blob: 8934886af74354ad126c6f5ae7ae1857ac645f24 [file] [log] [blame]
Robert Cragie3d23b1d2015-12-15 07:38:11 +00001/**
2 * \file cmac.h
3 *
Rose Zadik8c154932018-03-27 10:45:16 +01004 * \brief This file contains CMAC definitions and functions.
5 *
6 * The Cipher-based Message Authentication Code (CMAC) Mode for
7 * Authentication is defined in <em>RFC-4493: The AES-CMAC Algorithm</em>.
Darryl Greena40a1012018-01-05 15:33:17 +00008 */
9/*
Bence Szépkúti1e148272020-08-07 13:07:28 +020010 * Copyright The Mbed TLS Contributors
Robert Cragie3d23b1d2015-12-15 07:38:11 +000011 * SPDX-License-Identifier: Apache-2.0
12 *
13 * Licensed under the Apache License, Version 2.0 (the "License"); you may
14 * not use this file except in compliance with the License.
15 * You may obtain a copy of the License at
16 *
17 * http://www.apache.org/licenses/LICENSE-2.0
18 *
19 * Unless required by applicable law or agreed to in writing, software
20 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
21 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
22 * See the License for the specific language governing permissions and
23 * limitations under the License.
Robert Cragie3d23b1d2015-12-15 07:38:11 +000024 */
Rose Zadik380d05d2018-01-25 21:52:41 +000025
Robert Cragie3d23b1d2015-12-15 07:38:11 +000026#ifndef MBEDTLS_CMAC_H
27#define MBEDTLS_CMAC_H
28
Andrzej Kurekc470b6b2019-01-31 08:20:20 -050029#if !defined(MBEDTLS_CONFIG_FILE)
Jaeden Ameroc49fbbf2019-07-04 20:01:14 +010030#include "mbedtls/config.h"
Andrzej Kurekc470b6b2019-01-31 08:20:20 -050031#else
32#include MBEDTLS_CONFIG_FILE
33#endif
34
Jaeden Ameroc49fbbf2019-07-04 20:01:14 +010035#include "mbedtls/cipher.h"
Robert Cragie3d23b1d2015-12-15 07:38:11 +000036
37#ifdef __cplusplus
38extern "C" {
39#endif
40
Ron Eldor9924bdc2018-10-04 10:59:13 +030041/* MBEDTLS_ERR_CMAC_HW_ACCEL_FAILED is deprecated and should not be used. */
Gilles Peskinea3974432021-07-26 18:48:10 +020042/** CMAC hardware accelerator failed. */
43#define MBEDTLS_ERR_CMAC_HW_ACCEL_FAILED -0x007A
Gilles Peskine7ecab3d2018-01-26 17:56:38 +010044
Simon Butcher69283e52016-10-06 12:49:58 +010045#define MBEDTLS_AES_BLOCK_SIZE 16
46#define MBEDTLS_DES3_BLOCK_SIZE 8
47
Simon Butcher327398a2016-10-05 14:09:11 +010048#if defined(MBEDTLS_AES_C)
Rose Zadik8c154932018-03-27 10:45:16 +010049#define MBEDTLS_CIPHER_BLKSIZE_MAX 16 /**< The longest block used by CMAC is that of AES. */
Simon Butcher327398a2016-10-05 14:09:11 +010050#else
Rose Zadik8c154932018-03-27 10:45:16 +010051#define MBEDTLS_CIPHER_BLKSIZE_MAX 8 /**< The longest block used by CMAC is that of 3DES. */
Simon Butcher327398a2016-10-05 14:09:11 +010052#endif
53
Steven Cooreman63342772017-04-04 11:47:16 +020054#if !defined(MBEDTLS_CMAC_ALT)
55
Robert Cragie3d23b1d2015-12-15 07:38:11 +000056/**
Rose Zadik380d05d2018-01-25 21:52:41 +000057 * The CMAC context structure.
Robert Cragie3d23b1d2015-12-15 07:38:11 +000058 */
Simon Butcher8308a442016-10-05 15:12:59 +010059struct mbedtls_cmac_context_t
60{
Rose Zadik380d05d2018-01-25 21:52:41 +000061 /** The internal state of the CMAC algorithm. */
Simon Butcher69283e52016-10-06 12:49:58 +010062 unsigned char state[MBEDTLS_CIPHER_BLKSIZE_MAX];
Simon Butcher327398a2016-10-05 14:09:11 +010063
Andres AGa592dcc2016-10-06 15:23:39 +010064 /** Unprocessed data - either data that was not block aligned and is still
Rose Zadik380d05d2018-01-25 21:52:41 +000065 * pending processing, or the final block. */
Simon Butcher69283e52016-10-06 12:49:58 +010066 unsigned char unprocessed_block[MBEDTLS_CIPHER_BLKSIZE_MAX];
Simon Butcher327398a2016-10-05 14:09:11 +010067
Rose Zadik380d05d2018-01-25 21:52:41 +000068 /** The length of data pending processing. */
Simon Butcher327398a2016-10-05 14:09:11 +010069 size_t unprocessed_len;
Simon Butcher8308a442016-10-05 15:12:59 +010070};
Robert Cragie3d23b1d2015-12-15 07:38:11 +000071
Ron Eldor4e6d55d2018-02-07 16:36:15 +020072#else /* !MBEDTLS_CMAC_ALT */
73#include "cmac_alt.h"
74#endif /* !MBEDTLS_CMAC_ALT */
75
Robert Cragie3d23b1d2015-12-15 07:38:11 +000076/**
David Horstmannb56f38f2021-12-06 18:58:02 +000077 * \brief This function starts a new CMAC computation
78 * by setting the CMAC key, and preparing to authenticate
Rose Zadik380d05d2018-01-25 21:52:41 +000079 * the input data.
David Horstmannb56f38f2021-12-06 18:58:02 +000080 * It must be called with an initialized cipher context.
81 *
82 * Once this function has completed, data can be supplied
83 * to the CMAC computation by calling
84 * mbedtls_cipher_cmac_update().
85 *
86 * To start a CMAC computation using the same key as a previous
87 * CMAC computation, use mbedtls_cipher_cmac_finish().
Robert Cragie3d23b1d2015-12-15 07:38:11 +000088 *
Steven Cooreman5d342bf2021-04-26 11:24:44 +020089 * \note When the CMAC implementation is supplied by an alternate
90 * implementation (through #MBEDTLS_CMAC_ALT), some ciphers
91 * may not be supported by that implementation, and thus
92 * return an error. Alternate implementations must support
93 * AES-128 and AES-256, and may support AES-192 and 3DES.
94 *
Rose Zadik380d05d2018-01-25 21:52:41 +000095 * \param ctx The cipher context used for the CMAC operation, initialized
Rose Zadik8c154932018-03-27 10:45:16 +010096 * as one of the following types: MBEDTLS_CIPHER_AES_128_ECB,
97 * MBEDTLS_CIPHER_AES_192_ECB, MBEDTLS_CIPHER_AES_256_ECB,
98 * or MBEDTLS_CIPHER_DES_EDE3_ECB.
Rose Zadik380d05d2018-01-25 21:52:41 +000099 * \param key The CMAC key.
100 * \param keybits The length of the CMAC key in bits.
101 * Must be supported by the cipher.
Simon Butcher327398a2016-10-05 14:09:11 +0100102 *
Rose Zadikc138bb72018-04-16 11:11:25 +0100103 * \return \c 0 on success.
104 * \return A cipher-specific error code on failure.
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000105 */
Simon Butcher327398a2016-10-05 14:09:11 +0100106int mbedtls_cipher_cmac_starts( mbedtls_cipher_context_t *ctx,
Simon Butcher94ffde72016-10-05 15:33:53 +0100107 const unsigned char *key, size_t keybits );
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000108
109/**
Rose Zadik380d05d2018-01-25 21:52:41 +0000110 * \brief This function feeds an input buffer into an ongoing CMAC
111 * computation.
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000112 *
David Horstmannb56f38f2021-12-06 18:58:02 +0000113 * The CMAC computation must have previously been started
114 * by calling mbedtls_cipher_cmac_starts() or
115 * mbedtls_cipher_cmac_reset().
116 *
117 * Call this function as many times as needed to input the
118 * data to be authenticated.
119 * Once all of the required data has been input,
120 * call mbedtls_cipher_cmac_finish() to obtain the result
121 * of the CMAC operation.
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000122 *
Rose Zadik380d05d2018-01-25 21:52:41 +0000123 * \param ctx The cipher context used for the CMAC operation.
124 * \param input The buffer holding the input data.
125 * \param ilen The length of the input data.
126 *
Rose Zadikc138bb72018-04-16 11:11:25 +0100127 * \return \c 0 on success.
128 * \return #MBEDTLS_ERR_MD_BAD_INPUT_DATA
Rose Zadik8c154932018-03-27 10:45:16 +0100129 * if parameter verification fails.
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000130 */
Simon Butcher327398a2016-10-05 14:09:11 +0100131int mbedtls_cipher_cmac_update( mbedtls_cipher_context_t *ctx,
132 const unsigned char *input, size_t ilen );
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000133
134/**
David Horstmannb56f38f2021-12-06 18:58:02 +0000135 * \brief This function finishes an ongoing CMAC operation, and
136 * writes the result to the output buffer.
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000137 *
David Horstmannb56f38f2021-12-06 18:58:02 +0000138 * It should be followed either by
139 * mbedtls_cipher_cmac_reset(), which starts another CMAC
140 * operation with the same key, or mbedtls_cipher_free(),
141 * which clears the cipher context.
Simon Butcher327398a2016-10-05 14:09:11 +0100142 *
Rose Zadik380d05d2018-01-25 21:52:41 +0000143 * \param ctx The cipher context used for the CMAC operation.
144 * \param output The output buffer for the CMAC checksum result.
145 *
Rose Zadikc138bb72018-04-16 11:11:25 +0100146 * \return \c 0 on success.
147 * \return #MBEDTLS_ERR_MD_BAD_INPUT_DATA
Rose Zadik380d05d2018-01-25 21:52:41 +0000148 * if parameter verification fails.
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000149 */
Simon Butcher327398a2016-10-05 14:09:11 +0100150int mbedtls_cipher_cmac_finish( mbedtls_cipher_context_t *ctx,
151 unsigned char *output );
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000152
153/**
David Horstmannb56f38f2021-12-06 18:58:02 +0000154 * \brief This function starts a new CMAC operation with the same
155 * key as the previous one.
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000156 *
David Horstmannb56f38f2021-12-06 18:58:02 +0000157 * It should be called after finishing the previous CMAC
158 * operation with mbedtls_cipher_cmac_finish().
159 * After calling this function,
160 * call mbedtls_cipher_cmac_update() to supply the new
161 * CMAC operation with data.
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000162 *
Rose Zadik380d05d2018-01-25 21:52:41 +0000163 * \param ctx The cipher context used for the CMAC operation.
164 *
Rose Zadikc138bb72018-04-16 11:11:25 +0100165 * \return \c 0 on success.
166 * \return #MBEDTLS_ERR_MD_BAD_INPUT_DATA
Rose Zadik380d05d2018-01-25 21:52:41 +0000167 * if parameter verification fails.
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000168 */
Simon Butcher327398a2016-10-05 14:09:11 +0100169int mbedtls_cipher_cmac_reset( mbedtls_cipher_context_t *ctx );
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000170
171/**
Rose Zadik380d05d2018-01-25 21:52:41 +0000172 * \brief This function calculates the full generic CMAC
173 * on the input buffer with the provided key.
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000174 *
Rose Zadik380d05d2018-01-25 21:52:41 +0000175 * The function allocates the context, performs the
176 * calculation, and frees the context.
Simon Butcher327398a2016-10-05 14:09:11 +0100177 *
Rose Zadik380d05d2018-01-25 21:52:41 +0000178 * The CMAC result is calculated as
179 * output = generic CMAC(cmac key, input buffer).
180 *
Steven Cooreman5d342bf2021-04-26 11:24:44 +0200181 * \note When the CMAC implementation is supplied by an alternate
182 * implementation (through #MBEDTLS_CMAC_ALT), some ciphers
183 * may not be supported by that implementation, and thus
184 * return an error. Alternate implementations must support
185 * AES-128 and AES-256, and may support AES-192 and 3DES.
Rose Zadik380d05d2018-01-25 21:52:41 +0000186 *
187 * \param cipher_info The cipher information.
188 * \param key The CMAC key.
189 * \param keylen The length of the CMAC key in bits.
190 * \param input The buffer holding the input data.
191 * \param ilen The length of the input data.
192 * \param output The buffer for the generic CMAC result.
193 *
Rose Zadikc138bb72018-04-16 11:11:25 +0100194 * \return \c 0 on success.
195 * \return #MBEDTLS_ERR_MD_BAD_INPUT_DATA
Rose Zadik380d05d2018-01-25 21:52:41 +0000196 * if parameter verification fails.
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000197 */
Simon Butcher327398a2016-10-05 14:09:11 +0100198int mbedtls_cipher_cmac( const mbedtls_cipher_info_t *cipher_info,
199 const unsigned char *key, size_t keylen,
200 const unsigned char *input, size_t ilen,
201 unsigned char *output );
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000202
Simon Butcher69283e52016-10-06 12:49:58 +0100203#if defined(MBEDTLS_AES_C)
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000204/**
Rose Zadik380d05d2018-01-25 21:52:41 +0000205 * \brief This function implements the AES-CMAC-PRF-128 pseudorandom
206 * function, as defined in
207 * <em>RFC-4615: The Advanced Encryption Standard-Cipher-based
208 * Message Authentication Code-Pseudo-Random Function-128
209 * (AES-CMAC-PRF-128) Algorithm for the Internet Key
210 * Exchange Protocol (IKE).</em>
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000211 *
Rose Zadik380d05d2018-01-25 21:52:41 +0000212 * \param key The key to use.
213 * \param key_len The key length in Bytes.
214 * \param input The buffer holding the input data.
215 * \param in_len The length of the input data in Bytes.
216 * \param output The buffer holding the generated 16 Bytes of
217 * pseudorandom output.
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000218 *
Rose Zadik380d05d2018-01-25 21:52:41 +0000219 * \return \c 0 on success.
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000220 */
Brian Murrayb0c3c432016-05-18 14:29:51 -0700221int mbedtls_aes_cmac_prf_128( const unsigned char *key, size_t key_len,
Manuel Pégourié-Gonnard690083c2016-01-13 10:48:02 +0000222 const unsigned char *input, size_t in_len,
Simon Butcher327398a2016-10-05 14:09:11 +0100223 unsigned char output[16] );
Brian Murrayb439d452016-05-19 16:02:42 -0700224#endif /* MBEDTLS_AES_C */
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000225
Brian Murrayb439d452016-05-19 16:02:42 -0700226#if defined(MBEDTLS_SELF_TEST) && ( defined(MBEDTLS_AES_C) || defined(MBEDTLS_DES_C) )
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000227/**
Rose Zadik380d05d2018-01-25 21:52:41 +0000228 * \brief The CMAC checkup routine.
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000229 *
Steven Cooreman91e2bab2021-04-23 08:19:43 +0200230 * \note In case the CMAC routines are provided by an alternative
231 * implementation (i.e. #MBEDTLS_CMAC_ALT is defined), the
232 * checkup routine will succeed even if the implementation does
233 * not support the less widely used AES-192 or 3DES primitives.
234 * The self-test requires at least AES-128 and AES-256 to be
235 * supported by the underlying implementation.
236 *
Rose Zadik8c154932018-03-27 10:45:16 +0100237 * \return \c 0 on success.
238 * \return \c 1 on failure.
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000239 */
240int mbedtls_cmac_self_test( int verbose );
Brian Murrayb439d452016-05-19 16:02:42 -0700241#endif /* MBEDTLS_SELF_TEST && ( MBEDTLS_AES_C || MBEDTLS_DES_C ) */
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000242
243#ifdef __cplusplus
244}
245#endif
246
247#endif /* MBEDTLS_CMAC_H */