Copyright | (c) 2024 Jared Tobin |
---|---|
License | MIT |
Maintainer | Jared Tobin <jared@ppad.tech> |
Safe Haskell | Safe-Inferred |
Language | Haskell2010 |
Synopsis
- hash :: ByteString -> ByteString
- hash_lazy :: ByteString -> ByteString
- hmac :: ByteString -> ByteString -> ByteString
- hmac_lazy :: ByteString -> ByteString -> ByteString
SHA-512 message digest functions
hash :: ByteString -> ByteString Source #
Compute a condensed representation of a strict bytestring via SHA-512.
The 512-bit output digest is returned as a strict bytestring.
>>>
hash "strict bytestring input"
"<strict 512-bit message digest>"
hash_lazy :: ByteString -> ByteString Source #
Compute a condensed representation of a lazy bytestring via SHA-512.
The 512-bit output digest is returned as a strict bytestring.
>>>
hash_lazy "lazy bytestring input"
"<strict 512-bit message digest>"
SHA512-based MAC functions
:: ByteString | key |
-> ByteString | text |
-> ByteString |
Produce a message authentication code for a strict bytestring, based on the provided (strict, bytestring) key, via SHA-512.
The 512-bit MAC is returned as a strict bytestring.
Per RFC 2104, the key should be a minimum of 64 bytes long. Keys exceeding 1024 bytes in length will first be hashed (via SHA-512).
>>>
hmac "strict bytestring key" "strict bytestring input"
"<strict 512-bit MAC>"
:: ByteString | key |
-> ByteString | text |
-> ByteString |
Produce a message authentication code for a lazy bytestring, based on the provided (strict, bytestring) key, via SHA-512.
The 512-bit MAC is returned as a strict bytestring.
Per RFC 2104, the key should be a minimum of 64 bytes long. Keys exceeding 1024 bytes in length will first be hashed (via SHA-512).
>>>
hmac_lazy "strict bytestring key" "lazy bytestring input"
"<strict 512-bit MAC>"