at v4.10 2.8 kB view raw
1/* 2 * Copyright (C) 2004,2007,2008 IBM Corporation 3 * 4 * Authors: 5 * Leendert van Doorn <leendert@watson.ibm.com> 6 * Dave Safford <safford@watson.ibm.com> 7 * Reiner Sailer <sailer@watson.ibm.com> 8 * Kylene Hall <kjhall@us.ibm.com> 9 * Debora Velarde <dvelarde@us.ibm.com> 10 * 11 * Maintained by: <tpmdd_devel@lists.sourceforge.net> 12 * 13 * Device driver for TCG/TCPA TPM (trusted platform module). 14 * Specifications at www.trustedcomputinggroup.org 15 * 16 * This program is free software; you can redistribute it and/or 17 * modify it under the terms of the GNU General Public License as 18 * published by the Free Software Foundation, version 2 of the 19 * License. 20 * 21 */ 22#ifndef __LINUX_TPM_H__ 23#define __LINUX_TPM_H__ 24 25#define TPM_DIGEST_SIZE 20 /* Max TPM v1.2 PCR size */ 26 27/* 28 * Chip num is this value or a valid tpm idx 29 */ 30#define TPM_ANY_NUM 0xFFFF 31 32struct tpm_chip; 33struct trusted_key_payload; 34struct trusted_key_options; 35 36enum TPM_OPS_FLAGS { 37 TPM_OPS_AUTO_STARTUP = BIT(0), 38}; 39 40struct tpm_class_ops { 41 unsigned int flags; 42 const u8 req_complete_mask; 43 const u8 req_complete_val; 44 bool (*req_canceled)(struct tpm_chip *chip, u8 status); 45 int (*recv) (struct tpm_chip *chip, u8 *buf, size_t len); 46 int (*send) (struct tpm_chip *chip, u8 *buf, size_t len); 47 void (*cancel) (struct tpm_chip *chip); 48 u8 (*status) (struct tpm_chip *chip); 49 bool (*update_timeouts)(struct tpm_chip *chip, 50 unsigned long *timeout_cap); 51 52}; 53 54#if defined(CONFIG_TCG_TPM) || defined(CONFIG_TCG_TPM_MODULE) 55 56extern int tpm_is_tpm2(u32 chip_num); 57extern int tpm_pcr_read(u32 chip_num, int pcr_idx, u8 *res_buf); 58extern int tpm_pcr_extend(u32 chip_num, int pcr_idx, const u8 *hash); 59extern int tpm_send(u32 chip_num, void *cmd, size_t buflen); 60extern int tpm_get_random(u32 chip_num, u8 *data, size_t max); 61extern int tpm_seal_trusted(u32 chip_num, 62 struct trusted_key_payload *payload, 63 struct trusted_key_options *options); 64extern int tpm_unseal_trusted(u32 chip_num, 65 struct trusted_key_payload *payload, 66 struct trusted_key_options *options); 67#else 68static inline int tpm_is_tpm2(u32 chip_num) 69{ 70 return -ENODEV; 71} 72static inline int tpm_pcr_read(u32 chip_num, int pcr_idx, u8 *res_buf) { 73 return -ENODEV; 74} 75static inline int tpm_pcr_extend(u32 chip_num, int pcr_idx, const u8 *hash) { 76 return -ENODEV; 77} 78static inline int tpm_send(u32 chip_num, void *cmd, size_t buflen) { 79 return -ENODEV; 80} 81static inline int tpm_get_random(u32 chip_num, u8 *data, size_t max) { 82 return -ENODEV; 83} 84 85static inline int tpm_seal_trusted(u32 chip_num, 86 struct trusted_key_payload *payload, 87 struct trusted_key_options *options) 88{ 89 return -ENODEV; 90} 91static inline int tpm_unseal_trusted(u32 chip_num, 92 struct trusted_key_payload *payload, 93 struct trusted_key_options *options) 94{ 95 return -ENODEV; 96} 97#endif 98#endif