iOS encrypts and decrypts data with key
Introduction
In the development of iOS App, we need to encrypt the account, password and other personal private information to ensure the security of user information. Then these private information can be saved in the keychain, because the invisibility of the keychain can ensure the security of the u ...
Posted by illushinz on Mon, 09 Mar 2020 20:38:32 -0700
Cryptography summary
1, Digital signature
1.1 relationship between digital signature and asymmetric encryption
In fact, there is a very close relationship between digital signature and asymmetric encryption. In short, digital signature is realized by using asymmetric encryption in reverse. Let's summarize the usage of t ...
Posted by thomas777neo on Mon, 09 Mar 2020 03:43:26 -0700
Token is set up in the basic configuration of official account.
WeChat official account / development / basic setup / server configuration page
URL fill in your server address
The Token value is the value set by response.php
The content of the response.php file is as follows:
<?php
traceHttp();
define("TOKEN", "kiking");
$wechatObj = new wechatCallbacka ...
Posted by catnip_uk on Sat, 07 Mar 2020 06:13:21 -0800
BT seed structure and coding analysis
1, Data type
There are four types of data: string, integer, list and dictionary.
Strings (string)
Code to: < string len gt h >: < string >
For example: 4:test is represented by the string "test"
4: Examples are represented as string "examples"
String length in bytes ...
Posted by inkdrop on Sat, 01 Feb 2020 05:03:09 -0800
kerberos pitching Guide
Change from: https://www.jianshu.com/p/fc2d2dbd510b
Principle introduction
kerberos is mainly used for identity authentication in network communication, and its main feature is "complexity". So it's best to familiarize yourself with the principles of kerberos before entering the pit. Her ...
Posted by teguh123 on Thu, 16 Jan 2020 06:33:13 -0800
WeChat public number token has been verified successfully, but automatic response is not responding.
WeChat public number token has been verified successfully, but automatic response is not responding.
WeChat public number token has been verified successfully, but automatic response is not responding.
WeChat public number token has been verified successfully, but automatic response is not responding.
Start with the code and ...
Posted by dirkbonenkamp on Mon, 06 Jan 2020 04:51:53 -0800
Upload and download alicloud OSS files in Linux Shell script
background
In the work, because the log files generated by our project are very important, and the local disk space is limited for a long time, so considering the backup scheme, we originally intended to save them on nas, but due to various reasons, we communicated with the operation and maintenance department to suggest saving them on oss.
Bec ...
Posted by jmrouleau on Thu, 12 Dec 2019 06:34:17 -0800
Detailed explanation of the principle of Google Authenticator TOTP (take Python as an example)
Xiaosheng blog: http://xsboke.blog.51cto.com
If in doubt, please Click here The author will reply in time (or comment directly in the current article).
-------Thank you for your reference. If you have any questions, welcome to exchange
I. detailed explanation of the principle (click and zoom in the picture)
II. Verific ...
Posted by aurigus on Sat, 30 Nov 2019 10:23:35 -0800
How to Cross-compile the GO Program with ARM Architecture on Ubuntu
We all know that when CGO is not involved, cross-compilation of Go s is very simple and requires only the corresponding GOOS and GOARCH to be set, but when CGO is involved, the problem becomes a bit complicated because you need to specify a specific GCC.
For example, if you want to cross-compile a dynamic library with CGO on Ubuntu and the tar ...
Posted by Deadman2 on Wed, 27 Nov 2019 15:29:44 -0800
TOTP introduction and simple implementation based on C ා
Intro
TOTP is a time-based one-time password generation algorithm, which is composed of RFC 6238 Definition. Different from the event based one-time password generation algorithm HOTP TOTP is time-based and has the following relationship with HOTP:
TOTP = HOTP(K, T)
HOTP(K,C) = Truncate(HMAC-SHA-1(K,C))
Among them:
T: T = (Current Unix time - ...
Posted by Yippee on Sun, 24 Nov 2019 13:04:35 -0800