http://www.w3.org/ns/prov#value | - The key can then be passed, along with buffers for the input and output values to BCryptEncrypt to encrypt data or to BCryptDecrypt to decrypt data.Creating a hash is a cryptographic operation and you can provide a key to be used by the algorithm, but this is optional.
|