Rajiv Andrade | 659aaf2 | 2009-02-02 15:23:44 -0200 | [diff] [blame] | 1 | /* |
| 2 | * Copyright (C) 2004,2007,2008 IBM Corporation |
| 3 | * |
| 4 | * Authors: |
| 5 | * Leendert van Doorn <leendert@watson.ibm.com> |
| 6 | * Dave Safford <safford@watson.ibm.com> |
| 7 | * Reiner Sailer <sailer@watson.ibm.com> |
| 8 | * Kylene Hall <kjhall@us.ibm.com> |
| 9 | * Debora Velarde <dvelarde@us.ibm.com> |
| 10 | * |
| 11 | * Maintained by: <tpmdd_devel@lists.sourceforge.net> |
| 12 | * |
| 13 | * Device driver for TCG/TCPA TPM (trusted platform module). |
| 14 | * Specifications at www.trustedcomputinggroup.org |
| 15 | * |
| 16 | * This program is free software; you can redistribute it and/or |
| 17 | * modify it under the terms of the GNU General Public License as |
| 18 | * published by the Free Software Foundation, version 2 of the |
| 19 | * License. |
| 20 | * |
| 21 | */ |
| 22 | #ifndef __LINUX_TPM_H__ |
| 23 | #define __LINUX_TPM_H__ |
| 24 | |
Mimi Zohar | 1c16c96 | 2013-05-21 10:40:47 -0400 | [diff] [blame] | 25 | #define TPM_DIGEST_SIZE 20 /* Max TPM v1.2 PCR size */ |
| 26 | |
Rajiv Andrade | 659aaf2 | 2009-02-02 15:23:44 -0200 | [diff] [blame] | 27 | /* |
| 28 | * Chip num is this value or a valid tpm idx |
| 29 | */ |
| 30 | #define TPM_ANY_NUM 0xFFFF |
| 31 | |
Jason Gunthorpe | 01ad1fa | 2013-11-26 13:30:43 -0700 | [diff] [blame] | 32 | struct tpm_chip; |
Jarkko Sakkinen | 954650e | 2015-05-30 08:09:04 +0300 | [diff] [blame] | 33 | struct trusted_key_payload; |
| 34 | struct trusted_key_options; |
Jason Gunthorpe | 01ad1fa | 2013-11-26 13:30:43 -0700 | [diff] [blame] | 35 | |
Jason Gunthorpe | cae8b44 | 2016-07-12 11:41:49 -0600 | [diff] [blame] | 36 | enum TPM_OPS_FLAGS { |
| 37 | TPM_OPS_AUTO_STARTUP = BIT(0), |
| 38 | }; |
| 39 | |
Jason Gunthorpe | 01ad1fa | 2013-11-26 13:30:43 -0700 | [diff] [blame] | 40 | struct tpm_class_ops { |
Jason Gunthorpe | cae8b44 | 2016-07-12 11:41:49 -0600 | [diff] [blame] | 41 | unsigned int flags; |
Jason Gunthorpe | 01ad1fa | 2013-11-26 13:30:43 -0700 | [diff] [blame] | 42 | const u8 req_complete_mask; |
| 43 | const u8 req_complete_val; |
| 44 | bool (*req_canceled)(struct tpm_chip *chip, u8 status); |
| 45 | int (*recv) (struct tpm_chip *chip, u8 *buf, size_t len); |
| 46 | int (*send) (struct tpm_chip *chip, u8 *buf, size_t len); |
| 47 | void (*cancel) (struct tpm_chip *chip); |
| 48 | u8 (*status) (struct tpm_chip *chip); |
Jason Gunthorpe | 8e54caf | 2014-05-21 18:26:44 -0600 | [diff] [blame] | 49 | bool (*update_timeouts)(struct tpm_chip *chip, |
| 50 | unsigned long *timeout_cap); |
Tomas Winkler | e5d857d | 2018-06-28 18:13:33 +0300 | [diff] [blame] | 51 | int (*go_idle)(struct tpm_chip *chip); |
| 52 | int (*cmd_ready)(struct tpm_chip *chip); |
Jarkko Sakkinen | 877c57d | 2017-03-24 11:45:49 +0200 | [diff] [blame] | 53 | int (*request_locality)(struct tpm_chip *chip, int loc); |
Tomas Winkler | ac5881b | 2018-03-05 13:34:49 +0200 | [diff] [blame] | 54 | int (*relinquish_locality)(struct tpm_chip *chip, int loc); |
Azhar Shaikh | 7cea338 | 2017-12-22 12:13:44 -0800 | [diff] [blame] | 55 | void (*clk_enable)(struct tpm_chip *chip, bool value); |
Jason Gunthorpe | 01ad1fa | 2013-11-26 13:30:43 -0700 | [diff] [blame] | 56 | }; |
| 57 | |
Randy Dunlap | ff76ec1 | 2009-10-28 12:26:39 -0700 | [diff] [blame] | 58 | #if defined(CONFIG_TCG_TPM) || defined(CONFIG_TCG_TPM_MODULE) |
Rajiv Andrade | 659aaf2 | 2009-02-02 15:23:44 -0200 | [diff] [blame] | 59 | |
Jarkko Sakkinen | 954650e | 2015-05-30 08:09:04 +0300 | [diff] [blame] | 60 | extern int tpm_is_tpm2(u32 chip_num); |
Rajiv Andrade | 659aaf2 | 2009-02-02 15:23:44 -0200 | [diff] [blame] | 61 | extern int tpm_pcr_read(u32 chip_num, int pcr_idx, u8 *res_buf); |
| 62 | extern int tpm_pcr_extend(u32 chip_num, int pcr_idx, const u8 *hash); |
Mimi Zohar | c749ba9 | 2010-11-23 18:54:16 -0500 | [diff] [blame] | 63 | extern int tpm_send(u32 chip_num, void *cmd, size_t buflen); |
Kent Yoder | 41ab999 | 2012-06-07 13:47:14 -0500 | [diff] [blame] | 64 | extern int tpm_get_random(u32 chip_num, u8 *data, size_t max); |
Jarkko Sakkinen | 954650e | 2015-05-30 08:09:04 +0300 | [diff] [blame] | 65 | extern int tpm_seal_trusted(u32 chip_num, |
| 66 | struct trusted_key_payload *payload, |
| 67 | struct trusted_key_options *options); |
| 68 | extern int tpm_unseal_trusted(u32 chip_num, |
| 69 | struct trusted_key_payload *payload, |
| 70 | struct trusted_key_options *options); |
Mimi Zohar | d6ba452 | 2009-10-26 09:26:18 -0400 | [diff] [blame] | 71 | #else |
Jarkko Sakkinen | 954650e | 2015-05-30 08:09:04 +0300 | [diff] [blame] | 72 | static inline int tpm_is_tpm2(u32 chip_num) |
| 73 | { |
| 74 | return -ENODEV; |
| 75 | } |
Mimi Zohar | d6ba452 | 2009-10-26 09:26:18 -0400 | [diff] [blame] | 76 | static inline int tpm_pcr_read(u32 chip_num, int pcr_idx, u8 *res_buf) { |
| 77 | return -ENODEV; |
| 78 | } |
| 79 | static inline int tpm_pcr_extend(u32 chip_num, int pcr_idx, const u8 *hash) { |
| 80 | return -ENODEV; |
| 81 | } |
Mimi Zohar | c749ba9 | 2010-11-23 18:54:16 -0500 | [diff] [blame] | 82 | static inline int tpm_send(u32 chip_num, void *cmd, size_t buflen) { |
| 83 | return -ENODEV; |
| 84 | } |
Kent Yoder | 41ab999 | 2012-06-07 13:47:14 -0500 | [diff] [blame] | 85 | static inline int tpm_get_random(u32 chip_num, u8 *data, size_t max) { |
| 86 | return -ENODEV; |
| 87 | } |
Jarkko Sakkinen | 954650e | 2015-05-30 08:09:04 +0300 | [diff] [blame] | 88 | |
| 89 | static inline int tpm_seal_trusted(u32 chip_num, |
| 90 | struct trusted_key_payload *payload, |
| 91 | struct trusted_key_options *options) |
| 92 | { |
| 93 | return -ENODEV; |
| 94 | } |
| 95 | static inline int tpm_unseal_trusted(u32 chip_num, |
| 96 | struct trusted_key_payload *payload, |
| 97 | struct trusted_key_options *options) |
| 98 | { |
| 99 | return -ENODEV; |
| 100 | } |
Rajiv Andrade | 659aaf2 | 2009-02-02 15:23:44 -0200 | [diff] [blame] | 101 | #endif |
| 102 | #endif |