Alex Gaynor | af82d5e | 2013-10-29 17:07:24 -0700 | [diff] [blame] | 1 | .. hazmat:: |
Paul Kehrer | 0317b04 | 2013-10-28 17:34:27 -0500 | [diff] [blame] | 2 | |
| 3 | Hash-based Message Authentication Codes |
| 4 | ======================================= |
| 5 | |
Alex Gaynor | 4658ce1 | 2013-10-29 15:26:50 -0700 | [diff] [blame] | 6 | .. currentmodule:: cryptography.hazmat.primitives.hmac |
| 7 | |
Paul Kehrer | 0317b04 | 2013-10-28 17:34:27 -0500 | [diff] [blame] | 8 | .. testsetup:: |
| 9 | |
| 10 | import binascii |
| 11 | key = binascii.unhexlify(b"0" * 32) |
| 12 | |
| 13 | Hash-based message authentication codes (or HMACs) are a tool for calculating |
| 14 | message authentication codes using a cryptographic hash function coupled with a |
| 15 | secret key. You can use an HMAC to verify integrity as well as authenticate a |
| 16 | message. |
| 17 | |
David Reid | ef0fcf2 | 2013-11-06 11:12:45 -0800 | [diff] [blame] | 18 | .. class:: HMAC(key, algorithm, backend) |
Paul Kehrer | 0317b04 | 2013-10-28 17:34:27 -0500 | [diff] [blame] | 19 | |
David Reid | 6753e39 | 2013-11-01 15:32:03 -0700 | [diff] [blame] | 20 | HMAC objects take a ``key`` and a provider of |
| 21 | :class:`~cryptography.hazmat.primitives.interfaces.HashAlgorithm`. |
Paul Kehrer | 50a8815 | 2013-10-29 10:46:05 -0500 | [diff] [blame] | 22 | The ``key`` should be randomly generated bytes and is recommended to be |
| 23 | equal in length to the ``digest_size`` of the hash function chosen. |
| 24 | You must keep the ``key`` secret. |
Paul Kehrer | 0317b04 | 2013-10-28 17:34:27 -0500 | [diff] [blame] | 25 | |
Alex Gaynor | 58ecc8d | 2013-11-03 21:21:00 -0800 | [diff] [blame] | 26 | This is an implementation of :rfc:`2104`. |
| 27 | |
Paul Kehrer | 0317b04 | 2013-10-28 17:34:27 -0500 | [diff] [blame] | 28 | .. doctest:: |
| 29 | |
Alex Gaynor | f8796b1 | 2013-12-13 20:28:55 -0800 | [diff] [blame] | 30 | >>> from cryptography.hazmat.backends import default_backend |
Paul Kehrer | bf8962a | 2013-10-28 17:44:42 -0500 | [diff] [blame] | 31 | >>> from cryptography.hazmat.primitives import hashes, hmac |
David Reid | 63fa19a | 2013-11-20 10:49:13 -0800 | [diff] [blame] | 32 | >>> h = hmac.HMAC(key, hashes.SHA256(), backend=default_backend()) |
Paul Kehrer | 0317b04 | 2013-10-28 17:34:27 -0500 | [diff] [blame] | 33 | >>> h.update(b"message to hash") |
David Reid | 6753e39 | 2013-11-01 15:32:03 -0700 | [diff] [blame] | 34 | >>> h.finalize() |
| 35 | '#F\xdaI\x8b"e\xc4\xf1\xbb\x9a\x8fc\xff\xf5\xdex.\xbc\xcd/+\x8a\x86\x1d\x84\'\xc3\xa6\x1d\xd8J' |
Paul Kehrer | 0317b04 | 2013-10-28 17:34:27 -0500 | [diff] [blame] | 36 | |
Alex Stapleton | 447d64f | 2013-12-21 21:26:55 +0000 | [diff] [blame] | 37 | If the backend doesn't support the requested ``algorithm`` an |
| 38 | :class:`~cryptography.exceptions.UnsupportedAlgorithm` will be raised. |
David Reid | 663295d | 2013-11-20 13:55:08 -0800 | [diff] [blame] | 39 | |
| 40 | :param key: Secret key as ``bytes``. |
| 41 | :param algorithm: A |
| 42 | :class:`~cryptography.hazmat.primitives.interfaces.HashAlgorithm` |
| 43 | provider such as those described in |
| 44 | :ref:`Cryptographic Hashes <cryptographic-hash-algorithms>`. |
| 45 | :param backend: A |
Alex Gaynor | f8796b1 | 2013-12-13 20:28:55 -0800 | [diff] [blame] | 46 | :class:`~cryptography.hazmat.backends.interfaces.HMACBackend` |
David Reid | 663295d | 2013-11-20 13:55:08 -0800 | [diff] [blame] | 47 | provider. |
| 48 | |
Paul Kehrer | 2824ab7 | 2013-10-28 11:06:55 -0500 | [diff] [blame] | 49 | .. method:: update(msg) |
Paul Kehrer | 0317b04 | 2013-10-28 17:34:27 -0500 | [diff] [blame] | 50 | |
Paul Kehrer | 50a8815 | 2013-10-29 10:46:05 -0500 | [diff] [blame] | 51 | :param bytes msg: The bytes to hash and authenticate. |
David Reid | 2cce618 | 2013-11-13 13:49:41 -0800 | [diff] [blame] | 52 | :raises cryptography.exceptions.AlreadyFinalized: See :meth:`finalize` |
Paul Kehrer | 0317b04 | 2013-10-28 17:34:27 -0500 | [diff] [blame] | 53 | |
| 54 | .. method:: copy() |
| 55 | |
David Reid | 2cce618 | 2013-11-13 13:49:41 -0800 | [diff] [blame] | 56 | Copy this :class:`HMAC` instance, usually so that we may call |
| 57 | :meth:`finalize` and get an intermediate digest value while we continue |
| 58 | to call :meth:`update` on the original. |
| 59 | |
| 60 | :return: A new instance of :class:`HMAC` which can be updated |
| 61 | and finalized independently of the original instance. |
| 62 | :raises cryptography.exceptions.AlreadyFinalized: See :meth:`finalize` |
Paul Kehrer | 0317b04 | 2013-10-28 17:34:27 -0500 | [diff] [blame] | 63 | |
David Reid | 6753e39 | 2013-11-01 15:32:03 -0700 | [diff] [blame] | 64 | .. method:: finalize() |
| 65 | |
| 66 | Finalize the current context and return the message digest as bytes. |
| 67 | |
David Reid | 2cce618 | 2013-11-13 13:49:41 -0800 | [diff] [blame] | 68 | Once ``finalize`` is called this object can no longer be used and |
| 69 | :meth:`update`, :meth:`copy`, and :meth:`finalize` will raise |
| 70 | :class:`~cryptography.exceptions.AlreadyFinalized`. |
Paul Kehrer | 0317b04 | 2013-10-28 17:34:27 -0500 | [diff] [blame] | 71 | |
| 72 | :return bytes: The message digest as bytes. |
David Reid | 2cce618 | 2013-11-13 13:49:41 -0800 | [diff] [blame] | 73 | :raises cryptography.exceptions.AlreadyFinalized: |
Julian Krause | 2288e30 | 2013-12-17 21:26:23 -0800 | [diff] [blame] | 74 | |
Julian Krause | c91fe6a | 2013-12-25 11:00:49 -0800 | [diff] [blame] | 75 | .. method:: verify(signature) |
Julian Krause | 2288e30 | 2013-12-17 21:26:23 -0800 | [diff] [blame] | 76 | |
Alex Gaynor | 1225270 | 2014-01-02 11:10:35 -0800 | [diff] [blame] | 77 | Finalize the current context and securely compare digest to |
| 78 | ``signature``. |
Julian Krause | 2288e30 | 2013-12-17 21:26:23 -0800 | [diff] [blame] | 79 | |
Alex Gaynor | 1225270 | 2014-01-02 11:10:35 -0800 | [diff] [blame] | 80 | :param bytes signature: The bytes to compare the current digest |
| 81 | against. |
Julian Krause | 2288e30 | 2013-12-17 21:26:23 -0800 | [diff] [blame] | 82 | :raises cryptography.exceptions.AlreadyFinalized: See :meth:`finalize` |
Alex Gaynor | 1225270 | 2014-01-02 11:10:35 -0800 | [diff] [blame] | 83 | :raises cryptography.exceptions.InvalidSignature: If signature does not |
| 84 | match digest |