User guide
Specifying the resources that applications can access on a device....................................................................................162
Using application control policy rules to control the resources that applications can access on a smartphone.............162
How code signing controls the resources that applications can access on a smartphone............................................ 166
Permitting an application to encode data on a smartphone...............................................................................................167
Removing applications that a user installed when a user deletes all smartphone data........................................................167
Removing add-on applications from a device....................................................................................................................168
Controlling which applications can access NFC features on a device.................................................................................168
Controlling which applications can access the secure element on a device........................................................................169
20 RIM Cryptographic API................................................................................................................. 170
Cryptographic algorithms and cryptographic codes that the RIM Cryptographic API supports............................................170
Symmetric block algorithms that the RIM Cryptographic API supports........................................................................170
Stream encryption algorithms that the RIM Cryptographic API supports..................................................................... 171
Asymmetric encryption algorithms that the RIM Cryptographic API supports..............................................................171
Key agreement scheme algorithms that the RIM Cryptographic API supports............................................................. 171
Signature scheme algorithms that the RIM Cryptographic API supports......................................................................172
Key generation algorithms that the RIM Cryptographic API supports...........................................................................172
Message authentication codes that the RIM Cryptographic API supports....................................................................173
Message digest codes that the RIM Cryptographic API supports.................................................................................173
TLS and WTLS protocols that the RIM Cryptographic API supports ................................................................................... 173
Cipher suites for the key establishment algorithm that the RIM Cryptographic API supports ....................................... 174
Symmetric algorithms that the RIM Cryptographic API supports ................................................................................ 174
Hash algorithms that the RIM Cryptographic API supports .........................................................................................175
Limitations of RIM Cryptographic API support for cipher suites for the key establishment algorithm .................................. 175
21
Related resources.........................................................................................................................176
22 Glossary....................................................................................................................................... 179
23 Legal notice .................................................................................................................................187