RSA Security Home Security System 4.3 Manuel d'utilisateur Page 8

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 38
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 7
The Six-Step Sequence
4 RSA BSAFE Crypto-C Intel Hardware User’s Guide
The Six-Step Sequence
The model for building a hardware-aware application with Crypto-C is similar to the
six-step model described in Chapter 1 of the Crypto-C Users Manual. The differences
are as follows:
1. Create: At this point you may want to create the session chooser that will be used
in Step 3.
2. Set
3. Init: In this step, you must pass a modified chooser, the session chooser, to your
initialization function. (The session chooser must be created earlier, but is passed
in at this point.)
4. Update
5. Final
6. Destroy: In this step, in addition to calling the Destroy function and freeing any
allocated memory, you should free the session chooser you created in Step 3.
If you are modifying an existing application to use hardware, you may also need to
call different AIs and/or AMs in place of the software info types and methods you are
currently using.
Vue de la page 7
1 2 3 4 5 6 7 8 9 10 11 12 13 ... 37 38

Commentaires sur ces manuels

Pas de commentaire