blob: fae049efffe55debd5c8f774b5ff075df5084846 [file] [log] [blame]
Angel Pons986d50e2020-04-02 23:48:53 +02001/* SPDX-License-Identifier: GPL-2.0-only */
Stefan Reinauer7cb01e02013-08-29 16:05:02 -07002
Philipp Deppenwiesed88fb362017-10-18 20:26:18 +02003#ifndef TIS_H_
4#define TIS_H_
Stefan Reinauer7cb01e02013-08-29 16:05:02 -07005
Tim Wawrzynczak63632d72022-02-16 13:44:48 -07006#include <types.h>
Stefan Reinauer7cb01e02013-08-29 16:05:02 -07007
Furquan Shaikh260b2972017-04-07 13:26:01 -07008enum tis_access {
9 TPM_ACCESS_VALID = (1 << 7),
10 TPM_ACCESS_ACTIVE_LOCALITY = (1 << 5),
11 TPM_ACCESS_REQUEST_PENDING = (1 << 2),
12 TPM_ACCESS_REQUEST_USE = (1 << 1),
13 TPM_ACCESS_ESTABLISHMENT = (1 << 0),
14};
15
16enum tis_status {
17 TPM_STS_FAMILY_SHIFT = 26,
18 TPM_STS_FAMILY_MASK = (0x3 << TPM_STS_FAMILY_SHIFT),
19 TPM_STS_FAMILY_TPM_2_0 = (1 << TPM_STS_FAMILY_SHIFT),
20 TPM_STS_FAMILY_TPM_1_2 = (0 << TPM_STS_FAMILY_SHIFT),
21 TPM_STS_RESET_ESTABLISHMENT = (1 << 25),
22 TPM_STS_COMMAND_CANCEL = (1 << 24),
23 TPM_STS_BURST_COUNT_SHIFT = 8,
24 TPM_STS_BURST_COUNT_MASK = (0xFFFF << TPM_STS_BURST_COUNT_SHIFT),
25 TPM_STS_VALID = (1 << 7),
26 TPM_STS_COMMAND_READY = (1 << 6),
27 TPM_STS_GO = (1 << 5),
28 TPM_STS_DATA_AVAIL = (1 << 4),
29 TPM_STS_DATA_EXPECT = (1 << 3),
30 TPM_STS_SELF_TEST_DONE = (1 << 2),
31 TPM_STS_RESPONSE_RETRY = (1 << 1),
32};
33
Stefan Reinauer7cb01e02013-08-29 16:05:02 -070034/*
Sergii Dmytruk4ee03172022-12-22 19:35:25 +020035 * tis_init()
36 *
37 * Initialize the TPM device. Returns 0 on success or -1 on
38 * failure (in case device probing did not succeed).
39 */
40int tis_init(void);
41
42/*
43 * tis_open()
44 *
45 * Requests access to locality 0 for the caller.
46 *
47 * Returns 0 on success, -1 on failure.
48 */
49int tis_open(void);
50
51/*
52 * tis_sendrecv()
53 *
Stefan Reinauer7cb01e02013-08-29 16:05:02 -070054 * Send the requested data to the TPM and then try to get its response
55 *
56 * @sendbuf - buffer of the data to send
57 * @send_size size of the data to send
58 * @recvbuf - memory to save the response to
59 * @recv_len - pointer to the size of the response buffer
60 *
61 * Returns 0 on success (and places the number of response bytes at recv_len)
62 * or -1 on failure.
63 */
Sergii Dmytruk4ee03172022-12-22 19:35:25 +020064int tis_sendrecv(const u8 *sendbuf, size_t send_size, u8 *recvbuf,
65 size_t *recv_len);
Stefan Reinauer7cb01e02013-08-29 16:05:02 -070066
Tim Wawrzynczak63632d72022-02-16 13:44:48 -070067/*
68 * tis_vendor_write()
69 *
70 * Vendor-specific function to send the requested data to the TPM.
71 *
72 * @addr - address of the register to write to
73 * @sendbuf - buffer of the data to send
74 * @send_size - size of the data to send
75 *
76 * Returns CB_SUCCESS 0 on success, CB_ERR on failure.
77 */
Subrata Banik60b2ab82022-03-09 12:55:34 +053078enum cb_err tis_vendor_write(unsigned int addr, const void *sendbuf, size_t send_size);
Tim Wawrzynczak63632d72022-02-16 13:44:48 -070079
80/*
81 * tis_vendor_read()
82 *
83 * Vendor-specific function to read the requested data from the TPM.
84 *
85 * @addr - address of the register to read from
86 * @recvbuf - buffer of the data to read
87 * @recv_size - size of the output buffer
88 *
89 * Returns CB_SUCCESS on success or -1 on failure.
90 */
Subrata Banik60b2ab82022-03-09 12:55:34 +053091enum cb_err tis_vendor_read(unsigned int addr, void *recvbuf, size_t recv_size);
Tim Wawrzynczak63632d72022-02-16 13:44:48 -070092
Tim Wawrzynczak6b8599f2022-02-14 16:04:21 -070093static inline bool tpm_first_access_this_boot(void)
94{
95 return ENV_SEPARATE_VERSTAGE || ENV_BOOTBLOCK || !CONFIG(VBOOT);
96}
Tim Wawrzynczak63632d72022-02-16 13:44:48 -070097
Philipp Deppenwiesed88fb362017-10-18 20:26:18 +020098#endif /* TIS_H_ */