RSA Security 4.3 Home Security System User Manual


 
The Six-Step Sequence
4 RSA BSAFE Crypto-C Intel Hardware User’s Guide
The Six-Step Sequence
The model for building a hardware-aware application with Crypto-C is similar to the
six-step model described in Chapter 1 of the Crypto-C User’s Manual. The differences
are as follows:
1. Create: At this point you may want to create the session chooser that will be used
in Step 3.
2. Set
3. Init: In this step, you must pass a modified chooser, the session chooser, to your
initialization function. (The session chooser must be created earlier, but is passed
in at this point.)
4. Update
5. Final
6. Destroy: In this step, in addition to calling the Destroy function and freeing any
allocated memory, you should free the session chooser you created in Step 3.
If you are modifying an existing application to use hardware, you may also need to
call different AIs and/or AMs in place of the software info types and methods you are
currently using.