blob: e911035352393f1d80907af0db3d27c79a786f2f [file] [log] [blame]
Robert Cragie3d23b1d2015-12-15 07:38:11 +00001/**
2 * \file cmac.h
3 *
Rose Zadik8c154932018-03-27 10:45:16 +01004 * \brief This file contains CMAC definitions and functions.
5 *
6 * The Cipher-based Message Authentication Code (CMAC) Mode for
7 * Authentication is defined in <em>RFC-4493: The AES-CMAC Algorithm</em>.
Darryl Greena40a1012018-01-05 15:33:17 +00008 */
9/*
Rose Zadik380d05d2018-01-25 21:52:41 +000010 * Copyright (C) 2015-2018, Arm Limited (or its affiliates), All Rights Reserved
Robert Cragie3d23b1d2015-12-15 07:38:11 +000011 * SPDX-License-Identifier: Apache-2.0
12 *
13 * Licensed under the Apache License, Version 2.0 (the "License"); you may
14 * not use this file except in compliance with the License.
15 * You may obtain a copy of the License at
16 *
17 * http://www.apache.org/licenses/LICENSE-2.0
18 *
19 * Unless required by applicable law or agreed to in writing, software
20 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
21 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
22 * See the License for the specific language governing permissions and
23 * limitations under the License.
24 *
Rose Zadik380d05d2018-01-25 21:52:41 +000025 * This file is part of Mbed TLS (https://tls.mbed.org)
Robert Cragie3d23b1d2015-12-15 07:38:11 +000026 */
Rose Zadik380d05d2018-01-25 21:52:41 +000027
Robert Cragie3d23b1d2015-12-15 07:38:11 +000028#ifndef MBEDTLS_CMAC_H
29#define MBEDTLS_CMAC_H
30
Ron Eldor6fd941f2017-05-14 16:17:33 +030031#include "cipher.h"
Robert Cragie3d23b1d2015-12-15 07:38:11 +000032
33#ifdef __cplusplus
34extern "C" {
35#endif
36
Ron Eldor9924bdc2018-10-04 10:59:13 +030037/* MBEDTLS_ERR_CMAC_HW_ACCEL_FAILED is deprecated and should not be used. */
Rose Zadik380d05d2018-01-25 21:52:41 +000038#define MBEDTLS_ERR_CMAC_HW_ACCEL_FAILED -0x007A /**< CMAC hardware accelerator failed. */
Gilles Peskine7ecab3d2018-01-26 17:56:38 +010039
Simon Butcher69283e52016-10-06 12:49:58 +010040#define MBEDTLS_AES_BLOCK_SIZE 16
41#define MBEDTLS_DES3_BLOCK_SIZE 8
42
Simon Butcher327398a2016-10-05 14:09:11 +010043#if defined(MBEDTLS_AES_C)
Rose Zadik8c154932018-03-27 10:45:16 +010044#define MBEDTLS_CIPHER_BLKSIZE_MAX 16 /**< The longest block used by CMAC is that of AES. */
Simon Butcher327398a2016-10-05 14:09:11 +010045#else
Rose Zadik8c154932018-03-27 10:45:16 +010046#define MBEDTLS_CIPHER_BLKSIZE_MAX 8 /**< The longest block used by CMAC is that of 3DES. */
Simon Butcher327398a2016-10-05 14:09:11 +010047#endif
48
Steven Cooreman63342772017-04-04 11:47:16 +020049#if !defined(MBEDTLS_CMAC_ALT)
50
Robert Cragie3d23b1d2015-12-15 07:38:11 +000051/**
Rose Zadik380d05d2018-01-25 21:52:41 +000052 * The CMAC context structure.
Robert Cragie3d23b1d2015-12-15 07:38:11 +000053 */
Simon Butcher8308a442016-10-05 15:12:59 +010054struct mbedtls_cmac_context_t
55{
Rose Zadik380d05d2018-01-25 21:52:41 +000056 /** The internal state of the CMAC algorithm. */
Simon Butcher69283e52016-10-06 12:49:58 +010057 unsigned char state[MBEDTLS_CIPHER_BLKSIZE_MAX];
Simon Butcher327398a2016-10-05 14:09:11 +010058
Andres AGa592dcc2016-10-06 15:23:39 +010059 /** Unprocessed data - either data that was not block aligned and is still
Rose Zadik380d05d2018-01-25 21:52:41 +000060 * pending processing, or the final block. */
Simon Butcher69283e52016-10-06 12:49:58 +010061 unsigned char unprocessed_block[MBEDTLS_CIPHER_BLKSIZE_MAX];
Simon Butcher327398a2016-10-05 14:09:11 +010062
Rose Zadik380d05d2018-01-25 21:52:41 +000063 /** The length of data pending processing. */
Simon Butcher327398a2016-10-05 14:09:11 +010064 size_t unprocessed_len;
Simon Butcher8308a442016-10-05 15:12:59 +010065};
Robert Cragie3d23b1d2015-12-15 07:38:11 +000066
Ron Eldor4e6d55d2018-02-07 16:36:15 +020067#else /* !MBEDTLS_CMAC_ALT */
68#include "cmac_alt.h"
69#endif /* !MBEDTLS_CMAC_ALT */
70
Robert Cragie3d23b1d2015-12-15 07:38:11 +000071/**
Rose Zadik380d05d2018-01-25 21:52:41 +000072 * \brief This function sets the CMAC key, and prepares to authenticate
73 * the input data.
74 * Must be called with an initialized cipher context.
Robert Cragie3d23b1d2015-12-15 07:38:11 +000075 *
Rose Zadik380d05d2018-01-25 21:52:41 +000076 * \param ctx The cipher context used for the CMAC operation, initialized
Rose Zadik8c154932018-03-27 10:45:16 +010077 * as one of the following types: MBEDTLS_CIPHER_AES_128_ECB,
78 * MBEDTLS_CIPHER_AES_192_ECB, MBEDTLS_CIPHER_AES_256_ECB,
79 * or MBEDTLS_CIPHER_DES_EDE3_ECB.
Unknown1ad679e2018-12-14 05:37:29 -050080 * \param key The CMAC key. This must be a readable buffer of length
81 * \p keybits Bits.
Rose Zadik380d05d2018-01-25 21:52:41 +000082 * \param keybits The length of the CMAC key in bits.
83 * Must be supported by the cipher.
Simon Butcher327398a2016-10-05 14:09:11 +010084 *
Rose Zadikc138bb72018-04-16 11:11:25 +010085 * \return \c 0 on success.
86 * \return A cipher-specific error code on failure.
Robert Cragie3d23b1d2015-12-15 07:38:11 +000087 */
Simon Butcher327398a2016-10-05 14:09:11 +010088int mbedtls_cipher_cmac_starts( mbedtls_cipher_context_t *ctx,
Simon Butcher94ffde72016-10-05 15:33:53 +010089 const unsigned char *key, size_t keybits );
Robert Cragie3d23b1d2015-12-15 07:38:11 +000090
91/**
Rose Zadik380d05d2018-01-25 21:52:41 +000092 * \brief This function feeds an input buffer into an ongoing CMAC
93 * computation.
Robert Cragie3d23b1d2015-12-15 07:38:11 +000094 *
Rose Zadik380d05d2018-01-25 21:52:41 +000095 * It is called between mbedtls_cipher_cmac_starts() or
96 * mbedtls_cipher_cmac_reset(), and mbedtls_cipher_cmac_finish().
97 * Can be called repeatedly.
Robert Cragie3d23b1d2015-12-15 07:38:11 +000098 *
Rose Zadik380d05d2018-01-25 21:52:41 +000099 * \param ctx The cipher context used for the CMAC operation.
Unknown00260802018-12-13 03:04:05 -0500100 * This must be initialized.
Unknown1ad679e2018-12-14 05:37:29 -0500101 * \param input The buffer holding the input data. This must be a
102 * readable buffer of length \p ilen Bytes. It may be
Unknownb1ab2db2018-12-24 05:10:09 -0500103 * \c NULL if `ilen == 0`.
Rose Zadik380d05d2018-01-25 21:52:41 +0000104 * \param ilen The length of the input data.
105 *
Rose Zadikc138bb72018-04-16 11:11:25 +0100106 * \return \c 0 on success.
107 * \return #MBEDTLS_ERR_MD_BAD_INPUT_DATA
Rose Zadik8c154932018-03-27 10:45:16 +0100108 * if parameter verification fails.
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000109 */
Simon Butcher327398a2016-10-05 14:09:11 +0100110int mbedtls_cipher_cmac_update( mbedtls_cipher_context_t *ctx,
111 const unsigned char *input, size_t ilen );
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000112
113/**
Rose Zadik380d05d2018-01-25 21:52:41 +0000114 * \brief This function finishes the CMAC operation, and writes
115 * the result to the output buffer.
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000116 *
Rose Zadik380d05d2018-01-25 21:52:41 +0000117 * It is called after mbedtls_cipher_cmac_update().
118 * It can be followed by mbedtls_cipher_cmac_reset() and
119 * mbedtls_cipher_cmac_update(), or mbedtls_cipher_free().
Simon Butcher327398a2016-10-05 14:09:11 +0100120 *
Rose Zadik380d05d2018-01-25 21:52:41 +0000121 * \param ctx The cipher context used for the CMAC operation.
Unknown00260802018-12-13 03:04:05 -0500122 * This must be initialized.
Rose Zadik380d05d2018-01-25 21:52:41 +0000123 * \param output The output buffer for the CMAC checksum result.
Unknownb1ab2db2018-12-24 05:10:09 -0500124 * This must be a writable buffer of length equal to
125 * at least the block-size of the underlying cipher.
Rose Zadik380d05d2018-01-25 21:52:41 +0000126 *
Rose Zadikc138bb72018-04-16 11:11:25 +0100127 * \return \c 0 on success.
128 * \return #MBEDTLS_ERR_MD_BAD_INPUT_DATA
Rose Zadik380d05d2018-01-25 21:52:41 +0000129 * if parameter verification fails.
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000130 */
Simon Butcher327398a2016-10-05 14:09:11 +0100131int mbedtls_cipher_cmac_finish( mbedtls_cipher_context_t *ctx,
132 unsigned char *output );
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000133
134/**
Rose Zadik380d05d2018-01-25 21:52:41 +0000135 * \brief This function prepares the authentication of another
136 * message with the same key as the previous CMAC
137 * operation.
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000138 *
Rose Zadik380d05d2018-01-25 21:52:41 +0000139 * It is called after mbedtls_cipher_cmac_finish()
140 * and before mbedtls_cipher_cmac_update().
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000141 *
Rose Zadik380d05d2018-01-25 21:52:41 +0000142 * \param ctx The cipher context used for the CMAC operation.
Unknown00260802018-12-13 03:04:05 -0500143 * This must be initialized.
Rose Zadik380d05d2018-01-25 21:52:41 +0000144 *
Rose Zadikc138bb72018-04-16 11:11:25 +0100145 * \return \c 0 on success.
146 * \return #MBEDTLS_ERR_MD_BAD_INPUT_DATA
Rose Zadik380d05d2018-01-25 21:52:41 +0000147 * if parameter verification fails.
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000148 */
Simon Butcher327398a2016-10-05 14:09:11 +0100149int mbedtls_cipher_cmac_reset( mbedtls_cipher_context_t *ctx );
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000150
151/**
Rose Zadik380d05d2018-01-25 21:52:41 +0000152 * \brief This function calculates the full generic CMAC
153 * on the input buffer with the provided key.
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000154 *
Rose Zadik380d05d2018-01-25 21:52:41 +0000155 * The function allocates the context, performs the
156 * calculation, and frees the context.
Simon Butcher327398a2016-10-05 14:09:11 +0100157 *
Rose Zadik380d05d2018-01-25 21:52:41 +0000158 * The CMAC result is calculated as
159 * output = generic CMAC(cmac key, input buffer).
160 *
161 *
Unknown00260802018-12-13 03:04:05 -0500162 * \param cipher_info The cipher information. This must not be \c NULL.
163 * \param key The CMAC key. This must not be \c NULL.
Rose Zadik380d05d2018-01-25 21:52:41 +0000164 * \param keylen The length of the CMAC key in bits.
Unknown1ad679e2018-12-14 05:37:29 -0500165 * \param input The buffer holding the input data. This must be a
166 * readable buffer of length \p ilen Bytes. It may be
Unknownb1ab2db2018-12-24 05:10:09 -0500167 * \c NULL if `ilen == 0`.
Rose Zadik380d05d2018-01-25 21:52:41 +0000168 * \param ilen The length of the input data.
Unknown1ad679e2018-12-14 05:37:29 -0500169 * \param output The buffer for the generic CMAC result.
Unknownb1ab2db2018-12-24 05:10:09 -0500170 * This must be a writable buffer of length equal to
171 * at least the block-size of the underlying cipher.
Rose Zadik380d05d2018-01-25 21:52:41 +0000172 *
Rose Zadikc138bb72018-04-16 11:11:25 +0100173 * \return \c 0 on success.
174 * \return #MBEDTLS_ERR_MD_BAD_INPUT_DATA
Rose Zadik380d05d2018-01-25 21:52:41 +0000175 * if parameter verification fails.
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000176 */
Simon Butcher327398a2016-10-05 14:09:11 +0100177int mbedtls_cipher_cmac( const mbedtls_cipher_info_t *cipher_info,
178 const unsigned char *key, size_t keylen,
179 const unsigned char *input, size_t ilen,
180 unsigned char *output );
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000181
Simon Butcher69283e52016-10-06 12:49:58 +0100182#if defined(MBEDTLS_AES_C)
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000183/**
Rose Zadik380d05d2018-01-25 21:52:41 +0000184 * \brief This function implements the AES-CMAC-PRF-128 pseudorandom
185 * function, as defined in
186 * <em>RFC-4615: The Advanced Encryption Standard-Cipher-based
187 * Message Authentication Code-Pseudo-Random Function-128
188 * (AES-CMAC-PRF-128) Algorithm for the Internet Key
189 * Exchange Protocol (IKE).</em>
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000190 *
Unknown00260802018-12-13 03:04:05 -0500191 * \param key The key to use. This must not be \c NULL.
Rose Zadik380d05d2018-01-25 21:52:41 +0000192 * \param key_len The key length in Bytes.
Unknown00260802018-12-13 03:04:05 -0500193 * \param input The buffer holding the input data. This must not be \c NULL.
Rose Zadik380d05d2018-01-25 21:52:41 +0000194 * \param in_len The length of the input data in Bytes.
195 * \param output The buffer holding the generated 16 Bytes of
Unknownb1ab2db2018-12-24 05:10:09 -0500196 * pseudorandom output. This must be a writable buffer of size
197 * \c 16 Bytes.
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000198 *
Rose Zadik380d05d2018-01-25 21:52:41 +0000199 * \return \c 0 on success.
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000200 */
Brian Murrayb0c3c432016-05-18 14:29:51 -0700201int mbedtls_aes_cmac_prf_128( const unsigned char *key, size_t key_len,
Manuel Pégourié-Gonnard690083c2016-01-13 10:48:02 +0000202 const unsigned char *input, size_t in_len,
Simon Butcher327398a2016-10-05 14:09:11 +0100203 unsigned char output[16] );
Brian Murrayb439d452016-05-19 16:02:42 -0700204#endif /* MBEDTLS_AES_C */
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000205
Brian Murrayb439d452016-05-19 16:02:42 -0700206#if defined(MBEDTLS_SELF_TEST) && ( defined(MBEDTLS_AES_C) || defined(MBEDTLS_DES_C) )
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000207/**
Rose Zadik380d05d2018-01-25 21:52:41 +0000208 * \brief The CMAC checkup routine.
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000209 *
Rose Zadik8c154932018-03-27 10:45:16 +0100210 * \return \c 0 on success.
211 * \return \c 1 on failure.
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000212 */
213int mbedtls_cmac_self_test( int verbose );
Brian Murrayb439d452016-05-19 16:02:42 -0700214#endif /* MBEDTLS_SELF_TEST && ( MBEDTLS_AES_C || MBEDTLS_DES_C ) */
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000215
216#ifdef __cplusplus
217}
218#endif
219
220#endif /* MBEDTLS_CMAC_H */