You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
118 lines
5.0 KiB
118 lines
5.0 KiB
7 months ago
|
/* Microsoft Reference Implementation for TPM 2.0
|
||
|
*
|
||
|
* The copyright in this software is being made available under the BSD License,
|
||
|
* included below. This software may be subject to other third party and
|
||
|
* contributor rights, including patent rights, and no such rights are granted
|
||
|
* under this license.
|
||
|
*
|
||
|
* Copyright (c) Microsoft Corporation
|
||
|
*
|
||
|
* All rights reserved.
|
||
|
*
|
||
|
* BSD License
|
||
|
*
|
||
|
* Redistribution and use in source and binary forms, with or without modification,
|
||
|
* are permitted provided that the following conditions are met:
|
||
|
*
|
||
|
* Redistributions of source code must retain the above copyright notice, this list
|
||
|
* of conditions and the following disclaimer.
|
||
|
*
|
||
|
* Redistributions in binary form must reproduce the above copyright notice, this
|
||
|
* list of conditions and the following disclaimer in the documentation and/or
|
||
|
* other materials provided with the distribution.
|
||
|
*
|
||
|
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS ""AS IS""
|
||
|
* AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
|
||
|
* DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR
|
||
|
* ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
|
||
|
* (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
|
||
|
* LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON
|
||
|
* ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
|
||
|
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
|
||
|
* SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
||
|
*/
|
||
|
//** Introduction
|
||
|
//
|
||
|
// This file contains the implementation of the symmetric block cipher modes
|
||
|
// allowed for a TPM. These functions only use the single block encryption functions
|
||
|
// of the selected symmetric cryptographic library.
|
||
|
|
||
|
//** Includes, Defines, and Typedefs
|
||
|
#ifndef CRYPT_SYM_H
|
||
|
#define CRYPT_SYM_H
|
||
|
|
||
|
#if ALG_AES
|
||
|
# define IF_IMPLEMENTED_AES(op) op(AES, aes)
|
||
|
#else
|
||
|
# define IF_IMPLEMENTED_AES(op)
|
||
|
#endif
|
||
|
#if ALG_SM4
|
||
|
# define IF_IMPLEMENTED_SM4(op) op(SM4, sm4)
|
||
|
#else
|
||
|
# define IF_IMPLEMENTED_SM4(op)
|
||
|
#endif
|
||
|
#if ALG_CAMELLIA
|
||
|
# define IF_IMPLEMENTED_CAMELLIA(op) op(CAMELLIA, camellia)
|
||
|
#else
|
||
|
# define IF_IMPLEMENTED_CAMELLIA(op)
|
||
|
#endif
|
||
|
#if ALG_TDES
|
||
|
# define IF_IMPLEMENTED_TDES(op) op(TDES, tdes)
|
||
|
#else
|
||
|
# define IF_IMPLEMENTED_TDES(op)
|
||
|
#endif
|
||
|
|
||
|
#define FOR_EACH_SYM(op) \
|
||
|
IF_IMPLEMENTED_AES(op) \
|
||
|
IF_IMPLEMENTED_SM4(op) \
|
||
|
IF_IMPLEMENTED_CAMELLIA(op) \
|
||
|
IF_IMPLEMENTED_TDES(op)
|
||
|
|
||
|
// Macros for creating the key schedule union
|
||
|
#define KEY_SCHEDULE(SYM, sym) tpmKeySchedule##SYM sym;
|
||
|
#define TDES DES[3]
|
||
|
typedef union tpmCryptKeySchedule_t {
|
||
|
FOR_EACH_SYM(KEY_SCHEDULE)
|
||
|
|
||
|
#if SYMMETRIC_ALIGNMENT == 8
|
||
|
uint64_t alignment;
|
||
|
#else
|
||
|
uint32_t alignment;
|
||
|
#endif
|
||
|
} tpmCryptKeySchedule_t;
|
||
|
|
||
|
|
||
|
// Each block cipher within a library is expected to conform to the same calling
|
||
|
// conventions with three parameters ('keySchedule', 'in', and 'out') in the same
|
||
|
// order. That means that all algorithms would use the same order of the same
|
||
|
// parameters. The code is written assuming the ('keySchedule', 'in', and 'out')
|
||
|
// order. However, if the library uses a different order, the order can be changed
|
||
|
// with a SWIZZLE macro that puts the parameters in the correct order.
|
||
|
// Note that all algorithms have to use the same order and number of parameters
|
||
|
// because the code to build the calling list is common for each call to encrypt
|
||
|
// or decrypt with the algorithm chosen by setting a function pointer to select
|
||
|
// the algorithm that is used.
|
||
|
|
||
|
# define ENCRYPT(keySchedule, in, out) \
|
||
|
encrypt(SWIZZLE(keySchedule, in, out))
|
||
|
|
||
|
# define DECRYPT(keySchedule, in, out) \
|
||
|
decrypt(SWIZZLE(keySchedule, in, out))
|
||
|
|
||
|
// Note that the macros rely on 'encrypt' as local values in the
|
||
|
// functions that use these macros. Those parameters are set by the macro that
|
||
|
// set the key schedule to be used for the call.
|
||
|
|
||
|
#define ENCRYPT_CASE(ALG, alg) \
|
||
|
case TPM_ALG_##ALG: \
|
||
|
TpmCryptSetEncryptKey##ALG(key, keySizeInBits, &keySchedule.alg); \
|
||
|
encrypt = (TpmCryptSetSymKeyCall_t)TpmCryptEncrypt##ALG; \
|
||
|
break;
|
||
|
#define DECRYPT_CASE(ALG, alg) \
|
||
|
case TPM_ALG_##ALG: \
|
||
|
TpmCryptSetDecryptKey##ALG(key, keySizeInBits, &keySchedule.alg); \
|
||
|
decrypt = (TpmCryptSetSymKeyCall_t)TpmCryptDecrypt##ALG; \
|
||
|
break;
|
||
|
|
||
|
#endif // CRYPT_SYM_H
|