RSA Security 4.3 manual The Six-StepSequence

Models: 4.3

1 38
Download 38 pages 55.71 Kb
Page 8
Image 8
The Six-Step Sequence

The Six-Step Sequence

The Six-Step Sequence

The model for building a hardware-aware application with Crypto-C is similar to the six-step model described in Chapter 1 of the Crypto-C User’s Manual. The differences are as follows:

1.Create: At this point you may want to create the session chooser that will be used in Step 3.

2.Set

3.Init: In this step, you must pass a modified chooser, the session chooser, to your initialization function. (The session chooser must be created earlier, but is passed in at this point.)

4.Update

5.Final

6.Destroy: In this step, in addition to calling the Destroy function and freeing any allocated memory, you should free the session chooser you created in Step 3.

If you are modifying an existing application to use hardware, you may also need to call different AIs and/or AMs in place of the software info types and methods you are currently using.

4

R S A B S A F E C r y p t o - C I n t e l H a r d w a r e U s e r ’s G u i d e

Page 8
Image 8
RSA Security 4.3 manual The Six-StepSequence