The following table describes the APIs used in this guide. For details about the APIs, see [Crypto Framework](../reference/apis/js-apis-cryptoFramework.md).
The following table describes the APIs used in this guide. For details about the APIs, see [Crypto Framework](../reference/apis/js-apis-cryptoFramework.md).
|Instance|API|Description|
|Instance|API|Description|
|---|---|---|
|---|---|---|
...
@@ -121,8 +122,6 @@ function convertAsyKey() {
...
@@ -121,8 +122,6 @@ function convertAsyKey() {
>
>
> The public key binary data to be converted by **convertKey()** must be in the DER format complying with X.509 specifications, and the private key binary data must be in the DER format complying with PKCS #8 specifications.
> The public key binary data to be converted by **convertKey()** must be in the DER format complying with X.509 specifications, and the private key binary data must be in the DER format complying with PKCS #8 specifications.
Generate an ECC asymmetric key pair from the binary key data.
Generate an ECC asymmetric key pair from the binary key data.
1. Obtain the ECC binary key data and encapsulate it into a **DataBlob** instance.
1. Obtain the ECC binary key data and encapsulate it into a **DataBlob** instance.
...
@@ -206,7 +205,8 @@ Important data needs to be encrypted in data storage or transmission for securit
...
@@ -206,7 +205,8 @@ Important data needs to be encrypted in data storage or transmission for securit
### Available APIs
### Available APIs
The following table describes the APIs used in this guide. For details about the APIs, see [Crypto Framework](../reference/apis/js-apis-cryptoFramework.md). <br>Due to complexity of cryptographic algorithms, the implementation varies depending on the specifications and parameters you use, and cannot be enumerated by sample code. Before you start, understand the APIs to ensure correct use of these APIs.
The following table describes the APIs used in this guide. For details about the APIs, see [Crypto Framework](../reference/apis/js-apis-cryptoFramework.md). <br>Due to complexity of cryptographic algorithms, the implementation varies depending on the specifications and parameters you use, and cannot be enumerated by sample code. Before you start, understand the APIs to ensure correct use of these APIs.
|Instance|API|Description|
|Instance|API|Description|
|---|---|---|
|---|---|---|
...
@@ -1052,11 +1052,11 @@ function signLongMessagePromise() {
...
@@ -1052,11 +1052,11 @@ function signLongMessagePromise() {
letglobalSignData;
letglobalSignData;
lettextSplitLen=64;// Customized data splitting length.
lettextSplitLen=64;// Customized data splitting length.
letkeyGenName="RSA1024";
letkeyGenName="RSA1024";
letcipherAlgName="RSA1024|PKCS1|SHA256";
letsignAlgName="RSA1024|PKCS1|SHA256";
letglobalKeyPair;
letglobalKeyPair;
letasyKeyGenerator=cryptoFramework.createAsyKeyGenerator(keyGenName);// Create an AsyKeyGenerator object.
letasyKeyGenerator=cryptoFramework.createAsyKeyGenerator(keyGenName);// Create an AsyKeyGenerator object.
letsigner=cryptoFramework.createSign(cipherAlgName);//Create a Sign object for signing.
letsigner=cryptoFramework.createSign(signAlgName);// Create a Signer instance.
letverifier=cryptoFramework.createVerify(cipherAlgName);// Create a Verify object for signature verification.
letverifier=cryptoFramework.createVerify(signAlgName);// Create a Verifier instance.
returnnewPromise((resolve,reject)=>{
returnnewPromise((resolve,reject)=>{
setTimeout(()=>{
setTimeout(()=>{
resolve("testRsaMultiUpdate");
resolve("testRsaMultiUpdate");
...
@@ -1263,9 +1263,8 @@ async function doLoopMdPromise() {
...
@@ -1263,9 +1263,8 @@ async function doLoopMdPromise() {
### When to Use
### When to Use
Key agreement allows two parties to establish a shared secret over an insecure channel.
Key agreement allows two parties to establish a shared secret over an insecure channel.