crypto-api-0.13.3: A generic interface for cryptographic operations
MaintainerThomas.DuBuisson@gmail.com
Stabilitybeta
Portabilityportable
Safe HaskellSafe-Inferred
LanguageHaskell98

Crypto.HMAC

Description

 
Synopsis

Documentation

hmac :: Hash c d => MacKey c d -> ByteString -> d Source #

Message authentication code calculation for lazy bytestrings. hmac k msg will compute an authentication code for msg using key k

hmac' :: Hash c d => MacKey c d -> ByteString -> d Source #

hmac k msg will compute an authentication code for msg using key k

newtype MacKey c d Source #

A key carrying phantom types c and d, forcing the key data to only be used by particular hash algorithms.

Constructors

MacKey ByteString 

Instances

Instances details
Show (MacKey c d) Source # 
Instance details

Defined in Crypto.HMAC

Methods

showsPrec :: Int -> MacKey c d -> ShowS #

show :: MacKey c d -> String #

showList :: [MacKey c d] -> ShowS #

Eq (MacKey c d) Source # 
Instance details

Defined in Crypto.HMAC

Methods

(==) :: MacKey c d -> MacKey c d -> Bool #

(/=) :: MacKey c d -> MacKey c d -> Bool #

Ord (MacKey c d) Source # 
Instance details

Defined in Crypto.HMAC

Methods

compare :: MacKey c d -> MacKey c d -> Ordering #

(<) :: MacKey c d -> MacKey c d -> Bool #

(<=) :: MacKey c d -> MacKey c d -> Bool #

(>) :: MacKey c d -> MacKey c d -> Bool #

(>=) :: MacKey c d -> MacKey c d -> Bool #

max :: MacKey c d -> MacKey c d -> MacKey c d #

min :: MacKey c d -> MacKey c d -> MacKey c d #