by Ricardo Fernández Serrata
Generates Keyed Hash Message Authentication Code signatures using any hash function available on AM: MD5, SHA-1 and SHA-256. CRC-32 is excluded because it doesn't satisfy cryptographic requirements.
You can use this to automatically authenticate/verify data from HTTP responses (or anything else) by comparing the locally generated signature with the provided remote signature. Or you can just manually authenticate data, or create your own signatures.
The key isn't shown in the output because the key must be kept private.
I used the subroutine block because there's a variable that must be reset to null before another selected hash function is executed (it's not the Key, I already tested that). I've finally found a perfectly valid use of the subroutine block that isn't recursive.
Credits (original by "Payam Fz"):
Reviews and ratings can be submitted in the app.