blob: 13563b8c0c3a9bd5ba95b7c45acad13f4d53e97a [file] [log] [blame]
Rajiv Andrade659aaf22009-02-02 15:23:44 -02001/*
2 * Copyright (C) 2004,2007,2008 IBM Corporation
3 *
4 * Authors:
5 * Leendert van Doorn <leendert@watson.ibm.com>
6 * Dave Safford <safford@watson.ibm.com>
7 * Reiner Sailer <sailer@watson.ibm.com>
8 * Kylene Hall <kjhall@us.ibm.com>
9 * Debora Velarde <dvelarde@us.ibm.com>
10 *
11 * Maintained by: <tpmdd_devel@lists.sourceforge.net>
12 *
13 * Device driver for TCG/TCPA TPM (trusted platform module).
14 * Specifications at www.trustedcomputinggroup.org
15 *
16 * This program is free software; you can redistribute it and/or
17 * modify it under the terms of the GNU General Public License as
18 * published by the Free Software Foundation, version 2 of the
19 * License.
20 *
21 */
22#ifndef __LINUX_TPM_H__
23#define __LINUX_TPM_H__
24
Mimi Zohar1c16c962013-05-21 10:40:47 -040025#define TPM_DIGEST_SIZE 20 /* Max TPM v1.2 PCR size */
26
Jason Gunthorpe01ad1fa2013-11-26 13:30:43 -070027struct tpm_chip;
Jarkko Sakkinen954650e2015-05-30 08:09:04 +030028struct trusted_key_payload;
29struct trusted_key_options;
Jason Gunthorpe01ad1fa2013-11-26 13:30:43 -070030
Jason Gunthorpecae8b442016-07-12 11:41:49 -060031enum TPM_OPS_FLAGS {
32 TPM_OPS_AUTO_STARTUP = BIT(0),
33};
34
Jason Gunthorpe01ad1fa2013-11-26 13:30:43 -070035struct tpm_class_ops {
Jason Gunthorpecae8b442016-07-12 11:41:49 -060036 unsigned int flags;
Jason Gunthorpe01ad1fa2013-11-26 13:30:43 -070037 const u8 req_complete_mask;
38 const u8 req_complete_val;
39 bool (*req_canceled)(struct tpm_chip *chip, u8 status);
40 int (*recv) (struct tpm_chip *chip, u8 *buf, size_t len);
41 int (*send) (struct tpm_chip *chip, u8 *buf, size_t len);
42 void (*cancel) (struct tpm_chip *chip);
43 u8 (*status) (struct tpm_chip *chip);
Jerry Snitselaar36ce0892019-01-30 15:06:58 -070044 void (*update_timeouts)(struct tpm_chip *chip,
Jason Gunthorpe8e54caf2014-05-21 18:26:44 -060045 unsigned long *timeout_cap);
Tomas Winkler627448e2018-06-28 18:13:33 +030046 int (*go_idle)(struct tpm_chip *chip);
47 int (*cmd_ready)(struct tpm_chip *chip);
Jarkko Sakkinen877c57d2017-03-24 11:45:49 +020048 int (*request_locality)(struct tpm_chip *chip, int loc);
Tomas Winkler888d8672018-03-05 13:34:49 +020049 int (*relinquish_locality)(struct tpm_chip *chip, int loc);
Azhar Shaikhb3e958c2017-12-22 12:13:44 -080050 void (*clk_enable)(struct tpm_chip *chip, bool value);
Jason Gunthorpe01ad1fa2013-11-26 13:30:43 -070051};
52
Randy Dunlapff76ec12009-10-28 12:26:39 -070053#if defined(CONFIG_TCG_TPM) || defined(CONFIG_TCG_TPM_MODULE)
Rajiv Andrade659aaf22009-02-02 15:23:44 -020054
Jarkko Sakkinenaad887f2017-11-05 13:16:26 +020055extern int tpm_is_tpm2(struct tpm_chip *chip);
Tomas Winkler95adc6b2018-10-19 21:23:07 +030056extern int tpm_pcr_read(struct tpm_chip *chip, u32 pcr_idx, u8 *res_buf);
57extern int tpm_pcr_extend(struct tpm_chip *chip, u32 pcr_idx, const u8 *hash);
Jarkko Sakkinenaad887f2017-11-05 13:16:26 +020058extern int tpm_send(struct tpm_chip *chip, void *cmd, size_t buflen);
59extern int tpm_get_random(struct tpm_chip *chip, u8 *data, size_t max);
60extern int tpm_seal_trusted(struct tpm_chip *chip,
Jarkko Sakkinen954650e2015-05-30 08:09:04 +030061 struct trusted_key_payload *payload,
62 struct trusted_key_options *options);
Jarkko Sakkinenaad887f2017-11-05 13:16:26 +020063extern int tpm_unseal_trusted(struct tpm_chip *chip,
Jarkko Sakkinen954650e2015-05-30 08:09:04 +030064 struct trusted_key_payload *payload,
65 struct trusted_key_options *options);
Stefan Bergeraaae8152018-06-26 15:09:30 -040066extern struct tpm_chip *tpm_default_chip(void);
Mimi Zohard6ba4522009-10-26 09:26:18 -040067#else
Jarkko Sakkinenaad887f2017-11-05 13:16:26 +020068static inline int tpm_is_tpm2(struct tpm_chip *chip)
Jarkko Sakkinen954650e2015-05-30 08:09:04 +030069{
70 return -ENODEV;
71}
Tomas Winkler95adc6b2018-10-19 21:23:07 +030072
73static inline int tpm_pcr_read(struct tpm_chip *chip, u32 pcr_idx, u8 *res_buf)
Jarkko Sakkinenaad887f2017-11-05 13:16:26 +020074{
Mimi Zohard6ba4522009-10-26 09:26:18 -040075 return -ENODEV;
76}
Tomas Winkler95adc6b2018-10-19 21:23:07 +030077
78static inline int tpm_pcr_extend(struct tpm_chip *chip, u32 pcr_idx,
Jarkko Sakkinenaad887f2017-11-05 13:16:26 +020079 const u8 *hash)
80{
Mimi Zohard6ba4522009-10-26 09:26:18 -040081 return -ENODEV;
82}
Tomas Winkler95adc6b2018-10-19 21:23:07 +030083
Jarkko Sakkinenaad887f2017-11-05 13:16:26 +020084static inline int tpm_send(struct tpm_chip *chip, void *cmd, size_t buflen)
85{
Mimi Zoharc749ba92010-11-23 18:54:16 -050086 return -ENODEV;
87}
Jarkko Sakkinenaad887f2017-11-05 13:16:26 +020088static inline int tpm_get_random(struct tpm_chip *chip, u8 *data, size_t max)
89{
Kent Yoder41ab9992012-06-07 13:47:14 -050090 return -ENODEV;
91}
Jarkko Sakkinen954650e2015-05-30 08:09:04 +030092
Jarkko Sakkinenaad887f2017-11-05 13:16:26 +020093static inline int tpm_seal_trusted(struct tpm_chip *chip,
Jarkko Sakkinen954650e2015-05-30 08:09:04 +030094 struct trusted_key_payload *payload,
95 struct trusted_key_options *options)
96{
97 return -ENODEV;
98}
Jarkko Sakkinenaad887f2017-11-05 13:16:26 +020099static inline int tpm_unseal_trusted(struct tpm_chip *chip,
Jarkko Sakkinen954650e2015-05-30 08:09:04 +0300100 struct trusted_key_payload *payload,
101 struct trusted_key_options *options)
102{
103 return -ENODEV;
104}
Stefan Bergeraaae8152018-06-26 15:09:30 -0400105static inline struct tpm_chip *tpm_default_chip(void)
106{
107 return NULL;
108}
Rajiv Andrade659aaf22009-02-02 15:23:44 -0200109#endif
110#endif