at v4.14 2.9 kB view raw
1/* 2 * Copyright (C) 2004,2007,2008 IBM Corporation 3 * 4 * Authors: 5 * Leendert van Doorn <leendert@watson.ibm.com> 6 * Dave Safford <safford@watson.ibm.com> 7 * Reiner Sailer <sailer@watson.ibm.com> 8 * Kylene Hall <kjhall@us.ibm.com> 9 * Debora Velarde <dvelarde@us.ibm.com> 10 * 11 * Maintained by: <tpmdd_devel@lists.sourceforge.net> 12 * 13 * Device driver for TCG/TCPA TPM (trusted platform module). 14 * Specifications at www.trustedcomputinggroup.org 15 * 16 * This program is free software; you can redistribute it and/or 17 * modify it under the terms of the GNU General Public License as 18 * published by the Free Software Foundation, version 2 of the 19 * License. 20 * 21 */ 22#ifndef __LINUX_TPM_H__ 23#define __LINUX_TPM_H__ 24 25#define TPM_DIGEST_SIZE 20 /* Max TPM v1.2 PCR size */ 26 27/* 28 * Chip num is this value or a valid tpm idx 29 */ 30#define TPM_ANY_NUM 0xFFFF 31 32struct tpm_chip; 33struct trusted_key_payload; 34struct trusted_key_options; 35 36enum TPM_OPS_FLAGS { 37 TPM_OPS_AUTO_STARTUP = BIT(0), 38}; 39 40struct tpm_class_ops { 41 unsigned int flags; 42 const u8 req_complete_mask; 43 const u8 req_complete_val; 44 bool (*req_canceled)(struct tpm_chip *chip, u8 status); 45 int (*recv) (struct tpm_chip *chip, u8 *buf, size_t len); 46 int (*send) (struct tpm_chip *chip, u8 *buf, size_t len); 47 void (*cancel) (struct tpm_chip *chip); 48 u8 (*status) (struct tpm_chip *chip); 49 bool (*update_timeouts)(struct tpm_chip *chip, 50 unsigned long *timeout_cap); 51 int (*request_locality)(struct tpm_chip *chip, int loc); 52 void (*relinquish_locality)(struct tpm_chip *chip, int loc); 53}; 54 55#if defined(CONFIG_TCG_TPM) || defined(CONFIG_TCG_TPM_MODULE) 56 57extern int tpm_is_tpm2(u32 chip_num); 58extern int tpm_pcr_read(u32 chip_num, int pcr_idx, u8 *res_buf); 59extern int tpm_pcr_extend(u32 chip_num, int pcr_idx, const u8 *hash); 60extern int tpm_send(u32 chip_num, void *cmd, size_t buflen); 61extern int tpm_get_random(u32 chip_num, u8 *data, size_t max); 62extern int tpm_seal_trusted(u32 chip_num, 63 struct trusted_key_payload *payload, 64 struct trusted_key_options *options); 65extern int tpm_unseal_trusted(u32 chip_num, 66 struct trusted_key_payload *payload, 67 struct trusted_key_options *options); 68#else 69static inline int tpm_is_tpm2(u32 chip_num) 70{ 71 return -ENODEV; 72} 73static inline int tpm_pcr_read(u32 chip_num, int pcr_idx, u8 *res_buf) { 74 return -ENODEV; 75} 76static inline int tpm_pcr_extend(u32 chip_num, int pcr_idx, const u8 *hash) { 77 return -ENODEV; 78} 79static inline int tpm_send(u32 chip_num, void *cmd, size_t buflen) { 80 return -ENODEV; 81} 82static inline int tpm_get_random(u32 chip_num, u8 *data, size_t max) { 83 return -ENODEV; 84} 85 86static inline int tpm_seal_trusted(u32 chip_num, 87 struct trusted_key_payload *payload, 88 struct trusted_key_options *options) 89{ 90 return -ENODEV; 91} 92static inline int tpm_unseal_trusted(u32 chip_num, 93 struct trusted_key_payload *payload, 94 struct trusted_key_options *options) 95{ 96 return -ENODEV; 97} 98#endif 99#endif