]>
Commit | Line | Data |
---|---|---|
83d290c5 | 1 | // SPDX-License-Identifier: GPL-2.0+ |
576fb1ed | 2 | /* |
8732b070 | 3 | * Copyright (c) 2013 The Chromium OS Authors. |
576fb1ed VB |
4 | */ |
5 | ||
6 | #include <common.h> | |
09140113 | 7 | #include <command.h> |
c7694dd4 | 8 | #include <env.h> |
8732b070 | 9 | #include <malloc.h> |
8732b070 | 10 | #include <asm/unaligned.h> |
d677bfe2 MR |
11 | #include <tpm-common.h> |
12 | #include <tpm-v1.h> | |
13 | #include "tpm-user-utils.h" | |
d6a885f0 | 14 | #include <tpm_api.h> |
576fb1ed | 15 | |
09140113 SG |
16 | static int do_tpm_startup(struct cmd_tbl *cmdtp, int flag, int argc, |
17 | char *const argv[]) | |
8732b070 CC |
18 | { |
19 | enum tpm_startup_type mode; | |
abdc7b8a SG |
20 | struct udevice *dev; |
21 | int rc; | |
eea3f4d3 | 22 | |
abdc7b8a SG |
23 | rc = get_tpm(&dev); |
24 | if (rc) | |
25 | return rc; | |
8732b070 CC |
26 | if (argc != 2) |
27 | return CMD_RET_USAGE; | |
28 | if (!strcasecmp("TPM_ST_CLEAR", argv[1])) { | |
29 | mode = TPM_ST_CLEAR; | |
30 | } else if (!strcasecmp("TPM_ST_STATE", argv[1])) { | |
31 | mode = TPM_ST_STATE; | |
32 | } else if (!strcasecmp("TPM_ST_DEACTIVATED", argv[1])) { | |
33 | mode = TPM_ST_DEACTIVATED; | |
34 | } else { | |
35 | printf("Couldn't recognize mode string: %s\n", argv[1]); | |
36 | return CMD_RET_FAILURE; | |
37 | } | |
38 | ||
abdc7b8a | 39 | return report_return_code(tpm_startup(dev, mode)); |
8732b070 CC |
40 | } |
41 | ||
09140113 SG |
42 | static int do_tpm_nv_define_space(struct cmd_tbl *cmdtp, int flag, int argc, |
43 | char *const argv[]) | |
8732b070 | 44 | { |
b9804e5b | 45 | u32 index, perm, size; |
abdc7b8a SG |
46 | struct udevice *dev; |
47 | int rc; | |
48 | ||
49 | rc = get_tpm(&dev); | |
50 | if (rc) | |
51 | return rc; | |
8732b070 CC |
52 | |
53 | if (argc != 4) | |
54 | return CMD_RET_USAGE; | |
55 | index = simple_strtoul(argv[1], NULL, 0); | |
56 | perm = simple_strtoul(argv[2], NULL, 0); | |
57 | size = simple_strtoul(argv[3], NULL, 0); | |
58 | ||
d6a885f0 | 59 | return report_return_code(tpm1_nv_define_space(dev, index, perm, size)); |
8732b070 | 60 | } |
eea3f4d3 | 61 | |
09140113 SG |
62 | static int do_tpm_nv_read_value(struct cmd_tbl *cmdtp, int flag, int argc, |
63 | char *const argv[]) | |
eea3f4d3 | 64 | { |
b9804e5b | 65 | u32 index, count, rc; |
abdc7b8a | 66 | struct udevice *dev; |
8732b070 | 67 | void *data; |
eea3f4d3 | 68 | |
abdc7b8a SG |
69 | rc = get_tpm(&dev); |
70 | if (rc) | |
71 | return rc; | |
72 | ||
8732b070 CC |
73 | if (argc != 4) |
74 | return CMD_RET_USAGE; | |
75 | index = simple_strtoul(argv[1], NULL, 0); | |
76 | data = (void *)simple_strtoul(argv[2], NULL, 0); | |
77 | count = simple_strtoul(argv[3], NULL, 0); | |
78 | ||
abdc7b8a | 79 | rc = tpm_nv_read_value(dev, index, data, count); |
8732b070 CC |
80 | if (!rc) { |
81 | puts("area content:\n"); | |
82 | print_byte_string(data, count); | |
576fb1ed VB |
83 | } |
84 | ||
f8f1fe1d | 85 | return report_return_code(rc); |
8732b070 CC |
86 | } |
87 | ||
09140113 SG |
88 | static int do_tpm_nv_write_value(struct cmd_tbl *cmdtp, int flag, int argc, |
89 | char *const argv[]) | |
8732b070 | 90 | { |
abdc7b8a | 91 | struct udevice *dev; |
b9804e5b | 92 | u32 index, rc; |
8732b070 CC |
93 | size_t count; |
94 | void *data; | |
95 | ||
abdc7b8a SG |
96 | rc = get_tpm(&dev); |
97 | if (rc) | |
98 | return rc; | |
99 | ||
8732b070 CC |
100 | if (argc != 3) |
101 | return CMD_RET_USAGE; | |
102 | index = simple_strtoul(argv[1], NULL, 0); | |
103 | data = parse_byte_string(argv[2], NULL, &count); | |
104 | if (!data) { | |
105 | printf("Couldn't parse byte string %s\n", argv[2]); | |
106 | return CMD_RET_FAILURE; | |
eea3f4d3 LS |
107 | } |
108 | ||
abdc7b8a | 109 | rc = tpm_nv_write_value(dev, index, data, count); |
8732b070 CC |
110 | free(data); |
111 | ||
f8f1fe1d | 112 | return report_return_code(rc); |
8732b070 CC |
113 | } |
114 | ||
09140113 SG |
115 | static int do_tpm_extend(struct cmd_tbl *cmdtp, int flag, int argc, |
116 | char *const argv[]) | |
8732b070 | 117 | { |
b9804e5b | 118 | u8 in_digest[20], out_digest[20]; |
abdc7b8a SG |
119 | struct udevice *dev; |
120 | u32 index, rc; | |
121 | ||
122 | rc = get_tpm(&dev); | |
123 | if (rc) | |
124 | return rc; | |
8732b070 CC |
125 | |
126 | if (argc != 3) | |
127 | return CMD_RET_USAGE; | |
128 | index = simple_strtoul(argv[1], NULL, 0); | |
129 | if (!parse_byte_string(argv[2], in_digest, NULL)) { | |
130 | printf("Couldn't parse byte string %s\n", argv[2]); | |
131 | return CMD_RET_FAILURE; | |
576fb1ed VB |
132 | } |
133 | ||
d6a885f0 | 134 | rc = tpm_pcr_extend(dev, index, in_digest, out_digest); |
8732b070 CC |
135 | if (!rc) { |
136 | puts("PCR value after execution of the command:\n"); | |
137 | print_byte_string(out_digest, sizeof(out_digest)); | |
576fb1ed VB |
138 | } |
139 | ||
f8f1fe1d | 140 | return report_return_code(rc); |
8732b070 CC |
141 | } |
142 | ||
09140113 SG |
143 | static int do_tpm_pcr_read(struct cmd_tbl *cmdtp, int flag, int argc, |
144 | char *const argv[]) | |
8732b070 | 145 | { |
b9804e5b | 146 | u32 index, count, rc; |
abdc7b8a | 147 | struct udevice *dev; |
8732b070 CC |
148 | void *data; |
149 | ||
abdc7b8a SG |
150 | rc = get_tpm(&dev); |
151 | if (rc) | |
152 | return rc; | |
153 | ||
8732b070 CC |
154 | if (argc != 4) |
155 | return CMD_RET_USAGE; | |
156 | index = simple_strtoul(argv[1], NULL, 0); | |
157 | data = (void *)simple_strtoul(argv[2], NULL, 0); | |
158 | count = simple_strtoul(argv[3], NULL, 0); | |
576fb1ed | 159 | |
abdc7b8a | 160 | rc = tpm_pcr_read(dev, index, data, count); |
8732b070 CC |
161 | if (!rc) { |
162 | puts("Named PCR content:\n"); | |
163 | print_byte_string(data, count); | |
576fb1ed VB |
164 | } |
165 | ||
f8f1fe1d | 166 | return report_return_code(rc); |
576fb1ed VB |
167 | } |
168 | ||
09140113 SG |
169 | static int do_tpm_tsc_physical_presence(struct cmd_tbl *cmdtp, int flag, |
170 | int argc, char *const argv[]) | |
8732b070 | 171 | { |
abdc7b8a | 172 | struct udevice *dev; |
b9804e5b | 173 | u16 presence; |
abdc7b8a SG |
174 | int rc; |
175 | ||
176 | rc = get_tpm(&dev); | |
177 | if (rc) | |
178 | return rc; | |
8732b070 CC |
179 | |
180 | if (argc != 2) | |
181 | return CMD_RET_USAGE; | |
b9804e5b | 182 | presence = (u16)simple_strtoul(argv[1], NULL, 0); |
eea3f4d3 | 183 | |
abdc7b8a | 184 | return report_return_code(tpm_tsc_physical_presence(dev, presence)); |
8732b070 CC |
185 | } |
186 | ||
09140113 SG |
187 | static int do_tpm_read_pubek(struct cmd_tbl *cmdtp, int flag, int argc, |
188 | char *const argv[]) | |
eea3f4d3 | 189 | { |
abdc7b8a | 190 | struct udevice *dev; |
b9804e5b | 191 | u32 count, rc; |
8732b070 CC |
192 | void *data; |
193 | ||
abdc7b8a SG |
194 | rc = get_tpm(&dev); |
195 | if (rc) | |
196 | return rc; | |
197 | ||
8732b070 CC |
198 | if (argc != 3) |
199 | return CMD_RET_USAGE; | |
200 | data = (void *)simple_strtoul(argv[1], NULL, 0); | |
201 | count = simple_strtoul(argv[2], NULL, 0); | |
202 | ||
abdc7b8a | 203 | rc = tpm_read_pubek(dev, data, count); |
8732b070 CC |
204 | if (!rc) { |
205 | puts("pubek value:\n"); | |
206 | print_byte_string(data, count); | |
207 | } | |
208 | ||
f8f1fe1d | 209 | return report_return_code(rc); |
eea3f4d3 LS |
210 | } |
211 | ||
09140113 SG |
212 | static int do_tpm_physical_set_deactivated(struct cmd_tbl *cmdtp, int flag, |
213 | int argc, char *const argv[]) | |
8732b070 | 214 | { |
abdc7b8a | 215 | struct udevice *dev; |
b9804e5b | 216 | u8 state; |
abdc7b8a SG |
217 | int rc; |
218 | ||
219 | rc = get_tpm(&dev); | |
220 | if (rc) | |
221 | return rc; | |
8732b070 CC |
222 | |
223 | if (argc != 2) | |
224 | return CMD_RET_USAGE; | |
b9804e5b | 225 | state = (u8)simple_strtoul(argv[1], NULL, 0); |
eea3f4d3 | 226 | |
abdc7b8a | 227 | return report_return_code(tpm_physical_set_deactivated(dev, state)); |
8732b070 CC |
228 | } |
229 | ||
09140113 SG |
230 | static int do_tpm_get_capability(struct cmd_tbl *cmdtp, int flag, int argc, |
231 | char *const argv[]) | |
8732b070 | 232 | { |
b9804e5b | 233 | u32 cap_area, sub_cap, rc; |
8732b070 CC |
234 | void *cap; |
235 | size_t count; | |
abdc7b8a SG |
236 | struct udevice *dev; |
237 | ||
238 | rc = get_tpm(&dev); | |
239 | if (rc) | |
240 | return rc; | |
8732b070 CC |
241 | |
242 | if (argc != 5) | |
243 | return CMD_RET_USAGE; | |
244 | cap_area = simple_strtoul(argv[1], NULL, 0); | |
245 | sub_cap = simple_strtoul(argv[2], NULL, 0); | |
246 | cap = (void *)simple_strtoul(argv[3], NULL, 0); | |
247 | count = simple_strtoul(argv[4], NULL, 0); | |
248 | ||
abdc7b8a | 249 | rc = tpm_get_capability(dev, cap_area, sub_cap, cap, count); |
8732b070 CC |
250 | if (!rc) { |
251 | puts("capability information:\n"); | |
252 | print_byte_string(cap, count); | |
253 | } | |
254 | ||
f8f1fe1d | 255 | return report_return_code(rc); |
8732b070 | 256 | } |
eea3f4d3 | 257 | |
09140113 SG |
258 | static int do_tpm_raw_transfer(struct cmd_tbl *cmdtp, int flag, int argc, |
259 | char *const argv[]) | |
8732b070 | 260 | { |
c2b0f600 | 261 | struct udevice *dev; |
8732b070 | 262 | void *command; |
b9804e5b | 263 | u8 response[1024]; |
8732b070 | 264 | size_t count, response_length = sizeof(response); |
b9804e5b | 265 | u32 rc; |
8732b070 CC |
266 | |
267 | command = parse_byte_string(argv[1], NULL, &count); | |
268 | if (!command) { | |
269 | printf("Couldn't parse byte string %s\n", argv[1]); | |
270 | return CMD_RET_FAILURE; | |
271 | } | |
272 | ||
c8a8c510 SG |
273 | rc = get_tpm(&dev); |
274 | if (rc) | |
275 | return rc; | |
276 | ||
277 | rc = tpm_xfer(dev, command, count, response, &response_length); | |
8732b070 CC |
278 | free(command); |
279 | if (!rc) { | |
280 | puts("tpm response:\n"); | |
281 | print_byte_string(response, response_length); | |
282 | } | |
283 | ||
f8f1fe1d | 284 | return report_return_code(rc); |
8732b070 CC |
285 | } |
286 | ||
09140113 SG |
287 | static int do_tpm_nv_define(struct cmd_tbl *cmdtp, int flag, int argc, |
288 | char *const argv[]) | |
8732b070 | 289 | { |
b9804e5b | 290 | u32 index, perm, size; |
abdc7b8a SG |
291 | struct udevice *dev; |
292 | int rc; | |
293 | ||
294 | rc = get_tpm(&dev); | |
295 | if (rc) | |
296 | return rc; | |
8732b070 CC |
297 | |
298 | if (argc != 4) | |
299 | return CMD_RET_USAGE; | |
300 | size = type_string_get_space_size(argv[1]); | |
301 | if (!size) { | |
302 | printf("Couldn't parse arguments\n"); | |
303 | return CMD_RET_USAGE; | |
304 | } | |
305 | index = simple_strtoul(argv[2], NULL, 0); | |
306 | perm = simple_strtoul(argv[3], NULL, 0); | |
307 | ||
d6a885f0 | 308 | return report_return_code(tpm1_nv_define_space(dev, index, perm, size)); |
8732b070 CC |
309 | } |
310 | ||
09140113 SG |
311 | static int do_tpm_nv_read(struct cmd_tbl *cmdtp, int flag, int argc, |
312 | char *const argv[]) | |
eea3f4d3 | 313 | { |
b9804e5b | 314 | u32 index, count, err; |
abdc7b8a | 315 | struct udevice *dev; |
8732b070 | 316 | void *data; |
abdc7b8a SG |
317 | int rc; |
318 | ||
319 | rc = get_tpm(&dev); | |
320 | if (rc) | |
321 | return rc; | |
eea3f4d3 | 322 | |
8732b070 CC |
323 | if (argc < 3) |
324 | return CMD_RET_USAGE; | |
325 | if (argc != 3 + type_string_get_num_values(argv[1])) | |
326 | return CMD_RET_USAGE; | |
327 | index = simple_strtoul(argv[2], NULL, 0); | |
328 | data = type_string_alloc(argv[1], &count); | |
329 | if (!data) { | |
330 | printf("Couldn't parse arguments\n"); | |
331 | return CMD_RET_USAGE; | |
eea3f4d3 LS |
332 | } |
333 | ||
abdc7b8a | 334 | err = tpm_nv_read_value(dev, index, data, count); |
8732b070 CC |
335 | if (!err) { |
336 | if (type_string_write_vars(argv[1], data, argv + 3)) { | |
337 | printf("Couldn't write to variables\n"); | |
338 | err = ~0; | |
339 | } | |
eea3f4d3 | 340 | } |
8732b070 CC |
341 | free(data); |
342 | ||
f8f1fe1d | 343 | return report_return_code(err); |
8732b070 CC |
344 | } |
345 | ||
09140113 SG |
346 | static int do_tpm_nv_write(struct cmd_tbl *cmdtp, int flag, int argc, |
347 | char *const argv[]) | |
8732b070 | 348 | { |
b9804e5b | 349 | u32 index, count, err; |
abdc7b8a | 350 | struct udevice *dev; |
8732b070 | 351 | void *data; |
abdc7b8a SG |
352 | int rc; |
353 | ||
354 | rc = get_tpm(&dev); | |
355 | if (rc) | |
356 | return rc; | |
8732b070 CC |
357 | |
358 | if (argc < 3) | |
359 | return CMD_RET_USAGE; | |
360 | if (argc != 3 + type_string_get_num_values(argv[1])) | |
361 | return CMD_RET_USAGE; | |
362 | index = simple_strtoul(argv[2], NULL, 0); | |
363 | data = type_string_alloc(argv[1], &count); | |
364 | if (!data) { | |
365 | printf("Couldn't parse arguments\n"); | |
366 | return CMD_RET_USAGE; | |
367 | } | |
368 | if (type_string_pack(argv[1], argv + 3, data)) { | |
369 | printf("Couldn't parse arguments\n"); | |
370 | free(data); | |
371 | return CMD_RET_USAGE; | |
372 | } | |
373 | ||
abdc7b8a | 374 | err = tpm_nv_write_value(dev, index, data, count); |
8732b070 CC |
375 | free(data); |
376 | ||
f8f1fe1d | 377 | return report_return_code(err); |
8732b070 CC |
378 | } |
379 | ||
be6c1529 RP |
380 | #ifdef CONFIG_TPM_AUTH_SESSIONS |
381 | ||
09140113 SG |
382 | static int do_tpm_oiap(struct cmd_tbl *cmdtp, int flag, int argc, |
383 | char *const argv[]) | |
be6c1529 | 384 | { |
b9804e5b | 385 | u32 auth_handle, err; |
abdc7b8a SG |
386 | struct udevice *dev; |
387 | int rc; | |
388 | ||
389 | rc = get_tpm(&dev); | |
390 | if (rc) | |
391 | return rc; | |
be6c1529 | 392 | |
d6a885f0 | 393 | err = tpm1_oiap(dev, &auth_handle); |
be6c1529 | 394 | |
f8f1fe1d | 395 | return report_return_code(err); |
be6c1529 RP |
396 | } |
397 | ||
0f4b2ba1 | 398 | #ifdef CONFIG_TPM_LOAD_KEY_BY_SHA1 |
09140113 SG |
399 | static int do_tpm_load_key_by_sha1(struct cmd_tbl *cmdtp, int flag, int argc, |
400 | char *const argv[]) | |
0f4b2ba1 | 401 | { |
b9804e5b MR |
402 | u32 parent_handle = 0; |
403 | u32 key_len, key_handle, err; | |
404 | u8 usage_auth[DIGEST_LENGTH]; | |
405 | u8 parent_hash[DIGEST_LENGTH]; | |
0f4b2ba1 | 406 | void *key; |
abdc7b8a SG |
407 | struct udevice *dev; |
408 | ||
409 | rc = get_tpm(&dev); | |
410 | if (rc) | |
411 | return rc; | |
0f4b2ba1 | 412 | |
413 | if (argc < 5) | |
414 | return CMD_RET_USAGE; | |
415 | ||
416 | parse_byte_string(argv[1], parent_hash, NULL); | |
417 | key = (void *)simple_strtoul(argv[2], NULL, 0); | |
418 | key_len = simple_strtoul(argv[3], NULL, 0); | |
419 | if (strlen(argv[4]) != 2 * DIGEST_LENGTH) | |
420 | return CMD_RET_FAILURE; | |
421 | parse_byte_string(argv[4], usage_auth, NULL); | |
422 | ||
423 | err = tpm_find_key_sha1(usage_auth, parent_hash, &parent_handle); | |
424 | if (err) { | |
425 | printf("Could not find matching parent key (err = %d)\n", err); | |
426 | return CMD_RET_FAILURE; | |
427 | } | |
428 | ||
429 | printf("Found parent key %08x\n", parent_handle); | |
430 | ||
431 | err = tpm_load_key2_oiap(parent_handle, key, key_len, usage_auth, | |
432 | &key_handle); | |
433 | if (!err) { | |
434 | printf("Key handle is 0x%x\n", key_handle); | |
018f5303 | 435 | env_set_hex("key_handle", key_handle); |
0f4b2ba1 | 436 | } |
437 | ||
438 | return report_return_code(err); | |
439 | } | |
440 | #endif /* CONFIG_TPM_LOAD_KEY_BY_SHA1 */ | |
441 | ||
09140113 SG |
442 | static int do_tpm_load_key2_oiap(struct cmd_tbl *cmdtp, int flag, int argc, |
443 | char *const argv[]) | |
be6c1529 | 444 | { |
b9804e5b MR |
445 | u32 parent_handle, key_len, key_handle, err; |
446 | u8 usage_auth[DIGEST_LENGTH]; | |
be6c1529 | 447 | void *key; |
abdc7b8a SG |
448 | struct udevice *dev; |
449 | int rc; | |
450 | ||
451 | rc = get_tpm(&dev); | |
452 | if (rc) | |
453 | return rc; | |
be6c1529 RP |
454 | |
455 | if (argc < 5) | |
456 | return CMD_RET_USAGE; | |
457 | ||
458 | parent_handle = simple_strtoul(argv[1], NULL, 0); | |
459 | key = (void *)simple_strtoul(argv[2], NULL, 0); | |
460 | key_len = simple_strtoul(argv[3], NULL, 0); | |
461 | if (strlen(argv[4]) != 2 * DIGEST_LENGTH) | |
462 | return CMD_RET_FAILURE; | |
463 | parse_byte_string(argv[4], usage_auth, NULL); | |
464 | ||
d6a885f0 SG |
465 | err = tpm1_load_key2_oiap(dev, parent_handle, key, key_len, usage_auth, |
466 | &key_handle); | |
be6c1529 RP |
467 | if (!err) |
468 | printf("Key handle is 0x%x\n", key_handle); | |
469 | ||
f8f1fe1d | 470 | return report_return_code(err); |
be6c1529 RP |
471 | } |
472 | ||
09140113 SG |
473 | static int do_tpm_get_pub_key_oiap(struct cmd_tbl *cmdtp, int flag, int argc, |
474 | char *const argv[]) | |
be6c1529 | 475 | { |
b9804e5b MR |
476 | u32 key_handle, err; |
477 | u8 usage_auth[DIGEST_LENGTH]; | |
478 | u8 pub_key_buffer[TPM_PUBKEY_MAX_LENGTH]; | |
be6c1529 | 479 | size_t pub_key_len = sizeof(pub_key_buffer); |
abdc7b8a SG |
480 | struct udevice *dev; |
481 | int rc; | |
482 | ||
483 | rc = get_tpm(&dev); | |
484 | if (rc) | |
485 | return rc; | |
be6c1529 RP |
486 | |
487 | if (argc < 3) | |
488 | return CMD_RET_USAGE; | |
489 | ||
490 | key_handle = simple_strtoul(argv[1], NULL, 0); | |
491 | if (strlen(argv[2]) != 2 * DIGEST_LENGTH) | |
492 | return CMD_RET_FAILURE; | |
493 | parse_byte_string(argv[2], usage_auth, NULL); | |
494 | ||
d6a885f0 SG |
495 | err = tpm1_get_pub_key_oiap(dev, key_handle, usage_auth, pub_key_buffer, |
496 | &pub_key_len); | |
be6c1529 RP |
497 | if (!err) { |
498 | printf("dump of received pub key structure:\n"); | |
499 | print_byte_string(pub_key_buffer, pub_key_len); | |
500 | } | |
f8f1fe1d | 501 | return report_return_code(err); |
be6c1529 RP |
502 | } |
503 | ||
d6a885f0 | 504 | TPM_COMMAND_NO_ARG(tpm1_end_oiap) |
be6c1529 RP |
505 | |
506 | #endif /* CONFIG_TPM_AUTH_SESSIONS */ | |
507 | ||
7690be35 | 508 | #ifdef CONFIG_TPM_FLUSH_RESOURCES |
09140113 SG |
509 | static int do_tpm_flush(struct cmd_tbl *cmdtp, int flag, int argc, |
510 | char *const argv[]) | |
7690be35 | 511 | { |
abdc7b8a | 512 | struct udevice *dev; |
7690be35 | 513 | int type = 0; |
abdc7b8a SG |
514 | int rc; |
515 | ||
516 | rc = get_tpm(&dev); | |
517 | if (rc) | |
518 | return rc; | |
7690be35 | 519 | |
1c08b210 | 520 | if (argc != 3) |
7690be35 MS |
521 | return CMD_RET_USAGE; |
522 | ||
1c08b210 | 523 | if (!strcasecmp(argv[1], "key")) |
7690be35 | 524 | type = TPM_RT_KEY; |
1c08b210 | 525 | else if (!strcasecmp(argv[1], "auth")) |
7690be35 | 526 | type = TPM_RT_AUTH; |
1c08b210 | 527 | else if (!strcasecmp(argv[1], "hash")) |
7690be35 | 528 | type = TPM_RT_HASH; |
1c08b210 | 529 | else if (!strcasecmp(argv[1], "trans")) |
7690be35 | 530 | type = TPM_RT_TRANS; |
1c08b210 | 531 | else if (!strcasecmp(argv[1], "context")) |
7690be35 | 532 | type = TPM_RT_CONTEXT; |
1c08b210 | 533 | else if (!strcasecmp(argv[1], "counter")) |
7690be35 | 534 | type = TPM_RT_COUNTER; |
1c08b210 | 535 | else if (!strcasecmp(argv[1], "delegate")) |
7690be35 | 536 | type = TPM_RT_DELEGATE; |
1c08b210 | 537 | else if (!strcasecmp(argv[1], "daa_tpm")) |
7690be35 | 538 | type = TPM_RT_DAA_TPM; |
1c08b210 | 539 | else if (!strcasecmp(argv[1], "daa_v0")) |
7690be35 | 540 | type = TPM_RT_DAA_V0; |
1c08b210 | 541 | else if (!strcasecmp(argv[1], "daa_v1")) |
7690be35 MS |
542 | type = TPM_RT_DAA_V1; |
543 | ||
1c08b210 | 544 | if (!type) { |
545 | printf("Resource type %s unknown.\n", argv[1]); | |
546 | return -1; | |
547 | } | |
548 | ||
549 | if (!strcasecmp(argv[2], "all")) { | |
b9804e5b MR |
550 | u16 res_count; |
551 | u8 buf[288]; | |
552 | u8 *ptr; | |
7690be35 MS |
553 | int err; |
554 | uint i; | |
555 | ||
556 | /* fetch list of already loaded resources in the TPM */ | |
abdc7b8a | 557 | err = tpm_get_capability(dev, TPM_CAP_HANDLE, type, buf, |
7690be35 | 558 | sizeof(buf)); |
1c08b210 | 559 | if (err) { |
560 | printf("tpm_get_capability returned error %d.\n", err); | |
7690be35 | 561 | return -1; |
1c08b210 | 562 | } |
7690be35 MS |
563 | res_count = get_unaligned_be16(buf); |
564 | ptr = buf + 2; | |
565 | for (i = 0; i < res_count; ++i, ptr += 4) | |
d6a885f0 | 566 | tpm1_flush_specific(dev, get_unaligned_be32(ptr), type); |
7690be35 | 567 | } else { |
b9804e5b | 568 | u32 handle = simple_strtoul(argv[2], NULL, 0); |
7690be35 | 569 | |
1c08b210 | 570 | if (!handle) { |
571 | printf("Illegal resource handle %s\n", argv[2]); | |
7690be35 | 572 | return -1; |
1c08b210 | 573 | } |
d6a885f0 | 574 | tpm1_flush_specific(dev, cpu_to_be32(handle), type); |
7690be35 MS |
575 | } |
576 | ||
577 | return 0; | |
578 | } | |
579 | #endif /* CONFIG_TPM_FLUSH_RESOURCES */ | |
580 | ||
3d1df0e3 | 581 | #ifdef CONFIG_TPM_LIST_RESOURCES |
09140113 SG |
582 | static int do_tpm_list(struct cmd_tbl *cmdtp, int flag, int argc, |
583 | char *const argv[]) | |
3d1df0e3 | 584 | { |
585 | int type = 0; | |
b9804e5b MR |
586 | u16 res_count; |
587 | u8 buf[288]; | |
588 | u8 *ptr; | |
3d1df0e3 | 589 | int err; |
590 | uint i; | |
591 | ||
592 | if (argc != 2) | |
593 | return CMD_RET_USAGE; | |
594 | ||
595 | if (!strcasecmp(argv[1], "key")) | |
596 | type = TPM_RT_KEY; | |
597 | else if (!strcasecmp(argv[1], "auth")) | |
598 | type = TPM_RT_AUTH; | |
599 | else if (!strcasecmp(argv[1], "hash")) | |
600 | type = TPM_RT_HASH; | |
601 | else if (!strcasecmp(argv[1], "trans")) | |
602 | type = TPM_RT_TRANS; | |
603 | else if (!strcasecmp(argv[1], "context")) | |
604 | type = TPM_RT_CONTEXT; | |
605 | else if (!strcasecmp(argv[1], "counter")) | |
606 | type = TPM_RT_COUNTER; | |
607 | else if (!strcasecmp(argv[1], "delegate")) | |
608 | type = TPM_RT_DELEGATE; | |
609 | else if (!strcasecmp(argv[1], "daa_tpm")) | |
610 | type = TPM_RT_DAA_TPM; | |
611 | else if (!strcasecmp(argv[1], "daa_v0")) | |
612 | type = TPM_RT_DAA_V0; | |
613 | else if (!strcasecmp(argv[1], "daa_v1")) | |
614 | type = TPM_RT_DAA_V1; | |
615 | ||
616 | if (!type) { | |
617 | printf("Resource type %s unknown.\n", argv[1]); | |
618 | return -1; | |
619 | } | |
620 | ||
621 | /* fetch list of already loaded resources in the TPM */ | |
622 | err = tpm_get_capability(TPM_CAP_HANDLE, type, buf, | |
623 | sizeof(buf)); | |
624 | if (err) { | |
625 | printf("tpm_get_capability returned error %d.\n", err); | |
626 | return -1; | |
627 | } | |
628 | res_count = get_unaligned_be16(buf); | |
629 | ptr = buf + 2; | |
630 | ||
631 | printf("Resources of type %s (%02x):\n", argv[1], type); | |
632 | if (!res_count) { | |
633 | puts("None\n"); | |
634 | } else { | |
635 | for (i = 0; i < res_count; ++i, ptr += 4) | |
636 | printf("Index %d: %08x\n", i, get_unaligned_be32(ptr)); | |
637 | } | |
638 | ||
639 | return 0; | |
640 | } | |
641 | #endif /* CONFIG_TPM_LIST_RESOURCES */ | |
642 | ||
d677bfe2 MR |
643 | TPM_COMMAND_NO_ARG(tpm_self_test_full) |
644 | TPM_COMMAND_NO_ARG(tpm_continue_self_test) | |
645 | TPM_COMMAND_NO_ARG(tpm_force_clear) | |
646 | TPM_COMMAND_NO_ARG(tpm_physical_enable) | |
647 | TPM_COMMAND_NO_ARG(tpm_physical_disable) | |
8732b070 | 648 | |
09140113 | 649 | static struct cmd_tbl tpm1_commands[] = { |
3780e2d0 | 650 | U_BOOT_CMD_MKENT(device, 0, 1, do_tpm_device, "", ""), |
ad77694e | 651 | U_BOOT_CMD_MKENT(info, 0, 1, do_tpm_info, "", ""), |
c6179187 | 652 | U_BOOT_CMD_MKENT(init, 0, 1, do_tpm_init, "", ""), |
8732b070 | 653 | U_BOOT_CMD_MKENT(startup, 0, 1, |
c6179187 | 654 | do_tpm_startup, "", ""), |
8732b070 | 655 | U_BOOT_CMD_MKENT(self_test_full, 0, 1, |
c6179187 | 656 | do_tpm_self_test_full, "", ""), |
8732b070 | 657 | U_BOOT_CMD_MKENT(continue_self_test, 0, 1, |
c6179187 | 658 | do_tpm_continue_self_test, "", ""), |
8732b070 | 659 | U_BOOT_CMD_MKENT(force_clear, 0, 1, |
c6179187 | 660 | do_tpm_force_clear, "", ""), |
8732b070 | 661 | U_BOOT_CMD_MKENT(physical_enable, 0, 1, |
c6179187 | 662 | do_tpm_physical_enable, "", ""), |
8732b070 | 663 | U_BOOT_CMD_MKENT(physical_disable, 0, 1, |
c6179187 | 664 | do_tpm_physical_disable, "", ""), |
8732b070 | 665 | U_BOOT_CMD_MKENT(nv_define_space, 0, 1, |
c6179187 | 666 | do_tpm_nv_define_space, "", ""), |
8732b070 | 667 | U_BOOT_CMD_MKENT(nv_read_value, 0, 1, |
c6179187 | 668 | do_tpm_nv_read_value, "", ""), |
8732b070 | 669 | U_BOOT_CMD_MKENT(nv_write_value, 0, 1, |
c6179187 | 670 | do_tpm_nv_write_value, "", ""), |
8732b070 | 671 | U_BOOT_CMD_MKENT(extend, 0, 1, |
c6179187 | 672 | do_tpm_extend, "", ""), |
8732b070 | 673 | U_BOOT_CMD_MKENT(pcr_read, 0, 1, |
c6179187 | 674 | do_tpm_pcr_read, "", ""), |
8732b070 | 675 | U_BOOT_CMD_MKENT(tsc_physical_presence, 0, 1, |
c6179187 | 676 | do_tpm_tsc_physical_presence, "", ""), |
8732b070 | 677 | U_BOOT_CMD_MKENT(read_pubek, 0, 1, |
c6179187 | 678 | do_tpm_read_pubek, "", ""), |
8732b070 | 679 | U_BOOT_CMD_MKENT(physical_set_deactivated, 0, 1, |
c6179187 | 680 | do_tpm_physical_set_deactivated, "", ""), |
8732b070 | 681 | U_BOOT_CMD_MKENT(get_capability, 0, 1, |
c6179187 | 682 | do_tpm_get_capability, "", ""), |
8732b070 | 683 | U_BOOT_CMD_MKENT(raw_transfer, 0, 1, |
c6179187 | 684 | do_tpm_raw_transfer, "", ""), |
8732b070 | 685 | U_BOOT_CMD_MKENT(nv_define, 0, 1, |
c6179187 | 686 | do_tpm_nv_define, "", ""), |
8732b070 | 687 | U_BOOT_CMD_MKENT(nv_read, 0, 1, |
c6179187 | 688 | do_tpm_nv_read, "", ""), |
8732b070 | 689 | U_BOOT_CMD_MKENT(nv_write, 0, 1, |
c6179187 | 690 | do_tpm_nv_write, "", ""), |
be6c1529 RP |
691 | #ifdef CONFIG_TPM_AUTH_SESSIONS |
692 | U_BOOT_CMD_MKENT(oiap, 0, 1, | |
693 | do_tpm_oiap, "", ""), | |
694 | U_BOOT_CMD_MKENT(end_oiap, 0, 1, | |
d6a885f0 | 695 | do_tpm1_end_oiap, "", ""), |
be6c1529 RP |
696 | U_BOOT_CMD_MKENT(load_key2_oiap, 0, 1, |
697 | do_tpm_load_key2_oiap, "", ""), | |
0f4b2ba1 | 698 | #ifdef CONFIG_TPM_LOAD_KEY_BY_SHA1 |
699 | U_BOOT_CMD_MKENT(load_key_by_sha1, 0, 1, | |
700 | do_tpm_load_key_by_sha1, "", ""), | |
701 | #endif /* CONFIG_TPM_LOAD_KEY_BY_SHA1 */ | |
be6c1529 RP |
702 | U_BOOT_CMD_MKENT(get_pub_key_oiap, 0, 1, |
703 | do_tpm_get_pub_key_oiap, "", ""), | |
704 | #endif /* CONFIG_TPM_AUTH_SESSIONS */ | |
7690be35 MS |
705 | #ifdef CONFIG_TPM_FLUSH_RESOURCES |
706 | U_BOOT_CMD_MKENT(flush, 0, 1, | |
707 | do_tpm_flush, "", ""), | |
708 | #endif /* CONFIG_TPM_FLUSH_RESOURCES */ | |
3d1df0e3 | 709 | #ifdef CONFIG_TPM_LIST_RESOURCES |
710 | U_BOOT_CMD_MKENT(list, 0, 1, | |
711 | do_tpm_list, "", ""), | |
712 | #endif /* CONFIG_TPM_LIST_RESOURCES */ | |
8732b070 CC |
713 | }; |
714 | ||
09140113 | 715 | struct cmd_tbl *get_tpm1_commands(unsigned int *size) |
8732b070 | 716 | { |
d677bfe2 | 717 | *size = ARRAY_SIZE(tpm1_commands); |
eea3f4d3 | 718 | |
d677bfe2 | 719 | return tpm1_commands; |
eea3f4d3 LS |
720 | } |
721 | ||
8732b070 | 722 | U_BOOT_CMD(tpm, CONFIG_SYS_MAXARGS, 1, do_tpm, |
d677bfe2 | 723 | "Issue a TPMv1.x command", |
8732b070 CC |
724 | "cmd args...\n" |
725 | " - Issue TPM command <cmd> with arguments <args...>.\n" | |
726 | "Admin Startup and State Commands:\n" | |
3780e2d0 PR |
727 | " device [num device]\n" |
728 | " - Show all devices or set the specified device\n" | |
ad77694e | 729 | " info - Show information about the TPM\n" |
8732b070 CC |
730 | " init\n" |
731 | " - Put TPM into a state where it waits for 'startup' command.\n" | |
732 | " startup mode\n" | |
733 | " - Issue TPM_Starup command. <mode> is one of TPM_ST_CLEAR,\n" | |
734 | " TPM_ST_STATE, and TPM_ST_DEACTIVATED.\n" | |
735 | "Admin Testing Commands:\n" | |
736 | " self_test_full\n" | |
737 | " - Test all of the TPM capabilities.\n" | |
738 | " continue_self_test\n" | |
739 | " - Inform TPM that it should complete the self-test.\n" | |
740 | "Admin Opt-in Commands:\n" | |
741 | " physical_enable\n" | |
742 | " - Set the PERMANENT disable flag to FALSE using physical presence as\n" | |
743 | " authorization.\n" | |
744 | " physical_disable\n" | |
745 | " - Set the PERMANENT disable flag to TRUE using physical presence as\n" | |
746 | " authorization.\n" | |
747 | " physical_set_deactivated 0|1\n" | |
748 | " - Set deactivated flag.\n" | |
749 | "Admin Ownership Commands:\n" | |
750 | " force_clear\n" | |
751 | " - Issue TPM_ForceClear command.\n" | |
752 | " tsc_physical_presence flags\n" | |
753 | " - Set TPM device's Physical Presence flags to <flags>.\n" | |
754 | "The Capability Commands:\n" | |
755 | " get_capability cap_area sub_cap addr count\n" | |
756 | " - Read <count> bytes of TPM capability indexed by <cap_area> and\n" | |
757 | " <sub_cap> to memory address <addr>.\n" | |
3d1df0e3 | 758 | #if defined(CONFIG_TPM_FLUSH_RESOURCES) || defined(CONFIG_TPM_LIST_RESOURCES) |
7690be35 | 759 | "Resource management functions\n" |
3d1df0e3 | 760 | #endif |
761 | #ifdef CONFIG_TPM_FLUSH_RESOURCES | |
7690be35 MS |
762 | " flush resource_type id\n" |
763 | " - flushes a resource of type <resource_type> (may be one of key, auth,\n" | |
764 | " hash, trans, context, counter, delegate, daa_tpm, daa_v0, daa_v1),\n" | |
765 | " and id <id> from the TPM. Use an <id> of \"all\" to flush all\n" | |
766 | " resources of that type.\n" | |
767 | #endif /* CONFIG_TPM_FLUSH_RESOURCES */ | |
3d1df0e3 | 768 | #ifdef CONFIG_TPM_LIST_RESOURCES |
769 | " list resource_type\n" | |
770 | " - lists resources of type <resource_type> (may be one of key, auth,\n" | |
771 | " hash, trans, context, counter, delegate, daa_tpm, daa_v0, daa_v1),\n" | |
772 | " contained in the TPM.\n" | |
773 | #endif /* CONFIG_TPM_LIST_RESOURCES */ | |
be6c1529 RP |
774 | #ifdef CONFIG_TPM_AUTH_SESSIONS |
775 | "Storage functions\n" | |
776 | " loadkey2_oiap parent_handle key_addr key_len usage_auth\n" | |
777 | " - loads a key data from memory address <key_addr>, <key_len> bytes\n" | |
778 | " into TPM using the parent key <parent_handle> with authorization\n" | |
779 | " <usage_auth> (20 bytes hex string).\n" | |
0f4b2ba1 | 780 | #ifdef CONFIG_TPM_LOAD_KEY_BY_SHA1 |
781 | " load_key_by_sha1 parent_hash key_addr key_len usage_auth\n" | |
782 | " - loads a key data from memory address <key_addr>, <key_len> bytes\n" | |
783 | " into TPM using the parent hash <parent_hash> (20 bytes hex string)\n" | |
784 | " with authorization <usage_auth> (20 bytes hex string).\n" | |
785 | #endif /* CONFIG_TPM_LOAD_KEY_BY_SHA1 */ | |
be6c1529 RP |
786 | " get_pub_key_oiap key_handle usage_auth\n" |
787 | " - get the public key portion of a loaded key <key_handle> using\n" | |
788 | " authorization <usage auth> (20 bytes hex string)\n" | |
789 | #endif /* CONFIG_TPM_AUTH_SESSIONS */ | |
8732b070 CC |
790 | "Endorsement Key Handling Commands:\n" |
791 | " read_pubek addr count\n" | |
792 | " - Read <count> bytes of the public endorsement key to memory\n" | |
793 | " address <addr>\n" | |
794 | "Integrity Collection and Reporting Commands:\n" | |
795 | " extend index digest_hex_string\n" | |
796 | " - Add a new measurement to a PCR. Update PCR <index> with the 20-bytes\n" | |
797 | " <digest_hex_string>\n" | |
798 | " pcr_read index addr count\n" | |
799 | " - Read <count> bytes from PCR <index> to memory address <addr>.\n" | |
be6c1529 RP |
800 | #ifdef CONFIG_TPM_AUTH_SESSIONS |
801 | "Authorization Sessions\n" | |
802 | " oiap\n" | |
803 | " - setup an OIAP session\n" | |
804 | " end_oiap\n" | |
805 | " - terminates an active OIAP session\n" | |
806 | #endif /* CONFIG_TPM_AUTH_SESSIONS */ | |
8732b070 CC |
807 | "Non-volatile Storage Commands:\n" |
808 | " nv_define_space index permission size\n" | |
809 | " - Establish a space at index <index> with <permission> of <size> bytes.\n" | |
810 | " nv_read_value index addr count\n" | |
811 | " - Read <count> bytes from space <index> to memory address <addr>.\n" | |
812 | " nv_write_value index addr count\n" | |
813 | " - Write <count> bytes from memory address <addr> to space <index>.\n" | |
814 | "Miscellaneous helper functions:\n" | |
815 | " raw_transfer byte_string\n" | |
816 | " - Send a byte string <byte_string> to TPM and print the response.\n" | |
817 | " Non-volatile storage helper functions:\n" | |
818 | " These helper functions treat a non-volatile space as a non-padded\n" | |
819 | " sequence of integer values. These integer values are defined by a type\n" | |
820 | " string, which is a text string of 'bwd' characters: 'b' means a 8-bit\n" | |
821 | " value, 'w' 16-bit value, 'd' 32-bit value. All helper functions take\n" | |
822 | " a type string as their first argument.\n" | |
823 | " nv_define type_string index perm\n" | |
824 | " - Define a space <index> with permission <perm>.\n" | |
825 | " nv_read types_string index vars...\n" | |
826 | " - Read from space <index> to environment variables <vars...>.\n" | |
827 | " nv_write types_string index values...\n" | |
828 | " - Write to space <index> from values <values...>.\n" | |
eea3f4d3 | 829 | ); |