Robert Cragie | 3d23b1d | 2015-12-15 07:38:11 +0000 | [diff] [blame] | 1 | /** |
| 2 | * \file cmac.h |
| 3 | * |
Rose Zadik | 8c15493 | 2018-03-27 10:45:16 +0100 | [diff] [blame] | 4 | * \brief This file contains CMAC definitions and functions. |
| 5 | * |
| 6 | * The Cipher-based Message Authentication Code (CMAC) Mode for |
| 7 | * Authentication is defined in <em>RFC-4493: The AES-CMAC Algorithm</em>. |
Darryl Green | a40a101 | 2018-01-05 15:33:17 +0000 | [diff] [blame] | 8 | */ |
| 9 | /* |
Bence Szépkúti | 1e14827 | 2020-08-07 13:07:28 +0200 | [diff] [blame] | 10 | * Copyright The Mbed TLS Contributors |
Robert Cragie | 3d23b1d | 2015-12-15 07:38:11 +0000 | [diff] [blame] | 11 | * SPDX-License-Identifier: Apache-2.0 |
| 12 | * |
| 13 | * Licensed under the Apache License, Version 2.0 (the "License"); you may |
| 14 | * not use this file except in compliance with the License. |
| 15 | * You may obtain a copy of the License at |
| 16 | * |
| 17 | * http://www.apache.org/licenses/LICENSE-2.0 |
| 18 | * |
| 19 | * Unless required by applicable law or agreed to in writing, software |
| 20 | * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT |
| 21 | * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| 22 | * See the License for the specific language governing permissions and |
| 23 | * limitations under the License. |
Robert Cragie | 3d23b1d | 2015-12-15 07:38:11 +0000 | [diff] [blame] | 24 | */ |
Rose Zadik | 380d05d | 2018-01-25 21:52:41 +0000 | [diff] [blame] | 25 | |
Robert Cragie | 3d23b1d | 2015-12-15 07:38:11 +0000 | [diff] [blame] | 26 | #ifndef MBEDTLS_CMAC_H |
| 27 | #define MBEDTLS_CMAC_H |
Mateusz Starzyk | 846f021 | 2021-05-19 19:44:07 +0200 | [diff] [blame] | 28 | #include "mbedtls/private_access.h" |
Robert Cragie | 3d23b1d | 2015-12-15 07:38:11 +0000 | [diff] [blame] | 29 | |
Bence Szépkúti | c662b36 | 2021-05-27 11:25:03 +0200 | [diff] [blame] | 30 | #include "mbedtls/build_info.h" |
Andrzej Kurek | c470b6b | 2019-01-31 08:20:20 -0500 | [diff] [blame] | 31 | |
Jaeden Amero | c49fbbf | 2019-07-04 20:01:14 +0100 | [diff] [blame] | 32 | #include "mbedtls/cipher.h" |
Robert Cragie | 3d23b1d | 2015-12-15 07:38:11 +0000 | [diff] [blame] | 33 | |
| 34 | #ifdef __cplusplus |
| 35 | extern "C" { |
| 36 | #endif |
| 37 | |
Mateusz Starzyk | c0eabdc | 2021-08-03 14:09:02 +0200 | [diff] [blame^] | 38 | #define MBEDTLS_AES_BLOCK_SIZE 16 |
| 39 | #define MBEDTLS_DES3_BLOCK_SIZE 8 |
Simon Butcher | 69283e5 | 2016-10-06 12:49:58 +0100 | [diff] [blame] | 40 | |
Simon Butcher | 327398a | 2016-10-05 14:09:11 +0100 | [diff] [blame] | 41 | #if defined(MBEDTLS_AES_C) |
Mateusz Starzyk | 16fec33 | 2021-07-22 16:43:35 +0200 | [diff] [blame] | 42 | /** The longest block used by CMAC is that of AES. */ |
Mateusz Starzyk | c0eabdc | 2021-08-03 14:09:02 +0200 | [diff] [blame^] | 43 | # define MBEDTLS_CIPHER_BLKSIZE_MAX 16 |
Simon Butcher | 327398a | 2016-10-05 14:09:11 +0100 | [diff] [blame] | 44 | #else |
Mateusz Starzyk | 16fec33 | 2021-07-22 16:43:35 +0200 | [diff] [blame] | 45 | /** The longest block used by CMAC is that of 3DES. */ |
Mateusz Starzyk | c0eabdc | 2021-08-03 14:09:02 +0200 | [diff] [blame^] | 46 | # define MBEDTLS_CIPHER_BLKSIZE_MAX 8 |
Simon Butcher | 327398a | 2016-10-05 14:09:11 +0100 | [diff] [blame] | 47 | #endif |
| 48 | |
Steven Cooreman | 6334277 | 2017-04-04 11:47:16 +0200 | [diff] [blame] | 49 | #if !defined(MBEDTLS_CMAC_ALT) |
| 50 | |
Robert Cragie | 3d23b1d | 2015-12-15 07:38:11 +0000 | [diff] [blame] | 51 | /** |
Rose Zadik | 380d05d | 2018-01-25 21:52:41 +0000 | [diff] [blame] | 52 | * The CMAC context structure. |
Robert Cragie | 3d23b1d | 2015-12-15 07:38:11 +0000 | [diff] [blame] | 53 | */ |
Mateusz Starzyk | c0eabdc | 2021-08-03 14:09:02 +0200 | [diff] [blame^] | 54 | struct mbedtls_cmac_context_t { |
Rose Zadik | 380d05d | 2018-01-25 21:52:41 +0000 | [diff] [blame] | 55 | /** The internal state of the CMAC algorithm. */ |
Mateusz Starzyk | c0eabdc | 2021-08-03 14:09:02 +0200 | [diff] [blame^] | 56 | unsigned char MBEDTLS_PRIVATE(state)[MBEDTLS_CIPHER_BLKSIZE_MAX]; |
Simon Butcher | 327398a | 2016-10-05 14:09:11 +0100 | [diff] [blame] | 57 | |
Andres AG | a592dcc | 2016-10-06 15:23:39 +0100 | [diff] [blame] | 58 | /** Unprocessed data - either data that was not block aligned and is still |
Rose Zadik | 380d05d | 2018-01-25 21:52:41 +0000 | [diff] [blame] | 59 | * pending processing, or the final block. */ |
Mateusz Starzyk | c0eabdc | 2021-08-03 14:09:02 +0200 | [diff] [blame^] | 60 | unsigned char MBEDTLS_PRIVATE(unprocessed_block)[MBEDTLS_CIPHER_BLKSIZE_MAX]; |
Simon Butcher | 327398a | 2016-10-05 14:09:11 +0100 | [diff] [blame] | 61 | |
Rose Zadik | 380d05d | 2018-01-25 21:52:41 +0000 | [diff] [blame] | 62 | /** The length of data pending processing. */ |
Mateusz Starzyk | c0eabdc | 2021-08-03 14:09:02 +0200 | [diff] [blame^] | 63 | size_t MBEDTLS_PRIVATE(unprocessed_len); |
Simon Butcher | 8308a44 | 2016-10-05 15:12:59 +0100 | [diff] [blame] | 64 | }; |
Robert Cragie | 3d23b1d | 2015-12-15 07:38:11 +0000 | [diff] [blame] | 65 | |
Mateusz Starzyk | c0eabdc | 2021-08-03 14:09:02 +0200 | [diff] [blame^] | 66 | #else /* !MBEDTLS_CMAC_ALT */ |
| 67 | # include "cmac_alt.h" |
Ron Eldor | 4e6d55d | 2018-02-07 16:36:15 +0200 | [diff] [blame] | 68 | #endif /* !MBEDTLS_CMAC_ALT */ |
| 69 | |
Robert Cragie | 3d23b1d | 2015-12-15 07:38:11 +0000 | [diff] [blame] | 70 | /** |
Rose Zadik | 380d05d | 2018-01-25 21:52:41 +0000 | [diff] [blame] | 71 | * \brief This function sets the CMAC key, and prepares to authenticate |
| 72 | * the input data. |
| 73 | * Must be called with an initialized cipher context. |
Robert Cragie | 3d23b1d | 2015-12-15 07:38:11 +0000 | [diff] [blame] | 74 | * |
Steven Cooreman | c338cef | 2021-04-26 11:24:44 +0200 | [diff] [blame] | 75 | * \note When the CMAC implementation is supplied by an alternate |
| 76 | * implementation (through #MBEDTLS_CMAC_ALT), some ciphers |
| 77 | * may not be supported by that implementation, and thus |
| 78 | * return an error. Alternate implementations must support |
| 79 | * AES-128 and AES-256, and may support AES-192 and 3DES. |
| 80 | * |
Rose Zadik | 380d05d | 2018-01-25 21:52:41 +0000 | [diff] [blame] | 81 | * \param ctx The cipher context used for the CMAC operation, initialized |
Rose Zadik | 8c15493 | 2018-03-27 10:45:16 +0100 | [diff] [blame] | 82 | * as one of the following types: MBEDTLS_CIPHER_AES_128_ECB, |
| 83 | * MBEDTLS_CIPHER_AES_192_ECB, MBEDTLS_CIPHER_AES_256_ECB, |
| 84 | * or MBEDTLS_CIPHER_DES_EDE3_ECB. |
Rose Zadik | 380d05d | 2018-01-25 21:52:41 +0000 | [diff] [blame] | 85 | * \param key The CMAC key. |
| 86 | * \param keybits The length of the CMAC key in bits. |
| 87 | * Must be supported by the cipher. |
Simon Butcher | 327398a | 2016-10-05 14:09:11 +0100 | [diff] [blame] | 88 | * |
Rose Zadik | c138bb7 | 2018-04-16 11:11:25 +0100 | [diff] [blame] | 89 | * \return \c 0 on success. |
| 90 | * \return A cipher-specific error code on failure. |
Robert Cragie | 3d23b1d | 2015-12-15 07:38:11 +0000 | [diff] [blame] | 91 | */ |
Mateusz Starzyk | c0eabdc | 2021-08-03 14:09:02 +0200 | [diff] [blame^] | 92 | int mbedtls_cipher_cmac_starts(mbedtls_cipher_context_t *ctx, |
| 93 | const unsigned char *key, |
| 94 | size_t keybits); |
Robert Cragie | 3d23b1d | 2015-12-15 07:38:11 +0000 | [diff] [blame] | 95 | |
| 96 | /** |
Rose Zadik | 380d05d | 2018-01-25 21:52:41 +0000 | [diff] [blame] | 97 | * \brief This function feeds an input buffer into an ongoing CMAC |
| 98 | * computation. |
Robert Cragie | 3d23b1d | 2015-12-15 07:38:11 +0000 | [diff] [blame] | 99 | * |
Rose Zadik | 380d05d | 2018-01-25 21:52:41 +0000 | [diff] [blame] | 100 | * It is called between mbedtls_cipher_cmac_starts() or |
| 101 | * mbedtls_cipher_cmac_reset(), and mbedtls_cipher_cmac_finish(). |
| 102 | * Can be called repeatedly. |
Robert Cragie | 3d23b1d | 2015-12-15 07:38:11 +0000 | [diff] [blame] | 103 | * |
Rose Zadik | 380d05d | 2018-01-25 21:52:41 +0000 | [diff] [blame] | 104 | * \param ctx The cipher context used for the CMAC operation. |
| 105 | * \param input The buffer holding the input data. |
| 106 | * \param ilen The length of the input data. |
| 107 | * |
Rose Zadik | c138bb7 | 2018-04-16 11:11:25 +0100 | [diff] [blame] | 108 | * \return \c 0 on success. |
| 109 | * \return #MBEDTLS_ERR_MD_BAD_INPUT_DATA |
Rose Zadik | 8c15493 | 2018-03-27 10:45:16 +0100 | [diff] [blame] | 110 | * if parameter verification fails. |
Robert Cragie | 3d23b1d | 2015-12-15 07:38:11 +0000 | [diff] [blame] | 111 | */ |
Mateusz Starzyk | c0eabdc | 2021-08-03 14:09:02 +0200 | [diff] [blame^] | 112 | int mbedtls_cipher_cmac_update(mbedtls_cipher_context_t *ctx, |
| 113 | const unsigned char *input, |
| 114 | size_t ilen); |
Robert Cragie | 3d23b1d | 2015-12-15 07:38:11 +0000 | [diff] [blame] | 115 | |
| 116 | /** |
Rose Zadik | 380d05d | 2018-01-25 21:52:41 +0000 | [diff] [blame] | 117 | * \brief This function finishes the CMAC operation, and writes |
| 118 | * the result to the output buffer. |
Robert Cragie | 3d23b1d | 2015-12-15 07:38:11 +0000 | [diff] [blame] | 119 | * |
Rose Zadik | 380d05d | 2018-01-25 21:52:41 +0000 | [diff] [blame] | 120 | * It is called after mbedtls_cipher_cmac_update(). |
| 121 | * It can be followed by mbedtls_cipher_cmac_reset() and |
| 122 | * mbedtls_cipher_cmac_update(), or mbedtls_cipher_free(). |
Simon Butcher | 327398a | 2016-10-05 14:09:11 +0100 | [diff] [blame] | 123 | * |
Rose Zadik | 380d05d | 2018-01-25 21:52:41 +0000 | [diff] [blame] | 124 | * \param ctx The cipher context used for the CMAC operation. |
| 125 | * \param output The output buffer for the CMAC checksum result. |
| 126 | * |
Rose Zadik | c138bb7 | 2018-04-16 11:11:25 +0100 | [diff] [blame] | 127 | * \return \c 0 on success. |
| 128 | * \return #MBEDTLS_ERR_MD_BAD_INPUT_DATA |
Rose Zadik | 380d05d | 2018-01-25 21:52:41 +0000 | [diff] [blame] | 129 | * if parameter verification fails. |
Robert Cragie | 3d23b1d | 2015-12-15 07:38:11 +0000 | [diff] [blame] | 130 | */ |
Mateusz Starzyk | c0eabdc | 2021-08-03 14:09:02 +0200 | [diff] [blame^] | 131 | int mbedtls_cipher_cmac_finish(mbedtls_cipher_context_t *ctx, |
| 132 | unsigned char *output); |
Robert Cragie | 3d23b1d | 2015-12-15 07:38:11 +0000 | [diff] [blame] | 133 | |
| 134 | /** |
Rose Zadik | 380d05d | 2018-01-25 21:52:41 +0000 | [diff] [blame] | 135 | * \brief This function prepares the authentication of another |
| 136 | * message with the same key as the previous CMAC |
| 137 | * operation. |
Robert Cragie | 3d23b1d | 2015-12-15 07:38:11 +0000 | [diff] [blame] | 138 | * |
Rose Zadik | 380d05d | 2018-01-25 21:52:41 +0000 | [diff] [blame] | 139 | * It is called after mbedtls_cipher_cmac_finish() |
| 140 | * and before mbedtls_cipher_cmac_update(). |
Robert Cragie | 3d23b1d | 2015-12-15 07:38:11 +0000 | [diff] [blame] | 141 | * |
Rose Zadik | 380d05d | 2018-01-25 21:52:41 +0000 | [diff] [blame] | 142 | * \param ctx The cipher context used for the CMAC operation. |
| 143 | * |
Rose Zadik | c138bb7 | 2018-04-16 11:11:25 +0100 | [diff] [blame] | 144 | * \return \c 0 on success. |
| 145 | * \return #MBEDTLS_ERR_MD_BAD_INPUT_DATA |
Rose Zadik | 380d05d | 2018-01-25 21:52:41 +0000 | [diff] [blame] | 146 | * if parameter verification fails. |
Robert Cragie | 3d23b1d | 2015-12-15 07:38:11 +0000 | [diff] [blame] | 147 | */ |
Mateusz Starzyk | c0eabdc | 2021-08-03 14:09:02 +0200 | [diff] [blame^] | 148 | int mbedtls_cipher_cmac_reset(mbedtls_cipher_context_t *ctx); |
Robert Cragie | 3d23b1d | 2015-12-15 07:38:11 +0000 | [diff] [blame] | 149 | |
| 150 | /** |
Rose Zadik | 380d05d | 2018-01-25 21:52:41 +0000 | [diff] [blame] | 151 | * \brief This function calculates the full generic CMAC |
| 152 | * on the input buffer with the provided key. |
Robert Cragie | 3d23b1d | 2015-12-15 07:38:11 +0000 | [diff] [blame] | 153 | * |
Rose Zadik | 380d05d | 2018-01-25 21:52:41 +0000 | [diff] [blame] | 154 | * The function allocates the context, performs the |
| 155 | * calculation, and frees the context. |
Simon Butcher | 327398a | 2016-10-05 14:09:11 +0100 | [diff] [blame] | 156 | * |
Rose Zadik | 380d05d | 2018-01-25 21:52:41 +0000 | [diff] [blame] | 157 | * The CMAC result is calculated as |
| 158 | * output = generic CMAC(cmac key, input buffer). |
| 159 | * |
Steven Cooreman | c338cef | 2021-04-26 11:24:44 +0200 | [diff] [blame] | 160 | * \note When the CMAC implementation is supplied by an alternate |
| 161 | * implementation (through #MBEDTLS_CMAC_ALT), some ciphers |
| 162 | * may not be supported by that implementation, and thus |
| 163 | * return an error. Alternate implementations must support |
| 164 | * AES-128 and AES-256, and may support AES-192 and 3DES. |
Rose Zadik | 380d05d | 2018-01-25 21:52:41 +0000 | [diff] [blame] | 165 | * |
| 166 | * \param cipher_info The cipher information. |
| 167 | * \param key The CMAC key. |
| 168 | * \param keylen The length of the CMAC key in bits. |
| 169 | * \param input The buffer holding the input data. |
| 170 | * \param ilen The length of the input data. |
| 171 | * \param output The buffer for the generic CMAC result. |
| 172 | * |
Rose Zadik | c138bb7 | 2018-04-16 11:11:25 +0100 | [diff] [blame] | 173 | * \return \c 0 on success. |
| 174 | * \return #MBEDTLS_ERR_MD_BAD_INPUT_DATA |
Rose Zadik | 380d05d | 2018-01-25 21:52:41 +0000 | [diff] [blame] | 175 | * if parameter verification fails. |
Robert Cragie | 3d23b1d | 2015-12-15 07:38:11 +0000 | [diff] [blame] | 176 | */ |
Mateusz Starzyk | c0eabdc | 2021-08-03 14:09:02 +0200 | [diff] [blame^] | 177 | int mbedtls_cipher_cmac(const mbedtls_cipher_info_t *cipher_info, |
| 178 | const unsigned char *key, |
| 179 | size_t keylen, |
| 180 | const unsigned char *input, |
| 181 | size_t ilen, |
| 182 | unsigned char *output); |
Robert Cragie | 3d23b1d | 2015-12-15 07:38:11 +0000 | [diff] [blame] | 183 | |
Simon Butcher | 69283e5 | 2016-10-06 12:49:58 +0100 | [diff] [blame] | 184 | #if defined(MBEDTLS_AES_C) |
Robert Cragie | 3d23b1d | 2015-12-15 07:38:11 +0000 | [diff] [blame] | 185 | /** |
Rose Zadik | 380d05d | 2018-01-25 21:52:41 +0000 | [diff] [blame] | 186 | * \brief This function implements the AES-CMAC-PRF-128 pseudorandom |
| 187 | * function, as defined in |
| 188 | * <em>RFC-4615: The Advanced Encryption Standard-Cipher-based |
| 189 | * Message Authentication Code-Pseudo-Random Function-128 |
| 190 | * (AES-CMAC-PRF-128) Algorithm for the Internet Key |
| 191 | * Exchange Protocol (IKE).</em> |
Robert Cragie | 3d23b1d | 2015-12-15 07:38:11 +0000 | [diff] [blame] | 192 | * |
Rose Zadik | 380d05d | 2018-01-25 21:52:41 +0000 | [diff] [blame] | 193 | * \param key The key to use. |
| 194 | * \param key_len The key length in Bytes. |
| 195 | * \param input The buffer holding the input data. |
| 196 | * \param in_len The length of the input data in Bytes. |
| 197 | * \param output The buffer holding the generated 16 Bytes of |
| 198 | * pseudorandom output. |
Robert Cragie | 3d23b1d | 2015-12-15 07:38:11 +0000 | [diff] [blame] | 199 | * |
Rose Zadik | 380d05d | 2018-01-25 21:52:41 +0000 | [diff] [blame] | 200 | * \return \c 0 on success. |
Robert Cragie | 3d23b1d | 2015-12-15 07:38:11 +0000 | [diff] [blame] | 201 | */ |
Mateusz Starzyk | c0eabdc | 2021-08-03 14:09:02 +0200 | [diff] [blame^] | 202 | int mbedtls_aes_cmac_prf_128(const unsigned char *key, |
| 203 | size_t key_len, |
| 204 | const unsigned char *input, |
| 205 | size_t in_len, |
| 206 | unsigned char output[16]); |
Brian Murray | b439d45 | 2016-05-19 16:02:42 -0700 | [diff] [blame] | 207 | #endif /* MBEDTLS_AES_C */ |
Robert Cragie | 3d23b1d | 2015-12-15 07:38:11 +0000 | [diff] [blame] | 208 | |
Mateusz Starzyk | c0eabdc | 2021-08-03 14:09:02 +0200 | [diff] [blame^] | 209 | #if defined(MBEDTLS_SELF_TEST) && \ |
| 210 | (defined(MBEDTLS_AES_C) || defined(MBEDTLS_DES_C)) |
Robert Cragie | 3d23b1d | 2015-12-15 07:38:11 +0000 | [diff] [blame] | 211 | /** |
Rose Zadik | 380d05d | 2018-01-25 21:52:41 +0000 | [diff] [blame] | 212 | * \brief The CMAC checkup routine. |
Robert Cragie | 3d23b1d | 2015-12-15 07:38:11 +0000 | [diff] [blame] | 213 | * |
Steven Cooreman | 894b9c4 | 2021-04-23 08:19:43 +0200 | [diff] [blame] | 214 | * \note In case the CMAC routines are provided by an alternative |
| 215 | * implementation (i.e. #MBEDTLS_CMAC_ALT is defined), the |
| 216 | * checkup routine will succeed even if the implementation does |
| 217 | * not support the less widely used AES-192 or 3DES primitives. |
| 218 | * The self-test requires at least AES-128 and AES-256 to be |
| 219 | * supported by the underlying implementation. |
| 220 | * |
Rose Zadik | 8c15493 | 2018-03-27 10:45:16 +0100 | [diff] [blame] | 221 | * \return \c 0 on success. |
| 222 | * \return \c 1 on failure. |
Robert Cragie | 3d23b1d | 2015-12-15 07:38:11 +0000 | [diff] [blame] | 223 | */ |
Mateusz Starzyk | c0eabdc | 2021-08-03 14:09:02 +0200 | [diff] [blame^] | 224 | int mbedtls_cmac_self_test(int verbose); |
Brian Murray | b439d45 | 2016-05-19 16:02:42 -0700 | [diff] [blame] | 225 | #endif /* MBEDTLS_SELF_TEST && ( MBEDTLS_AES_C || MBEDTLS_DES_C ) */ |
Robert Cragie | 3d23b1d | 2015-12-15 07:38:11 +0000 | [diff] [blame] | 226 | |
| 227 | #ifdef __cplusplus |
| 228 | } |
| 229 | #endif |
| 230 | |
| 231 | #endif /* MBEDTLS_CMAC_H */ |