actions are performed when Final is TRUE:
If the function succeeds, the return value is nonzero.
If the function fails, the return value is zero. To retrieve extended error information, use the GetLastError function.
The following table lists the error codes most commonly returned by the GetLastError function. The error codes prefaced by “NTE” are generated by the particular CSP you are using.
Error |
Description |
ERROR_INVALID_HANDLE |
One of the parameters specifies an invalid handle. |
ERROR_INVALID_PARAMETER |
One of the parameters contains an invalid value. This is most often an illegal pointer. |
NTE_BAD_ALGID |
The hKey session key specifies an algorithm that this CSP does not support. |
NTE_BAD_DATA |
The data to be decrypted is invalid. For example, when a block cipher is used and the Final flag FALSE, the value specified by pdwDataLen must be a multiple of the block size. This error can also be returned when the padding is found to be invalid. |
NTE_BAD_FLAGS |
The dwFlags parameter is nonzero. |
NTE_BAD_HASH |
The hHash parameter contains an invalid handle. |
NTE_BAD_KEY |
The hKey parameter does not contain a valid handle to a key. |
NTE_BAD_LEN |
The size of the output buffer is too small to hold the generated plaintext. |
NTE_BAD_UID |
The CSP context that was specified when the key was created cannot be found. |
NTE_DOUBLE_ENCRYPT |
The application attempted to decrypt the same data twice. |
NTE_FAIL |
The function failed in some unexpected way. |
See “Decryption Example” in the section Encrypting and Decrypting Data.
CryptCreateHash, CryptEncrypt, CryptGenKey, CryptGetKeyParam, CryptGetHashParam, CryptImportKey, CryptSignHash, CryptVerifySignature
file: /Techref/os/win/api/win32/func/src/f11_19.htm, 9KB, , updated: 2000/4/7 11:19, local time: 2024/11/6 23:26,
18.218.125.85:LOG IN ©2024 PLEASE DON'T RIP! THIS SITE CLOSES OCT 28, 2024 SO LONG AND THANKS FOR ALL THE FISH!
|
©2024 These pages are served without commercial sponsorship. (No popup ads, etc...).Bandwidth abuse increases hosting cost forcing sponsorship or shutdown. This server aggressively defends against automated copying for any reason including offline viewing, duplication, etc... Please respect this requirement and DO NOT RIP THIS SITE. Questions? <A HREF="http://massmind.org/Techref/os/win/api/win32/func/src/f11_19.htm"> CryptDecrypt Release 2]</A> |
Did you find what you needed? |
Welcome to massmind.org! |
Welcome to massmind.org! |
.