| /* |
| * Copyright (C) 2004,2007,2008 IBM Corporation |
| * |
| * Authors: |
| * Leendert van Doorn <leendert@watson.ibm.com> |
| * Dave Safford <safford@watson.ibm.com> |
| * Reiner Sailer <sailer@watson.ibm.com> |
| * Kylene Hall <kjhall@us.ibm.com> |
| * Debora Velarde <dvelarde@us.ibm.com> |
| * |
| * Maintained by: <tpmdd_devel@lists.sourceforge.net> |
| * |
| * Device driver for TCG/TCPA TPM (trusted platform module). |
| * Specifications at www.trustedcomputinggroup.org |
| * |
| * This program is free software; you can redistribute it and/or |
| * modify it under the terms of the GNU General Public License as |
| * published by the Free Software Foundation, version 2 of the |
| * License. |
| * |
| */ |
| #ifndef __LINUX_TPM_H__ |
| #define __LINUX_TPM_H__ |
| |
| #define TPM_DIGEST_SIZE 20 /* Max TPM v1.2 PCR size */ |
| |
| /* |
| * Chip num is this value or a valid tpm idx |
| */ |
| #define TPM_ANY_NUM 0xFFFF |
| |
| struct tpm_chip; |
| struct trusted_key_payload; |
| struct trusted_key_options; |
| |
| enum TPM_OPS_FLAGS { |
| TPM_OPS_AUTO_STARTUP = BIT(0), |
| }; |
| |
| struct tpm_class_ops { |
| unsigned int flags; |
| const u8 req_complete_mask; |
| const u8 req_complete_val; |
| bool (*req_canceled)(struct tpm_chip *chip, u8 status); |
| int (*recv) (struct tpm_chip *chip, u8 *buf, size_t len); |
| int (*send) (struct tpm_chip *chip, u8 *buf, size_t len); |
| void (*cancel) (struct tpm_chip *chip); |
| u8 (*status) (struct tpm_chip *chip); |
| bool (*update_timeouts)(struct tpm_chip *chip, |
| unsigned long *timeout_cap); |
| int (*request_locality)(struct tpm_chip *chip, int loc); |
| void (*relinquish_locality)(struct tpm_chip *chip, int loc); |
| }; |
| |
| #if defined(CONFIG_TCG_TPM) || defined(CONFIG_TCG_TPM_MODULE) |
| |
| extern int tpm_is_tpm2(u32 chip_num); |
| extern int tpm_pcr_read(u32 chip_num, int pcr_idx, u8 *res_buf); |
| extern int tpm_pcr_extend(u32 chip_num, int pcr_idx, const u8 *hash); |
| extern int tpm_send(u32 chip_num, void *cmd, size_t buflen); |
| extern int tpm_get_random(u32 chip_num, u8 *data, size_t max); |
| extern int tpm_seal_trusted(u32 chip_num, |
| struct trusted_key_payload *payload, |
| struct trusted_key_options *options); |
| extern int tpm_unseal_trusted(u32 chip_num, |
| struct trusted_key_payload *payload, |
| struct trusted_key_options *options); |
| #else |
| static inline int tpm_is_tpm2(u32 chip_num) |
| { |
| return -ENODEV; |
| } |
| static inline int tpm_pcr_read(u32 chip_num, int pcr_idx, u8 *res_buf) { |
| return -ENODEV; |
| } |
| static inline int tpm_pcr_extend(u32 chip_num, int pcr_idx, const u8 *hash) { |
| return -ENODEV; |
| } |
| static inline int tpm_send(u32 chip_num, void *cmd, size_t buflen) { |
| return -ENODEV; |
| } |
| static inline int tpm_get_random(u32 chip_num, u8 *data, size_t max) { |
| return -ENODEV; |
| } |
| |
| static inline int tpm_seal_trusted(u32 chip_num, |
| struct trusted_key_payload *payload, |
| struct trusted_key_options *options) |
| { |
| return -ENODEV; |
| } |
| static inline int tpm_unseal_trusted(u32 chip_num, |
| struct trusted_key_payload *payload, |
| struct trusted_key_options *options) |
| { |
| return -ENODEV; |
| } |
| #endif |
| #endif |