.. hazmat:: Backend Interfaces ================== .. currentmodule:: cryptography.hazmat.backends.interfaces Backend implementations may provide a number of interfaces to support operations such as :doc:`/hazmat/primitives/symmetric-encryption`, :doc:`/hazmat/primitives/cryptographic-hashes`, and :doc:`/hazmat/primitives/hmac`. A specific ``backend`` may provide one or more of these interfaces. .. class:: CipherBackend A backend that provides methods for using ciphers for encryption and decryption. The following backends implement this interface: * :doc:`/hazmat/backends/openssl` * :doc:`/hazmat/backends/commoncrypto` .. method:: cipher_supported(cipher, mode) Check if a ``cipher`` and ``mode`` combination is supported by this backend. :param cipher: An instance of a :class:`~cryptography.hazmat.primitives.interfaces.CipherAlgorithm` provider. :param mode: An instance of a :class:`~cryptography.hazmat.primitives.interfaces.Mode` provider. :returns: ``True`` if the specified ``cipher`` and ``mode`` combination is supported by this backend, otherwise ``False`` .. method:: create_symmetric_encryption_ctx(cipher, mode) Create a :class:`~cryptography.hazmat.primitives.interfaces.CipherContext` that can be used for encrypting data with the symmetric ``cipher`` using the given ``mode``. :param cipher: An instance of a :class:`~cryptography.hazmat.primitives.interfaces.CipherAlgorithm` provider. :param mode: An instance of a :class:`~cryptography.hazmat.primitives.interfaces.Mode` provider. :returns: :class:`~cryptography.hazmat.primitives.interfaces.CipherContext` :raises ValueError: When tag is not None in an AEAD mode .. method:: create_symmetric_decryption_ctx(cipher, mode) Create a :class:`~cryptography.hazmat.primitives.interfaces.CipherContext` that can be used for decrypting data with the symmetric ``cipher`` using the given ``mode``. :param cipher: An instance of a :class:`~cryptography.hazmat.primitives.interfaces.CipherAlgorithm` provider. :param mode: An instance of a :class:`~cryptography.hazmat.primitives.interfaces.Mode` provider. :returns: :class:`~cryptography.hazmat.primitives.interfaces.CipherContext` :raises ValueError: When tag is None in an AEAD mode .. class:: HashBackend A backend with methods for using cryptographic hash functions. The following backends implement this interface: * :doc:`/hazmat/backends/openssl` * :doc:`/hazmat/backends/commoncrypto` .. method:: hash_supported(algorithm) Check if the specified ``algorithm`` is supported by this backend. :param algorithm: An instance of a :class:`~cryptography.hazmat.primitives.interfaces.HashAlgorithm` provider. :returns: ``True`` if the specified ``algorithm`` is supported by this backend, otherwise ``False``. .. method:: create_hash_ctx(algorithm) Create a :class:`~cryptography.hazmat.primitives.interfaces.HashContext` that uses the specified ``algorithm`` to calculate a message digest. :param algorithm: An instance of a :class:`~cryptography.hazmat.primitives.interfaces.HashAlgorithm` provider. :returns: :class:`~cryptography.hazmat.primitives.interfaces.HashContext` .. class:: HMACBackend A backend with methods for using cryptographic hash functions as message authentication codes. The following backends implement this interface: * :doc:`/hazmat/backends/openssl` * :doc:`/hazmat/backends/commoncrypto` .. method:: hmac_supported(algorithm) Check if the specified ``algorithm`` is supported by this backend. :param algorithm: An instance of a :class:`~cryptography.hazmat.primitives.interfaces.HashAlgorithm` provider. :returns: ``True`` if the specified ``algorithm`` is supported for HMAC by this backend, otherwise ``False``. .. method:: create_hmac_ctx(algorithm) Create a :class:`~cryptography.hazmat.primitives.interfaces.HashContext` that uses the specified ``algorithm`` to calculate a hash-based message authentication code. :param algorithm: An instance of a :class:`~cryptography.hazmat.primitives.interfaces.HashAlgorithm` provider. :returns: :class:`~cryptography.hazmat.primitives.interfaces.HashContext` .. class:: PBKDF2HMACBackend .. versionadded:: 0.2 A backend with methods for using PBKDF2 using HMAC as a PRF. The following backends implement this interface: * :doc:`/hazmat/backends/openssl` * :doc:`/hazmat/backends/commoncrypto` .. method:: pbkdf2_hmac_supported(algorithm) Check if the specified ``algorithm`` is supported by this backend. :param algorithm: An instance of a :class:`~cryptography.hazmat.primitives.interfaces.HashAlgorithm` provider. :returns: ``True`` if the specified ``algorithm`` is supported for PBKDF2 HMAC by this backend, otherwise ``False``. .. method:: derive_pbkdf2_hmac(self, algorithm, length, salt, iterations, key_material) :param algorithm: An instance of a :class:`~cryptography.hazmat.primitives.interfaces.HashAlgorithm` provider. :param int length: The desired length of the derived key. Maximum is (2\ :sup:`32` - 1) * ``algorithm.digest_size`` :param bytes salt: A salt. :param int iterations: The number of iterations to perform of the hash function. This can be used to control the length of time the operation takes. Higher numbers help mitigate brute force attacks against derived keys. :param bytes key_material: The key material to use as a basis for the derived key. This is typically a password. :return bytes: Derived key. .. class:: RSABackend .. versionadded:: 0.2 A backend with methods for using RSA. .. method:: generate_rsa_private_key(public_exponent, key_size) :param int public_exponent: The public exponent of the new key. Often one of the small Fermat primes 3, 5, 17, 257 or 65537. :param int key_size: The length in bits of the modulus. Should be at least 2048. :return: A new instance of a :class:`~cryptography.hazmat.primitives.interfaces.RSAPrivateKey` provider. :raises ValueError: If the public_exponent is not valid. .. method:: create_rsa_signature_ctx(private_key, padding, algorithm) :param private_key: An instance of an :class:`~cryptography.hazmat.primitives.interfaces.RSAPrivateKey` provider. :param padding: An instance of an :class:`~cryptography.hazmat.primitives.interfaces.AsymmetricPadding` provider. :param algorithm: An instance of a :class:`~cryptography.hazmat.primitives.interfaces.HashAlgorithm` provider. :returns: :class:`~cryptography.hazmat.primitives.interfaces.AsymmetricSignatureContext` .. method:: create_rsa_verification_ctx(public_key, signature, padding, algorithm) :param public_key: An instance of a :class:`~cryptography.hazmat.primitives.interfaces.RSAPublicKey` provider. :param bytes signature: The signature to verify. :param padding: An instance of an :class:`~cryptography.hazmat.primitives.interfaces.AsymmetricPadding` provider. :param algorithm: An instance of a :class:`~cryptography.hazmat.primitives.interfaces.HashAlgorithm` provider. :returns: :class:`~cryptography.hazmat.primitives.interfaces.AsymmetricVerificationContext` .. class:: OpenSSLSerializationBackend .. versionadded:: 0.3 A backend with methods for working with OpenSSL's "traditional" PKCS #1 style key serialization. .. method:: load_openssl_pem_private_key(data, password) :param bytes data: PEM data to deserialize. :param bytes password: The password to use if this data is encrypted. Should be None if the data is not encrypted. :return: A new instance of :class:`~cryptography.hazmat.primitives.serialization.OpenSSLPrivateKey` :raises ValueError: If the data could not be deserialized correctly. :raises cryptography.exceptions.UnsupportedAlgorithm: If the data is encrypted with an unsupported algorithm.