Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

This noncompliant code example shows an example where ...

Code Block
bgColor#FFCCCC
 


Compliant Solution

In this compliant solution, ...

Code Block
bgColor#CCCCFF
 

Risk Assessment

Using insecure or weak cryptographic algorithms is not a good idea.

Rule

Severity

Likelihood

Detectable

RepairableRemediation Cost

Priority

Level

MSC25-C

Medium

Probable

No

NoHigh

P4

L3

Automated Detection

ToolVersionCheckerDescription
CodeSonar
Include Page
CodeSonar_V
CodeSonar_V

BADMACRO.WEAK_CRYPTO
BADFUNC.WEAKCRYPTO

Use of Weak Cryptographic Algorithm
Weak Cryptography
Security Reviewer - Static Reviewer

Include Page
Security Reviewer - Static Reviewer_V
Security Reviewer - Static Reviewer_V

CE8
oppositeExpression
redundantPointerOp
RTOS_01
RTOS_02
RTOS_03
RTOS_04
RTOS_05
RTOS_06
RTOS_18

Fully implemented

Related Guidelines

Bibliography