blob: 97b86fc42b169bb9ec26859c46520940617dd300 [file] [log] [blame]
Antonio de Angelis8bb98512024-01-16 14:13:36 +00001/**
2 * \file cmac.h
3 *
4 * \brief This file contains CMAC definitions and functions.
5 *
6 * The Cipher-based Message Authentication Code (CMAC) Mode for
7 * Authentication is defined in <em>RFC-4493: The AES-CMAC Algorithm</em>.
8 * It is supported with AES and DES.
9 */
10/*
11 * Copyright The Mbed TLS Contributors
12 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
13 */
14
15#ifndef MBEDTLS_CMAC_H
16#define MBEDTLS_CMAC_H
17#include "mbedtls/private_access.h"
18
19#include "mbedtls/build_info.h"
20
21#include "mbedtls/cipher.h"
22
23#ifdef __cplusplus
24extern "C" {
25#endif
26
27#define MBEDTLS_AES_BLOCK_SIZE 16
28#define MBEDTLS_DES3_BLOCK_SIZE 8
29
30/* We don't support Camellia or ARIA in this module */
31#if defined(MBEDTLS_AES_C)
32#define MBEDTLS_CMAC_MAX_BLOCK_SIZE 16 /**< The longest block used by CMAC is that of AES. */
33#else
34#define MBEDTLS_CMAC_MAX_BLOCK_SIZE 8 /**< The longest block used by CMAC is that of 3DES. */
35#endif
36
37#if !defined(MBEDTLS_DEPRECATED_REMOVED)
38/** The longest block supported by the cipher module.
39 *
40 * \deprecated
41 * For the maximum block size of a cipher supported by the CMAC module,
42 * use #MBEDTLS_CMAC_MAX_BLOCK_SIZE.
43 * For the maximum block size of a cipher supported by the cipher module,
44 * use #MBEDTLS_MAX_BLOCK_LENGTH.
45 */
46/* Before Mbed TLS 3.5, this was the maximum block size supported by the CMAC
47 * module, so it didn't take Camellia or ARIA into account. Since the name
48 * of the macro doesn't even convey "CMAC", this was misleading. Now the size
49 * is sufficient for any cipher, but the name is defined in cmac.h for
50 * backward compatibility. */
51#define MBEDTLS_CIPHER_BLKSIZE_MAX MBEDTLS_MAX_BLOCK_LENGTH
52#endif /* MBEDTLS_DEPRECATED_REMOVED */
53
54#if !defined(MBEDTLS_CMAC_ALT)
55
56/**
57 * The CMAC context structure.
58 */
59struct mbedtls_cmac_context_t {
60 /** The internal state of the CMAC algorithm. */
61 unsigned char MBEDTLS_PRIVATE(state)[MBEDTLS_CMAC_MAX_BLOCK_SIZE];
62
63 /** Unprocessed data - either data that was not block aligned and is still
64 * pending processing, or the final block. */
65 unsigned char MBEDTLS_PRIVATE(unprocessed_block)[MBEDTLS_CMAC_MAX_BLOCK_SIZE];
66
67 /** The length of data pending processing. */
68 size_t MBEDTLS_PRIVATE(unprocessed_len);
69};
70
71#else /* !MBEDTLS_CMAC_ALT */
72#include "cmac_alt.h"
73#endif /* !MBEDTLS_CMAC_ALT */
74
75/**
76 * \brief This function starts a new CMAC computation
77 * by setting the CMAC key, and preparing to authenticate
78 * the input data.
79 * It must be called with an initialized cipher context.
80 *
81 * Once this function has completed, data can be supplied
82 * to the CMAC computation by calling
83 * mbedtls_cipher_cmac_update().
84 *
85 * To start a CMAC computation using the same key as a previous
86 * CMAC computation, use mbedtls_cipher_cmac_finish().
87 *
88 * \note When the CMAC implementation is supplied by an alternate
89 * implementation (through #MBEDTLS_CMAC_ALT), some ciphers
90 * may not be supported by that implementation, and thus
91 * return an error. Alternate implementations must support
92 * AES-128 and AES-256, and may support AES-192 and 3DES.
93 *
94 * \param ctx The cipher context used for the CMAC operation, initialized
95 * as one of the following types: MBEDTLS_CIPHER_AES_128_ECB,
96 * MBEDTLS_CIPHER_AES_192_ECB, MBEDTLS_CIPHER_AES_256_ECB,
97 * or MBEDTLS_CIPHER_DES_EDE3_ECB.
98 * \param key The CMAC key.
99 * \param keybits The length of the CMAC key in bits.
100 * Must be supported by the cipher.
101 *
102 * \return \c 0 on success.
103 * \return A cipher-specific error code on failure.
104 */
105int mbedtls_cipher_cmac_starts(mbedtls_cipher_context_t *ctx,
106 const unsigned char *key, size_t keybits);
107
108/**
109 * \brief This function feeds an input buffer into an ongoing CMAC
110 * computation.
111 *
112 * The CMAC computation must have previously been started
113 * by calling mbedtls_cipher_cmac_starts() or
114 * mbedtls_cipher_cmac_reset().
115 *
116 * Call this function as many times as needed to input the
117 * data to be authenticated.
118 * Once all of the required data has been input,
119 * call mbedtls_cipher_cmac_finish() to obtain the result
120 * of the CMAC operation.
121 *
122 * \param ctx The cipher context used for the CMAC operation.
123 * \param input The buffer holding the input data.
124 * \param ilen The length of the input data.
125 *
126 * \return \c 0 on success.
127 * \return #MBEDTLS_ERR_MD_BAD_INPUT_DATA
128 * if parameter verification fails.
129 */
130int mbedtls_cipher_cmac_update(mbedtls_cipher_context_t *ctx,
131 const unsigned char *input, size_t ilen);
132
133/**
134 * \brief This function finishes an ongoing CMAC operation, and
135 * writes the result to the output buffer.
136 *
137 * It should be followed either by
138 * mbedtls_cipher_cmac_reset(), which starts another CMAC
139 * operation with the same key, or mbedtls_cipher_free(),
140 * which clears the cipher context.
141 *
142 * \param ctx The cipher context used for the CMAC operation.
143 * \param output The output buffer for the CMAC checksum result.
144 *
145 * \return \c 0 on success.
146 * \return #MBEDTLS_ERR_MD_BAD_INPUT_DATA
147 * if parameter verification fails.
148 */
149int mbedtls_cipher_cmac_finish(mbedtls_cipher_context_t *ctx,
150 unsigned char *output);
151
152/**
153 * \brief This function starts a new CMAC operation with the same
154 * key as the previous one.
155 *
156 * It should be called after finishing the previous CMAC
157 * operation with mbedtls_cipher_cmac_finish().
158 * After calling this function,
159 * call mbedtls_cipher_cmac_update() to supply the new
160 * CMAC operation with data.
161 *
162 * \param ctx The cipher context used for the CMAC operation.
163 *
164 * \return \c 0 on success.
165 * \return #MBEDTLS_ERR_MD_BAD_INPUT_DATA
166 * if parameter verification fails.
167 */
168int mbedtls_cipher_cmac_reset(mbedtls_cipher_context_t *ctx);
169
170/**
171 * \brief This function calculates the full generic CMAC
172 * on the input buffer with the provided key.
173 *
174 * The function allocates the context, performs the
175 * calculation, and frees the context.
176 *
177 * The CMAC result is calculated as
178 * output = generic CMAC(cmac key, input buffer).
179 *
180 * \note When the CMAC implementation is supplied by an alternate
181 * implementation (through #MBEDTLS_CMAC_ALT), some ciphers
182 * may not be supported by that implementation, and thus
183 * return an error. Alternate implementations must support
184 * AES-128 and AES-256, and may support AES-192 and 3DES.
185 *
186 * \param cipher_info The cipher information.
187 * \param key The CMAC key.
188 * \param keylen The length of the CMAC key in bits.
189 * \param input The buffer holding the input data.
190 * \param ilen The length of the input data.
191 * \param output The buffer for the generic CMAC result.
192 *
193 * \return \c 0 on success.
194 * \return #MBEDTLS_ERR_MD_BAD_INPUT_DATA
195 * if parameter verification fails.
196 */
197int mbedtls_cipher_cmac(const mbedtls_cipher_info_t *cipher_info,
198 const unsigned char *key, size_t keylen,
199 const unsigned char *input, size_t ilen,
200 unsigned char *output);
201
202#if defined(MBEDTLS_AES_C)
203/**
204 * \brief This function implements the AES-CMAC-PRF-128 pseudorandom
205 * function, as defined in
206 * <em>RFC-4615: The Advanced Encryption Standard-Cipher-based
207 * Message Authentication Code-Pseudo-Random Function-128
208 * (AES-CMAC-PRF-128) Algorithm for the Internet Key
209 * Exchange Protocol (IKE).</em>
210 *
211 * \param key The key to use.
212 * \param key_len The key length in Bytes.
213 * \param input The buffer holding the input data.
214 * \param in_len The length of the input data in Bytes.
215 * \param output The buffer holding the generated 16 Bytes of
216 * pseudorandom output.
217 *
218 * \return \c 0 on success.
219 */
220int mbedtls_aes_cmac_prf_128(const unsigned char *key, size_t key_len,
221 const unsigned char *input, size_t in_len,
222 unsigned char output[16]);
223#endif /* MBEDTLS_AES_C */
224
225#if defined(MBEDTLS_SELF_TEST) && (defined(MBEDTLS_AES_C) || defined(MBEDTLS_DES_C))
226/**
227 * \brief The CMAC checkup routine.
228 *
229 * \note In case the CMAC routines are provided by an alternative
230 * implementation (i.e. #MBEDTLS_CMAC_ALT is defined), the
231 * checkup routine will succeed even if the implementation does
232 * not support the less widely used AES-192 or 3DES primitives.
233 * The self-test requires at least AES-128 and AES-256 to be
234 * supported by the underlying implementation.
235 *
236 * \return \c 0 on success.
237 * \return \c 1 on failure.
238 */
239int mbedtls_cmac_self_test(int verbose);
240#endif /* MBEDTLS_SELF_TEST && ( MBEDTLS_AES_C || MBEDTLS_DES_C ) */
241
242#ifdef __cplusplus
243}
244#endif
245
246#endif /* MBEDTLS_CMAC_H */