1 /*
2  * Copyright (C) 2004,2007,2008 IBM Corporation
3  *
4  * Authors:
5  * Leendert van Doorn <leendert@watson.ibm.com>
6  * Dave Safford <safford@watson.ibm.com>
7  * Reiner Sailer <sailer@watson.ibm.com>
8  * Kylene Hall <kjhall@us.ibm.com>
9  * Debora Velarde <dvelarde@us.ibm.com>
10  *
11  * Maintained by: <tpmdd_devel@lists.sourceforge.net>
12  *
13  * Device driver for TCG/TCPA TPM (trusted platform module).
14  * Specifications at www.trustedcomputinggroup.org
15  *
16  * This program is free software; you can redistribute it and/or
17  * modify it under the terms of the GNU General Public License as
18  * published by the Free Software Foundation, version 2 of the
19  * License.
20  *
21  */
22 #ifndef __LINUX_TPM_H__
23 #define __LINUX_TPM_H__
24 
25 #define TPM_DIGEST_SIZE 20	/* Max TPM v1.2 PCR size */
26 
27 /*
28  * Chip num is this value or a valid tpm idx
29  */
30 #define	TPM_ANY_NUM 0xFFFF
31 
32 struct tpm_chip;
33 struct trusted_key_payload;
34 struct trusted_key_options;
35 
36 struct tpm_class_ops {
37 	const u8 req_complete_mask;
38 	const u8 req_complete_val;
39 	bool (*req_canceled)(struct tpm_chip *chip, u8 status);
40 	int (*recv) (struct tpm_chip *chip, u8 *buf, size_t len);
41 	int (*send) (struct tpm_chip *chip, u8 *buf, size_t len);
42 	void (*cancel) (struct tpm_chip *chip);
43 	u8 (*status) (struct tpm_chip *chip);
44 	bool (*update_timeouts)(struct tpm_chip *chip,
45 				unsigned long *timeout_cap);
46 
47 };
48 
49 #if defined(CONFIG_TCG_TPM) || defined(CONFIG_TCG_TPM_MODULE)
50 
51 extern int tpm_is_tpm2(u32 chip_num);
52 extern int tpm_pcr_read(u32 chip_num, int pcr_idx, u8 *res_buf);
53 extern int tpm_pcr_extend(u32 chip_num, int pcr_idx, const u8 *hash);
54 extern int tpm_send(u32 chip_num, void *cmd, size_t buflen);
55 extern int tpm_get_random(u32 chip_num, u8 *data, size_t max);
56 extern int tpm_seal_trusted(u32 chip_num,
57 			    struct trusted_key_payload *payload,
58 			    struct trusted_key_options *options);
59 extern int tpm_unseal_trusted(u32 chip_num,
60 			      struct trusted_key_payload *payload,
61 			      struct trusted_key_options *options);
62 #else
tpm_is_tpm2(u32 chip_num)63 static inline int tpm_is_tpm2(u32 chip_num)
64 {
65 	return -ENODEV;
66 }
tpm_pcr_read(u32 chip_num,int pcr_idx,u8 * res_buf)67 static inline int tpm_pcr_read(u32 chip_num, int pcr_idx, u8 *res_buf) {
68 	return -ENODEV;
69 }
tpm_pcr_extend(u32 chip_num,int pcr_idx,const u8 * hash)70 static inline int tpm_pcr_extend(u32 chip_num, int pcr_idx, const u8 *hash) {
71 	return -ENODEV;
72 }
tpm_send(u32 chip_num,void * cmd,size_t buflen)73 static inline int tpm_send(u32 chip_num, void *cmd, size_t buflen) {
74 	return -ENODEV;
75 }
tpm_get_random(u32 chip_num,u8 * data,size_t max)76 static inline int tpm_get_random(u32 chip_num, u8 *data, size_t max) {
77 	return -ENODEV;
78 }
79 
tpm_seal_trusted(u32 chip_num,struct trusted_key_payload * payload,struct trusted_key_options * options)80 static inline int tpm_seal_trusted(u32 chip_num,
81 				   struct trusted_key_payload *payload,
82 				   struct trusted_key_options *options)
83 {
84 	return -ENODEV;
85 }
tpm_unseal_trusted(u32 chip_num,struct trusted_key_payload * payload,struct trusted_key_options * options)86 static inline int tpm_unseal_trusted(u32 chip_num,
87 				     struct trusted_key_payload *payload,
88 				     struct trusted_key_options *options)
89 {
90 	return -ENODEV;
91 }
92 #endif
93 #endif
94