diff options
author | Alex Gaynor <alex.gaynor@gmail.com> | 2013-10-29 10:53:57 -0700 |
---|---|---|
committer | Alex Gaynor <alex.gaynor@gmail.com> | 2013-10-29 10:53:57 -0700 |
commit | 89546af52b8f8a6fc2fba520377906b4010c9037 (patch) | |
tree | 5bb161d84c93e16db187b18f5d60e651198f7185 /docs/hazmat/primitives | |
parent | 3944a8ce014f9f665a2300e1fa994b872cffa92b (diff) | |
parent | a9d9922f82d4e7b940679c4b548a4b14d0958ed9 (diff) | |
download | cryptography-89546af52b8f8a6fc2fba520377906b4010c9037.tar.gz cryptography-89546af52b8f8a6fc2fba520377906b4010c9037.tar.bz2 cryptography-89546af52b8f8a6fc2fba520377906b4010c9037.zip |
Merge branch 'master' into pkcs7-padding
Diffstat (limited to 'docs/hazmat/primitives')
-rw-r--r-- | docs/hazmat/primitives/hmac.rst | 52 | ||||
-rw-r--r-- | docs/hazmat/primitives/index.rst | 1 |
2 files changed, 53 insertions, 0 deletions
diff --git a/docs/hazmat/primitives/hmac.rst b/docs/hazmat/primitives/hmac.rst new file mode 100644 index 00000000..bfbe3255 --- /dev/null +++ b/docs/hazmat/primitives/hmac.rst @@ -0,0 +1,52 @@ +.. danger:: + + This is a "Hazardous Materials" module. You should **ONLY** use it if + you're 100% absolutely sure that you know what you're doing because this + module is full of land mines, dragons, and dinosaurs with laser guns. + + +Hash-based Message Authentication Codes +======================================= + +.. testsetup:: + + import binascii + key = binascii.unhexlify(b"0" * 32) + +Hash-based message authentication codes (or HMACs) are a tool for calculating +message authentication codes using a cryptographic hash function coupled with a +secret key. You can use an HMAC to verify integrity as well as authenticate a +message. + +.. class:: cryptography.hazmat.primitives.hmac.HMAC(key, msg=None, digestmod=None) + + HMAC objects take a ``key``, a hash class derived from + :class:`~cryptography.primitives.hashes.BaseHash`, and optional message. + The ``key`` should be randomly generated bytes and is recommended to be + equal in length to the ``digest_size`` of the hash function chosen. + You must keep the ``key`` secret. + + .. doctest:: + + >>> from cryptography.hazmat.primitives import hashes, hmac + >>> h = hmac.HMAC(key, digestmod=hashes.SHA256) + >>> h.update(b"message to hash") + >>> h.hexdigest() + '...' + + .. method:: update(msg) + + :param bytes msg: The bytes to hash and authenticate. + + .. method:: copy() + + :return: a new instance of this object with a copied internal state. + + .. method:: digest() + + :return bytes: The message digest as bytes. + + .. method:: hexdigest() + + :return str: The message digest as hex. + diff --git a/docs/hazmat/primitives/index.rst b/docs/hazmat/primitives/index.rst index 6ae769a6..3927f3f0 100644 --- a/docs/hazmat/primitives/index.rst +++ b/docs/hazmat/primitives/index.rst @@ -12,4 +12,5 @@ Primitives :maxdepth: 1 cryptographic-hashes + hmac symmetric-encryption |