blob: 1da57c921bf71996d26da7f44c0168e06e7a08ae [file] [log] [blame]
Antonio de Angelis8bb98512024-01-16 14:13:36 +00001/**
2 * \file ccm.h
3 *
4 * \brief This file provides an API for the CCM authenticated encryption
5 * mode for block ciphers.
6 *
7 * CCM combines Counter mode encryption with CBC-MAC authentication
8 * for 128-bit block ciphers.
9 *
10 * Input to CCM includes the following elements:
11 * <ul><li>Payload - data that is both authenticated and encrypted.</li>
12 * <li>Associated data (Adata) - data that is authenticated but not
13 * encrypted, For example, a header.</li>
14 * <li>Nonce - A unique value that is assigned to the payload and the
15 * associated data.</li></ul>
16 *
17 * Definition of CCM:
18 * http://csrc.nist.gov/publications/nistpubs/800-38C/SP800-38C_updated-July20_2007.pdf
19 * RFC 3610 "Counter with CBC-MAC (CCM)"
20 *
21 * Related:
22 * RFC 5116 "An Interface and Algorithms for Authenticated Encryption"
23 *
24 * Definition of CCM*:
25 * IEEE 802.15.4 - IEEE Standard for Local and metropolitan area networks
26 * Integer representation is fixed most-significant-octet-first order and
27 * the representation of octets is most-significant-bit-first order. This is
28 * consistent with RFC 3610.
29 */
30/*
31 * Copyright The Mbed TLS Contributors
32 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
33 */
34
35#ifndef MBEDTLS_CCM_H
36#define MBEDTLS_CCM_H
37#include "mbedtls/private_access.h"
38
39#include "mbedtls/build_info.h"
40
41#include "mbedtls/cipher.h"
42
43#if defined(MBEDTLS_BLOCK_CIPHER_C)
44#include "mbedtls/block_cipher.h"
45#endif
46
47#define MBEDTLS_CCM_DECRYPT 0
48#define MBEDTLS_CCM_ENCRYPT 1
49#define MBEDTLS_CCM_STAR_DECRYPT 2
50#define MBEDTLS_CCM_STAR_ENCRYPT 3
51
52/** Bad input parameters to the function. */
53#define MBEDTLS_ERR_CCM_BAD_INPUT -0x000D
54/** Authenticated decryption failed. */
55#define MBEDTLS_ERR_CCM_AUTH_FAILED -0x000F
56
57#ifdef __cplusplus
58extern "C" {
59#endif
60
61#if !defined(MBEDTLS_CCM_ALT)
62// Regular implementation
63//
64
65/**
66 * \brief The CCM context-type definition. The CCM context is passed
67 * to the APIs called.
68 */
69typedef struct mbedtls_ccm_context {
70 unsigned char MBEDTLS_PRIVATE(y)[16]; /*!< The Y working buffer */
71 unsigned char MBEDTLS_PRIVATE(ctr)[16]; /*!< The counter buffer */
72 size_t MBEDTLS_PRIVATE(plaintext_len); /*!< Total plaintext length */
73 size_t MBEDTLS_PRIVATE(add_len); /*!< Total authentication data length */
74 size_t MBEDTLS_PRIVATE(tag_len); /*!< Total tag length */
75 size_t MBEDTLS_PRIVATE(processed); /*!< Track how many bytes of input data
76 were processed (chunked input).
77 Used independently for both auth data
78 and plaintext/ciphertext.
79 This variable is set to zero after
80 auth data input is finished. */
81 unsigned int MBEDTLS_PRIVATE(q); /*!< The Q working value */
82 unsigned int MBEDTLS_PRIVATE(mode); /*!< The operation to perform:
83 #MBEDTLS_CCM_ENCRYPT or
84 #MBEDTLS_CCM_DECRYPT or
85 #MBEDTLS_CCM_STAR_ENCRYPT or
86 #MBEDTLS_CCM_STAR_DECRYPT. */
87#if defined(MBEDTLS_BLOCK_CIPHER_C)
88 mbedtls_block_cipher_context_t MBEDTLS_PRIVATE(block_cipher_ctx); /*!< The cipher context used. */
89#else
90 mbedtls_cipher_context_t MBEDTLS_PRIVATE(cipher_ctx); /*!< The cipher context used. */
91#endif
92 int MBEDTLS_PRIVATE(state); /*!< Working value holding context's
93 state. Used for chunked data input */
94}
95mbedtls_ccm_context;
96
97#else /* MBEDTLS_CCM_ALT */
98#include "ccm_alt.h"
99#endif /* MBEDTLS_CCM_ALT */
100
101/**
102 * \brief This function initializes the specified CCM context,
103 * to make references valid, and prepare the context
104 * for mbedtls_ccm_setkey() or mbedtls_ccm_free().
105 *
106 * \param ctx The CCM context to initialize. This must not be \c NULL.
107 */
108void mbedtls_ccm_init(mbedtls_ccm_context *ctx);
109
110/**
111 * \brief This function initializes the CCM context set in the
112 * \p ctx parameter and sets the encryption key.
113 *
114 * \param ctx The CCM context to initialize. This must be an initialized
115 * context.
116 * \param cipher The 128-bit block cipher to use.
117 * \param key The encryption key. This must not be \c NULL.
118 * \param keybits The key size in bits. This must be acceptable by the cipher.
119 *
120 * \return \c 0 on success.
121 * \return A CCM or cipher-specific error code on failure.
122 */
123int mbedtls_ccm_setkey(mbedtls_ccm_context *ctx,
124 mbedtls_cipher_id_t cipher,
125 const unsigned char *key,
126 unsigned int keybits);
127
128/**
129 * \brief This function releases and clears the specified CCM context
130 * and underlying cipher sub-context.
131 *
132 * \param ctx The CCM context to clear. If this is \c NULL, the function
133 * has no effect. Otherwise, this must be initialized.
134 */
135void mbedtls_ccm_free(mbedtls_ccm_context *ctx);
136
137/**
138 * \brief This function encrypts a buffer using CCM.
139 *
140 * \note The tag is written to a separate buffer. To concatenate
141 * the \p tag with the \p output, as done in <em>RFC-3610:
142 * Counter with CBC-MAC (CCM)</em>, use
143 * \p tag = \p output + \p length, and make sure that the
144 * output buffer is at least \p length + \p tag_len wide.
145 *
146 * \param ctx The CCM context to use for encryption. This must be
147 * initialized and bound to a key.
148 * \param length The length of the input data in Bytes.
149 * \param iv The initialization vector (nonce). This must be a readable
150 * buffer of at least \p iv_len Bytes.
151 * \param iv_len The length of the nonce in Bytes: 7, 8, 9, 10, 11, 12,
152 * or 13. The length L of the message length field is
153 * 15 - \p iv_len.
154 * \param ad The additional data field. If \p ad_len is greater than
155 * zero, \p ad must be a readable buffer of at least that
156 * length.
157 * \param ad_len The length of additional data in Bytes.
158 * This must be less than `2^16 - 2^8`.
159 * \param input The buffer holding the input data. If \p length is greater
160 * than zero, \p input must be a readable buffer of at least
161 * that length.
162 * \param output The buffer holding the output data. If \p length is greater
163 * than zero, \p output must be a writable buffer of at least
164 * that length.
165 * \param tag The buffer holding the authentication field. This must be a
166 * writable buffer of at least \p tag_len Bytes.
167 * \param tag_len The length of the authentication field to generate in Bytes:
168 * 4, 6, 8, 10, 12, 14 or 16.
169 *
170 * \return \c 0 on success.
171 * \return A CCM or cipher-specific error code on failure.
172 */
173int mbedtls_ccm_encrypt_and_tag(mbedtls_ccm_context *ctx, size_t length,
174 const unsigned char *iv, size_t iv_len,
175 const unsigned char *ad, size_t ad_len,
176 const unsigned char *input, unsigned char *output,
177 unsigned char *tag, size_t tag_len);
178
179/**
180 * \brief This function encrypts a buffer using CCM*.
181 *
182 * \note The tag is written to a separate buffer. To concatenate
183 * the \p tag with the \p output, as done in <em>RFC-3610:
184 * Counter with CBC-MAC (CCM)</em>, use
185 * \p tag = \p output + \p length, and make sure that the
186 * output buffer is at least \p length + \p tag_len wide.
187 *
188 * \note When using this function in a variable tag length context,
189 * the tag length has to be encoded into the \p iv passed to
190 * this function.
191 *
192 * \param ctx The CCM context to use for encryption. This must be
193 * initialized and bound to a key.
194 * \param length The length of the input data in Bytes.
195 * For tag length = 0, input length is ignored.
196 * \param iv The initialization vector (nonce). This must be a readable
197 * buffer of at least \p iv_len Bytes.
198 * \param iv_len The length of the nonce in Bytes: 7, 8, 9, 10, 11, 12,
199 * or 13. The length L of the message length field is
200 * 15 - \p iv_len.
201 * \param ad The additional data field. This must be a readable buffer of
202 * at least \p ad_len Bytes.
203 * \param ad_len The length of additional data in Bytes.
204 * This must be less than 2^16 - 2^8.
205 * \param input The buffer holding the input data. If \p length is greater
206 * than zero, \p input must be a readable buffer of at least
207 * that length.
208 * \param output The buffer holding the output data. If \p length is greater
209 * than zero, \p output must be a writable buffer of at least
210 * that length.
211 * \param tag The buffer holding the authentication field. This must be a
212 * writable buffer of at least \p tag_len Bytes.
213 * \param tag_len The length of the authentication field to generate in Bytes:
214 * 0, 4, 6, 8, 10, 12, 14 or 16.
215 *
216 * \warning Passing \c 0 as \p tag_len means that the message is no
217 * longer authenticated.
218 *
219 * \return \c 0 on success.
220 * \return A CCM or cipher-specific error code on failure.
221 */
222int mbedtls_ccm_star_encrypt_and_tag(mbedtls_ccm_context *ctx, size_t length,
223 const unsigned char *iv, size_t iv_len,
224 const unsigned char *ad, size_t ad_len,
225 const unsigned char *input, unsigned char *output,
226 unsigned char *tag, size_t tag_len);
227
228/**
229 * \brief This function performs a CCM authenticated decryption of a
230 * buffer.
231 *
232 * \param ctx The CCM context to use for decryption. This must be
233 * initialized and bound to a key.
234 * \param length The length of the input data in Bytes.
235 * \param iv The initialization vector (nonce). This must be a readable
236 * buffer of at least \p iv_len Bytes.
237 * \param iv_len The length of the nonce in Bytes: 7, 8, 9, 10, 11, 12,
238 * or 13. The length L of the message length field is
239 * 15 - \p iv_len.
240 * \param ad The additional data field. This must be a readable buffer
241 * of at least that \p ad_len Bytes..
242 * \param ad_len The length of additional data in Bytes.
243 * This must be less than 2^16 - 2^8.
244 * \param input The buffer holding the input data. If \p length is greater
245 * than zero, \p input must be a readable buffer of at least
246 * that length.
247 * \param output The buffer holding the output data. If \p length is greater
248 * than zero, \p output must be a writable buffer of at least
249 * that length.
250 * \param tag The buffer holding the authentication field. This must be a
251 * readable buffer of at least \p tag_len Bytes.
252 * \param tag_len The length of the authentication field to generate in Bytes:
253 * 4, 6, 8, 10, 12, 14 or 16.
254 *
255 * \return \c 0 on success. This indicates that the message is authentic.
256 * \return #MBEDTLS_ERR_CCM_AUTH_FAILED if the tag does not match.
257 * \return A cipher-specific error code on calculation failure.
258 */
259int mbedtls_ccm_auth_decrypt(mbedtls_ccm_context *ctx, size_t length,
260 const unsigned char *iv, size_t iv_len,
261 const unsigned char *ad, size_t ad_len,
262 const unsigned char *input, unsigned char *output,
263 const unsigned char *tag, size_t tag_len);
264
265/**
266 * \brief This function performs a CCM* authenticated decryption of a
267 * buffer.
268 *
269 * \note When using this function in a variable tag length context,
270 * the tag length has to be decoded from \p iv and passed to
271 * this function as \p tag_len. (\p tag needs to be adjusted
272 * accordingly.)
273 *
274 * \param ctx The CCM context to use for decryption. This must be
275 * initialized and bound to a key.
276 * \param length The length of the input data in Bytes.
277 * For tag length = 0, input length is ignored.
278 * \param iv The initialization vector (nonce). This must be a readable
279 * buffer of at least \p iv_len Bytes.
280 * \param iv_len The length of the nonce in Bytes: 7, 8, 9, 10, 11, 12,
281 * or 13. The length L of the message length field is
282 * 15 - \p iv_len.
283 * \param ad The additional data field. This must be a readable buffer of
284 * at least that \p ad_len Bytes.
285 * \param ad_len The length of additional data in Bytes.
286 * This must be less than 2^16 - 2^8.
287 * \param input The buffer holding the input data. If \p length is greater
288 * than zero, \p input must be a readable buffer of at least
289 * that length.
290 * \param output The buffer holding the output data. If \p length is greater
291 * than zero, \p output must be a writable buffer of at least
292 * that length.
293 * \param tag The buffer holding the authentication field. This must be a
294 * readable buffer of at least \p tag_len Bytes.
295 * \param tag_len The length of the authentication field in Bytes.
296 * 0, 4, 6, 8, 10, 12, 14 or 16.
297 *
298 * \warning Passing \c 0 as \p tag_len means that the message is nos
299 * longer authenticated.
300 *
301 * \return \c 0 on success.
302 * \return #MBEDTLS_ERR_CCM_AUTH_FAILED if the tag does not match.
303 * \return A cipher-specific error code on calculation failure.
304 */
305int mbedtls_ccm_star_auth_decrypt(mbedtls_ccm_context *ctx, size_t length,
306 const unsigned char *iv, size_t iv_len,
307 const unsigned char *ad, size_t ad_len,
308 const unsigned char *input, unsigned char *output,
309 const unsigned char *tag, size_t tag_len);
310
311/**
312 * \brief This function starts a CCM encryption or decryption
313 * operation.
314 *
315 * This function and mbedtls_ccm_set_lengths() must be called
316 * before calling mbedtls_ccm_update_ad() or
317 * mbedtls_ccm_update(). This function can be called before
318 * or after mbedtls_ccm_set_lengths().
319 *
320 * \note This function is not implemented in Mbed TLS yet.
321 *
322 * \param ctx The CCM context. This must be initialized.
323 * \param mode The operation to perform: #MBEDTLS_CCM_ENCRYPT or
324 * #MBEDTLS_CCM_DECRYPT or #MBEDTLS_CCM_STAR_ENCRYPT or
325 * #MBEDTLS_CCM_STAR_DECRYPT.
326 * \param iv The initialization vector. This must be a readable buffer
327 * of at least \p iv_len Bytes.
328 * \param iv_len The length of the nonce in Bytes: 7, 8, 9, 10, 11, 12,
329 * or 13. The length L of the message length field is
330 * 15 - \p iv_len.
331 *
332 * \return \c 0 on success.
333 * \return #MBEDTLS_ERR_CCM_BAD_INPUT on failure:
334 * \p ctx is in an invalid state,
335 * \p mode is invalid,
336 * \p iv_len is invalid (lower than \c 7 or greater than
337 * \c 13).
338 */
339int mbedtls_ccm_starts(mbedtls_ccm_context *ctx,
340 int mode,
341 const unsigned char *iv,
342 size_t iv_len);
343
344/**
345 * \brief This function declares the lengths of the message
346 * and additional data for a CCM encryption or decryption
347 * operation.
348 *
349 * This function and mbedtls_ccm_starts() must be called
350 * before calling mbedtls_ccm_update_ad() or
351 * mbedtls_ccm_update(). This function can be called before
352 * or after mbedtls_ccm_starts().
353 *
354 * \note This function is not implemented in Mbed TLS yet.
355 *
356 * \param ctx The CCM context. This must be initialized.
357 * \param total_ad_len The total length of additional data in bytes.
358 * This must be less than `2^16 - 2^8`.
359 * \param plaintext_len The length in bytes of the plaintext to encrypt or
360 * result of the decryption (thus not encompassing the
361 * additional data that are not encrypted).
362 * \param tag_len The length of the tag to generate in Bytes:
363 * 4, 6, 8, 10, 12, 14 or 16.
364 * For CCM*, zero is also valid.
365 *
366 * \return \c 0 on success.
367 * \return #MBEDTLS_ERR_CCM_BAD_INPUT on failure:
368 * \p ctx is in an invalid state,
369 * \p total_ad_len is greater than \c 0xFF00.
370 */
371int mbedtls_ccm_set_lengths(mbedtls_ccm_context *ctx,
372 size_t total_ad_len,
373 size_t plaintext_len,
374 size_t tag_len);
375
376/**
377 * \brief This function feeds an input buffer as associated data
378 * (authenticated but not encrypted data) in a CCM
379 * encryption or decryption operation.
380 *
381 * You may call this function zero, one or more times
382 * to pass successive parts of the additional data. The
383 * lengths \p ad_len of the data parts should eventually add
384 * up exactly to the total length of additional data
385 * \c total_ad_len passed to mbedtls_ccm_set_lengths(). You
386 * may not call this function after calling
387 * mbedtls_ccm_update().
388 *
389 * \note This function is not implemented in Mbed TLS yet.
390 *
391 * \param ctx The CCM context. This must have been started with
392 * mbedtls_ccm_starts(), the lengths of the message and
393 * additional data must have been declared with
394 * mbedtls_ccm_set_lengths() and this must not have yet
395 * received any input with mbedtls_ccm_update().
396 * \param ad The buffer holding the additional data, or \c NULL
397 * if \p ad_len is \c 0.
398 * \param ad_len The length of the additional data. If \c 0,
399 * \p ad may be \c NULL.
400 *
401 * \return \c 0 on success.
402 * \return #MBEDTLS_ERR_CCM_BAD_INPUT on failure:
403 * \p ctx is in an invalid state,
404 * total input length too long.
405 */
406int mbedtls_ccm_update_ad(mbedtls_ccm_context *ctx,
407 const unsigned char *ad,
408 size_t ad_len);
409
410/**
411 * \brief This function feeds an input buffer into an ongoing CCM
412 * encryption or decryption operation.
413 *
414 * You may call this function zero, one or more times
415 * to pass successive parts of the input: the plaintext to
416 * encrypt, or the ciphertext (not including the tag) to
417 * decrypt. After the last part of the input, call
418 * mbedtls_ccm_finish(). The lengths \p input_len of the
419 * data parts should eventually add up exactly to the
420 * plaintext length \c plaintext_len passed to
421 * mbedtls_ccm_set_lengths().
422 *
423 * This function may produce output in one of the following
424 * ways:
425 * - Immediate output: the output length is always equal
426 * to the input length.
427 * - Buffered output: except for the last part of input data,
428 * the output consists of a whole number of 16-byte blocks.
429 * If the total input length so far (not including
430 * associated data) is 16 \* *B* + *A* with *A* < 16 then
431 * the total output length is 16 \* *B*.
432 * For the last part of input data, the output length is
433 * equal to the input length plus the number of bytes (*A*)
434 * buffered in the previous call to the function (if any).
435 * The function uses the plaintext length
436 * \c plaintext_len passed to mbedtls_ccm_set_lengths()
437 * to detect the last part of input data.
438 *
439 * In particular:
440 * - It is always correct to call this function with
441 * \p output_size >= \p input_len + 15.
442 * - If \p input_len is a multiple of 16 for all the calls
443 * to this function during an operation (not necessary for
444 * the last one) then it is correct to use \p output_size
445 * =\p input_len.
446 *
447 * \note This function is not implemented in Mbed TLS yet.
448 *
449 * \param ctx The CCM context. This must have been started with
450 * mbedtls_ccm_starts() and the lengths of the message and
451 * additional data must have been declared with
452 * mbedtls_ccm_set_lengths().
453 * \param input The buffer holding the input data. If \p input_len
454 * is greater than zero, this must be a readable buffer
455 * of at least \p input_len bytes.
456 * \param input_len The length of the input data in bytes.
457 * \param output The buffer for the output data. If \p output_size
458 * is greater than zero, this must be a writable buffer of
459 * at least \p output_size bytes.
460 * \param output_size The size of the output buffer in bytes.
461 * See the function description regarding the output size.
462 * \param output_len On success, \p *output_len contains the actual
463 * length of the output written in \p output.
464 * On failure, the content of \p *output_len is
465 * unspecified.
466 *
467 * \return \c 0 on success.
468 * \return #MBEDTLS_ERR_CCM_BAD_INPUT on failure:
469 * \p ctx is in an invalid state,
470 * total input length too long,
471 * or \p output_size too small.
472 */
473int mbedtls_ccm_update(mbedtls_ccm_context *ctx,
474 const unsigned char *input, size_t input_len,
475 unsigned char *output, size_t output_size,
476 size_t *output_len);
477
478/**
479 * \brief This function finishes the CCM operation and generates
480 * the authentication tag.
481 *
482 * It wraps up the CCM stream, and generates the
483 * tag. The tag can have a maximum length of 16 Bytes.
484 *
485 * \note This function is not implemented in Mbed TLS yet.
486 *
487 * \param ctx The CCM context. This must have been started with
488 * mbedtls_ccm_starts() and the lengths of the message and
489 * additional data must have been declared with
490 * mbedtls_ccm_set_lengths().
491 * \param tag The buffer for holding the tag. If \p tag_len is greater
492 * than zero, this must be a writable buffer of at least \p
493 * tag_len Bytes.
494 * \param tag_len The length of the tag. Must match the tag length passed to
495 * mbedtls_ccm_set_lengths() function.
496 *
497 * \return \c 0 on success.
498 * \return #MBEDTLS_ERR_CCM_BAD_INPUT on failure:
499 * \p ctx is in an invalid state,
500 * invalid value of \p tag_len,
501 * the total amount of additional data passed to
502 * mbedtls_ccm_update_ad() was lower than the total length of
503 * additional data \c total_ad_len passed to
504 * mbedtls_ccm_set_lengths(),
505 * the total amount of input data passed to
506 * mbedtls_ccm_update() was lower than the plaintext length
507 * \c plaintext_len passed to mbedtls_ccm_set_lengths().
508 */
509int mbedtls_ccm_finish(mbedtls_ccm_context *ctx,
510 unsigned char *tag, size_t tag_len);
511
512#if defined(MBEDTLS_SELF_TEST) && defined(MBEDTLS_CCM_GCM_CAN_AES)
513/**
514 * \brief The CCM checkup routine.
515 *
516 * \return \c 0 on success.
517 * \return \c 1 on failure.
518 */
519int mbedtls_ccm_self_test(int verbose);
520#endif /* MBEDTLS_SELF_TEST && MBEDTLS_AES_C */
521
522#ifdef __cplusplus
523}
524#endif
525
526#endif /* MBEDTLS_CCM_H */