Hash Object
Cryptographic operations require that you obtain a pointer to an instance of a cipher object or a hash object. A cipher object may be used to encrypt, decrypt, sign (or MAC), or verify data. A hash object is used to perform a digest operation.
There is a function for obtaining an instance of each of these objects. This chapter provides details on Hash Objects. See Cipher Object for information on Cipher Objects.
Hash Object Functions
The generic Hash Object wraps hashing algorithms into a common interface. In this section, the following Hash Object functions are specified:
>Free
>Init