tpm.h 3.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100
  1. /*
  2. * Copyright (C) 2004,2007,2008 IBM Corporation
  3. *
  4. * Authors:
  5. * Leendert van Doorn <leendert@watson.ibm.com>
  6. * Dave Safford <safford@watson.ibm.com>
  7. * Reiner Sailer <sailer@watson.ibm.com>
  8. * Kylene Hall <kjhall@us.ibm.com>
  9. * Debora Velarde <dvelarde@us.ibm.com>
  10. *
  11. * Maintained by: <tpmdd_devel@lists.sourceforge.net>
  12. *
  13. * Device driver for TCG/TCPA TPM (trusted platform module).
  14. * Specifications at www.trustedcomputinggroup.org
  15. *
  16. * This program is free software; you can redistribute it and/or
  17. * modify it under the terms of the GNU General Public License as
  18. * published by the Free Software Foundation, version 2 of the
  19. * License.
  20. *
  21. */
  22. #ifndef __LINUX_TPM_H__
  23. #define __LINUX_TPM_H__
  24. #define TPM_DIGEST_SIZE 20 /* Max TPM v1.2 PCR size */
  25. struct tpm_chip;
  26. struct trusted_key_payload;
  27. struct trusted_key_options;
  28. enum TPM_OPS_FLAGS {
  29. TPM_OPS_AUTO_STARTUP = BIT(0),
  30. };
  31. struct tpm_class_ops {
  32. unsigned int flags;
  33. const u8 req_complete_mask;
  34. const u8 req_complete_val;
  35. bool (*req_canceled)(struct tpm_chip *chip, u8 status);
  36. int (*recv) (struct tpm_chip *chip, u8 *buf, size_t len);
  37. int (*send) (struct tpm_chip *chip, u8 *buf, size_t len);
  38. void (*cancel) (struct tpm_chip *chip);
  39. u8 (*status) (struct tpm_chip *chip);
  40. bool (*update_timeouts)(struct tpm_chip *chip,
  41. unsigned long *timeout_cap);
  42. int (*request_locality)(struct tpm_chip *chip, int loc);
  43. void (*relinquish_locality)(struct tpm_chip *chip, int loc);
  44. void (*clk_enable)(struct tpm_chip *chip, bool value);
  45. };
  46. #if defined(CONFIG_TCG_TPM) || defined(CONFIG_TCG_TPM_MODULE)
  47. extern int tpm_is_tpm2(struct tpm_chip *chip);
  48. extern int tpm_pcr_read(struct tpm_chip *chip, int pcr_idx, u8 *res_buf);
  49. extern int tpm_pcr_extend(struct tpm_chip *chip, int pcr_idx, const u8 *hash);
  50. extern int tpm_send(struct tpm_chip *chip, void *cmd, size_t buflen);
  51. extern int tpm_get_random(struct tpm_chip *chip, u8 *data, size_t max);
  52. extern int tpm_seal_trusted(struct tpm_chip *chip,
  53. struct trusted_key_payload *payload,
  54. struct trusted_key_options *options);
  55. extern int tpm_unseal_trusted(struct tpm_chip *chip,
  56. struct trusted_key_payload *payload,
  57. struct trusted_key_options *options);
  58. #else
  59. static inline int tpm_is_tpm2(struct tpm_chip *chip)
  60. {
  61. return -ENODEV;
  62. }
  63. static inline int tpm_pcr_read(struct tpm_chip *chip, int pcr_idx, u8 *res_buf)
  64. {
  65. return -ENODEV;
  66. }
  67. static inline int tpm_pcr_extend(struct tpm_chip *chip, int pcr_idx,
  68. const u8 *hash)
  69. {
  70. return -ENODEV;
  71. }
  72. static inline int tpm_send(struct tpm_chip *chip, void *cmd, size_t buflen)
  73. {
  74. return -ENODEV;
  75. }
  76. static inline int tpm_get_random(struct tpm_chip *chip, u8 *data, size_t max)
  77. {
  78. return -ENODEV;
  79. }
  80. static inline int tpm_seal_trusted(struct tpm_chip *chip,
  81. struct trusted_key_payload *payload,
  82. struct trusted_key_options *options)
  83. {
  84. return -ENODEV;
  85. }
  86. static inline int tpm_unseal_trusted(struct tpm_chip *chip,
  87. struct trusted_key_payload *payload,
  88. struct trusted_key_options *options)
  89. {
  90. return -ENODEV;
  91. }
  92. #endif
  93. #endif