Hash Object

Cryptographic operations require that you obtain a pointer to an instance of a cipher object or a hash object. A cipher object may be used to encrypt, decrypt, sign (or MAC), or verify data. A hash object is used to perform a digest operation. There is a function for obtaining an instance of each of these objects.

This chapter provides the following details on Hash Objects:

>FmCreateHashObject

>Hash Object Functions

See Cipher Object for information on Cipher Objects.