@@ -286,6 +286,12 @@ static int TPM2_ParamEnc_AESCFB(TPM2_AUTH_SESSION *session, TPM2B_AUTH* keyIn,
286286 return TPM_RC_FAILURE ;
287287 }
288288
289+ #ifdef WOLFTPM_DEBUG_VERBOSE
290+ printf ("AES Enc Key %d, IV %d\n" , symKeySz , symKeyIvSz );
291+ TPM2_PrintBin (symKey , symKeySz );
292+ TPM2_PrintBin (& symKey [symKeySz ], symKeyIvSz );
293+ #endif
294+
289295 /* Perform AES CFB Encryption */
290296 rc = wc_AesInit (& enc , NULL , INVALID_DEVID );
291297 if (rc == 0 ) {
@@ -325,6 +331,12 @@ static int TPM2_ParamDec_AESCFB(TPM2_AUTH_SESSION *session, TPM2B_AUTH* keyIn,
325331 return TPM_RC_FAILURE ;
326332 }
327333
334+ #ifdef WOLFTPM_DEBUG_VERBOSE
335+ printf ("AES Dec Key %d, IV %d\n" , symKeySz , symKeyIvSz );
336+ TPM2_PrintBin (symKey , symKeySz );
337+ TPM2_PrintBin (& symKey [symKeySz ], symKeyIvSz );
338+ #endif
339+
328340 /* Perform AES CFB Decryption */
329341 rc = wc_AesInit (& dec , NULL , INVALID_DEVID );
330342 if (rc == 0 ) {
@@ -386,6 +398,11 @@ int TPM2_CalcCpHash(TPMI_ALG_HASH authHash, TPM_CC cmdCode,
386398 wc_HashFree (& hash_ctx , hashType );
387399 }
388400
401+ #ifdef WOLFTPM_DEBUG_VERBOSE
402+ printf ("cpHash: cmd %x, size %d\n" , cmdCode , hash -> size );
403+ TPM2_PrintBin (hash -> buffer , hash -> size );
404+ #endif
405+
389406 return rc ;
390407}
391408
@@ -430,6 +447,11 @@ int TPM2_CalcRpHash(TPMI_ALG_HASH authHash,
430447 wc_HashFree (& hash_ctx , hashType );
431448 }
432449
450+ #ifdef WOLFTPM_DEBUG_VERBOSE
451+ printf ("rpHash: cmd %x, size %d\n" , cmdCode , hash -> size );
452+ TPM2_PrintBin (hash -> buffer , hash -> size );
453+ #endif
454+
433455 return rc ;
434456}
435457
@@ -455,9 +477,14 @@ int TPM2_CalcHmac(TPMI_ALG_HASH authHash, TPM2B_AUTH* auth,
455477 rc = wc_HmacInit (& hmac_ctx , NULL , INVALID_DEVID );
456478 if (rc != 0 )
457479 return rc ;
480+
458481 /* start HMAC - sessionKey || authValue */
459482 /* TODO: Handle "authValue" case "a value that is found in the sensitive area of an entity" */
460483 if (auth ) {
484+ #ifdef WOLFTPM_DEBUG_VERBOSE
485+ printf ("HMAC Key: %d\n" , auth -> size );
486+ TPM2_PrintBin (auth -> buffer , auth -> size );
487+ #endif
461488 rc = wc_HmacSetKey (& hmac_ctx , hashType , auth -> buffer , auth -> size );
462489 }
463490 else {
@@ -488,6 +515,11 @@ int TPM2_CalcHmac(TPMI_ALG_HASH authHash, TPM2B_AUTH* auth,
488515 rc = wc_HmacFinal (& hmac_ctx , hmac -> buffer );
489516 wc_HmacFree (& hmac_ctx );
490517
518+ #ifdef WOLFTPM_DEBUG_VERBOSE
519+ printf ("HMAC Auth: attrib %x, size %d\n" , sessionAttributes , hmac -> size );
520+ TPM2_PrintBin (hmac -> buffer , hmac -> size );
521+ #endif
522+
491523 return rc ;
492524}
493525#endif /* !WOLFTPM2_NO_WOLFCRYPT */
@@ -497,6 +529,16 @@ TPM_RC TPM2_ParamEnc_CmdRequest(TPM2_AUTH_SESSION *session,
497529{
498530 TPM_RC rc = TPM_RC_FAILURE ;
499531
532+ #ifdef WOLFTPM_DEBUG_VERBOSE
533+ printf ("CmdEnc Session Key %d\n" , session -> auth .size );
534+ TPM2_PrintBin (session -> auth .buffer , session -> auth .size );
535+ printf ("CmdEnc Nonce caller %d\n" , session -> nonceCaller .size );
536+ TPM2_PrintBin (session -> nonceCaller .buffer , session -> nonceCaller .size );
537+ printf ("CmdEnc Nonce TPM %d\n" , session -> nonceTPM .size );
538+ TPM2_PrintBin (session -> nonceTPM .buffer , session -> nonceTPM .size );
539+ #endif
540+
541+
500542 if (session -> symmetric .algorithm == TPM_ALG_XOR ) {
501543 rc = TPM2_ParamEnc_XOR (session , & session -> auth , & session -> nonceCaller ,
502544 & session -> nonceTPM , paramData , paramSz );
@@ -517,6 +559,15 @@ TPM_RC TPM2_ParamDec_CmdResponse(TPM2_AUTH_SESSION *session,
517559{
518560 TPM_RC rc = TPM_RC_FAILURE ;
519561
562+ #ifdef WOLFTPM_DEBUG_VERBOSE
563+ printf ("RspDec Session Key %d\n" , session -> auth .size );
564+ TPM2_PrintBin (session -> auth .buffer , session -> auth .size );
565+ printf ("RspDec Nonce caller %d\n" , session -> nonceCaller .size );
566+ TPM2_PrintBin (session -> nonceCaller .buffer , session -> nonceCaller .size );
567+ printf ("RspDec Nonce TPM %d\n" , session -> nonceTPM .size );
568+ TPM2_PrintBin (session -> nonceTPM .buffer , session -> nonceTPM .size );
569+ #endif
570+
520571 if (session -> symmetric .algorithm == TPM_ALG_XOR ) {
521572 rc = TPM2_ParamDec_XOR (session , & session -> auth , & session -> nonceCaller ,
522573 & session -> nonceTPM , paramData , paramSz );
0 commit comments