iOS encrypts and decrypts data with key

Introduction In the development of iOS App, we need to encrypt the account, password and other personal private information to ensure the security of user information. Then these private information can be saved in the keychain, because the invisibility of the keychain can ensure the security of the u ...

Posted by illushinz on Mon, 09 Mar 2020 20:38:32 -0700

Cryptography summary

1, Digital signature 1.1 relationship between digital signature and asymmetric encryption In fact, there is a very close relationship between digital signature and asymmetric encryption. In short, digital signature is realized by using asymmetric encryption in reverse. Let's summarize the usage of t ...

Posted by thomas777neo on Mon, 09 Mar 2020 03:43:26 -0700

Token is set up in the basic configuration of official account.

WeChat official account / development / basic setup / server configuration page URL fill in your server address The Token value is the value set by response.php The content of the response.php file is as follows: <?php traceHttp(); define("TOKEN", "kiking"); $wechatObj = new wechatCallbacka ...

Posted by catnip_uk on Sat, 07 Mar 2020 06:13:21 -0800

BT seed structure and coding analysis

1, Data type There are four types of data: string, integer, list and dictionary. Strings (string) Code to: < string len gt h >: < string > For example: 4:test is represented by the string "test" 4: Examples are represented as string "examples" String length in bytes ...

Posted by inkdrop on Sat, 01 Feb 2020 05:03:09 -0800

kerberos pitching Guide

Change from: https://www.jianshu.com/p/fc2d2dbd510b Principle introduction kerberos is mainly used for identity authentication in network communication, and its main feature is "complexity". So it's best to familiarize yourself with the principles of kerberos before entering the pit. Her ...

Posted by teguh123 on Thu, 16 Jan 2020 06:33:13 -0800

WeChat public number token has been verified successfully, but automatic response is not responding.

WeChat public number token has been verified successfully, but automatic response is not responding. WeChat public number token has been verified successfully, but automatic response is not responding. WeChat public number token has been verified successfully, but automatic response is not responding. Start with the code and ...

Posted by dirkbonenkamp on Mon, 06 Jan 2020 04:51:53 -0800

Upload and download alicloud OSS files in Linux Shell script

background In the work, because the log files generated by our project are very important, and the local disk space is limited for a long time, so considering the backup scheme, we originally intended to save them on nas, but due to various reasons, we communicated with the operation and maintenance department to suggest saving them on oss. Bec ...

Posted by jmrouleau on Thu, 12 Dec 2019 06:34:17 -0800

Detailed explanation of the principle of Google Authenticator TOTP (take Python as an example)

Xiaosheng blog: http://xsboke.blog.51cto.com If in doubt, please Click here The author will reply in time (or comment directly in the current article). -------Thank you for your reference. If you have any questions, welcome to exchange I. detailed explanation of the principle (click and zoom in the picture) II. Verific ...

Posted by aurigus on Sat, 30 Nov 2019 10:23:35 -0800

How to Cross-compile the GO Program with ARM Architecture on Ubuntu

We all know that when CGO is not involved, cross-compilation of Go s is very simple and requires only the corresponding GOOS and GOARCH to be set, but when CGO is involved, the problem becomes a bit complicated because you need to specify a specific GCC. For example, if you want to cross-compile a dynamic library with CGO on Ubuntu and the tar ...

Posted by Deadman2 on Wed, 27 Nov 2019 15:29:44 -0800

TOTP introduction and simple implementation based on C ා

Intro TOTP is a time-based one-time password generation algorithm, which is composed of RFC 6238 Definition. Different from the event based one-time password generation algorithm HOTP TOTP is time-based and has the following relationship with HOTP: TOTP = HOTP(K, T) HOTP(K,C) = Truncate(HMAC-SHA-1(K,C)) Among them: T: T = (Current Unix time - ...

Posted by Yippee on Sun, 24 Nov 2019 13:04:35 -0800