123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293 |
- /*
- * Copyright (C) 2004,2007,2008 IBM Corporation
- *
- * Authors:
- * Leendert van Doorn <leendert@watson.ibm.com>
- * Dave Safford <safford@watson.ibm.com>
- * Reiner Sailer <sailer@watson.ibm.com>
- * Kylene Hall <kjhall@us.ibm.com>
- * Debora Velarde <dvelarde@us.ibm.com>
- *
- * Maintained by: <tpmdd_devel@lists.sourceforge.net>
- *
- * Device driver for TCG/TCPA TPM (trusted platform module).
- * Specifications at www.trustedcomputinggroup.org
- *
- * This program is free software; you can redistribute it and/or
- * modify it under the terms of the GNU General Public License as
- * published by the Free Software Foundation, version 2 of the
- * License.
- *
- */
- #ifndef __LINUX_TPM_H__
- #define __LINUX_TPM_H__
- #define TPM_DIGEST_SIZE 20 /* Max TPM v1.2 PCR size */
- /*
- * Chip num is this value or a valid tpm idx
- */
- #define TPM_ANY_NUM 0xFFFF
- struct tpm_chip;
- struct trusted_key_payload;
- struct trusted_key_options;
- struct tpm_class_ops {
- const u8 req_complete_mask;
- const u8 req_complete_val;
- bool (*req_canceled)(struct tpm_chip *chip, u8 status);
- int (*recv) (struct tpm_chip *chip, u8 *buf, size_t len);
- int (*send) (struct tpm_chip *chip, u8 *buf, size_t len);
- void (*cancel) (struct tpm_chip *chip);
- u8 (*status) (struct tpm_chip *chip);
- bool (*update_timeouts)(struct tpm_chip *chip,
- unsigned long *timeout_cap);
- };
- #if defined(CONFIG_TCG_TPM) || defined(CONFIG_TCG_TPM_MODULE)
- extern int tpm_is_tpm2(u32 chip_num);
- extern int tpm_pcr_read(u32 chip_num, int pcr_idx, u8 *res_buf);
- extern int tpm_pcr_extend(u32 chip_num, int pcr_idx, const u8 *hash);
- extern int tpm_send(u32 chip_num, void *cmd, size_t buflen);
- extern int tpm_get_random(u32 chip_num, u8 *data, size_t max);
- extern int tpm_seal_trusted(u32 chip_num,
- struct trusted_key_payload *payload,
- struct trusted_key_options *options);
- extern int tpm_unseal_trusted(u32 chip_num,
- struct trusted_key_payload *payload,
- struct trusted_key_options *options);
- #else
- static inline int tpm_is_tpm2(u32 chip_num)
- {
- return -ENODEV;
- }
- static inline int tpm_pcr_read(u32 chip_num, int pcr_idx, u8 *res_buf) {
- return -ENODEV;
- }
- static inline int tpm_pcr_extend(u32 chip_num, int pcr_idx, const u8 *hash) {
- return -ENODEV;
- }
- static inline int tpm_send(u32 chip_num, void *cmd, size_t buflen) {
- return -ENODEV;
- }
- static inline int tpm_get_random(u32 chip_num, u8 *data, size_t max) {
- return -ENODEV;
- }
- static inline int tpm_seal_trusted(u32 chip_num,
- struct trusted_key_payload *payload,
- struct trusted_key_options *options)
- {
- return -ENODEV;
- }
- static inline int tpm_unseal_trusted(u32 chip_num,
- struct trusted_key_payload *payload,
- struct trusted_key_options *options)
- {
- return -ENODEV;
- }
- #endif
- #endif
|