Thanks to visit codestin.com
Credit goes to lib.rs

#hash #mac

no-std hmac

Generic implementation of Hash-based Message Authentication Code (HMAC)

20 releases

Uses new Rust 2024

0.13.0-rc.2 Sep 16, 2025
0.13.0-rc.0 May 29, 2025
0.13.0-pre.5 Mar 7, 2025
0.13.0-pre.4 Jul 26, 2024
0.0.1 Oct 21, 2016

#540 in Cryptography

Codestin Search App Codestin Search App Codestin Search App Codestin Search App Codestin Search App Codestin Search App Codestin Search App Codestin Search App Codestin Search App Codestin Search App Codestin Search App Codestin Search App Codestin Search App Codestin Search App Codestin Search App Codestin Search App Codestin Search App

11,755,802 downloads per month
Used in 13,519 crates (1,274 directly)

MIT/Apache

45KB
359 lines

RustCrypto: HMAC

crate Docs Build Status Apache2/MIT licensed Rust Version Project Chat

Generic implementation of Hash-based Message Authentication Code (HMAC).

To use it you will need a cryptographic hash function implementation which implements the digest crate traits. You can find compatible crates (e.g. sha2) in the RustCrypto/hashes repository.

This crate provides four HMAC implementations: Hmac, HmacReset, SimpleHmac, and SimpleHmacReset.

The first two types are buffered wrappers around block-level block_api::HmacCore and block_api::HmacResetCore types respectively. Internally they uses efficient state representation, but work only with hash functions which expose block-level API and consume blocks eagerly (e.g. they will not work with the BLAKE2 family of hash functions).

On the other hand, SimpleHmac and SimpleHmacReset are a bit less efficient, but work with all hash functions which implement the Digest trait.

Hmac and SimpleHmac do not support resetting MAC state (i.e. they do not implement the Reset and FixedOutputReset traits). Use HmacReset or SimpleHmacReset if you want to reuse MAC state.

Examples

Let us demonstrate how to use HMAC using the SHA-256 hash function implemented in the sha2 crate.

In the following examples Hmac is interchangeable with SimpleHmac.

To get authentication code:

use sha2::Sha256;
use hmac::{Hmac, KeyInit, Mac};
use hex_literal::hex;

// Create alias for HMAC-SHA256
type HmacSha256 = Hmac<Sha256>;

let mut mac = HmacSha256::new_from_slice(b"my secret and secure key")
    .expect("HMAC can take key of any size");
mac.update(b"input message");

// `result` has type `CtOutput` which is a thin wrapper around array of
// bytes for providing constant time equality check
let result = mac.finalize();
// To get underlying array use `into_bytes`, but be careful, since
// incorrect use of the code value may permit timing attacks which defeats
// the security provided by the `CtOutput`
let code_bytes = result.into_bytes();
let expected = hex!("
    97d2a569059bbcd8ead4444ff99071f4
    c01d005bcefe0d3567e1be628e5fdcd9
");
assert_eq!(code_bytes[..], expected[..]);

To verify the message:

use sha2::Sha256;
use hmac::{Hmac, KeyInit, Mac};
use hex_literal::hex;

type HmacSha256 = Hmac<Sha256>;

let mut mac = HmacSha256::new_from_slice(b"my secret and secure key")
    .expect("HMAC can take key of any size");

mac.update(b"input message");

let code_bytes = hex!("
    97d2a569059bbcd8ead4444ff99071f4
    c01d005bcefe0d3567e1be628e5fdcd9
");
// `verify_slice` will return `Ok(())` if code is correct, `Err(MacError)` otherwise
mac.verify_slice(&code_bytes[..]).unwrap();

Block and input sizes

Usually it is assumed that block size is larger than output size. Due to the generic nature of the implementation, we must handle cases when this assumption does not hold. This is done by truncating hash output to the hash block size if needed.

License

Licensed under either of:

at your option.

Contribution

Unless you explicitly state otherwise, any contribution intentionally submitted for inclusion in the work by you, as defined in the Apache-2.0 license, shall be dual licensed as above, without any additional terms or conditions.

Dependencies

~665KB
~17K SLoC