S2OPC OPCUA Toolkit
crypto_struct_nocrypto.h
Go to the documentation of this file.
1 /*
2  * Licensed to Systerel under one or more contributor license
3  * agreements. See the NOTICE file distributed with this work
4  * for additional information regarding copyright ownership.
5  * Systerel licenses this file to you under the Apache
6  * License, Version 2.0 (the "License"); you may not use this
7  * file except in compliance with the License. You may obtain
8  * a copy of the License at
9  *
10  * http://www.apache.org/licenses/LICENSE-2.0
11  *
12  * Unless required by applicable law or agreed to in writing,
13  * software distributed under the License is distributed on an
14  * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
15  * KIND, either express or implied. See the License for the
16  * specific language governing permissions and limitations
17  * under the License.
18  */
19 
20 #ifndef CRYPTO_STRUCT_NOCRYPTO_H_
21 #define CRYPTO_STRUCT_NOCRYPTO_H_
22 
23 #include <string.h>
24 
25 // The services which are implemented in this file are declared here
27 
28 #include "sopc_crypto_decl.h"
29 
30 #define EMPTY_STRUCT(x) \
31  struct x \
32  { \
33  int unused; \
34  }
35 
37 {
38  uint64_t randomCtx;
39 };
44 
45 #endif // CRYPTO_STRUCT_NOCRYPTO_H_
SOPC_CertificateList
The signed public key representation.
Definition: key_manager_cyclone.h:60
sopc_crypto_decl.h
Defines the common declarations for the cryptographic objects. The structures and macros defined in t...
EMPTY_STRUCT
#define EMPTY_STRUCT(x)
Definition: crypto_struct_nocrypto.h:30
SOPC_CryptolibContext
Definition: crypto_provider_cyclone.h:29
SOPC_CSR
Definition: key_manager_cyclone.h:86
SOPC_AsymmetricKey
The asymmetric key representation.
Definition: key_manager_cyclone.h:42
SOPC_CryptolibContext::randomCtx
uint64_t randomCtx
Definition: crypto_provider_cyclone.h:30
SOPC_CRLList
A list of Certificate Revocation Lists.
Definition: key_manager_cyclone.h:79
sopc_crypto_struct_lib_itf.h
Defines the cryptographic abstraction interface for the object. A cryptographic implementation must d...