aboutsummaryrefslogtreecommitdiffstats
path: root/tpm-util/duplicate/include/crypto_aux.h
diff options
context:
space:
mode:
authorArun kumar Sekar <arunkumarsit@gmail.com>2018-03-30 11:20:30 -0700
committerArun kumar sekar <arunkumarsit@gmail.com>2018-04-03 21:14:48 +0000
commit2ac563372735668ac9687c57e35e39c3e4553ff0 (patch)
tree4f276f8feba53a700f73a4aa9f2f55187444dff5 /tpm-util/duplicate/include/crypto_aux.h
parent3d5e48d877919ec8d33e1d1ee3682fb1f0bc0532 (diff)
Utility to Import external RSA pem key into TPM
Duplicate tool - Takes RSA private key in pem format as input and generates TPM structured buffers as expected by tpm Import Import tool - Takes input buffers from Duplicate tool and results in pub/priv blobs which can be used to load the key in tpm storage heirarchy's as child to primary key Change-Id: I0af6676895ce0cc22c70e5546908e905b78bb71e Issue-ID: AAF-207 Signed-off-by: Arun kumar Sekar <arunkumarsit@gmail.com>
Diffstat (limited to 'tpm-util/duplicate/include/crypto_aux.h')
-rw-r--r--tpm-util/duplicate/include/crypto_aux.h60
1 files changed, 60 insertions, 0 deletions
diff --git a/tpm-util/duplicate/include/crypto_aux.h b/tpm-util/duplicate/include/crypto_aux.h
new file mode 100644
index 0000000..272cc39
--- /dev/null
+++ b/tpm-util/duplicate/include/crypto_aux.h
@@ -0,0 +1,60 @@
+/*
+ * Copyright 2018 Intel Corporation
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+// Author: Arun Kumar Sekar
+
+#ifndef CRYPTO_AUX
+#define CRYPTO_AUX
+
+#include <string.h>
+#include <sapi/tpm20.h>
+#include <openssl/rsa.h>
+#include <openssl/aes.h>
+#include <openssl/rsa.h>
+#include <openssl/sha.h>
+#include <openssl/hmac.h>
+#include <openssl/evp.h>
+
+typedef BYTE* PBYTE;
+
+int RSA_OAEP_Enc(TPM2B_PUBLIC_KEY_RSA *plain, // plain text to encrypt
+ //Size of plain (0 <= pl <= kl - (2 * hashLen + 2)
+ TPM2B_PUBLIC_KEY_RSA *cipher, // must be same size as key in bytes
+ TPM2B_PUBLIC_KEY_RSA *key, // Key in big endian byte array
+ TPM2B_DATA *encoding_params // Null terminated string like
+ // ((unsigned char*)"DUPLICATE")
+ // length of encoding parameter includes \0
+ // (10 in DUPLICATE case..)
+ );
+
+void AES_128_CFB_enc_dec(
+ TPM2B *in,
+ TPM2B *out,
+ const TPM2B *const key,
+ const TPM2B *const ivIn,
+ TPM2B *ivOut,
+ const TPMI_YES_NO enc);
+
+
+
+TPM_RC KDFa( TPMI_ALG_HASH hashAlg, TPM2B *key, char *label,
+ TPM2B *contextU, TPM2B *contextV, UINT16 bits, TPM2B_MAX_BUFFER *resultKey );
+
+UINT32 OpenSslHmac( TPMI_ALG_HASH hashAlg, TPM2B *key,TPM2B **bufferList, TPM2B_DIGEST *result );
+
+void print_buff(char * data, int len, const PBYTE buff);
+
+#endif
+