• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 /* Microsoft Reference Implementation for TPM 2.0
2  *
3  *  The copyright in this software is being made available under the BSD License,
4  *  included below. This software may be subject to other third party and
5  *  contributor rights, including patent rights, and no such rights are granted
6  *  under this license.
7  *
8  *  Copyright (c) Microsoft Corporation
9  *
10  *  All rights reserved.
11  *
12  *  BSD License
13  *
14  *  Redistribution and use in source and binary forms, with or without modification,
15  *  are permitted provided that the following conditions are met:
16  *
17  *  Redistributions of source code must retain the above copyright notice, this list
18  *  of conditions and the following disclaimer.
19  *
20  *  Redistributions in binary form must reproduce the above copyright notice, this
21  *  list of conditions and the following disclaimer in the documentation and/or other
22  *  materials provided with the distribution.
23  *
24  *  THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS ""AS IS""
25  *  AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
26  *  IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
27  *  DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR
28  *  ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
29  *  (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
30  *  LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON
31  *  ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
32  *  (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
33  *  SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
34  */
35 
36 //** Introduction
37 //
38 // The functions in this file are used for initialization of the interface to the
39 // LibTomCrypt and MpaLib libraries. This is not used if only the LTC hash and
40 // symmetric functions are used.
41 
42 //** Defines and Includes
43 
44 #include "Tpm.h"
45 
46 #if (defined SYM_LIB_LTC) && ALG_TDES
47 
48 //** TDES_setup
49 // This function calls the LTC function to generate a TDES key schedule. If the
50 // key is one DES key (8 bytes), then it is replicated two more times to create a
51 // 24-byte TDES key. If the key is two key (16 bytes), then the first DES key is
52 // replicated to the third key position.
TDES_setup(const BYTE * key,UINT32 keyBits,symmetric_key * skey)53 void TDES_setup(
54     const BYTE          *key,
55     UINT32               keyBits,
56     symmetric_key       *skey
57     )
58 {
59     BYTE                 k[24];
60     BYTE                *kp;
61 
62     // If this is two-key, make it three key by replicating K1
63     if(keyBits == 128)
64     {
65         memcpy(k, key, 16);
66         memcpy(&k[16], key, 8);
67         kp = k;
68     }
69     else
70         kp = (BYTE *)key;
71 
72     des3_setup(kp, 24, 0, skey);
73 }
74 
75 #endif // MATH_LIB_LTC && ALG_TDES
76