tpm.h 2.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293
  1. /*
  2. * Copyright (C) 2004,2007,2008 IBM Corporation
  3. *
  4. * Authors:
  5. * Leendert van Doorn <leendert@watson.ibm.com>
  6. * Dave Safford <safford@watson.ibm.com>
  7. * Reiner Sailer <sailer@watson.ibm.com>
  8. * Kylene Hall <kjhall@us.ibm.com>
  9. * Debora Velarde <dvelarde@us.ibm.com>
  10. *
  11. * Maintained by: <tpmdd_devel@lists.sourceforge.net>
  12. *
  13. * Device driver for TCG/TCPA TPM (trusted platform module).
  14. * Specifications at www.trustedcomputinggroup.org
  15. *
  16. * This program is free software; you can redistribute it and/or
  17. * modify it under the terms of the GNU General Public License as
  18. * published by the Free Software Foundation, version 2 of the
  19. * License.
  20. *
  21. */
  22. #ifndef __LINUX_TPM_H__
  23. #define __LINUX_TPM_H__
  24. #define TPM_DIGEST_SIZE 20 /* Max TPM v1.2 PCR size */
  25. /*
  26. * Chip num is this value or a valid tpm idx
  27. */
  28. #define TPM_ANY_NUM 0xFFFF
  29. struct tpm_chip;
  30. struct trusted_key_payload;
  31. struct trusted_key_options;
  32. struct tpm_class_ops {
  33. const u8 req_complete_mask;
  34. const u8 req_complete_val;
  35. bool (*req_canceled)(struct tpm_chip *chip, u8 status);
  36. int (*recv) (struct tpm_chip *chip, u8 *buf, size_t len);
  37. int (*send) (struct tpm_chip *chip, u8 *buf, size_t len);
  38. void (*cancel) (struct tpm_chip *chip);
  39. u8 (*status) (struct tpm_chip *chip);
  40. bool (*update_timeouts)(struct tpm_chip *chip,
  41. unsigned long *timeout_cap);
  42. };
  43. #if defined(CONFIG_TCG_TPM) || defined(CONFIG_TCG_TPM_MODULE)
  44. extern int tpm_is_tpm2(u32 chip_num);
  45. extern int tpm_pcr_read(u32 chip_num, int pcr_idx, u8 *res_buf);
  46. extern int tpm_pcr_extend(u32 chip_num, int pcr_idx, const u8 *hash);
  47. extern int tpm_send(u32 chip_num, void *cmd, size_t buflen);
  48. extern int tpm_get_random(u32 chip_num, u8 *data, size_t max);
  49. extern int tpm_seal_trusted(u32 chip_num,
  50. struct trusted_key_payload *payload,
  51. struct trusted_key_options *options);
  52. extern int tpm_unseal_trusted(u32 chip_num,
  53. struct trusted_key_payload *payload,
  54. struct trusted_key_options *options);
  55. #else
  56. static inline int tpm_is_tpm2(u32 chip_num)
  57. {
  58. return -ENODEV;
  59. }
  60. static inline int tpm_pcr_read(u32 chip_num, int pcr_idx, u8 *res_buf) {
  61. return -ENODEV;
  62. }
  63. static inline int tpm_pcr_extend(u32 chip_num, int pcr_idx, const u8 *hash) {
  64. return -ENODEV;
  65. }
  66. static inline int tpm_send(u32 chip_num, void *cmd, size_t buflen) {
  67. return -ENODEV;
  68. }
  69. static inline int tpm_get_random(u32 chip_num, u8 *data, size_t max) {
  70. return -ENODEV;
  71. }
  72. static inline int tpm_seal_trusted(u32 chip_num,
  73. struct trusted_key_payload *payload,
  74. struct trusted_key_options *options)
  75. {
  76. return -ENODEV;
  77. }
  78. static inline int tpm_unseal_trusted(u32 chip_num,
  79. struct trusted_key_payload *payload,
  80. struct trusted_key_options *options)
  81. {
  82. return -ENODEV;
  83. }
  84. #endif
  85. #endif