]>
Commit | Line | Data |
---|---|---|
bfe8fa26 SG |
1 | /* SPDX-License-Identifier: GPL-2.0+ */ |
2 | /* | |
3 | * Copyright (c) 2013 The Chromium OS Authors. | |
4 | * Coypright (c) 2013 Guntermann & Drunck GmbH | |
5 | */ | |
6 | ||
7 | #ifndef __TPM_API_H | |
8 | #define __TPM_API_H | |
9 | ||
10 | #include <tpm-common.h> | |
11 | #include <tpm-v1.h> | |
12 | #include <tpm-v2.h> | |
13 | ||
14 | /** | |
15 | * Issue a TPM_Startup command. | |
16 | * | |
17 | * @param dev TPM device | |
18 | * @param mode TPM startup mode | |
185f812c | 19 | * Return: return code of the operation |
bfe8fa26 SG |
20 | */ |
21 | u32 tpm_startup(struct udevice *dev, enum tpm_startup_type mode); | |
22 | ||
23 | /** | |
24 | * Issue a TPM_SelfTestFull command. | |
25 | * | |
26 | * @param dev TPM device | |
185f812c | 27 | * Return: return code of the operation |
bfe8fa26 SG |
28 | */ |
29 | u32 tpm_self_test_full(struct udevice *dev); | |
30 | ||
31 | /** | |
32 | * Issue a TPM_ContinueSelfTest command. | |
33 | * | |
34 | * @param dev TPM device | |
185f812c | 35 | * Return: return code of the operation |
bfe8fa26 SG |
36 | */ |
37 | u32 tpm_continue_self_test(struct udevice *dev); | |
38 | ||
39 | /** | |
40 | * Issue a TPM_NV_DefineSpace command. The implementation is limited | |
41 | * to specify TPM_NV_ATTRIBUTES and size of the area. The area index | |
42 | * could be one of the special value listed in enum tpm_nv_index. | |
43 | * | |
44 | * @param dev TPM device | |
45 | * @param index index of the area | |
46 | * @param perm TPM_NV_ATTRIBUTES of the area | |
47 | * @param size size of the area | |
185f812c | 48 | * Return: return code of the operation |
bfe8fa26 SG |
49 | */ |
50 | u32 tpm_nv_define_space(struct udevice *dev, u32 index, u32 perm, u32 size); | |
51 | ||
52 | /** | |
53 | * Issue a TPM_NV_ReadValue command. This implementation is limited | |
54 | * to read the area from offset 0. The area index could be one of | |
55 | * the special value listed in enum tpm_nv_index. | |
56 | * | |
57 | * @param dev TPM device | |
58 | * @param index index of the area | |
59 | * @param data output buffer of the area contents | |
60 | * @param count size of output buffer | |
185f812c | 61 | * Return: return code of the operation |
bfe8fa26 SG |
62 | */ |
63 | u32 tpm_nv_read_value(struct udevice *dev, u32 index, void *data, u32 count); | |
64 | ||
65 | /** | |
66 | * Issue a TPM_NV_WriteValue command. This implementation is limited | |
67 | * to write the area from offset 0. The area index could be one of | |
68 | * the special value listed in enum tpm_nv_index. | |
69 | * | |
70 | * @param dev TPM device | |
71 | * @param index index of the area | |
72 | * @param data input buffer to be wrote to the area | |
73 | * @param length length of data bytes of input buffer | |
185f812c | 74 | * Return: return code of the operation |
bfe8fa26 SG |
75 | */ |
76 | u32 tpm_nv_write_value(struct udevice *dev, u32 index, const void *data, | |
77 | u32 length); | |
78 | ||
79 | /** | |
80 | * Issue a TPM_Extend command. | |
81 | * | |
82 | * @param dev TPM device | |
83 | * @param index index of the PCR | |
a557d258 | 84 | * @param in_digest 160/256-bit value representing the event to be |
bfe8fa26 | 85 | * recorded |
a557d258 SG |
86 | * @param size size of digest in bytes |
87 | * @param out_digest 160/256-bit PCR value after execution of the | |
bfe8fa26 | 88 | * command |
a557d258 | 89 | * @param name digest source, used for log output |
185f812c | 90 | * Return: return code of the operation |
bfe8fa26 SG |
91 | */ |
92 | u32 tpm_pcr_extend(struct udevice *dev, u32 index, const void *in_digest, | |
a557d258 | 93 | uint size, void *out_digest, const char *name); |
bfe8fa26 SG |
94 | |
95 | /** | |
96 | * Issue a TPM_PCRRead command. | |
97 | * | |
98 | * @param dev TPM device | |
99 | * @param index index of the PCR | |
100 | * @param data output buffer for contents of the named PCR | |
101 | * @param count size of output buffer | |
185f812c | 102 | * Return: return code of the operation |
bfe8fa26 SG |
103 | */ |
104 | u32 tpm_pcr_read(struct udevice *dev, u32 index, void *data, size_t count); | |
105 | ||
106 | /** | |
107 | * Issue a TSC_PhysicalPresence command. TPM physical presence flag | |
108 | * is bit-wise OR'ed of flags listed in enum tpm_physical_presence. | |
109 | * | |
110 | * @param dev TPM device | |
111 | * @param presence TPM physical presence flag | |
185f812c | 112 | * Return: return code of the operation |
bfe8fa26 SG |
113 | */ |
114 | u32 tpm_tsc_physical_presence(struct udevice *dev, u16 presence); | |
115 | ||
116 | /** | |
117 | * Issue a TPM_ReadPubek command. | |
118 | * | |
119 | * @param dev TPM device | |
120 | * @param data output buffer for the public endorsement key | |
121 | * @param count size of output buffer | |
185f812c | 122 | * Return: return code of the operation |
bfe8fa26 SG |
123 | */ |
124 | u32 tpm_read_pubek(struct udevice *dev, void *data, size_t count); | |
125 | ||
126 | /** | |
127 | * Issue a TPM_ForceClear command. | |
128 | * | |
129 | * @param dev TPM device | |
185f812c | 130 | * Return: return code of the operation |
bfe8fa26 SG |
131 | */ |
132 | u32 tpm_force_clear(struct udevice *dev); | |
133 | ||
134 | /** | |
135 | * Issue a TPM_PhysicalEnable command. | |
136 | * | |
137 | * @param dev TPM device | |
185f812c | 138 | * Return: return code of the operation |
bfe8fa26 SG |
139 | */ |
140 | u32 tpm_physical_enable(struct udevice *dev); | |
141 | ||
142 | /** | |
143 | * Issue a TPM_PhysicalDisable command. | |
144 | * | |
145 | * @param dev TPM device | |
185f812c | 146 | * Return: return code of the operation |
bfe8fa26 SG |
147 | */ |
148 | u32 tpm_physical_disable(struct udevice *dev); | |
149 | ||
150 | /** | |
151 | * Issue a TPM_PhysicalSetDeactivated command. | |
152 | * | |
153 | * @param dev TPM device | |
154 | * @param state boolean state of the deactivated flag | |
185f812c | 155 | * Return: return code of the operation |
bfe8fa26 SG |
156 | */ |
157 | u32 tpm_physical_set_deactivated(struct udevice *dev, u8 state); | |
158 | ||
159 | /** | |
160 | * Issue a TPM_GetCapability command. This implementation is limited | |
161 | * to query sub_cap index that is 4-byte wide. | |
162 | * | |
163 | * @param dev TPM device | |
164 | * @param cap_area partition of capabilities | |
165 | * @param sub_cap further definition of capability, which is | |
166 | * limited to be 4-byte wide | |
167 | * @param cap output buffer for capability information | |
168 | * @param count size of output buffer | |
185f812c | 169 | * Return: return code of the operation |
bfe8fa26 SG |
170 | */ |
171 | u32 tpm_get_capability(struct udevice *dev, u32 cap_area, u32 sub_cap, | |
172 | void *cap, size_t count); | |
173 | ||
174 | /** | |
175 | * Issue a TPM_FlushSpecific command for a AUTH resource. | |
176 | * | |
177 | * @param dev TPM device | |
178 | * @param auth_handle handle of the auth session | |
185f812c | 179 | * Return: return code of the operation |
bfe8fa26 SG |
180 | */ |
181 | u32 tpm_terminate_auth_session(struct udevice *dev, u32 auth_handle); | |
182 | ||
183 | /** | |
184 | * Issue a TPM_OIAP command to setup an object independent authorization | |
185 | * session. | |
186 | * Information about the session is stored internally. | |
187 | * If there was already an OIAP session active it is terminated and a new | |
188 | * session is set up. | |
189 | * | |
190 | * @param dev TPM device | |
191 | * @param auth_handle pointer to the (new) auth handle or NULL. | |
185f812c | 192 | * Return: return code of the operation |
bfe8fa26 SG |
193 | */ |
194 | u32 tpm_oiap(struct udevice *dev, u32 *auth_handle); | |
195 | ||
196 | /** | |
197 | * Ends an active OIAP session. | |
198 | * | |
199 | * @param dev TPM device | |
185f812c | 200 | * Return: return code of the operation |
bfe8fa26 SG |
201 | */ |
202 | u32 tpm_end_oiap(struct udevice *dev); | |
203 | ||
204 | /** | |
205 | * Issue a TPM_LoadKey2 (Auth1) command using an OIAP session for authenticating | |
206 | * the usage of the parent key. | |
207 | * | |
208 | * @param dev TPM device | |
209 | * @param parent_handle handle of the parent key. | |
210 | * @param key pointer to the key structure (TPM_KEY or TPM_KEY12). | |
211 | * @param key_length size of the key structure | |
212 | * @param parent_key_usage_auth usage auth for the parent key | |
213 | * @param key_handle pointer to the key handle | |
185f812c | 214 | * Return: return code of the operation |
bfe8fa26 SG |
215 | */ |
216 | u32 tpm_load_key2_oiap(struct udevice *dev, u32 parent_handle, const void *key, | |
217 | size_t key_length, const void *parent_key_usage_auth, | |
218 | u32 *key_handle); | |
219 | ||
220 | /** | |
221 | * Issue a TPM_GetPubKey (Auth1) command using an OIAP session for | |
222 | * authenticating the usage of the key. | |
223 | * | |
224 | * @param dev TPM device | |
225 | * @param key_handle handle of the key | |
226 | * @param usage_auth usage auth for the key | |
227 | * @param pubkey pointer to the pub key buffer; may be NULL if the pubkey | |
228 | * should not be stored. | |
229 | * @param pubkey_len pointer to the pub key buffer len. On entry: the size of | |
230 | * the provided pubkey buffer. On successful exit: the size | |
231 | * of the stored TPM_PUBKEY structure (iff pubkey != NULL). | |
185f812c | 232 | * Return: return code of the operation |
bfe8fa26 SG |
233 | */ |
234 | u32 tpm_get_pub_key_oiap(struct udevice *dev, u32 key_handle, | |
235 | const void *usage_auth, void *pubkey, | |
236 | size_t *pubkey_len); | |
237 | ||
238 | /** | |
239 | * Get the TPM permissions | |
240 | * | |
241 | * @param dev TPM device | |
242 | * @param perm Returns permissions value | |
185f812c | 243 | * Return: return code of the operation |
bfe8fa26 SG |
244 | */ |
245 | u32 tpm_get_permissions(struct udevice *dev, u32 index, u32 *perm); | |
246 | ||
247 | /** | |
248 | * Flush a resource with a given handle and type from the TPM | |
249 | * | |
250 | * @param dev TPM device | |
251 | * @param key_handle handle of the resource | |
252 | * @param resource_type type of the resource | |
185f812c | 253 | * Return: return code of the operation |
bfe8fa26 SG |
254 | */ |
255 | u32 tpm_flush_specific(struct udevice *dev, u32 key_handle, u32 resource_type); | |
256 | ||
257 | #ifdef CONFIG_TPM_LOAD_KEY_BY_SHA1 | |
258 | /** | |
259 | * Search for a key by usage AuthData and the hash of the parent's pub key. | |
260 | * | |
261 | * @param dev TPM device | |
262 | * @param auth Usage auth of the key to search for | |
263 | * @param pubkey_digest SHA1 hash of the pub key structure of the key | |
264 | * @param[out] handle The handle of the key (Non-null iff found) | |
185f812c | 265 | * Return: 0 if key was found in TPM; != 0 if not. |
bfe8fa26 SG |
266 | */ |
267 | u32 tpm_find_key_sha1(struct udevice *dev, const u8 auth[20], | |
268 | const u8 pubkey_digest[20], u32 *handle); | |
269 | #endif /* CONFIG_TPM_LOAD_KEY_BY_SHA1 */ | |
270 | ||
271 | /** | |
272 | * Read random bytes from the TPM RNG. The implementation deals with the fact | |
273 | * that the TPM may legally return fewer bytes than requested by retrying | |
274 | * until @p count bytes have been received. | |
275 | * | |
276 | * @param dev TPM device | |
277 | * @param data output buffer for the random bytes | |
278 | * @param count size of output buffer | |
185f812c | 279 | * Return: return code of the operation |
bfe8fa26 SG |
280 | */ |
281 | u32 tpm_get_random(struct udevice *dev, void *data, u32 count); | |
282 | ||
283 | /** | |
284 | * tpm_finalise_physical_presence() - Finalise physical presence | |
285 | * | |
286 | * @param dev TPM device | |
185f812c | 287 | * Return: return code of the operation (0 = success) |
bfe8fa26 SG |
288 | */ |
289 | u32 tpm_finalise_physical_presence(struct udevice *dev); | |
290 | ||
291 | /** | |
292 | * tpm_nv_enable_locking() - lock the non-volatile space | |
293 | * | |
294 | * @param dev TPM device | |
185f812c | 295 | * Return: return code of the operation (0 = success) |
bfe8fa26 SG |
296 | */ |
297 | u32 tpm_nv_enable_locking(struct udevice *dev); | |
298 | ||
299 | /** | |
300 | * tpm_set_global_lock() - set the global lock | |
301 | * | |
302 | * @param dev TPM device | |
185f812c | 303 | * Return: return code of the operation (0 = success) |
bfe8fa26 SG |
304 | */ |
305 | u32 tpm_set_global_lock(struct udevice *dev); | |
306 | ||
307 | /** | |
308 | * tpm_write_lock() - lock the non-volatile space | |
309 | * | |
310 | * @param dev TPM device | |
311 | * @param index Index of space to lock | |
185f812c | 312 | * Return: return code of the operation (0 = success) |
bfe8fa26 SG |
313 | */ |
314 | u32 tpm_write_lock(struct udevice *dev, u32 index); | |
315 | ||
316 | /** | |
317 | * tpm_resume() - start up the TPM from resume (after suspend) | |
318 | * | |
319 | * @param dev TPM device | |
185f812c | 320 | * Return: return code of the operation (0 = success) |
bfe8fa26 SG |
321 | */ |
322 | u32 tpm_resume(struct udevice *dev); | |
323 | ||
5e593782 SG |
324 | static inline bool tpm_is_v1(struct udevice *dev) |
325 | { | |
326 | return IS_ENABLED(CONFIG_TPM_V1) && tpm_get_version(dev) == TPM_V1; | |
327 | } | |
328 | ||
329 | static inline bool tpm_is_v2(struct udevice *dev) | |
330 | { | |
331 | return IS_ENABLED(CONFIG_TPM_V2) && tpm_get_version(dev) == TPM_V2; | |
332 | } | |
333 | ||
a595be3a IA |
334 | /** |
335 | * tpm_auto_start() - start up the TPM and perform selftests | |
336 | * | |
337 | * @param dev TPM device | |
338 | * Return: return code of the operation (0 = success) | |
339 | */ | |
340 | u32 tpm_auto_start(struct udevice *dev); | |
341 | ||
bfe8fa26 | 342 | #endif /* __TPM_API_H */ |