- Extended by:
- Defined in:
Computes an authenticator as HMAC-SHA-256
The authenticator can be used at a later time to verify the provenance of the message by recomputing the HMAC over the message and then comparing it to the provided authenticator. The class provides methods for generating signatures and also has a constant-time implementation for checking them.
This is a secret key authenticator, i.e. anyone who can verify signatures can also create them.
Constants inherited from
Methods included from
, , , ,
Methods inherited from
, , , , , , , , ,
This class inherits a constructor from