Developing an Application

Using Security Builder Crypto in your application - lists the steps that must be followed to use Security Builder functions in your application. The details for the functions, datatypes and other information mentioned in the steps are described in the following sections.

Global Context and Adapters - describes how to create a global context structure, register a provider, and call the adapter initialization functions. You must create a global context structure and register the cryptographic provider before calling any Security Builder functions.

Naming Convention and Function Interface - describes the naming conventions for Security Builder functions and data structures.

Opaque Data Types - describes important data structures in Security Builder.

Last modified: 2013-12-21

Got questions about leaving a comment? Get answers from our Disqus FAQ.

comments powered by Disqus