[−][src]Struct ring::hmac::SigningKey
A key to use for HMAC signing.
Methods
impl SigningKey[src]
pub fn generate(
digest_alg: &'static Algorithm,
rng: &dyn SecureRandom
) -> Result<SigningKey, Unspecified>[src]
digest_alg: &'static Algorithm,
rng: &dyn SecureRandom
) -> Result<SigningKey, Unspecified>
Generate an HMAC signing key using the given digest algorithm with a
random value generated from rng.
The key will be recommended_key_len(digest_alg) bytes long.
pub fn generate_serializable(
digest_alg: &'static Algorithm,
rng: &dyn SecureRandom,
key_bytes: &mut [u8]
) -> Result<SigningKey, Unspecified>[src]
digest_alg: &'static Algorithm,
rng: &dyn SecureRandom,
key_bytes: &mut [u8]
) -> Result<SigningKey, Unspecified>
Generate an HMAC signing key using the given digest algorithm with a
random value generated from rng, and puts the raw key value in
key_bytes.
The key will be recommended_key_len(digest_alg) bytes long. The raw
value of the random key is put in key_bytes so that it can be
serialized for later use, so key_bytes must be exactly
recommended_key_len(digest_alg). This serialized value can be
deserialized with SigningKey::new().
pub fn new(digest_alg: &'static Algorithm, key_value: &[u8]) -> SigningKey[src]
Construct an HMAC signing key using the given digest algorithm and key value.
key_value should be a value generated using a secure random number
generator (e.g. the key_value output by
SealingKey::generate_serializable()) or derived from a random key by
a key derivation function (e.g. ring::hkdf). In particular,
key_value shouldn't be a password.
As specified in RFC 2104, if key_value is shorter than the digest
algorithm's block length (as returned by digest::Algorithm::block_len,
not the digest length returned by digest::Algorithm::output_len) then
it will be padded with zeros. Similarly, if it is longer than the block
length then it will be compressed using the digest algorithm.
You should not use keys larger than the digest_alg.block_len because
the truncation described above reduces their strength to only
digest_alg.output_len * 8 bits. Support for such keys is likely to be
removed in a future version of ring.
pub fn digest_algorithm(&self) -> &'static Algorithm[src]
The digest algorithm for the key.
Trait Implementations
Auto Trait Implementations
impl Unpin for SigningKey
impl Sync for SigningKey
impl Send for SigningKey
impl RefUnwindSafe for SigningKey
impl UnwindSafe for SigningKey
Blanket Implementations
impl<T> From<T> for T[src]
impl<T, U> Into<U> for T where
U: From<T>, [src]
U: From<T>,
impl<T, U> TryFrom<U> for T where
U: Into<T>, [src]
U: Into<T>,
type Error = Infallible
The type returned in the event of a conversion error.
fn try_from(value: U) -> Result<T, <T as TryFrom<U>>::Error>[src]
impl<T, U> TryInto<U> for T where
U: TryFrom<T>, [src]
U: TryFrom<T>,
type Error = <U as TryFrom<T>>::Error
The type returned in the event of a conversion error.
fn try_into(self) -> Result<U, <U as TryFrom<T>>::Error>[src]
impl<T> Borrow<T> for T where
T: ?Sized, [src]
T: ?Sized,
impl<T> BorrowMut<T> for T where
T: ?Sized, [src]
T: ?Sized,
fn borrow_mut(&mut self) -> &mut T[src]
impl<T> Any for T where
T: 'static + ?Sized, [src]
T: 'static + ?Sized,