crypto-api-0.13.3: A generic interface for cryptographic operations

MaintainerThomas.DuBuisson@gmail.com
Stabilitybeta
Portabilityportable
Safe HaskellNone
LanguageHaskell98

Crypto.HMAC

Description

 
Synopsis

Documentation

hmac :: Hash c d => MacKey c d -> ByteString -> d Source #

Message authentication code calculation for lazy bytestrings. hmac k msg will compute an authentication code for msg using key k

hmac' :: Hash c d => MacKey c d -> ByteString -> d Source #

hmac k msg will compute an authentication code for msg using key k

newtype MacKey c d Source #

A key carrying phantom types c and d, forcing the key data to only be used by particular hash algorithms.

Constructors

MacKey ByteString 
Instances
Eq (MacKey c d) Source # 
Instance details

Defined in Crypto.HMAC

Methods

(==) :: MacKey c d -> MacKey c d -> Bool

(/=) :: MacKey c d -> MacKey c d -> Bool

Ord (MacKey c d) Source # 
Instance details

Defined in Crypto.HMAC

Methods

compare :: MacKey c d -> MacKey c d -> Ordering

(<) :: MacKey c d -> MacKey c d -> Bool

(<=) :: MacKey c d -> MacKey c d -> Bool

(>) :: MacKey c d -> MacKey c d -> Bool

(>=) :: MacKey c d -> MacKey c d -> Bool

max :: MacKey c d -> MacKey c d -> MacKey c d

min :: MacKey c d -> MacKey c d -> MacKey c d

Show (MacKey c d) Source # 
Instance details

Defined in Crypto.HMAC

Methods

showsPrec :: Int -> MacKey c d -> ShowS

show :: MacKey c d -> String

showList :: [MacKey c d] -> ShowS