Home
last modified time | relevance | path

Searched refs:algorithms (Results 1 – 25 of 103) sorted by relevance

12345

/ohos5.0/docs/en/application-dev/security/CryptoArchitectureKit/
H A Dcrypto-architecture-kit-intro.md13algorithms. Some algorithms and specifications, such as MD5, do not apply to scenarios with high s…
H A Dcrypto-sym-key-generation-conversion-spec.md4 This topic describes the supported algorithms and specifications for symmetric key generation and c…
87 …key used by HMAC is not within the range of the MD generated by the MD algorithms listed in the fo…
H A Dcrypto-key-agreement-overview.md7 This topic describes the key agreement algorithms and specifications supported by the system.
/ohos5.0/docs/en/contribute/
H A DOpenHarmony-security-design-guide.md25 3-1 Use verified, secure, and open encryption algorithms.
31 Recommended cipher algorithms are as follows:
40 The following are examples of insecure cipher algorithms:
44 3-2 Do not use algorithms for error control coding, such as parity check and CRC, to perform integr…
46 3-3 Cipher algorithms must use cryptographically secure random numbers for security purposes.
59 3-4 By default, use secure cipher algorithms and disable/prohibit insecure cipher algorithms. Use c…
61 …ipher algorithms may become insecure. Using such algorithms may bring risks to user data. In addit…
65 3-5 The GCM mode is preferred when block cipher algorithms are used.
77 …on and digital signature are required. Check the order in which cipher algorithms are called, and …
117 …encryption, weak authentication, weak key exchange, weak symmetric key algorithms, or weak message…
[all …]
/ohos5.0/docs/en/application-dev/security/UniversalKeystoreKit/
H A Dhuks-hmac-arkts.md16 …bout the HMAC specifications supported, see [huks-key-generation-overview.md#supported-algorithms).
18 … For details about the supported algorithms, see [Supported Algorithms](huks-key-import-overview.m…
H A Dhuks-hmac-ndk.md19 …he HMAC specifications, see [Key Generation](huks-key-generation-overview.md#supported-algorithms).
21 … For details about the supported algorithms, see [Supported Algorithms](huks-key-import-overview.m…
H A Dhuks-key-generation-arkts.md4 …ut the scenarios and supported algorithms, see [Supported Algorithms](huks-key-generation-overview…
H A Dhuks-key-generation-ndk.md4 …ut the scenarios and supported algorithms, see [Supported Algorithms](huks-key-generation-overview…
H A Dhuks-hmac-overview.md3 …-1. The universal keystore supports the use of HMAC with mainstream message digest (MD) algorithms.
H A Dhuks-signing-signature-verification-ndk.md4 …cenarios and supported algorithms, see [Supported Algorithms](huks-signing-signature-verification-…
H A Dhuks-key-derivation-ndk.md4 …ut the scenarios and supported algorithms, see [Supported Algorithms](huks-key-generation-overview…
H A Dhuks-encryption-decryption-ndk.md4 …ut the scenarios and supported algorithms, see [Supported Algorithms](huks-key-generation-overview…
H A Dhuks-import-key-in-plaintext-ndk.md4 …rithm specifications, see [Supported Algorithms](huks-key-import-overview.md#supported-algorithms).
H A Dhuks-key-agreement-ndk.md4 …ut the scenarios and supported algorithms, see [Supported Algorithms](huks-key-generation-overview…
/ohos5.0/docs/en/application-dev/reference/apis-universal-keystore-kit/
H A Dnative__huks__type_8h.md62 …HUKS_DIGEST_SHA384 = 13, <br>OH_HUKS_DIGEST_SHA512 = 14<br>} | Enumerates the digest algorithms. |
63 …_HUKS_PADDING_PKCS5 = 4, <br>OH_HUKS_PADDING_PKCS7 = 5<br>} | Enumerates the padding algorithms. |
65 …6 = 256, <br>OH_HUKS_SM4_KEY_SIZE_128 = 128<br>} | Enumerates key sizes of different algorithms. |
66 …,<br>OH_HUKS_ALG_SM3 = 151, <br>OH_HUKS_ALG_SM4 = 152<br>} | Enumerates the algorithms for keys. |
H A D_huks_type_api.md69 …_HUKS_DIGEST_SHA384 = 13, <br>OH_HUKS_DIGEST_SHA512 = 14<br>} | Enumerates the digest algorithms.|
70 …H_HUKS_PADDING_PKCS5 = 4, <br>OH_HUKS_PADDING_PKCS7 = 5<br>} | Enumerates the padding algorithms.|
72 …56 = 256, <br>OH_HUKS_SM4_KEY_SIZE_128 = 128<br>} | Enumerates key sizes of different algorithms.|
73 …0,<br>OH_HUKS_ALG_SM3 = 151, <br>OH_HUKS_ALG_SM4 = 152<br>} | Enumerates the algorithms for keys.|
280 Enumerates the algorithms for keys.
310 Enumerates the digest algorithms.
373 Enumerates the padding algorithms.
420 Enumerates the key sizes of different algorithms.
/ohos5.0/base/update/packaging_tools/
H A DREADME.md63 -sa {ECC,RSA}, --signing_algorithm {ECC,RSA} Signing algorithms supported by the tool,…
64 -ha {sha256,sha384}, --hash_algorithm {sha256,sha384} Hash algorithms supported by the tool, in…
/ohos5.0/docs/en/application-dev/reference/apis-crypto-architecture-kit/
H A D_crypto_digest_api.md6 Provides APIs for message digest (MD) algorithms.
18 | [crypto_digest.h](crypto__digest_8h.md) | Defines APIs for MD algorithms. |
H A Dcrypto__digest_8h.md6 Provides APIs for message digest (MD) algorithms.
/ohos5.0/foundation/communication/netstack/test/unittest/tlssocket/server/
H A DTlsSocketServerTest.cpp294 const std::vector<std::string> &algorithms) { in __anon487d28ab1902() argument
296 testSignatureAlgorithms = algorithms; in __anon487d28ab1902()
/ohos5.0/docs/en/application-dev/device/sensor/
H A Dsensorservice-kit-intro.md7 …e to sensor data. Based on the sensor data obtained, you can customize algorithms and develop vari…
/ohos5.0/foundation/communication/netstack/interfaces/innerkits/tls_socket/include/
H A Dtls_socket.h60 std::function<void(int32_t errorNumber, const std::vector<std::string> &algorithms)>;
619 void CallGetSignatureAlgorithmsCallback(int32_t err, const std::vector<std::string> &algorithms,
/ohos5.0/foundation/communication/netstack/test/unittest/tlssocket/client/
H A DTlsSocketCertChainTest.cpp338 [&testSignatureAlgorithms](int32_t errCode, const std::vector<std::string> &algorithms) { in __anon6010aead2302() argument
340 testSignatureAlgorithms = algorithms; in __anon6010aead2302()
H A DTlsSocketTest.cpp382 [&signatureAlgorithms](int32_t errCode, const std::vector<std::string> &algorithms) { in __anon0295c29c2802() argument
384 signatureAlgorithms = algorithms; in __anon0295c29c2802()
/ohos5.0/docs/en/application-dev/arkts-utils/
H A Dgc-introduction.md3algorithms are mainly used: reference counting and tracing GC. Based on the generational model (yo…
14 - Old Space: stores old generation, that is, long-surviving objects. Multiple algorithms are used t…
107 … efficient garbage collection by employing generational models, hybrid algorithms, and GC process …

12345