blob: 89634dc92743f71449531258a3ac7e3c03bbbd95 [file] [log] [blame]
Robert Cragie3d23b1d2015-12-15 07:38:11 +00001/**
2 * \file cmac.h
3 *
Rose Zadik8c154932018-03-27 10:45:16 +01004 * \brief This file contains CMAC definitions and functions.
5 *
6 * The Cipher-based Message Authentication Code (CMAC) Mode for
7 * Authentication is defined in <em>RFC-4493: The AES-CMAC Algorithm</em>.
Darryl Greena40a1012018-01-05 15:33:17 +00008 */
9/*
Bence Szépkúti1e148272020-08-07 13:07:28 +020010 * Copyright The Mbed TLS Contributors
Dave Rodgman7ff79652023-11-03 12:04:52 +000011 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
Robert Cragie3d23b1d2015-12-15 07:38:11 +000012 */
Rose Zadik380d05d2018-01-25 21:52:41 +000013
Robert Cragie3d23b1d2015-12-15 07:38:11 +000014#ifndef MBEDTLS_CMAC_H
15#define MBEDTLS_CMAC_H
16
Andrzej Kurekc470b6b2019-01-31 08:20:20 -050017#if !defined(MBEDTLS_CONFIG_FILE)
Jaeden Ameroc49fbbf2019-07-04 20:01:14 +010018#include "mbedtls/config.h"
Andrzej Kurekc470b6b2019-01-31 08:20:20 -050019#else
20#include MBEDTLS_CONFIG_FILE
21#endif
22
Jaeden Ameroc49fbbf2019-07-04 20:01:14 +010023#include "mbedtls/cipher.h"
Robert Cragie3d23b1d2015-12-15 07:38:11 +000024
25#ifdef __cplusplus
26extern "C" {
27#endif
28
Ron Eldor9924bdc2018-10-04 10:59:13 +030029/* MBEDTLS_ERR_CMAC_HW_ACCEL_FAILED is deprecated and should not be used. */
Gilles Peskinea3974432021-07-26 18:48:10 +020030/** CMAC hardware accelerator failed. */
31#define MBEDTLS_ERR_CMAC_HW_ACCEL_FAILED -0x007A
Gilles Peskine7ecab3d2018-01-26 17:56:38 +010032
Simon Butcher69283e52016-10-06 12:49:58 +010033#define MBEDTLS_AES_BLOCK_SIZE 16
34#define MBEDTLS_DES3_BLOCK_SIZE 8
35
Dave Rodgmana3e4e222023-07-13 15:31:00 +010036
37/* Although the CMAC module does not support ARIA or CAMELLIA, we adjust the value of
38 * MBEDTLS_CIPHER_BLKSIZE_MAX to reflect these ciphers.
39 * This is done to avoid confusion, given the general-purpose name of the macro. */
40#if defined(MBEDTLS_AES_C) || defined(MBEDTLS_ARIA_C) || defined(MBEDTLS_CAMELLIA_C)
Rose Zadik8c154932018-03-27 10:45:16 +010041#define MBEDTLS_CIPHER_BLKSIZE_MAX 16 /**< The longest block used by CMAC is that of AES. */
Simon Butcher327398a2016-10-05 14:09:11 +010042#else
Rose Zadik8c154932018-03-27 10:45:16 +010043#define MBEDTLS_CIPHER_BLKSIZE_MAX 8 /**< The longest block used by CMAC is that of 3DES. */
Simon Butcher327398a2016-10-05 14:09:11 +010044#endif
45
Steven Cooreman63342772017-04-04 11:47:16 +020046#if !defined(MBEDTLS_CMAC_ALT)
47
Robert Cragie3d23b1d2015-12-15 07:38:11 +000048/**
Rose Zadik380d05d2018-01-25 21:52:41 +000049 * The CMAC context structure.
Robert Cragie3d23b1d2015-12-15 07:38:11 +000050 */
Gilles Peskine1b6c09a2023-01-11 14:52:35 +010051struct mbedtls_cmac_context_t {
Rose Zadik380d05d2018-01-25 21:52:41 +000052 /** The internal state of the CMAC algorithm. */
Simon Butcher69283e52016-10-06 12:49:58 +010053 unsigned char state[MBEDTLS_CIPHER_BLKSIZE_MAX];
Simon Butcher327398a2016-10-05 14:09:11 +010054
Andres AGa592dcc2016-10-06 15:23:39 +010055 /** Unprocessed data - either data that was not block aligned and is still
Rose Zadik380d05d2018-01-25 21:52:41 +000056 * pending processing, or the final block. */
Simon Butcher69283e52016-10-06 12:49:58 +010057 unsigned char unprocessed_block[MBEDTLS_CIPHER_BLKSIZE_MAX];
Simon Butcher327398a2016-10-05 14:09:11 +010058
Rose Zadik380d05d2018-01-25 21:52:41 +000059 /** The length of data pending processing. */
Simon Butcher327398a2016-10-05 14:09:11 +010060 size_t unprocessed_len;
Simon Butcher8308a442016-10-05 15:12:59 +010061};
Robert Cragie3d23b1d2015-12-15 07:38:11 +000062
Ron Eldor4e6d55d2018-02-07 16:36:15 +020063#else /* !MBEDTLS_CMAC_ALT */
64#include "cmac_alt.h"
65#endif /* !MBEDTLS_CMAC_ALT */
66
Robert Cragie3d23b1d2015-12-15 07:38:11 +000067/**
David Horstmannb56f38f2021-12-06 18:58:02 +000068 * \brief This function starts a new CMAC computation
69 * by setting the CMAC key, and preparing to authenticate
Rose Zadik380d05d2018-01-25 21:52:41 +000070 * the input data.
David Horstmannb56f38f2021-12-06 18:58:02 +000071 * It must be called with an initialized cipher context.
72 *
73 * Once this function has completed, data can be supplied
74 * to the CMAC computation by calling
75 * mbedtls_cipher_cmac_update().
76 *
77 * To start a CMAC computation using the same key as a previous
78 * CMAC computation, use mbedtls_cipher_cmac_finish().
Robert Cragie3d23b1d2015-12-15 07:38:11 +000079 *
Steven Cooreman5d342bf2021-04-26 11:24:44 +020080 * \note When the CMAC implementation is supplied by an alternate
81 * implementation (through #MBEDTLS_CMAC_ALT), some ciphers
82 * may not be supported by that implementation, and thus
83 * return an error. Alternate implementations must support
84 * AES-128 and AES-256, and may support AES-192 and 3DES.
85 *
Rose Zadik380d05d2018-01-25 21:52:41 +000086 * \param ctx The cipher context used for the CMAC operation, initialized
Rose Zadik8c154932018-03-27 10:45:16 +010087 * as one of the following types: MBEDTLS_CIPHER_AES_128_ECB,
88 * MBEDTLS_CIPHER_AES_192_ECB, MBEDTLS_CIPHER_AES_256_ECB,
89 * or MBEDTLS_CIPHER_DES_EDE3_ECB.
Rose Zadik380d05d2018-01-25 21:52:41 +000090 * \param key The CMAC key.
91 * \param keybits The length of the CMAC key in bits.
92 * Must be supported by the cipher.
Simon Butcher327398a2016-10-05 14:09:11 +010093 *
Rose Zadikc138bb72018-04-16 11:11:25 +010094 * \return \c 0 on success.
95 * \return A cipher-specific error code on failure.
Robert Cragie3d23b1d2015-12-15 07:38:11 +000096 */
Gilles Peskine1b6c09a2023-01-11 14:52:35 +010097int mbedtls_cipher_cmac_starts(mbedtls_cipher_context_t *ctx,
98 const unsigned char *key, size_t keybits);
Robert Cragie3d23b1d2015-12-15 07:38:11 +000099
100/**
Rose Zadik380d05d2018-01-25 21:52:41 +0000101 * \brief This function feeds an input buffer into an ongoing CMAC
102 * computation.
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000103 *
David Horstmannb56f38f2021-12-06 18:58:02 +0000104 * The CMAC computation must have previously been started
105 * by calling mbedtls_cipher_cmac_starts() or
106 * mbedtls_cipher_cmac_reset().
107 *
108 * Call this function as many times as needed to input the
109 * data to be authenticated.
110 * Once all of the required data has been input,
111 * call mbedtls_cipher_cmac_finish() to obtain the result
112 * of the CMAC operation.
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000113 *
Rose Zadik380d05d2018-01-25 21:52:41 +0000114 * \param ctx The cipher context used for the CMAC operation.
115 * \param input The buffer holding the input data.
116 * \param ilen The length of the input data.
117 *
Rose Zadikc138bb72018-04-16 11:11:25 +0100118 * \return \c 0 on success.
119 * \return #MBEDTLS_ERR_MD_BAD_INPUT_DATA
Rose Zadik8c154932018-03-27 10:45:16 +0100120 * if parameter verification fails.
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000121 */
Gilles Peskine1b6c09a2023-01-11 14:52:35 +0100122int mbedtls_cipher_cmac_update(mbedtls_cipher_context_t *ctx,
123 const unsigned char *input, size_t ilen);
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000124
125/**
David Horstmannb56f38f2021-12-06 18:58:02 +0000126 * \brief This function finishes an ongoing CMAC operation, and
127 * writes the result to the output buffer.
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000128 *
David Horstmannb56f38f2021-12-06 18:58:02 +0000129 * It should be followed either by
130 * mbedtls_cipher_cmac_reset(), which starts another CMAC
131 * operation with the same key, or mbedtls_cipher_free(),
132 * which clears the cipher context.
Simon Butcher327398a2016-10-05 14:09:11 +0100133 *
Rose Zadik380d05d2018-01-25 21:52:41 +0000134 * \param ctx The cipher context used for the CMAC operation.
135 * \param output The output buffer for the CMAC checksum result.
136 *
Rose Zadikc138bb72018-04-16 11:11:25 +0100137 * \return \c 0 on success.
138 * \return #MBEDTLS_ERR_MD_BAD_INPUT_DATA
Rose Zadik380d05d2018-01-25 21:52:41 +0000139 * if parameter verification fails.
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000140 */
Gilles Peskine1b6c09a2023-01-11 14:52:35 +0100141int mbedtls_cipher_cmac_finish(mbedtls_cipher_context_t *ctx,
142 unsigned char *output);
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000143
144/**
David Horstmannb56f38f2021-12-06 18:58:02 +0000145 * \brief This function starts a new CMAC operation with the same
146 * key as the previous one.
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000147 *
David Horstmannb56f38f2021-12-06 18:58:02 +0000148 * It should be called after finishing the previous CMAC
149 * operation with mbedtls_cipher_cmac_finish().
150 * After calling this function,
151 * call mbedtls_cipher_cmac_update() to supply the new
152 * CMAC operation with data.
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000153 *
Rose Zadik380d05d2018-01-25 21:52:41 +0000154 * \param ctx The cipher context used for the CMAC operation.
155 *
Rose Zadikc138bb72018-04-16 11:11:25 +0100156 * \return \c 0 on success.
157 * \return #MBEDTLS_ERR_MD_BAD_INPUT_DATA
Rose Zadik380d05d2018-01-25 21:52:41 +0000158 * if parameter verification fails.
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000159 */
Gilles Peskine1b6c09a2023-01-11 14:52:35 +0100160int mbedtls_cipher_cmac_reset(mbedtls_cipher_context_t *ctx);
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000161
162/**
Rose Zadik380d05d2018-01-25 21:52:41 +0000163 * \brief This function calculates the full generic CMAC
164 * on the input buffer with the provided key.
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000165 *
Rose Zadik380d05d2018-01-25 21:52:41 +0000166 * The function allocates the context, performs the
167 * calculation, and frees the context.
Simon Butcher327398a2016-10-05 14:09:11 +0100168 *
Rose Zadik380d05d2018-01-25 21:52:41 +0000169 * The CMAC result is calculated as
170 * output = generic CMAC(cmac key, input buffer).
171 *
Steven Cooreman5d342bf2021-04-26 11:24:44 +0200172 * \note When the CMAC implementation is supplied by an alternate
173 * implementation (through #MBEDTLS_CMAC_ALT), some ciphers
174 * may not be supported by that implementation, and thus
175 * return an error. Alternate implementations must support
176 * AES-128 and AES-256, and may support AES-192 and 3DES.
Rose Zadik380d05d2018-01-25 21:52:41 +0000177 *
178 * \param cipher_info The cipher information.
179 * \param key The CMAC key.
180 * \param keylen The length of the CMAC key in bits.
181 * \param input The buffer holding the input data.
182 * \param ilen The length of the input data.
183 * \param output The buffer for the generic CMAC result.
184 *
Rose Zadikc138bb72018-04-16 11:11:25 +0100185 * \return \c 0 on success.
186 * \return #MBEDTLS_ERR_MD_BAD_INPUT_DATA
Rose Zadik380d05d2018-01-25 21:52:41 +0000187 * if parameter verification fails.
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000188 */
Gilles Peskine1b6c09a2023-01-11 14:52:35 +0100189int mbedtls_cipher_cmac(const mbedtls_cipher_info_t *cipher_info,
190 const unsigned char *key, size_t keylen,
191 const unsigned char *input, size_t ilen,
192 unsigned char *output);
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000193
Simon Butcher69283e52016-10-06 12:49:58 +0100194#if defined(MBEDTLS_AES_C)
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000195/**
Rose Zadik380d05d2018-01-25 21:52:41 +0000196 * \brief This function implements the AES-CMAC-PRF-128 pseudorandom
197 * function, as defined in
198 * <em>RFC-4615: The Advanced Encryption Standard-Cipher-based
199 * Message Authentication Code-Pseudo-Random Function-128
200 * (AES-CMAC-PRF-128) Algorithm for the Internet Key
201 * Exchange Protocol (IKE).</em>
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000202 *
Rose Zadik380d05d2018-01-25 21:52:41 +0000203 * \param key The key to use.
204 * \param key_len The key length in Bytes.
205 * \param input The buffer holding the input data.
206 * \param in_len The length of the input data in Bytes.
207 * \param output The buffer holding the generated 16 Bytes of
208 * pseudorandom output.
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000209 *
Rose Zadik380d05d2018-01-25 21:52:41 +0000210 * \return \c 0 on success.
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000211 */
Gilles Peskine1b6c09a2023-01-11 14:52:35 +0100212int mbedtls_aes_cmac_prf_128(const unsigned char *key, size_t key_len,
213 const unsigned char *input, size_t in_len,
214 unsigned char output[16]);
Brian Murrayb439d452016-05-19 16:02:42 -0700215#endif /* MBEDTLS_AES_C */
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000216
Gilles Peskine1b6c09a2023-01-11 14:52:35 +0100217#if defined(MBEDTLS_SELF_TEST) && (defined(MBEDTLS_AES_C) || defined(MBEDTLS_DES_C))
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000218/**
Rose Zadik380d05d2018-01-25 21:52:41 +0000219 * \brief The CMAC checkup routine.
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000220 *
Steven Cooreman91e2bab2021-04-23 08:19:43 +0200221 * \note In case the CMAC routines are provided by an alternative
222 * implementation (i.e. #MBEDTLS_CMAC_ALT is defined), the
223 * checkup routine will succeed even if the implementation does
224 * not support the less widely used AES-192 or 3DES primitives.
225 * The self-test requires at least AES-128 and AES-256 to be
226 * supported by the underlying implementation.
227 *
Rose Zadik8c154932018-03-27 10:45:16 +0100228 * \return \c 0 on success.
229 * \return \c 1 on failure.
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000230 */
Gilles Peskine1b6c09a2023-01-11 14:52:35 +0100231int mbedtls_cmac_self_test(int verbose);
Brian Murrayb439d452016-05-19 16:02:42 -0700232#endif /* MBEDTLS_SELF_TEST && ( MBEDTLS_AES_C || MBEDTLS_DES_C ) */
Robert Cragie3d23b1d2015-12-15 07:38:11 +0000233
234#ifdef __cplusplus
235}
236#endif
237
238#endif /* MBEDTLS_CMAC_H */