blob: 938b6b4dcc657af5a76a5ebf74141ed1cb4184c0 [file] [log] [blame]
Robert Cragie3d23b1d2015-12-15 07:38:11 +00001/**
2 * \file cmac.h
3 *
Rose Zadik8c154932018-03-27 10:45:16 +01004 * \brief This file contains CMAC definitions and functions.
5 *
6 * The Cipher-based Message Authentication Code (CMAC) Mode for
7 * Authentication is defined in <em>RFC-4493: The AES-CMAC Algorithm</em>.
Darryl Greena40a1012018-01-05 15:33:17 +00008 */
9/*
Bence Szépkúti1e148272020-08-07 13:07:28 +020010 * Copyright The Mbed TLS Contributors
Robert Cragie3d23b1d2015-12-15 07:38:11 +000011 * SPDX-License-Identifier: Apache-2.0
12 *
13 * Licensed under the Apache License, Version 2.0 (the "License"); you may
14 * not use this file except in compliance with the License.
15 * You may obtain a copy of the License at
16 *
17 * http://www.apache.org/licenses/LICENSE-2.0
18 *
19 * Unless required by applicable law or agreed to in writing, software
20 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
21 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
22 * See the License for the specific language governing permissions and
23 * limitations under the License.
Robert Cragie3d23b1d2015-12-15 07:38:11 +000024 */
Rose Zadik380d05d2018-01-25 21:52:41 +000025
Robert Cragie3d23b1d2015-12-15 07:38:11 +000026#ifndef MBEDTLS_CMAC_H
27#define MBEDTLS_CMAC_H
Mateusz Starzyk846f0212021-05-19 19:44:07 +020028#include "mbedtls/private_access.h"
Robert Cragie3d23b1d2015-12-15 07:38:11 +000029
Bence Szépkútic662b362021-05-27 11:25:03 +020030#include "mbedtls/build_info.h"
Andrzej Kurekc470b6b2019-01-31 08:20:20 -050031
Jaeden Ameroc49fbbf2019-07-04 20:01:14 +010032#include "mbedtls/cipher.h"
Robert Cragie3d23b1d2015-12-15 07:38:11 +000033
34#ifdef __cplusplus
35extern "C" {
36#endif
37
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +020038#define MBEDTLS_AES_BLOCK_SIZE 16
39#define MBEDTLS_DES3_BLOCK_SIZE 8
Simon Butcher69283e52016-10-06 12:49:58 +010040
Simon Butcher327398a2016-10-05 14:09:11 +010041#if defined(MBEDTLS_AES_C)
Mateusz Starzyk16fec332021-07-22 16:43:35 +020042/** The longest block used by CMAC is that of AES. */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +020043# define MBEDTLS_CIPHER_BLKSIZE_MAX 16
Simon Butcher327398a2016-10-05 14:09:11 +010044#else
Mateusz Starzyk16fec332021-07-22 16:43:35 +020045/** The longest block used by CMAC is that of 3DES. */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +020046# define MBEDTLS_CIPHER_BLKSIZE_MAX 8
Simon Butcher327398a2016-10-05 14:09:11 +010047#endif
48
Steven Cooreman63342772017-04-04 11:47:16 +020049#if !defined(MBEDTLS_CMAC_ALT)
50
Robert Cragie3d23b1d2015-12-15 07:38:11 +000051/**
Rose Zadik380d05d2018-01-25 21:52:41 +000052 * The CMAC context structure.
Robert Cragie3d23b1d2015-12-15 07:38:11 +000053 */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +020054struct mbedtls_cmac_context_t {
Rose Zadik380d05d2018-01-25 21:52:41 +000055 /** The internal state of the CMAC algorithm. */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +020056 unsigned char MBEDTLS_PRIVATE(state)[MBEDTLS_CIPHER_BLKSIZE_MAX];
Simon Butcher327398a2016-10-05 14:09:11 +010057
Andres AGa592dcc2016-10-06 15:23:39 +010058 /** Unprocessed data - either data that was not block aligned and is still
Rose Zadik380d05d2018-01-25 21:52:41 +000059 * pending processing, or the final block. */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +020060 unsigned char MBEDTLS_PRIVATE(unprocessed_block)[MBEDTLS_CIPHER_BLKSIZE_MAX];
Simon Butcher327398a2016-10-05 14:09:11 +010061
Rose Zadik380d05d2018-01-25 21:52:41 +000062 /** The length of data pending processing. */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +020063 size_t MBEDTLS_PRIVATE(unprocessed_len);
Simon Butcher8308a442016-10-05 15:12:59 +010064};
Robert Cragie3d23b1d2015-12-15 07:38:11 +000065
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +020066#else /* !MBEDTLS_CMAC_ALT */
67# include "cmac_alt.h"
Ron Eldor4e6d55d2018-02-07 16:36:15 +020068#endif /* !MBEDTLS_CMAC_ALT */
69
Robert Cragie3d23b1d2015-12-15 07:38:11 +000070/**
Rose Zadik380d05d2018-01-25 21:52:41 +000071 * \brief This function sets the CMAC key, and prepares to authenticate
72 * the input data.
73 * Must be called with an initialized cipher context.
Robert Cragie3d23b1d2015-12-15 07:38:11 +000074 *
Steven Cooremanc338cef2021-04-26 11:24:44 +020075 * \note When the CMAC implementation is supplied by an alternate
76 * implementation (through #MBEDTLS_CMAC_ALT), some ciphers
77 * may not be supported by that implementation, and thus
78 * return an error. Alternate implementations must support
79 * AES-128 and AES-256, and may support AES-192 and 3DES.
80 *
Rose Zadik380d05d2018-01-25 21:52:41 +000081 * \param ctx The cipher context used for the CMAC operation, initialized
Rose Zadik8c154932018-03-27 10:45:16 +010082 * as one of the following types: MBEDTLS_CIPHER_AES_128_ECB,
83 * MBEDTLS_CIPHER_AES_192_ECB, MBEDTLS_CIPHER_AES_256_ECB,
84 * or MBEDTLS_CIPHER_DES_EDE3_ECB.
Rose Zadik380d05d2018-01-25 21:52:41 +000085 * \param key The CMAC key.
86 * \param keybits The length of the CMAC key in bits.
87 * Must be supported by the cipher.
Simon Butcher327398a2016-10-05 14:09:11 +010088 *
Rose Zadikc138bb72018-04-16 11:11:25 +010089 * \return \c 0 on success.
90 * \return A cipher-specific error code on failure.
Robert Cragie3d23b1d2015-12-15 07:38:11 +000091 */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +020092int mbedtls_cipher_cmac_starts(mbedtls_cipher_context_t *ctx,
93 const unsigned char *key,
94 size_t keybits);
Robert Cragie3d23b1d2015-12-15 07:38:11 +000095
96/**
Rose Zadik380d05d2018-01-25 21:52:41 +000097 * \brief This function feeds an input buffer into an ongoing CMAC
98 * computation.
Robert Cragie3d23b1d2015-12-15 07:38:11 +000099 *
Rose Zadik380d05d2018-01-25 21:52:41 +0000100 * It is called between mbedtls_cipher_cmac_starts() or
101 * mbedtls_cipher_cmac_reset(), and mbedtls_cipher_cmac_finish().
102 * Can be called repeatedly.
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000103 *
Rose Zadik380d05d2018-01-25 21:52:41 +0000104 * \param ctx The cipher context used for the CMAC operation.
105 * \param input The buffer holding the input data.
106 * \param ilen The length of the input data.
107 *
Rose Zadikc138bb72018-04-16 11:11:25 +0100108 * \return \c 0 on success.
109 * \return #MBEDTLS_ERR_MD_BAD_INPUT_DATA
Rose Zadik8c154932018-03-27 10:45:16 +0100110 * if parameter verification fails.
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000111 */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +0200112int mbedtls_cipher_cmac_update(mbedtls_cipher_context_t *ctx,
113 const unsigned char *input,
114 size_t ilen);
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000115
116/**
Rose Zadik380d05d2018-01-25 21:52:41 +0000117 * \brief This function finishes the CMAC operation, and writes
118 * the result to the output buffer.
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000119 *
Rose Zadik380d05d2018-01-25 21:52:41 +0000120 * It is called after mbedtls_cipher_cmac_update().
121 * It can be followed by mbedtls_cipher_cmac_reset() and
122 * mbedtls_cipher_cmac_update(), or mbedtls_cipher_free().
Simon Butcher327398a2016-10-05 14:09:11 +0100123 *
Rose Zadik380d05d2018-01-25 21:52:41 +0000124 * \param ctx The cipher context used for the CMAC operation.
125 * \param output The output buffer for the CMAC checksum result.
126 *
Rose Zadikc138bb72018-04-16 11:11:25 +0100127 * \return \c 0 on success.
128 * \return #MBEDTLS_ERR_MD_BAD_INPUT_DATA
Rose Zadik380d05d2018-01-25 21:52:41 +0000129 * if parameter verification fails.
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000130 */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +0200131int mbedtls_cipher_cmac_finish(mbedtls_cipher_context_t *ctx,
132 unsigned char *output);
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000133
134/**
Rose Zadik380d05d2018-01-25 21:52:41 +0000135 * \brief This function prepares the authentication of another
136 * message with the same key as the previous CMAC
137 * operation.
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000138 *
Rose Zadik380d05d2018-01-25 21:52:41 +0000139 * It is called after mbedtls_cipher_cmac_finish()
140 * and before mbedtls_cipher_cmac_update().
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000141 *
Rose Zadik380d05d2018-01-25 21:52:41 +0000142 * \param ctx The cipher context used for the CMAC operation.
143 *
Rose Zadikc138bb72018-04-16 11:11:25 +0100144 * \return \c 0 on success.
145 * \return #MBEDTLS_ERR_MD_BAD_INPUT_DATA
Rose Zadik380d05d2018-01-25 21:52:41 +0000146 * if parameter verification fails.
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000147 */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +0200148int mbedtls_cipher_cmac_reset(mbedtls_cipher_context_t *ctx);
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000149
150/**
Rose Zadik380d05d2018-01-25 21:52:41 +0000151 * \brief This function calculates the full generic CMAC
152 * on the input buffer with the provided key.
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000153 *
Rose Zadik380d05d2018-01-25 21:52:41 +0000154 * The function allocates the context, performs the
155 * calculation, and frees the context.
Simon Butcher327398a2016-10-05 14:09:11 +0100156 *
Rose Zadik380d05d2018-01-25 21:52:41 +0000157 * The CMAC result is calculated as
158 * output = generic CMAC(cmac key, input buffer).
159 *
Steven Cooremanc338cef2021-04-26 11:24:44 +0200160 * \note When the CMAC implementation is supplied by an alternate
161 * implementation (through #MBEDTLS_CMAC_ALT), some ciphers
162 * may not be supported by that implementation, and thus
163 * return an error. Alternate implementations must support
164 * AES-128 and AES-256, and may support AES-192 and 3DES.
Rose Zadik380d05d2018-01-25 21:52:41 +0000165 *
166 * \param cipher_info The cipher information.
167 * \param key The CMAC key.
168 * \param keylen The length of the CMAC key in bits.
169 * \param input The buffer holding the input data.
170 * \param ilen The length of the input data.
171 * \param output The buffer for the generic CMAC result.
172 *
Rose Zadikc138bb72018-04-16 11:11:25 +0100173 * \return \c 0 on success.
174 * \return #MBEDTLS_ERR_MD_BAD_INPUT_DATA
Rose Zadik380d05d2018-01-25 21:52:41 +0000175 * if parameter verification fails.
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000176 */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +0200177int mbedtls_cipher_cmac(const mbedtls_cipher_info_t *cipher_info,
178 const unsigned char *key,
179 size_t keylen,
180 const unsigned char *input,
181 size_t ilen,
182 unsigned char *output);
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000183
Simon Butcher69283e52016-10-06 12:49:58 +0100184#if defined(MBEDTLS_AES_C)
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000185/**
Rose Zadik380d05d2018-01-25 21:52:41 +0000186 * \brief This function implements the AES-CMAC-PRF-128 pseudorandom
187 * function, as defined in
188 * <em>RFC-4615: The Advanced Encryption Standard-Cipher-based
189 * Message Authentication Code-Pseudo-Random Function-128
190 * (AES-CMAC-PRF-128) Algorithm for the Internet Key
191 * Exchange Protocol (IKE).</em>
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000192 *
Rose Zadik380d05d2018-01-25 21:52:41 +0000193 * \param key The key to use.
194 * \param key_len The key length in Bytes.
195 * \param input The buffer holding the input data.
196 * \param in_len The length of the input data in Bytes.
197 * \param output The buffer holding the generated 16 Bytes of
198 * pseudorandom output.
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000199 *
Rose Zadik380d05d2018-01-25 21:52:41 +0000200 * \return \c 0 on success.
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000201 */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +0200202int mbedtls_aes_cmac_prf_128(const unsigned char *key,
203 size_t key_len,
204 const unsigned char *input,
205 size_t in_len,
206 unsigned char output[16]);
Brian Murrayb439d452016-05-19 16:02:42 -0700207#endif /* MBEDTLS_AES_C */
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000208
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +0200209#if defined(MBEDTLS_SELF_TEST) && \
210 (defined(MBEDTLS_AES_C) || defined(MBEDTLS_DES_C))
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000211/**
Rose Zadik380d05d2018-01-25 21:52:41 +0000212 * \brief The CMAC checkup routine.
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000213 *
Steven Cooreman894b9c42021-04-23 08:19:43 +0200214 * \note In case the CMAC routines are provided by an alternative
215 * implementation (i.e. #MBEDTLS_CMAC_ALT is defined), the
216 * checkup routine will succeed even if the implementation does
217 * not support the less widely used AES-192 or 3DES primitives.
218 * The self-test requires at least AES-128 and AES-256 to be
219 * supported by the underlying implementation.
220 *
Rose Zadik8c154932018-03-27 10:45:16 +0100221 * \return \c 0 on success.
222 * \return \c 1 on failure.
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000223 */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +0200224int mbedtls_cmac_self_test(int verbose);
Brian Murrayb439d452016-05-19 16:02:42 -0700225#endif /* MBEDTLS_SELF_TEST && ( MBEDTLS_AES_C || MBEDTLS_DES_C ) */
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000226
227#ifdef __cplusplus
228}
229#endif
230
231#endif /* MBEDTLS_CMAC_H */