blob: c9aec0826202b2b13afa8e20d83a0dac2c9581f6 [file] [log] [blame]
Jacob Garberfa8f5672020-05-18 13:18:19 -06001/* SPDX-License-Identifier: BSD-3-Clause */
Daisuke Nojiriefb5cde2014-07-02 08:37:23 -07002
3/*
4 * TPM Lightweight Command Library.
5 *
6 * A low-level library for interfacing to TPM hardware or an emulator.
7 */
8
Philipp Deppenwiesed88fb362017-10-18 20:26:18 +02009#ifndef TSS_H_
10#define TSS_H_
Philipp Deppenwiesec07f8fb2018-02-27 19:40:52 +010011
Vadim Bendebury245d4572016-04-05 16:01:57 -070012#include <types.h>
Sergii Dmytruk7221a6c2022-10-22 20:11:35 +030013#include <vb2_sha.h>
Daisuke Nojiriefb5cde2014-07-02 08:37:23 -070014
Sergii Dmytruk094a0512022-10-31 18:41:52 +020015#include <security/tpm/tis.h>
Philipp Deppenwiesec07f8fb2018-02-27 19:40:52 +010016#include <security/tpm/tss_errors.h>
17#include <security/tpm/tss/vendor/cr50/cr50.h>
Philipp Deppenwiesec07f8fb2018-02-27 19:40:52 +010018#include <security/tpm/tss/tcg-1.2/tss_structures.h>
Philipp Deppenwiesec07f8fb2018-02-27 19:40:52 +010019#include <security/tpm/tss/tcg-2.0/tss_structures.h>
Sergii Dmytruk094a0512022-10-31 18:41:52 +020020#include <security/tpm/tss1.h>
21#include <security/tpm/tss2.h>
Philipp Deppenwiesec07f8fb2018-02-27 19:40:52 +010022
23/*
Sergii Dmytruk094a0512022-10-31 18:41:52 +020024 * Operations that are applicable to both TPM versions have wrappers which
25 * pick the implementation based on version determined during initialization via
26 * tlcl_lib_init().
27 *
28 * Other operations are defined in tss1.h and tss2.h.
Philipp Deppenwiesec07f8fb2018-02-27 19:40:52 +010029 */
Daisuke Nojiriefb5cde2014-07-02 08:37:23 -070030
31/**
32 * Call this first. Returns 0 if success, nonzero if error.
33 */
Jon Murphyd7b8dc92023-09-05 11:36:43 -060034tpm_result_t tlcl_lib_init(void);
Daisuke Nojiriefb5cde2014-07-02 08:37:23 -070035
Sergii Dmytruk47e9e8c2022-11-02 00:50:03 +020036/**
37 * Query active TPM family. Returns TPM_UNKNOWN if uninitialized and TPM_1 or TPM_2 otherwise.
38 */
39static inline enum tpm_family tlcl_get_family(void)
40{
41 /* Defined in tss/tss.c */
42 extern enum tpm_family tlcl_tpm_family;
43
44 if (CONFIG(TPM1) && CONFIG(TPM2))
45 return tlcl_tpm_family;
46 if (CONFIG(TPM1))
47 return TPM_1;
48 if (CONFIG(TPM2))
49 return TPM_2;
50 return TPM_UNKNOWN;
51}
52
Daisuke Nojiriefb5cde2014-07-02 08:37:23 -070053/* Commands */
54
Sergii Dmytruk47e9e8c2022-11-02 00:50:03 +020055#define TLCL_CALL(name, ...) do { \
56 if (tlcl_get_family() == TPM_1) \
57 return tlcl1_##name(__VA_ARGS__); \
58 if (tlcl_get_family() == TPM_2) \
59 return tlcl2_##name(__VA_ARGS__); \
60 return TPM_CB_INTERNAL_INCONSISTENCY; \
Sergii Dmytruk094a0512022-10-31 18:41:52 +020061 } while (0)
62
Daisuke Nojiriefb5cde2014-07-02 08:37:23 -070063/**
64 * Send a TPM_Startup(ST_CLEAR). The TPM error code is returned (0 for
65 * success).
66 */
Sergii Dmytruk094a0512022-10-31 18:41:52 +020067static inline tpm_result_t tlcl_startup(void)
68{
69 TLCL_CALL(startup);
70}
Daisuke Nojiriefb5cde2014-07-02 08:37:23 -070071
72/**
73 * Resume by sending a TPM_Startup(ST_STATE). The TPM error code is returned
74 * (0 for success).
75 */
Sergii Dmytruk094a0512022-10-31 18:41:52 +020076static inline tpm_result_t tlcl_resume(void)
77{
78 TLCL_CALL(resume);
79}
Daisuke Nojiriefb5cde2014-07-02 08:37:23 -070080
81/**
Joel Kitching2e690ee2018-11-15 16:48:53 +080082 * Save TPM state by sending either TPM_SaveState() (TPM1.2) or
83 * TPM_Shutdown(ST_STATE) (TPM2.0). The TPM error code is returned (0 for
84 * success).
85 */
Sergii Dmytruk094a0512022-10-31 18:41:52 +020086static inline tpm_result_t tlcl_save_state(void)
87{
88 TLCL_CALL(save_state);
89}
Joel Kitching2e690ee2018-11-15 16:48:53 +080090
91/**
Daisuke Nojiriefb5cde2014-07-02 08:37:23 -070092 * Run the self test.
93 *
94 * Note---this is synchronous. To run this in parallel with other firmware,
95 * use ContinueSelfTest(). The TPM error code is returned.
96 */
Sergii Dmytruk094a0512022-10-31 18:41:52 +020097static inline tpm_result_t tlcl_self_test_full(void)
98{
99 TLCL_CALL(self_test_full);
100}
Daisuke Nojiriefb5cde2014-07-02 08:37:23 -0700101
Daisuke Nojiriefb5cde2014-07-02 08:37:23 -0700102/**
103 * Write [length] bytes of [data] to space at [index]. The TPM error code is
104 * returned.
105 */
Sergii Dmytruk094a0512022-10-31 18:41:52 +0200106static inline tpm_result_t tlcl_write(uint32_t index, const void *data, uint32_t length)
107{
108 TLCL_CALL(write, index, data, length);
109}
Daisuke Nojiriefb5cde2014-07-02 08:37:23 -0700110
111/**
112 * Read [length] bytes from space at [index] into [data]. The TPM error code
113 * is returned.
114 */
Sergii Dmytruk094a0512022-10-31 18:41:52 +0200115static inline tpm_result_t tlcl_read(uint32_t index, void *data, uint32_t length)
116{
117 TLCL_CALL(read, index, data, length);
118}
Daisuke Nojiriefb5cde2014-07-02 08:37:23 -0700119
120/**
121 * Assert physical presence in software. The TPM error code is returned.
122 */
Sergii Dmytruk094a0512022-10-31 18:41:52 +0200123static inline tpm_result_t tlcl_assert_physical_presence(void)
124{
125 TLCL_CALL(assert_physical_presence);
126}
Daisuke Nojiriefb5cde2014-07-02 08:37:23 -0700127
128/**
129 * Enable the physical presence command. The TPM error code is returned.
130 */
Sergii Dmytruk094a0512022-10-31 18:41:52 +0200131static inline tpm_result_t tlcl_physical_presence_cmd_enable(void)
132{
133 TLCL_CALL(physical_presence_cmd_enable);
134}
Daisuke Nojiriefb5cde2014-07-02 08:37:23 -0700135
136/**
Frans Hendriks8bd5c992018-10-29 10:47:52 +0100137 * Finalize the physical presence settings: software PP is enabled, hardware PP
Daisuke Nojiriefb5cde2014-07-02 08:37:23 -0700138 * is disabled, and the lifetime lock is set. The TPM error code is returned.
139 */
Sergii Dmytruk094a0512022-10-31 18:41:52 +0200140static inline tpm_result_t tlcl_finalize_physical_presence(void)
141{
142 TLCL_CALL(finalize_physical_presence);
143}
Daisuke Nojiriefb5cde2014-07-02 08:37:23 -0700144
145/**
146 * Issue a ForceClear. The TPM error code is returned.
147 */
Sergii Dmytruk094a0512022-10-31 18:41:52 +0200148static inline tpm_result_t tlcl_force_clear(void)
149{
150 TLCL_CALL(force_clear);
151}
Vadim Bendebury4c0851c2016-07-03 17:08:10 -0700152
153/**
Daisuke Nojiriefb5cde2014-07-02 08:37:23 -0700154 * Perform a TPM_Extend.
155 */
Sergii Dmytruk094a0512022-10-31 18:41:52 +0200156static inline tpm_result_t tlcl_extend(int pcr_num, const uint8_t *digest_data,
157 enum vb2_hash_algorithm digest_algo)
158{
159 TLCL_CALL(extend, pcr_num, digest_data, digest_algo);
160}
Daisuke Nojiriefb5cde2014-07-02 08:37:23 -0700161
Sergii Dmytruk094a0512022-10-31 18:41:52 +0200162extern tis_sendrecv_fn tlcl_tis_sendrecv;
Daisuke Nojirid9f26ed2020-04-21 15:13:07 -0700163
Philipp Deppenwiesec07f8fb2018-02-27 19:40:52 +0100164#endif /* TSS_H_ */