Alex Gaynor | af82d5e | 2013-10-29 17:07:24 -0700 | [diff] [blame] | 1 | .. hazmat:: |
Paul Kehrer | 0317b04 | 2013-10-28 17:34:27 -0500 | [diff] [blame] | 2 | |
| 3 | Hash-based Message Authentication Codes |
| 4 | ======================================= |
| 5 | |
Alex Gaynor | 4658ce1 | 2013-10-29 15:26:50 -0700 | [diff] [blame] | 6 | .. currentmodule:: cryptography.hazmat.primitives.hmac |
| 7 | |
Paul Kehrer | 0317b04 | 2013-10-28 17:34:27 -0500 | [diff] [blame] | 8 | .. testsetup:: |
| 9 | |
| 10 | import binascii |
| 11 | key = binascii.unhexlify(b"0" * 32) |
| 12 | |
| 13 | Hash-based message authentication codes (or HMACs) are a tool for calculating |
| 14 | message authentication codes using a cryptographic hash function coupled with a |
| 15 | secret key. You can use an HMAC to verify integrity as well as authenticate a |
| 16 | message. |
| 17 | |
David Reid | ef0fcf2 | 2013-11-06 11:12:45 -0800 | [diff] [blame] | 18 | .. class:: HMAC(key, algorithm, backend) |
Paul Kehrer | 0317b04 | 2013-10-28 17:34:27 -0500 | [diff] [blame] | 19 | |
David Reid | 6753e39 | 2013-11-01 15:32:03 -0700 | [diff] [blame] | 20 | HMAC objects take a ``key`` and a provider of |
| 21 | :class:`~cryptography.hazmat.primitives.interfaces.HashAlgorithm`. |
Paul Kehrer | 50a8815 | 2013-10-29 10:46:05 -0500 | [diff] [blame] | 22 | The ``key`` should be randomly generated bytes and is recommended to be |
| 23 | equal in length to the ``digest_size`` of the hash function chosen. |
| 24 | You must keep the ``key`` secret. |
Paul Kehrer | 0317b04 | 2013-10-28 17:34:27 -0500 | [diff] [blame] | 25 | |
Alex Gaynor | 58ecc8d | 2013-11-03 21:21:00 -0800 | [diff] [blame] | 26 | This is an implementation of :rfc:`2104`. |
| 27 | |
Paul Kehrer | 0317b04 | 2013-10-28 17:34:27 -0500 | [diff] [blame] | 28 | .. doctest:: |
| 29 | |
David Reid | ef0fcf2 | 2013-11-06 11:12:45 -0800 | [diff] [blame] | 30 | >>> from cryptography.hazmat.bindings import default_backend |
Paul Kehrer | bf8962a | 2013-10-28 17:44:42 -0500 | [diff] [blame] | 31 | >>> from cryptography.hazmat.primitives import hashes, hmac |
David Reid | 63fa19a | 2013-11-20 10:49:13 -0800 | [diff] [blame] | 32 | >>> h = hmac.HMAC(key, hashes.SHA256(), backend=default_backend()) |
Paul Kehrer | 0317b04 | 2013-10-28 17:34:27 -0500 | [diff] [blame] | 33 | >>> h.update(b"message to hash") |
David Reid | 6753e39 | 2013-11-01 15:32:03 -0700 | [diff] [blame] | 34 | >>> h.finalize() |
| 35 | '#F\xdaI\x8b"e\xc4\xf1\xbb\x9a\x8fc\xff\xf5\xdex.\xbc\xcd/+\x8a\x86\x1d\x84\'\xc3\xa6\x1d\xd8J' |
Paul Kehrer | 0317b04 | 2013-10-28 17:34:27 -0500 | [diff] [blame] | 36 | |
David Reid | 663295d | 2013-11-20 13:55:08 -0800 | [diff] [blame^] | 37 | |
| 38 | :param key: Secret key as ``bytes``. |
| 39 | :param algorithm: A |
| 40 | :class:`~cryptography.hazmat.primitives.interfaces.HashAlgorithm` |
| 41 | provider such as those described in |
| 42 | :ref:`Cryptographic Hashes <cryptographic-hash-algorithms>`. |
| 43 | :param backend: A |
| 44 | :class:`~cryptography.hazmat.bindings.interfaces.HMACBackend` |
| 45 | provider. |
| 46 | |
Paul Kehrer | 2824ab7 | 2013-10-28 11:06:55 -0500 | [diff] [blame] | 47 | .. method:: update(msg) |
Paul Kehrer | 0317b04 | 2013-10-28 17:34:27 -0500 | [diff] [blame] | 48 | |
Paul Kehrer | 50a8815 | 2013-10-29 10:46:05 -0500 | [diff] [blame] | 49 | :param bytes msg: The bytes to hash and authenticate. |
David Reid | 2cce618 | 2013-11-13 13:49:41 -0800 | [diff] [blame] | 50 | :raises cryptography.exceptions.AlreadyFinalized: See :meth:`finalize` |
Paul Kehrer | 0317b04 | 2013-10-28 17:34:27 -0500 | [diff] [blame] | 51 | |
| 52 | .. method:: copy() |
| 53 | |
David Reid | 2cce618 | 2013-11-13 13:49:41 -0800 | [diff] [blame] | 54 | Copy this :class:`HMAC` instance, usually so that we may call |
| 55 | :meth:`finalize` and get an intermediate digest value while we continue |
| 56 | to call :meth:`update` on the original. |
| 57 | |
| 58 | :return: A new instance of :class:`HMAC` which can be updated |
| 59 | and finalized independently of the original instance. |
| 60 | :raises cryptography.exceptions.AlreadyFinalized: See :meth:`finalize` |
Paul Kehrer | 0317b04 | 2013-10-28 17:34:27 -0500 | [diff] [blame] | 61 | |
David Reid | 6753e39 | 2013-11-01 15:32:03 -0700 | [diff] [blame] | 62 | .. method:: finalize() |
| 63 | |
| 64 | Finalize the current context and return the message digest as bytes. |
| 65 | |
David Reid | 2cce618 | 2013-11-13 13:49:41 -0800 | [diff] [blame] | 66 | Once ``finalize`` is called this object can no longer be used and |
| 67 | :meth:`update`, :meth:`copy`, and :meth:`finalize` will raise |
| 68 | :class:`~cryptography.exceptions.AlreadyFinalized`. |
Paul Kehrer | 0317b04 | 2013-10-28 17:34:27 -0500 | [diff] [blame] | 69 | |
| 70 | :return bytes: The message digest as bytes. |
David Reid | 2cce618 | 2013-11-13 13:49:41 -0800 | [diff] [blame] | 71 | :raises cryptography.exceptions.AlreadyFinalized: |