Home
SHA-1 and Message-Digest hash algorithms should not be used in secure contexts
Rule description
- SHA-1 and Message-Digest hash algorithms should not be used in secure contexts
Non-compliant Code Example
DECLARE
hash_value varchar2;
BEGIN
hash_value := DBMS_CRYPTO.HASH('demo text source', HASH_MD5); --Non compliant code (SHA-1 OR Message-Digest hash algorithms is used in secure contexts)
END;