Iuri,
The nsc_crypto::hmac performs the HMAC (Keyed-Hashing for
Message Authentication) as specified in RFC 2104, using a symmetric
key provided via argument.
The HMAC can be verified the same way as a plain digest (without a secret):
If a received HMAC (or digest) should be verified, it must b
Thanks Gustaf,It works now.p.s. I don't understand why the subject of this thread got replaced with a previous thread that I opened.The original email that I sent has the subject: "Verifying HMAC signature [ns_crypto::hmac ...]"
Original Message
Subject: Re: [naviserver-devel] W
Thanks Gustaf,
Yes, it works fine!
I was not capable to understand the verification part. I was trying to learn it
by repeating the method of base64* with encode/decode. Then, after decrypting,
to verify if secret and data were both the same from the original request
Best wishes,
I
On May 26,