blob: 4858235107ba2951da3079950211bb2c90a3b4f8 [file] [log] [blame]
Georg Brandl116aa622007-08-15 14:28:22 +00001:mod:`hmac` --- Keyed-Hashing for Message Authentication
2========================================================
3
4.. module:: hmac
Georg Brandl80b75fd2010-10-17 09:43:35 +00005 :synopsis: Keyed-Hashing for Message Authentication (HMAC) implementation
6 for Python.
Georg Brandl116aa622007-08-15 14:28:22 +00007.. moduleauthor:: Gerhard Häring <ghaering@users.sourceforge.net>
8.. sectionauthor:: Gerhard Häring <ghaering@users.sourceforge.net>
9
Raymond Hettinger469271d2011-01-27 20:38:46 +000010**Source code:** :source:`Lib/hmac.py`
11
12--------------
Georg Brandl116aa622007-08-15 14:28:22 +000013
Georg Brandl116aa622007-08-15 14:28:22 +000014This module implements the HMAC algorithm as described by :rfc:`2104`.
15
16
Georg Brandl036490d2009-05-17 13:00:36 +000017.. function:: new(key, msg=None, digestmod=None)
Georg Brandl116aa622007-08-15 14:28:22 +000018
Christian Heimes04926ae2013-07-01 13:08:42 +020019 Return a new hmac object. *key* is a bytes or bytearray object giving the
20 secret key. If *msg* is present, the method call ``update(msg)`` is made.
Christian Heimes634919a2013-11-20 17:23:06 +010021 *digestmod* is the digest name, digest constructor or module for the HMAC
22 object to use. It supports any name suitable to :func:`hashlib.new` and
23 defaults to the :data:`hashlib.md5` constructor.
Georg Brandl116aa622007-08-15 14:28:22 +000024
Christian Heimes04926ae2013-07-01 13:08:42 +020025 .. versionchanged:: 3.4
Larry Hastings3732ed22014-03-15 21:13:56 -070026 Parameter *key* can be a bytes or bytearray object.
27 Parameter *msg* can be of any type supported by :mod:`hashlib`.
Christian Heimes634919a2013-11-20 17:23:06 +010028 Paramter *digestmod* can be the name of a hash algorithm.
29
30 .. deprecated:: 3.4
31 MD5 as implicit default digest for *digestmod* is deprecated.
32
33
Georg Brandl116aa622007-08-15 14:28:22 +000034An HMAC object has the following methods:
35
Georg Brandl9701eb62012-02-05 09:25:22 +010036.. method:: HMAC.update(msg)
Georg Brandl116aa622007-08-15 14:28:22 +000037
Christian Heimes04926ae2013-07-01 13:08:42 +020038 Update the hmac object with *msg*. Repeated calls are equivalent to a
39 single call with the concatenation of all the arguments:
Georg Brandl80b75fd2010-10-17 09:43:35 +000040 ``m.update(a); m.update(b)`` is equivalent to ``m.update(a + b)``.
Georg Brandl116aa622007-08-15 14:28:22 +000041
Christian Heimes04926ae2013-07-01 13:08:42 +020042 .. versionchanged:: 3.4
43 Parameter *msg* can be of any type supported by :mod:`hashlib`.
44
Georg Brandl116aa622007-08-15 14:28:22 +000045
Georg Brandl9701eb62012-02-05 09:25:22 +010046.. method:: HMAC.digest()
Georg Brandl116aa622007-08-15 14:28:22 +000047
Georg Brandl80b75fd2010-10-17 09:43:35 +000048 Return the digest of the bytes passed to the :meth:`update` method so far.
49 This bytes object will be the same length as the *digest_size* of the digest
50 given to the constructor. It may contain non-ASCII bytes, including NUL
51 bytes.
Georg Brandl116aa622007-08-15 14:28:22 +000052
Charles-François Natali7feb9f42012-05-13 19:53:07 +020053 .. warning::
54
55 When comparing the output of :meth:`digest` to an externally-supplied
56 digest during a verification routine, it is recommended to use the
Nick Coghlan807770e2012-06-15 21:14:08 +100057 :func:`compare_digest` function instead of the ``==`` operator
58 to reduce the vulnerability to timing attacks.
Charles-François Natali7feb9f42012-05-13 19:53:07 +020059
Georg Brandl116aa622007-08-15 14:28:22 +000060
Georg Brandl9701eb62012-02-05 09:25:22 +010061.. method:: HMAC.hexdigest()
Georg Brandl116aa622007-08-15 14:28:22 +000062
Georg Brandl80b75fd2010-10-17 09:43:35 +000063 Like :meth:`digest` except the digest is returned as a string twice the
64 length containing only hexadecimal digits. This may be used to exchange the
65 value safely in email or other non-binary environments.
Georg Brandl116aa622007-08-15 14:28:22 +000066
Charles-François Natali7feb9f42012-05-13 19:53:07 +020067 .. warning::
68
Antoine Pitrou9df73da2012-06-24 16:03:50 +020069 When comparing the output of :meth:`hexdigest` to an externally-supplied
70 digest during a verification routine, it is recommended to use the
71 :func:`compare_digest` function instead of the ``==`` operator
72 to reduce the vulnerability to timing attacks.
Charles-François Natali7feb9f42012-05-13 19:53:07 +020073
Georg Brandl116aa622007-08-15 14:28:22 +000074
Georg Brandl9701eb62012-02-05 09:25:22 +010075.. method:: HMAC.copy()
Georg Brandl116aa622007-08-15 14:28:22 +000076
77 Return a copy ("clone") of the hmac object. This can be used to efficiently
78 compute the digests of strings that share a common initial substring.
79
80
Christian Heimesc4ab1102013-11-20 17:35:06 +010081A hash object has the following attributes:
82
83.. attribute:: HMAC.digest_size
84
85 The size of the resulting HMAC digest in bytes.
86
87.. attribute:: HMAC.block_size
88
89 The internal block size of the hash algorithm in bytes.
90
91 .. versionadded:: 3.4
92
93.. attribute:: HMAC.name
94
95 The canonical name of this HMAC, always lowercase, e.g. ``hmac-md5``.
96
97 .. versionadded:: 3.4
98
99
Charles-François Natali7feb9f42012-05-13 19:53:07 +0200100This module also provides the following helper function:
101
Nick Coghlan807770e2012-06-15 21:14:08 +1000102.. function:: compare_digest(a, b)
Charles-François Natali7feb9f42012-05-13 19:53:07 +0200103
Antoine Pitrou5f762af2012-06-24 16:23:54 +0200104 Return ``a == b``. This function uses an approach designed to prevent
105 timing analysis by avoiding content-based short circuiting behaviour,
106 making it appropriate for cryptography. *a* and *b* must both be of the
107 same type: either :class:`str` (ASCII only, as e.g. returned by
Ezio Melottic228e962013-05-04 18:06:34 +0300108 :meth:`HMAC.hexdigest`), or a :term:`bytes-like object`.
Nick Coghlan807770e2012-06-15 21:14:08 +1000109
Charles-François Natali7feb9f42012-05-13 19:53:07 +0200110 .. note::
111
Antoine Pitrouf61e7912012-06-24 16:21:10 +0200112 If *a* and *b* are of different lengths, or if an error occurs,
Larry Hastings48986d62012-06-25 00:59:34 -0700113 a timing attack could theoretically reveal information about the
114 types and lengths of *a* and *b*--but not their values.
Antoine Pitrouf61e7912012-06-24 16:21:10 +0200115
Charles-François Natali7feb9f42012-05-13 19:53:07 +0200116
Charles-François Natali9b704ec2012-05-15 21:00:32 +0200117 .. versionadded:: 3.3
Charles-François Natali7feb9f42012-05-13 19:53:07 +0200118
Georg Brandla1bc35f2012-06-24 16:07:33 +0200119
Georg Brandl116aa622007-08-15 14:28:22 +0000120.. seealso::
121
122 Module :mod:`hashlib`
Ezio Melotti0639d5a2009-12-19 23:26:38 +0000123 The Python module providing secure hash functions.