• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 /*
2  * Copyright (C) 2004,2007,2008 IBM Corporation
3  *
4  * Authors:
5  * Leendert van Doorn <leendert@watson.ibm.com>
6  * Dave Safford <safford@watson.ibm.com>
7  * Reiner Sailer <sailer@watson.ibm.com>
8  * Kylene Hall <kjhall@us.ibm.com>
9  * Debora Velarde <dvelarde@us.ibm.com>
10  *
11  * Maintained by: <tpmdd_devel@lists.sourceforge.net>
12  *
13  * Device driver for TCG/TCPA TPM (trusted platform module).
14  * Specifications at www.trustedcomputinggroup.org
15  *
16  * This program is free software; you can redistribute it and/or
17  * modify it under the terms of the GNU General Public License as
18  * published by the Free Software Foundation, version 2 of the
19  * License.
20  *
21  */
22 #ifndef __LINUX_TPM_H__
23 #define __LINUX_TPM_H__
24 
25 #define TPM_DIGEST_SIZE 20	/* Max TPM v1.2 PCR size */
26 
27 /*
28  * Chip num is this value or a valid tpm idx
29  */
30 #define	TPM_ANY_NUM 0xFFFF
31 
32 struct tpm_chip;
33 struct trusted_key_payload;
34 struct trusted_key_options;
35 
36 enum TPM_OPS_FLAGS {
37 	TPM_OPS_AUTO_STARTUP = BIT(0),
38 };
39 
40 struct tpm_class_ops {
41 	unsigned int flags;
42 	const u8 req_complete_mask;
43 	const u8 req_complete_val;
44 	bool (*req_canceled)(struct tpm_chip *chip, u8 status);
45 	int (*recv) (struct tpm_chip *chip, u8 *buf, size_t len);
46 	int (*send) (struct tpm_chip *chip, u8 *buf, size_t len);
47 	void (*cancel) (struct tpm_chip *chip);
48 	u8 (*status) (struct tpm_chip *chip);
49 	bool (*update_timeouts)(struct tpm_chip *chip,
50 				unsigned long *timeout_cap);
51 
52 };
53 
54 #if defined(CONFIG_TCG_TPM) || defined(CONFIG_TCG_TPM_MODULE)
55 
56 extern int tpm_is_tpm2(u32 chip_num);
57 extern int tpm_pcr_read(u32 chip_num, int pcr_idx, u8 *res_buf);
58 extern int tpm_pcr_extend(u32 chip_num, int pcr_idx, const u8 *hash);
59 extern int tpm_send(u32 chip_num, void *cmd, size_t buflen);
60 extern int tpm_get_random(u32 chip_num, u8 *data, size_t max);
61 extern int tpm_seal_trusted(u32 chip_num,
62 			    struct trusted_key_payload *payload,
63 			    struct trusted_key_options *options);
64 extern int tpm_unseal_trusted(u32 chip_num,
65 			      struct trusted_key_payload *payload,
66 			      struct trusted_key_options *options);
67 #else
tpm_is_tpm2(u32 chip_num)68 static inline int tpm_is_tpm2(u32 chip_num)
69 {
70 	return -ENODEV;
71 }
tpm_pcr_read(u32 chip_num,int pcr_idx,u8 * res_buf)72 static inline int tpm_pcr_read(u32 chip_num, int pcr_idx, u8 *res_buf) {
73 	return -ENODEV;
74 }
tpm_pcr_extend(u32 chip_num,int pcr_idx,const u8 * hash)75 static inline int tpm_pcr_extend(u32 chip_num, int pcr_idx, const u8 *hash) {
76 	return -ENODEV;
77 }
tpm_send(u32 chip_num,void * cmd,size_t buflen)78 static inline int tpm_send(u32 chip_num, void *cmd, size_t buflen) {
79 	return -ENODEV;
80 }
tpm_get_random(u32 chip_num,u8 * data,size_t max)81 static inline int tpm_get_random(u32 chip_num, u8 *data, size_t max) {
82 	return -ENODEV;
83 }
84 
tpm_seal_trusted(u32 chip_num,struct trusted_key_payload * payload,struct trusted_key_options * options)85 static inline int tpm_seal_trusted(u32 chip_num,
86 				   struct trusted_key_payload *payload,
87 				   struct trusted_key_options *options)
88 {
89 	return -ENODEV;
90 }
tpm_unseal_trusted(u32 chip_num,struct trusted_key_payload * payload,struct trusted_key_options * options)91 static inline int tpm_unseal_trusted(u32 chip_num,
92 				     struct trusted_key_payload *payload,
93 				     struct trusted_key_options *options)
94 {
95 	return -ENODEV;
96 }
97 #endif
98 #endif
99