tpm.h 2.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899
  1. /*
  2. * Copyright (C) 2004,2007,2008 IBM Corporation
  3. *
  4. * Authors:
  5. * Leendert van Doorn <leendert@watson.ibm.com>
  6. * Dave Safford <safford@watson.ibm.com>
  7. * Reiner Sailer <sailer@watson.ibm.com>
  8. * Kylene Hall <kjhall@us.ibm.com>
  9. * Debora Velarde <dvelarde@us.ibm.com>
  10. *
  11. * Maintained by: <tpmdd_devel@lists.sourceforge.net>
  12. *
  13. * Device driver for TCG/TCPA TPM (trusted platform module).
  14. * Specifications at www.trustedcomputinggroup.org
  15. *
  16. * This program is free software; you can redistribute it and/or
  17. * modify it under the terms of the GNU General Public License as
  18. * published by the Free Software Foundation, version 2 of the
  19. * License.
  20. *
  21. */
  22. #ifndef __LINUX_TPM_H__
  23. #define __LINUX_TPM_H__
  24. #define TPM_DIGEST_SIZE 20 /* Max TPM v1.2 PCR size */
  25. /*
  26. * Chip num is this value or a valid tpm idx
  27. */
  28. #define TPM_ANY_NUM 0xFFFF
  29. struct tpm_chip;
  30. struct trusted_key_payload;
  31. struct trusted_key_options;
  32. enum TPM_OPS_FLAGS {
  33. TPM_OPS_AUTO_STARTUP = BIT(0),
  34. };
  35. struct tpm_class_ops {
  36. unsigned int flags;
  37. const u8 req_complete_mask;
  38. const u8 req_complete_val;
  39. bool (*req_canceled)(struct tpm_chip *chip, u8 status);
  40. int (*recv) (struct tpm_chip *chip, u8 *buf, size_t len);
  41. int (*send) (struct tpm_chip *chip, u8 *buf, size_t len);
  42. void (*cancel) (struct tpm_chip *chip);
  43. u8 (*status) (struct tpm_chip *chip);
  44. bool (*update_timeouts)(struct tpm_chip *chip,
  45. unsigned long *timeout_cap);
  46. };
  47. #if defined(CONFIG_TCG_TPM) || defined(CONFIG_TCG_TPM_MODULE)
  48. extern int tpm_is_tpm2(u32 chip_num);
  49. extern int tpm_pcr_read(u32 chip_num, int pcr_idx, u8 *res_buf);
  50. extern int tpm_pcr_extend(u32 chip_num, int pcr_idx, const u8 *hash);
  51. extern int tpm_send(u32 chip_num, void *cmd, size_t buflen);
  52. extern int tpm_get_random(u32 chip_num, u8 *data, size_t max);
  53. extern int tpm_seal_trusted(u32 chip_num,
  54. struct trusted_key_payload *payload,
  55. struct trusted_key_options *options);
  56. extern int tpm_unseal_trusted(u32 chip_num,
  57. struct trusted_key_payload *payload,
  58. struct trusted_key_options *options);
  59. #else
  60. static inline int tpm_is_tpm2(u32 chip_num)
  61. {
  62. return -ENODEV;
  63. }
  64. static inline int tpm_pcr_read(u32 chip_num, int pcr_idx, u8 *res_buf) {
  65. return -ENODEV;
  66. }
  67. static inline int tpm_pcr_extend(u32 chip_num, int pcr_idx, const u8 *hash) {
  68. return -ENODEV;
  69. }
  70. static inline int tpm_send(u32 chip_num, void *cmd, size_t buflen) {
  71. return -ENODEV;
  72. }
  73. static inline int tpm_get_random(u32 chip_num, u8 *data, size_t max) {
  74. return -ENODEV;
  75. }
  76. static inline int tpm_seal_trusted(u32 chip_num,
  77. struct trusted_key_payload *payload,
  78. struct trusted_key_options *options)
  79. {
  80. return -ENODEV;
  81. }
  82. static inline int tpm_unseal_trusted(u32 chip_num,
  83. struct trusted_key_payload *payload,
  84. struct trusted_key_options *options)
  85. {
  86. return -ENODEV;
  87. }
  88. #endif
  89. #endif