473,544 Members | 1,813 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ



I have to encrypt a string with HMAC-MD5 in asp, like the function
MHASH_MD5 in php. Is anyone know how to proceed ?


Sep 26 '06 #1
5 5953
Vince wrote:

I have to encrypt a string with HMAC-MD5 in asp, like the function
MHASH_MD5 in php. Is anyone know how to proceed ?
I've never done this, but here are some search results that may prove

Microsoft MVP - ASP/ASP.NET
Please reply to the newsgroup. This email account is my spam trap so I
don't check it very often. If you must reply off-line, then remove the
Sep 26 '06 #2
"Vince" <vi**********@f ree.frwrote in message
news:11******** *************@i 42g2000cwa.goog legroups.com...

I have to encrypt a string with HMAC-MD5 in asp, like the function
MHASH_MD5 in php. Is anyone know how to proceed ?
MD5 Homepage (unofficial)

Sep 26 '06 #3
Thanks but I've already found this function md5 in VB. I'd want
MHASH_MD5 function, wich takes a string and a key as argument :

mhash(string,ke y)

like : http://www.php.net/mhash ($hash = mhash(MHASH_MD5 , $input,

Sep 26 '06 #4
"Vince" <vi**********@f ree.frwrote in message
news:11******** **************@ m73g2000cwd.goo glegroups.com.. .
Thanks but I've already found this function md5 in VB. I'd want
MHASH_MD5 function, wich takes a string and a key as argument :

mhash(string,ke y)

like : http://www.php.net/mhash ($hash = mhash(MHASH_MD5 , $input,
Sorry, I'm not (yet) familiar with HMAC-MD5 or MHASH_MD5.


"A keyed-hash message authentication code, or HMAC,
is a type of message authentication code (MAC) calculated
using a cryptographic hash function in combination with a
secret key. As with any MAC, it may be used to simultaneously
verify both the data integrity and the authenticity of a message."
Hash ActiveX Objects Version 1.3 ($37.50)

"This is a collection of fifteen ActiveX objects that implement
CRC-32 and Adler-32 checksum algorithms, seven cryptographic
hash (also known as message digest) algorithms, and four algorithms
for calculating Hash-based Message Authentication Codes (HMAC).
... HMAC algorithms are: HMAC-MD5 ...."

Hashing Software

Sep 26 '06 #5
Vince wrote:
I have to encrypt a string with HMAC-MD5 in asp, like the
function MHASH_MD5 in php. Is anyone know how to proceed ?
Assuming you want to store that hashed value in, say, a database, then you
could do this language-independently if your DB is SQL Server 2005:


Dave Anderson

Unsolicited commercial email will be read at a cost of $500 per message. Use
of this email address implies consent to these terms.
Sep 26 '06 #6

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

by: David McNab | last post by:
Hi, I'm looking for adventurous pre-alpha testers for a DHTML (active website) framework for Python I've developed. Name: - pyWeb Features:
by: Reed L. O'Brien | last post by:
I see rotor was removed for 2.4 and the docs say use an AES module provided separately... Is there a standard module that works alike or an AES module that works alike but with better encryption? cheers, reed
by: Steve Holden | last post by:
This is even stranger: it makes it if I import the module a second time: import dbimp as dbimp import sys if __name__ == "__main__": dbimp.install() #k = sys.modules.keys() #k.sort() #for kk in k:
by: rbt | last post by:
I have written a python socketServer program and I have a few questions that I hope the group can answer... here is a simple version of the server: class tr_handler(SocketServer.StreamRequestHandler): def handle(self): data = self.rfile.readline(300) data = str.strip(data)
by: Fernando Barsoba | last post by:
Hi all, I very much need your help here guys.. I'm working on a IPSec implementation, and when almost finished, I found a considerable problem. I'm sending a particular array + a key to a HMAC-SHA1 function. I did the tests with the following: void icv_Calculation_test(char p_output) { char msgtest="what do ya want for nothing?"; char...
by: Fernando Barsoba | last post by:
Dear all, I have been posting about a problem trying to encrypt certain data using HMAC-SHA1 functions. I posted that my problem was solved, but unfortunately, I was being overly optimistic. I am really desperate now, because I havent' been able to locate the origin of the problem for a couple of days now.. PROBLEM: the message digest...
by: ed | last post by:
Hello, I've been crawling the net tonight looking for a reasonably portable sha1/hmac implementation. I don't need a huge library of different methods, don't suppose anyone has such a piece of code lying around anyplace do they? -- Regards, Ed :: http://www.s5h.net :%s/\t/ /g :: proud unix...
by: KW | last post by:
I'm trying to convert some PHP code using OpenSSL to Python and I'm stuck on openssl_sign() which uses an RSA private key to compute a signature. Example PHP code: $privkeyid = openssl_get_privatekey($priv_key, $key_pass); openssl_sign($data, $signature, $privkeyid); openssl_free_key($privkeyid); I've tried several permutations of the...
by: Bhavesh.Feb | last post by:
Hi, I'm trying to use SHA1 and HMAC to create signature for my web service request. I dont know much about HMAC or SHA1 but this is what i need to create signature. What i'm trying to do is: SHA_CTX shaContext; SHA1_Init(&shaContext); SHA1_Update(&shaContext, &data, dataLen ); SHA1_Final(cipher_key, &shaContext);
by: mirandacascade | last post by:
I am attempting to implement a process, and I'm pretty sure that a major roadblock is that I do not understand the nomenclature. The specs indicate that the goal is to calculate a message digest using an SHA-256 algorithm. There are 2 examples included with the specs. The label on the 2 examples are: 'HMAC samples'. In both examples, the...
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However, people are often confused as to whether an ONU can Work As a Router. In this blog post, we’ll explore What is ONU, What Is Router, ONU & Router’s main...
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven tapestry of website design and digital marketing. It's not merely about having a website; it's about crafting an immersive digital experience that...
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows Update option using the Control Panel or Settings app; it automatically checks for updates and installs any it finds, whether you like it or not. For...
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the...
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then...
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules. He will explain when you may want to use classes...
by: TSSRALBI | last post by:
Hello I'm a network technician in training and I need your help. I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs. The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols. I succeeded, with both firewalls in...
by: 6302768590 | last post by:
Hai team i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated we have to send another system
by: muto222 | last post by:
How can i add a mobile payment intergratation into php mysql website.

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.