1 /*
2 * Copyright (C) 2004,2007,2008 IBM Corporation
3 *
4 * Authors:
5 * Leendert van Doorn <leendert@watson.ibm.com>
6 * Dave Safford <safford@watson.ibm.com>
7 * Reiner Sailer <sailer@watson.ibm.com>
8 * Kylene Hall <kjhall@us.ibm.com>
9 * Debora Velarde <dvelarde@us.ibm.com>
10 *
11 * Maintained by: <tpmdd_devel@lists.sourceforge.net>
12 *
13 * Device driver for TCG/TCPA TPM (trusted platform module).
14 * Specifications at www.trustedcomputinggroup.org
15 *
16 * This program is free software; you can redistribute it and/or
17 * modify it under the terms of the GNU General Public License as
18 * published by the Free Software Foundation, version 2 of the
19 * License.
20 *
21 */
22 #ifndef __LINUX_TPM_H__
23 #define __LINUX_TPM_H__
24
25 #define TPM_DIGEST_SIZE 20 /* Max TPM v1.2 PCR size */
26
27 /*
28 * Chip num is this value or a valid tpm idx
29 */
30 #define TPM_ANY_NUM 0xFFFF
31
32 struct tpm_chip;
33 struct trusted_key_payload;
34 struct trusted_key_options;
35
36 enum TPM_OPS_FLAGS {
37 TPM_OPS_AUTO_STARTUP = BIT(0),
38 };
39
40 struct tpm_class_ops {
41 unsigned int flags;
42 const u8 req_complete_mask;
43 const u8 req_complete_val;
44 bool (*req_canceled)(struct tpm_chip *chip, u8 status);
45 int (*recv) (struct tpm_chip *chip, u8 *buf, size_t len);
46 int (*send) (struct tpm_chip *chip, u8 *buf, size_t len);
47 void (*cancel) (struct tpm_chip *chip);
48 u8 (*status) (struct tpm_chip *chip);
49 bool (*update_timeouts)(struct tpm_chip *chip,
50 unsigned long *timeout_cap);
51
52 };
53
54 #if defined(CONFIG_TCG_TPM) || defined(CONFIG_TCG_TPM_MODULE)
55
56 extern int tpm_is_tpm2(u32 chip_num);
57 extern int tpm_pcr_read(u32 chip_num, int pcr_idx, u8 *res_buf);
58 extern int tpm_pcr_extend(u32 chip_num, int pcr_idx, const u8 *hash);
59 extern int tpm_send(u32 chip_num, void *cmd, size_t buflen);
60 extern int tpm_get_random(u32 chip_num, u8 *data, size_t max);
61 extern int tpm_seal_trusted(u32 chip_num,
62 struct trusted_key_payload *payload,
63 struct trusted_key_options *options);
64 extern int tpm_unseal_trusted(u32 chip_num,
65 struct trusted_key_payload *payload,
66 struct trusted_key_options *options);
67 #else
tpm_is_tpm2(u32 chip_num)68 static inline int tpm_is_tpm2(u32 chip_num)
69 {
70 return -ENODEV;
71 }
tpm_pcr_read(u32 chip_num,int pcr_idx,u8 * res_buf)72 static inline int tpm_pcr_read(u32 chip_num, int pcr_idx, u8 *res_buf) {
73 return -ENODEV;
74 }
tpm_pcr_extend(u32 chip_num,int pcr_idx,const u8 * hash)75 static inline int tpm_pcr_extend(u32 chip_num, int pcr_idx, const u8 *hash) {
76 return -ENODEV;
77 }
tpm_send(u32 chip_num,void * cmd,size_t buflen)78 static inline int tpm_send(u32 chip_num, void *cmd, size_t buflen) {
79 return -ENODEV;
80 }
tpm_get_random(u32 chip_num,u8 * data,size_t max)81 static inline int tpm_get_random(u32 chip_num, u8 *data, size_t max) {
82 return -ENODEV;
83 }
84
tpm_seal_trusted(u32 chip_num,struct trusted_key_payload * payload,struct trusted_key_options * options)85 static inline int tpm_seal_trusted(u32 chip_num,
86 struct trusted_key_payload *payload,
87 struct trusted_key_options *options)
88 {
89 return -ENODEV;
90 }
tpm_unseal_trusted(u32 chip_num,struct trusted_key_payload * payload,struct trusted_key_options * options)91 static inline int tpm_unseal_trusted(u32 chip_num,
92 struct trusted_key_payload *payload,
93 struct trusted_key_options *options)
94 {
95 return -ENODEV;
96 }
97 #endif
98 #endif
99