1 /* Microsoft Reference Implementation for TPM 2.0
2 *
3 * The copyright in this software is being made available under the BSD License,
4 * included below. This software may be subject to other third party and
5 * contributor rights, including patent rights, and no such rights are granted
6 * under this license.
7 *
8 * Copyright (c) Microsoft Corporation
9 *
10 * All rights reserved.
11 *
12 * BSD License
13 *
14 * Redistribution and use in source and binary forms, with or without modification,
15 * are permitted provided that the following conditions are met:
16 *
17 * Redistributions of source code must retain the above copyright notice, this list
18 * of conditions and the following disclaimer.
19 *
20 * Redistributions in binary form must reproduce the above copyright notice, this
21 * list of conditions and the following disclaimer in the documentation and/or other
22 * materials provided with the distribution.
23 *
24 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS ""AS IS""
25 * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
26 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
27 * DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR
28 * ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
29 * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
30 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON
31 * ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
32 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
33 * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
34 */
35
36 //** Introduction
37 //
38 // The functions in this file are used for initialization of the interface to the
39 // wolfcrypt library.
40
41 //** Defines and Includes
42
43 #include "Tpm.h"
44
45 #if (defined SYM_LIB_WOLF) && ALG_TDES
46
47 //**Functions
48 //** TDES_setup
49 // This function calls the wolfcrypt function to generate a TDES key schedule. If the
50 // If the key is two key (16 bytes), then the first DES key is replicated to the third
51 // key position.
TDES_setup(const BYTE * key,UINT32 keyBits,tpmKeyScheduleTDES * skey,int dir)52 int TDES_setup(
53 const BYTE *key,
54 UINT32 keyBits,
55 tpmKeyScheduleTDES *skey,
56 int dir
57 )
58 {
59 BYTE k[24];
60 BYTE *kp;
61
62 // If this is two-key, make it three key by replicating K1
63 if(keyBits == 128)
64 {
65 memcpy(k, key, 16);
66 memcpy(&k[16], key, 8);
67 kp = k;
68 }
69 else
70 kp = (BYTE *)key;
71
72 return wc_Des3_SetKey( skey, kp, 0, dir );
73 }
74
75 //** TDES_setup_encrypt_key
76 // This function calls into TDES_setup(), specifically for an encryption key.
TDES_setup_encrypt_key(const BYTE * key,UINT32 keyBits,tpmKeyScheduleTDES * skey)77 int TDES_setup_encrypt_key(
78 const BYTE *key,
79 UINT32 keyBits,
80 tpmKeyScheduleTDES *skey
81 )
82 {
83 return TDES_setup( key, keyBits, skey, DES_ENCRYPTION );
84 }
85
86 //** TDES_setup_decrypt_key
87 // This function calls into TDES_setup(), specifically for an decryption key.
TDES_setup_decrypt_key(const BYTE * key,UINT32 keyBits,tpmKeyScheduleTDES * skey)88 int TDES_setup_decrypt_key(
89 const BYTE *key,
90 UINT32 keyBits,
91 tpmKeyScheduleTDES *skey
92 )
93 {
94 return TDES_setup( key, keyBits, skey, DES_DECRYPTION );
95 }
96
97 //*** TDES_encyrpt()
TDES_encrypt(const BYTE * in,BYTE * out,tpmKeyScheduleTDES * ks)98 void TDES_encrypt(
99 const BYTE *in,
100 BYTE *out,
101 tpmKeyScheduleTDES *ks
102 )
103 {
104 wc_Des3_EcbEncrypt( ks, out, in, DES_BLOCK_SIZE );
105 }
106
107 //*** TDES_decrypt()
TDES_decrypt(const BYTE * in,BYTE * out,tpmKeyScheduleTDES * ks)108 void TDES_decrypt(
109 const BYTE *in,
110 BYTE *out,
111 tpmKeyScheduleTDES *ks
112 )
113 {
114 wc_Des3_EcbDecrypt( ks, out, in, DES_BLOCK_SIZE );
115 }
116
117 #endif // MATH_LIB_WOLF && ALG_TDES
118