blob: b42b32b1cd813535e6ecc4fdbf33d21c9472c6b6 [file] [log] [blame]
/* Microsoft Reference Implementation for TPM 2.0
*
* The copyright in this software is being made available under the BSD License,
* included below. This software may be subject to other third party and
* contributor rights, including patent rights, and no such rights are granted
* under this license.
*
* Copyright (c) Microsoft Corporation
*
* All rights reserved.
*
* BSD License
*
* Redistribution and use in source and binary forms, with or without modification,
* are permitted provided that the following conditions are met:
*
* Redistributions of source code must retain the above copyright notice, this list
* of conditions and the following disclaimer.
*
* Redistributions in binary form must reproduce the above copyright notice, this
* list of conditions and the following disclaimer in the documentation and/or other
* materials provided with the distribution.
*
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS ""AS IS""
* AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
* DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR
* ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
* (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
* LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON
* ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
* SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
*/
//** Introduction
//
// The functions in this file are used for initialization of the interface to the
// wolfcrypt library.
//** Defines and Includes
#include "Tpm.h"
#if (defined SYM_LIB_WOLF) && ALG_TDES
//**Functions
//** TDES_setup
// This function calls the wolfcrypt function to generate a TDES key schedule. If the
// If the key is two key (16 bytes), then the first DES key is replicated to the third
// key position.
int TDES_setup(
const BYTE *key,
UINT32 keyBits,
tpmKeyScheduleTDES *skey,
int dir
)
{
BYTE k[24];
BYTE *kp;
// If this is two-key, make it three key by replicating K1
if(keyBits == 128)
{
memcpy(k, key, 16);
memcpy(&k[16], key, 8);
kp = k;
}
else
kp = (BYTE *)key;
return wc_Des3_SetKey( skey, kp, 0, dir );
}
//** TDES_setup_encrypt_key
// This function calls into TDES_setup(), specifically for an encryption key.
int TDES_setup_encrypt_key(
const BYTE *key,
UINT32 keyBits,
tpmKeyScheduleTDES *skey
)
{
return TDES_setup( key, keyBits, skey, DES_ENCRYPTION );
}
//** TDES_setup_decrypt_key
// This function calls into TDES_setup(), specifically for an decryption key.
int TDES_setup_decrypt_key(
const BYTE *key,
UINT32 keyBits,
tpmKeyScheduleTDES *skey
)
{
return TDES_setup( key, keyBits, skey, DES_DECRYPTION );
}
//*** TDES_encyrpt()
void TDES_encrypt(
const BYTE *in,
BYTE *out,
tpmKeyScheduleTDES *ks
)
{
wc_Des3_EcbEncrypt( ks, out, in, DES_BLOCK_SIZE );
}
//*** TDES_decrypt()
void TDES_decrypt(
const BYTE *in,
BYTE *out,
tpmKeyScheduleTDES *ks
)
{
wc_Des3_EcbDecrypt( ks, out, in, DES_BLOCK_SIZE );
}
#endif // MATH_LIB_WOLF && ALG_TDES