Last Updated on : 2023-10-09 08:55:47download
This topic describes the method of signing message queue data.
Before you get the real data
, you can set the tamper-proof MD5 signature verification. The signature algorithm is processed in the following steps:
sign
and the parameters with an empty value) into key=val
.key
. Format example of the assembled string: k1=v1||k2=v2
.k1=v1||k2=v2...kn=vn||key
.sign
value, it means the data has not been tampered. Otherwise, the data has been tampered.The data is decrypted after the signature is checked.
Is this page helpful?
YesFeedbackIs this page helpful?
YesFeedback