blob: 706e63eea0800123d50dae79cfae327f6dacaa51 [file] [log] [blame]
Rajiv Andrade659aaf22009-02-02 15:23:44 -02001/*
2 * Copyright (C) 2004,2007,2008 IBM Corporation
3 *
4 * Authors:
5 * Leendert van Doorn <leendert@watson.ibm.com>
6 * Dave Safford <safford@watson.ibm.com>
7 * Reiner Sailer <sailer@watson.ibm.com>
8 * Kylene Hall <kjhall@us.ibm.com>
9 * Debora Velarde <dvelarde@us.ibm.com>
10 *
11 * Maintained by: <tpmdd_devel@lists.sourceforge.net>
12 *
13 * Device driver for TCG/TCPA TPM (trusted platform module).
14 * Specifications at www.trustedcomputinggroup.org
15 *
16 * This program is free software; you can redistribute it and/or
17 * modify it under the terms of the GNU General Public License as
18 * published by the Free Software Foundation, version 2 of the
19 * License.
20 *
21 */
22#ifndef __LINUX_TPM_H__
23#define __LINUX_TPM_H__
24
Mimi Zohar1c16c962013-05-21 10:40:47 -040025#define TPM_DIGEST_SIZE 20 /* Max TPM v1.2 PCR size */
26
Rajiv Andrade659aaf22009-02-02 15:23:44 -020027/*
28 * Chip num is this value or a valid tpm idx
29 */
30#define TPM_ANY_NUM 0xFFFF
31
Jason Gunthorpe01ad1fa2013-11-26 13:30:43 -070032struct tpm_chip;
Jarkko Sakkinen954650e2015-05-30 08:09:04 +030033struct trusted_key_payload;
34struct trusted_key_options;
Jason Gunthorpe01ad1fa2013-11-26 13:30:43 -070035
36struct tpm_class_ops {
37 const u8 req_complete_mask;
38 const u8 req_complete_val;
39 bool (*req_canceled)(struct tpm_chip *chip, u8 status);
40 int (*recv) (struct tpm_chip *chip, u8 *buf, size_t len);
41 int (*send) (struct tpm_chip *chip, u8 *buf, size_t len);
42 void (*cancel) (struct tpm_chip *chip);
43 u8 (*status) (struct tpm_chip *chip);
Jason Gunthorpe8e54caf2014-05-21 18:26:44 -060044 bool (*update_timeouts)(struct tpm_chip *chip,
45 unsigned long *timeout_cap);
46
Jason Gunthorpe01ad1fa2013-11-26 13:30:43 -070047};
48
Randy Dunlapff76ec12009-10-28 12:26:39 -070049#if defined(CONFIG_TCG_TPM) || defined(CONFIG_TCG_TPM_MODULE)
Rajiv Andrade659aaf22009-02-02 15:23:44 -020050
Jarkko Sakkinen954650e2015-05-30 08:09:04 +030051extern int tpm_is_tpm2(u32 chip_num);
Rajiv Andrade659aaf22009-02-02 15:23:44 -020052extern int tpm_pcr_read(u32 chip_num, int pcr_idx, u8 *res_buf);
53extern int tpm_pcr_extend(u32 chip_num, int pcr_idx, const u8 *hash);
Mimi Zoharc749ba92010-11-23 18:54:16 -050054extern int tpm_send(u32 chip_num, void *cmd, size_t buflen);
Kent Yoder41ab9992012-06-07 13:47:14 -050055extern int tpm_get_random(u32 chip_num, u8 *data, size_t max);
Jarkko Sakkinen954650e2015-05-30 08:09:04 +030056extern int tpm_seal_trusted(u32 chip_num,
57 struct trusted_key_payload *payload,
58 struct trusted_key_options *options);
59extern int tpm_unseal_trusted(u32 chip_num,
60 struct trusted_key_payload *payload,
61 struct trusted_key_options *options);
Mimi Zohard6ba4522009-10-26 09:26:18 -040062#else
Jarkko Sakkinen954650e2015-05-30 08:09:04 +030063static inline int tpm_is_tpm2(u32 chip_num)
64{
65 return -ENODEV;
66}
Mimi Zohard6ba4522009-10-26 09:26:18 -040067static inline int tpm_pcr_read(u32 chip_num, int pcr_idx, u8 *res_buf) {
68 return -ENODEV;
69}
70static inline int tpm_pcr_extend(u32 chip_num, int pcr_idx, const u8 *hash) {
71 return -ENODEV;
72}
Mimi Zoharc749ba92010-11-23 18:54:16 -050073static inline int tpm_send(u32 chip_num, void *cmd, size_t buflen) {
74 return -ENODEV;
75}
Kent Yoder41ab9992012-06-07 13:47:14 -050076static inline int tpm_get_random(u32 chip_num, u8 *data, size_t max) {
77 return -ENODEV;
78}
Jarkko Sakkinen954650e2015-05-30 08:09:04 +030079
80static inline int tpm_seal_trusted(u32 chip_num,
81 struct trusted_key_payload *payload,
82 struct trusted_key_options *options)
83{
84 return -ENODEV;
85}
86static inline int tpm_unseal_trusted(u32 chip_num,
87 struct trusted_key_payload *payload,
88 struct trusted_key_options *options)
89{
90 return -ENODEV;
91}
Rajiv Andrade659aaf22009-02-02 15:23:44 -020092#endif
93#endif