blob: e33ef50a6e6b5f852049bd8833b8b7c110061337 [file] [log] [blame]
Georg Brandl8ec7f652007-08-15 14:28:01 +00001:mod:`hashlib` --- Secure hashes and message digests
2====================================================
3
4.. module:: hashlib
5 :synopsis: Secure hash and message digest algorithms.
Gregory P. Smith26f8d1b2009-01-11 17:53:33 +00006.. moduleauthor:: Gregory P. Smith <greg@krypto.org>
7.. sectionauthor:: Gregory P. Smith <greg@krypto.org>
Georg Brandl8ec7f652007-08-15 14:28:01 +00008
9
10.. versionadded:: 2.5
11
12.. index::
13 single: message digest, MD5
14 single: secure hash algorithm, SHA1, SHA224, SHA256, SHA384, SHA512
15
Éric Araujo29a0b572011-08-19 02:14:03 +020016**Source code:** :source:`Lib/hashlib.py`
17
18--------------
19
Georg Brandl8ec7f652007-08-15 14:28:01 +000020This module implements a common interface to many different secure hash and
21message digest algorithms. Included are the FIPS secure hash algorithms SHA1,
22SHA224, SHA256, SHA384, and SHA512 (defined in FIPS 180-2) as well as RSA's MD5
23algorithm (defined in Internet :rfc:`1321`). The terms secure hash and message
24digest are interchangeable. Older algorithms were called message digests. The
25modern term is secure hash.
26
Gregory P. Smithbde40072008-03-19 01:38:35 +000027.. note::
Georg Brandl917bb8c2013-10-06 18:26:36 +020028
29 If you want the adler32 or crc32 hash functions, they are available in
Gregory P. Smithbde40072008-03-19 01:38:35 +000030 the :mod:`zlib` module.
31
Georg Brandl8ec7f652007-08-15 14:28:01 +000032.. warning::
33
Georg Brandl917bb8c2013-10-06 18:26:36 +020034 Some algorithms have known hash collision weaknesses, refer to the "See
35 also" section at the end.
Georg Brandl8ec7f652007-08-15 14:28:01 +000036
37There is one constructor method named for each type of :dfn:`hash`. All return
38a hash object with the same simple interface. For example: use :func:`sha1` to
39create a SHA1 hash object. You can now feed this object with arbitrary strings
40using the :meth:`update` method. At any point you can ask it for the
41:dfn:`digest` of the concatenation of the strings fed to it so far using the
42:meth:`digest` or :meth:`hexdigest` methods.
43
Bill Janssen98d19da2007-09-10 21:51:02 +000044.. index:: single: OpenSSL; (use in module hashlib)
Georg Brandl8ec7f652007-08-15 14:28:01 +000045
46Constructors for hash algorithms that are always present in this module are
47:func:`md5`, :func:`sha1`, :func:`sha224`, :func:`sha256`, :func:`sha384`, and
48:func:`sha512`. Additional algorithms may also be available depending upon the
49OpenSSL library that Python uses on your platform.
50
51For example, to obtain the digest of the string ``'Nobody inspects the spammish
Georg Brandle8f1b002008-03-22 22:04:10 +000052repetition'``:
Georg Brandl8ec7f652007-08-15 14:28:01 +000053
54 >>> import hashlib
55 >>> m = hashlib.md5()
56 >>> m.update("Nobody inspects")
57 >>> m.update(" the spammish repetition")
58 >>> m.digest()
59 '\xbbd\x9c\x83\xdd\x1e\xa5\xc9\xd9\xde\xc9\xa1\x8d\xf0\xff\xe9'
Gregory P. Smithe1ac4f12007-11-06 00:19:03 +000060 >>> m.digest_size
61 16
62 >>> m.block_size
63 64
Georg Brandl8ec7f652007-08-15 14:28:01 +000064
Georg Brandle8f1b002008-03-22 22:04:10 +000065More condensed:
Georg Brandl8ec7f652007-08-15 14:28:01 +000066
67 >>> hashlib.sha224("Nobody inspects the spammish repetition").hexdigest()
68 'a4337bc45a8fc544c03f52dc550cd6e1e87021bc896588bd79e901e2'
69
70A generic :func:`new` constructor that takes the string name of the desired
71algorithm as its first parameter also exists to allow access to the above listed
72hashes as well as any other algorithms that your OpenSSL library may offer. The
73named constructors are much faster than :func:`new` and should be preferred.
74
Georg Brandle8f1b002008-03-22 22:04:10 +000075Using :func:`new` with an algorithm provided by OpenSSL:
Georg Brandl8ec7f652007-08-15 14:28:01 +000076
77 >>> h = hashlib.new('ripemd160')
78 >>> h.update("Nobody inspects the spammish repetition")
79 >>> h.hexdigest()
80 'cc4a5ce1b3df48aec5d22d1f16b894a0b894eccc'
81
Gregory P. Smithe6390a12010-03-01 02:01:47 +000082This module provides the following constant attribute:
83
84.. data:: hashlib.algorithms
85
86 A tuple providing the names of the hash algorithms guaranteed to be
87 supported by this module.
88
89 .. versionadded:: 2.7
90
Benjamin Peterson0062d1e2014-08-28 09:41:29 -040091.. data:: algorithms_guaranteed
92
93 A set containing the names of the hash algorithms guaranteed to be supported
94 by this module on all platforms.
95
96 .. versionadded:: 2.7.9
97
98.. data:: algorithms_available
99
100 A set containing the names of the hash algorithms that are available in the
101 running Python interpreter. These names will be recognized when passed to
102 :func:`new`. :attr:`algorithms_guaranteed` will always be a subset. The
103 same algorithm may appear multiple times in this set under different names
104 (thanks to OpenSSL).
105
106 .. versionadded:: 2.7.9
107
108
Georg Brandl8ec7f652007-08-15 14:28:01 +0000109The following values are provided as constant attributes of the hash objects
110returned by the constructors:
111
112
Georg Brandl58d23fb2009-09-14 14:50:47 +0000113.. data:: hash.digest_size
Georg Brandl8ec7f652007-08-15 14:28:01 +0000114
Gregory P. Smithe1ac4f12007-11-06 00:19:03 +0000115 The size of the resulting hash in bytes.
116
Georg Brandl58d23fb2009-09-14 14:50:47 +0000117.. data:: hash.block_size
Gregory P. Smithe1ac4f12007-11-06 00:19:03 +0000118
119 The internal block size of the hash algorithm in bytes.
Georg Brandl8ec7f652007-08-15 14:28:01 +0000120
121A hash object has the following methods:
122
123
124.. method:: hash.update(arg)
125
126 Update the hash object with the string *arg*. Repeated calls are equivalent to
127 a single call with the concatenation of all the arguments: ``m.update(a);
128 m.update(b)`` is equivalent to ``m.update(a+b)``.
129
Gregory P. Smithd02eeda2009-05-04 00:16:49 +0000130 .. versionchanged:: 2.7
Gregory P. Smithd02eeda2009-05-04 00:16:49 +0000131 The Python GIL is released to allow other threads to run while
132 hash updates on data larger than 2048 bytes is taking place when
133 using hash algorithms supplied by OpenSSL.
134
Georg Brandl8ec7f652007-08-15 14:28:01 +0000135
136.. method:: hash.digest()
137
138 Return the digest of the strings passed to the :meth:`update` method so far.
139 This is a string of :attr:`digest_size` bytes which may contain non-ASCII
140 characters, including null bytes.
141
142
143.. method:: hash.hexdigest()
144
145 Like :meth:`digest` except the digest is returned as a string of double length,
146 containing only hexadecimal digits. This may be used to exchange the value
147 safely in email or other non-binary environments.
148
149
150.. method:: hash.copy()
151
152 Return a copy ("clone") of the hash object. This can be used to efficiently
153 compute the digests of strings that share a common initial substring.
154
155
Benjamin Peterson48f2e992014-05-31 13:26:22 -0700156Key Derivation Function
157-----------------------
158
159Key derivation and key stretching algorithms are designed for secure password
160hashing. Naive algorithms such as ``sha1(password)`` are not resistant against
161brute-force attacks. A good password hashing function must be tunable, slow, and
162include a `salt <https://en.wikipedia.org/wiki/Salt_%28cryptography%29>`_.
163
164
165.. function:: pbkdf2_hmac(name, password, salt, rounds, dklen=None)
166
167 The function provides PKCS#5 password-based key derivation function 2. It
168 uses HMAC as pseudorandom function.
169
170 The string *name* is the desired name of the hash digest algorithm for
171 HMAC, e.g. 'sha1' or 'sha256'. *password* and *salt* are interpreted as
172 buffers of bytes. Applications and libraries should limit *password* to
173 a sensible value (e.g. 1024). *salt* should be about 16 or more bytes from
174 a proper source, e.g. :func:`os.urandom`.
175
176 The number of *rounds* should be chosen based on the hash algorithm and
177 computing power. As of 2013, at least 100,000 rounds of SHA-256 is suggested.
178
179 *dklen* is the length of the derived key. If *dklen* is ``None`` then the
180 digest size of the hash algorithm *name* is used, e.g. 64 for SHA-512.
181
182 >>> import hashlib, binascii
183 >>> dk = hashlib.pbkdf2_hmac('sha256', b'password', b'salt', 100000)
184 >>> binascii.hexlify(dk)
185 b'0394a2ede332c9a13eb82e9b24631604c31df978b4e2f0fbd2c549944f9d79a5'
186
187 .. versionadded:: 2.7.8
188
189 .. note::
190
191 A fast implementation of *pbkdf2_hmac* is available with OpenSSL. The
192 Python implementation uses an inline version of :mod:`hmac`. It is about
193 three times slower and doesn't release the GIL.
194
195
Georg Brandl8ec7f652007-08-15 14:28:01 +0000196.. seealso::
197
198 Module :mod:`hmac`
199 A module to generate message authentication codes using hashes.
200
201 Module :mod:`base64`
202 Another way to encode binary hashes for non-binary environments.
203
204 http://csrc.nist.gov/publications/fips/fips180-2/fips180-2.pdf
205 The FIPS 180-2 publication on Secure Hash Algorithms.
206
Georg Brandl16fd5cd2010-05-21 20:24:45 +0000207 http://en.wikipedia.org/wiki/Cryptographic_hash_function#Cryptographic_hash_algorithms
208 Wikipedia article with information on which algorithms have known issues and
Georg Brandl8ec7f652007-08-15 14:28:01 +0000209 what that means regarding their use.
210