blob: 672aeba6e7dbd2b28bbf86d5b3ead79cf24d5b9b [file] [log] [blame]
Robert Cragie3d23b1d2015-12-15 07:38:11 +00001/**
2 * \file cmac.h
3 *
Rose Zadik8c154932018-03-27 10:45:16 +01004 * \brief This file contains CMAC definitions and functions.
5 *
6 * The Cipher-based Message Authentication Code (CMAC) Mode for
7 * Authentication is defined in <em>RFC-4493: The AES-CMAC Algorithm</em>.
Gilles Peskine16bb83c2023-06-14 17:42:26 +02008 * It is supported with AES and DES.
Darryl Greena40a1012018-01-05 15:33:17 +00009 */
10/*
Bence Szépkúti1e148272020-08-07 13:07:28 +020011 * Copyright The Mbed TLS Contributors
Robert Cragie3d23b1d2015-12-15 07:38:11 +000012 * SPDX-License-Identifier: Apache-2.0
13 *
14 * Licensed under the Apache License, Version 2.0 (the "License"); you may
15 * not use this file except in compliance with the License.
16 * You may obtain a copy of the License at
17 *
18 * http://www.apache.org/licenses/LICENSE-2.0
19 *
20 * Unless required by applicable law or agreed to in writing, software
21 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
22 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
23 * See the License for the specific language governing permissions and
24 * limitations under the License.
Robert Cragie3d23b1d2015-12-15 07:38:11 +000025 */
Rose Zadik380d05d2018-01-25 21:52:41 +000026
Robert Cragie3d23b1d2015-12-15 07:38:11 +000027#ifndef MBEDTLS_CMAC_H
28#define MBEDTLS_CMAC_H
Mateusz Starzyk846f0212021-05-19 19:44:07 +020029#include "mbedtls/private_access.h"
Robert Cragie3d23b1d2015-12-15 07:38:11 +000030
Bence Szépkútic662b362021-05-27 11:25:03 +020031#include "mbedtls/build_info.h"
Andrzej Kurekc470b6b2019-01-31 08:20:20 -050032
Jaeden Ameroc49fbbf2019-07-04 20:01:14 +010033#include "mbedtls/cipher.h"
Robert Cragie3d23b1d2015-12-15 07:38:11 +000034
35#ifdef __cplusplus
36extern "C" {
37#endif
38
Simon Butcher69283e52016-10-06 12:49:58 +010039#define MBEDTLS_AES_BLOCK_SIZE 16
40#define MBEDTLS_DES3_BLOCK_SIZE 8
41
Gilles Peskine16bb83c2023-06-14 17:42:26 +020042/* We don't support Camellia or ARIA in this module */
Simon Butcher327398a2016-10-05 14:09:11 +010043#if defined(MBEDTLS_AES_C)
Gilles Peskine7282a9e2023-06-14 17:49:02 +020044#define MBEDTLS_CMAC_MAX_BLOCK_SIZE 16 /**< The longest block used by CMAC is that of AES. */
Simon Butcher327398a2016-10-05 14:09:11 +010045#else
Gilles Peskine7282a9e2023-06-14 17:49:02 +020046#define MBEDTLS_CMAC_MAX_BLOCK_SIZE 8 /**< The longest block used by CMAC is that of 3DES. */
Simon Butcher327398a2016-10-05 14:09:11 +010047#endif
48
Gilles Peskine7282a9e2023-06-14 17:49:02 +020049/** The longest block supported by the cipher module.
50 *
51 * \deprecated
52 * For the maximum block size of a cipher supported by the CMAC module,
53 * use #MBEDTLS_CMAC_MAX_BLOCK_SIZE.
54 * For the maximum block size of a cipher supported by the cipher module,
55 * use #MBEDTLS_MAX_BLOCK_LENGTH.
56 */
57/* Before Mbed TLS 3.5, this was the maximum block size supported by the CMAC
58 * module, so it didn't take Camellia or ARIA into account. Since the name
59 * of the macro doesn't even convey "CMAC", this was misleading. Now the size
60 * is sufficient for any cipher, but the name is defined in cmac.h for
61 * backward compatibility. */
62#define MBEDTLS_CIPHER_BLKSIZE_MAX MBEDTLS_MAX_BLOCK_LENGTH
63
Steven Cooreman63342772017-04-04 11:47:16 +020064#if !defined(MBEDTLS_CMAC_ALT)
65
Robert Cragie3d23b1d2015-12-15 07:38:11 +000066/**
Rose Zadik380d05d2018-01-25 21:52:41 +000067 * The CMAC context structure.
Robert Cragie3d23b1d2015-12-15 07:38:11 +000068 */
Gilles Peskine449bd832023-01-11 14:50:10 +010069struct mbedtls_cmac_context_t {
Rose Zadik380d05d2018-01-25 21:52:41 +000070 /** The internal state of the CMAC algorithm. */
Gilles Peskine9e930e22023-06-14 17:52:54 +020071 unsigned char MBEDTLS_PRIVATE(state)[MBEDTLS_CMAC_MAX_BLOCK_SIZE];
Simon Butcher327398a2016-10-05 14:09:11 +010072
Andres AGa592dcc2016-10-06 15:23:39 +010073 /** Unprocessed data - either data that was not block aligned and is still
Rose Zadik380d05d2018-01-25 21:52:41 +000074 * pending processing, or the final block. */
Gilles Peskine9e930e22023-06-14 17:52:54 +020075 unsigned char MBEDTLS_PRIVATE(unprocessed_block)[MBEDTLS_CMAC_MAX_BLOCK_SIZE];
Simon Butcher327398a2016-10-05 14:09:11 +010076
Rose Zadik380d05d2018-01-25 21:52:41 +000077 /** The length of data pending processing. */
Mateusz Starzyk846f0212021-05-19 19:44:07 +020078 size_t MBEDTLS_PRIVATE(unprocessed_len);
Simon Butcher8308a442016-10-05 15:12:59 +010079};
Robert Cragie3d23b1d2015-12-15 07:38:11 +000080
Ron Eldor4e6d55d2018-02-07 16:36:15 +020081#else /* !MBEDTLS_CMAC_ALT */
82#include "cmac_alt.h"
83#endif /* !MBEDTLS_CMAC_ALT */
84
Robert Cragie3d23b1d2015-12-15 07:38:11 +000085/**
David Horstmann3d5dfa52021-12-06 18:58:02 +000086 * \brief This function starts a new CMAC computation
87 * by setting the CMAC key, and preparing to authenticate
Rose Zadik380d05d2018-01-25 21:52:41 +000088 * the input data.
David Horstmann3d5dfa52021-12-06 18:58:02 +000089 * It must be called with an initialized cipher context.
90 *
91 * Once this function has completed, data can be supplied
92 * to the CMAC computation by calling
93 * mbedtls_cipher_cmac_update().
94 *
95 * To start a CMAC computation using the same key as a previous
96 * CMAC computation, use mbedtls_cipher_cmac_finish().
Robert Cragie3d23b1d2015-12-15 07:38:11 +000097 *
Steven Cooremanc338cef2021-04-26 11:24:44 +020098 * \note When the CMAC implementation is supplied by an alternate
99 * implementation (through #MBEDTLS_CMAC_ALT), some ciphers
100 * may not be supported by that implementation, and thus
101 * return an error. Alternate implementations must support
102 * AES-128 and AES-256, and may support AES-192 and 3DES.
103 *
Rose Zadik380d05d2018-01-25 21:52:41 +0000104 * \param ctx The cipher context used for the CMAC operation, initialized
Rose Zadik8c154932018-03-27 10:45:16 +0100105 * as one of the following types: MBEDTLS_CIPHER_AES_128_ECB,
106 * MBEDTLS_CIPHER_AES_192_ECB, MBEDTLS_CIPHER_AES_256_ECB,
107 * or MBEDTLS_CIPHER_DES_EDE3_ECB.
Rose Zadik380d05d2018-01-25 21:52:41 +0000108 * \param key The CMAC key.
109 * \param keybits The length of the CMAC key in bits.
110 * Must be supported by the cipher.
Simon Butcher327398a2016-10-05 14:09:11 +0100111 *
Rose Zadikc138bb72018-04-16 11:11:25 +0100112 * \return \c 0 on success.
113 * \return A cipher-specific error code on failure.
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000114 */
Gilles Peskine449bd832023-01-11 14:50:10 +0100115int mbedtls_cipher_cmac_starts(mbedtls_cipher_context_t *ctx,
116 const unsigned char *key, size_t keybits);
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000117
118/**
Rose Zadik380d05d2018-01-25 21:52:41 +0000119 * \brief This function feeds an input buffer into an ongoing CMAC
120 * computation.
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000121 *
David Horstmann3d5dfa52021-12-06 18:58:02 +0000122 * The CMAC computation must have previously been started
123 * by calling mbedtls_cipher_cmac_starts() or
124 * mbedtls_cipher_cmac_reset().
125 *
126 * Call this function as many times as needed to input the
127 * data to be authenticated.
128 * Once all of the required data has been input,
129 * call mbedtls_cipher_cmac_finish() to obtain the result
130 * of the CMAC operation.
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000131 *
Rose Zadik380d05d2018-01-25 21:52:41 +0000132 * \param ctx The cipher context used for the CMAC operation.
133 * \param input The buffer holding the input data.
134 * \param ilen The length of the input data.
135 *
Rose Zadikc138bb72018-04-16 11:11:25 +0100136 * \return \c 0 on success.
137 * \return #MBEDTLS_ERR_MD_BAD_INPUT_DATA
Rose Zadik8c154932018-03-27 10:45:16 +0100138 * if parameter verification fails.
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000139 */
Gilles Peskine449bd832023-01-11 14:50:10 +0100140int mbedtls_cipher_cmac_update(mbedtls_cipher_context_t *ctx,
141 const unsigned char *input, size_t ilen);
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000142
143/**
David Horstmann3d5dfa52021-12-06 18:58:02 +0000144 * \brief This function finishes an ongoing CMAC operation, and
145 * writes the result to the output buffer.
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000146 *
David Horstmann3d5dfa52021-12-06 18:58:02 +0000147 * It should be followed either by
148 * mbedtls_cipher_cmac_reset(), which starts another CMAC
149 * operation with the same key, or mbedtls_cipher_free(),
150 * which clears the cipher context.
Simon Butcher327398a2016-10-05 14:09:11 +0100151 *
Rose Zadik380d05d2018-01-25 21:52:41 +0000152 * \param ctx The cipher context used for the CMAC operation.
153 * \param output The output buffer for the CMAC checksum result.
154 *
Rose Zadikc138bb72018-04-16 11:11:25 +0100155 * \return \c 0 on success.
156 * \return #MBEDTLS_ERR_MD_BAD_INPUT_DATA
Rose Zadik380d05d2018-01-25 21:52:41 +0000157 * if parameter verification fails.
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000158 */
Gilles Peskine449bd832023-01-11 14:50:10 +0100159int mbedtls_cipher_cmac_finish(mbedtls_cipher_context_t *ctx,
160 unsigned char *output);
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000161
162/**
David Horstmann3d5dfa52021-12-06 18:58:02 +0000163 * \brief This function starts a new CMAC operation with the same
164 * key as the previous one.
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000165 *
David Horstmann3d5dfa52021-12-06 18:58:02 +0000166 * It should be called after finishing the previous CMAC
167 * operation with mbedtls_cipher_cmac_finish().
168 * After calling this function,
169 * call mbedtls_cipher_cmac_update() to supply the new
170 * CMAC operation with data.
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000171 *
Rose Zadik380d05d2018-01-25 21:52:41 +0000172 * \param ctx The cipher context used for the CMAC operation.
173 *
Rose Zadikc138bb72018-04-16 11:11:25 +0100174 * \return \c 0 on success.
175 * \return #MBEDTLS_ERR_MD_BAD_INPUT_DATA
Rose Zadik380d05d2018-01-25 21:52:41 +0000176 * if parameter verification fails.
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000177 */
Gilles Peskine449bd832023-01-11 14:50:10 +0100178int mbedtls_cipher_cmac_reset(mbedtls_cipher_context_t *ctx);
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000179
180/**
Rose Zadik380d05d2018-01-25 21:52:41 +0000181 * \brief This function calculates the full generic CMAC
182 * on the input buffer with the provided key.
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000183 *
Rose Zadik380d05d2018-01-25 21:52:41 +0000184 * The function allocates the context, performs the
185 * calculation, and frees the context.
Simon Butcher327398a2016-10-05 14:09:11 +0100186 *
Rose Zadik380d05d2018-01-25 21:52:41 +0000187 * The CMAC result is calculated as
188 * output = generic CMAC(cmac key, input buffer).
189 *
Steven Cooremanc338cef2021-04-26 11:24:44 +0200190 * \note When the CMAC implementation is supplied by an alternate
191 * implementation (through #MBEDTLS_CMAC_ALT), some ciphers
192 * may not be supported by that implementation, and thus
193 * return an error. Alternate implementations must support
194 * AES-128 and AES-256, and may support AES-192 and 3DES.
Rose Zadik380d05d2018-01-25 21:52:41 +0000195 *
196 * \param cipher_info The cipher information.
197 * \param key The CMAC key.
198 * \param keylen The length of the CMAC key in bits.
199 * \param input The buffer holding the input data.
200 * \param ilen The length of the input data.
201 * \param output The buffer for the generic CMAC result.
202 *
Rose Zadikc138bb72018-04-16 11:11:25 +0100203 * \return \c 0 on success.
204 * \return #MBEDTLS_ERR_MD_BAD_INPUT_DATA
Rose Zadik380d05d2018-01-25 21:52:41 +0000205 * if parameter verification fails.
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000206 */
Gilles Peskine449bd832023-01-11 14:50:10 +0100207int mbedtls_cipher_cmac(const mbedtls_cipher_info_t *cipher_info,
208 const unsigned char *key, size_t keylen,
209 const unsigned char *input, size_t ilen,
210 unsigned char *output);
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000211
Simon Butcher69283e52016-10-06 12:49:58 +0100212#if defined(MBEDTLS_AES_C)
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000213/**
Rose Zadik380d05d2018-01-25 21:52:41 +0000214 * \brief This function implements the AES-CMAC-PRF-128 pseudorandom
215 * function, as defined in
216 * <em>RFC-4615: The Advanced Encryption Standard-Cipher-based
217 * Message Authentication Code-Pseudo-Random Function-128
218 * (AES-CMAC-PRF-128) Algorithm for the Internet Key
219 * Exchange Protocol (IKE).</em>
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000220 *
Rose Zadik380d05d2018-01-25 21:52:41 +0000221 * \param key The key to use.
222 * \param key_len The key length in Bytes.
223 * \param input The buffer holding the input data.
224 * \param in_len The length of the input data in Bytes.
225 * \param output The buffer holding the generated 16 Bytes of
226 * pseudorandom output.
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000227 *
Rose Zadik380d05d2018-01-25 21:52:41 +0000228 * \return \c 0 on success.
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000229 */
Gilles Peskine449bd832023-01-11 14:50:10 +0100230int mbedtls_aes_cmac_prf_128(const unsigned char *key, size_t key_len,
231 const unsigned char *input, size_t in_len,
232 unsigned char output[16]);
Brian Murrayb439d452016-05-19 16:02:42 -0700233#endif /* MBEDTLS_AES_C */
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000234
Gilles Peskine449bd832023-01-11 14:50:10 +0100235#if defined(MBEDTLS_SELF_TEST) && (defined(MBEDTLS_AES_C) || defined(MBEDTLS_DES_C))
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000236/**
Rose Zadik380d05d2018-01-25 21:52:41 +0000237 * \brief The CMAC checkup routine.
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000238 *
Steven Cooreman894b9c42021-04-23 08:19:43 +0200239 * \note In case the CMAC routines are provided by an alternative
240 * implementation (i.e. #MBEDTLS_CMAC_ALT is defined), the
241 * checkup routine will succeed even if the implementation does
242 * not support the less widely used AES-192 or 3DES primitives.
243 * The self-test requires at least AES-128 and AES-256 to be
244 * supported by the underlying implementation.
245 *
Rose Zadik8c154932018-03-27 10:45:16 +0100246 * \return \c 0 on success.
247 * \return \c 1 on failure.
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000248 */
Gilles Peskine449bd832023-01-11 14:50:10 +0100249int mbedtls_cmac_self_test(int verbose);
Brian Murrayb439d452016-05-19 16:02:42 -0700250#endif /* MBEDTLS_SELF_TEST && ( MBEDTLS_AES_C || MBEDTLS_DES_C ) */
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000251
252#ifdef __cplusplus
253}
254#endif
255
256#endif /* MBEDTLS_CMAC_H */