blob: ac07bfb5c619eb44e50c107d89a8fc77cd4b7497 [file] [log] [blame]
Angel Pons986d50e2020-04-02 23:48:53 +02001/* SPDX-License-Identifier: GPL-2.0-only */
Stefan Reinauer7cb01e02013-08-29 16:05:02 -07002
Philipp Deppenwiesed88fb362017-10-18 20:26:18 +02003#ifndef TIS_H_
4#define TIS_H_
Stefan Reinauer7cb01e02013-08-29 16:05:02 -07005
Jon Murphyd7b8dc92023-09-05 11:36:43 -06006#include <security/tpm/tss_errors.h>
Tim Wawrzynczak63632d72022-02-16 13:44:48 -07007#include <types.h>
Stefan Reinauer7cb01e02013-08-29 16:05:02 -07008
Furquan Shaikh260b2972017-04-07 13:26:01 -07009enum tis_access {
10 TPM_ACCESS_VALID = (1 << 7),
11 TPM_ACCESS_ACTIVE_LOCALITY = (1 << 5),
12 TPM_ACCESS_REQUEST_PENDING = (1 << 2),
13 TPM_ACCESS_REQUEST_USE = (1 << 1),
14 TPM_ACCESS_ESTABLISHMENT = (1 << 0),
15};
16
17enum tis_status {
18 TPM_STS_FAMILY_SHIFT = 26,
19 TPM_STS_FAMILY_MASK = (0x3 << TPM_STS_FAMILY_SHIFT),
20 TPM_STS_FAMILY_TPM_2_0 = (1 << TPM_STS_FAMILY_SHIFT),
21 TPM_STS_FAMILY_TPM_1_2 = (0 << TPM_STS_FAMILY_SHIFT),
22 TPM_STS_RESET_ESTABLISHMENT = (1 << 25),
23 TPM_STS_COMMAND_CANCEL = (1 << 24),
24 TPM_STS_BURST_COUNT_SHIFT = 8,
25 TPM_STS_BURST_COUNT_MASK = (0xFFFF << TPM_STS_BURST_COUNT_SHIFT),
26 TPM_STS_VALID = (1 << 7),
27 TPM_STS_COMMAND_READY = (1 << 6),
28 TPM_STS_GO = (1 << 5),
29 TPM_STS_DATA_AVAIL = (1 << 4),
30 TPM_STS_DATA_EXPECT = (1 << 3),
31 TPM_STS_SELF_TEST_DONE = (1 << 2),
32 TPM_STS_RESPONSE_RETRY = (1 << 1),
33};
34
Stefan Reinauer7cb01e02013-08-29 16:05:02 -070035/*
Sergii Dmytruk4ee03172022-12-22 19:35:25 +020036 * tis_sendrecv()
37 *
Stefan Reinauer7cb01e02013-08-29 16:05:02 -070038 * Send the requested data to the TPM and then try to get its response
39 *
40 * @sendbuf - buffer of the data to send
41 * @send_size size of the data to send
42 * @recvbuf - memory to save the response to
43 * @recv_len - pointer to the size of the response buffer
44 *
Jon Murphyd7b8dc92023-09-05 11:36:43 -060045 * Returns TSS Return Code from TCG TPM Structures. See tss_errors.h
Stefan Reinauer7cb01e02013-08-29 16:05:02 -070046 */
Sergii Dmytruk963f7b92022-10-29 20:42:28 +030047typedef tpm_result_t (*tis_sendrecv_fn)(const u8 *sendbuf, size_t send_size, u8 *recvbuf,
48 size_t *recv_len);
49
50/*
51 * tis_probe()
52 *
53 * Probe for the TPM device and set it up for use within locality 0. Returns
54 * pointer to send-receive function on success or NULL on failure.
55 *
56 * Do not call this explicitly, it's meant to be used exclusively by TSS
57 * implementation (tlcl_lib_init() function to be specific).
58 */
59tis_sendrecv_fn tis_probe(void);
Stefan Reinauer7cb01e02013-08-29 16:05:02 -070060
Tim Wawrzynczak63632d72022-02-16 13:44:48 -070061/*
62 * tis_vendor_write()
63 *
64 * Vendor-specific function to send the requested data to the TPM.
65 *
66 * @addr - address of the register to write to
67 * @sendbuf - buffer of the data to send
68 * @send_size - size of the data to send
69 *
70 * Returns CB_SUCCESS 0 on success, CB_ERR on failure.
71 */
Subrata Banik60b2ab82022-03-09 12:55:34 +053072enum cb_err tis_vendor_write(unsigned int addr, const void *sendbuf, size_t send_size);
Tim Wawrzynczak63632d72022-02-16 13:44:48 -070073
74/*
75 * tis_vendor_read()
76 *
77 * Vendor-specific function to read the requested data from the TPM.
78 *
79 * @addr - address of the register to read from
80 * @recvbuf - buffer of the data to read
81 * @recv_size - size of the output buffer
82 *
83 * Returns CB_SUCCESS on success or -1 on failure.
84 */
Subrata Banik60b2ab82022-03-09 12:55:34 +053085enum cb_err tis_vendor_read(unsigned int addr, void *recvbuf, size_t recv_size);
Tim Wawrzynczak63632d72022-02-16 13:44:48 -070086
Tim Wawrzynczak6b8599f2022-02-14 16:04:21 -070087static inline bool tpm_first_access_this_boot(void)
88{
89 return ENV_SEPARATE_VERSTAGE || ENV_BOOTBLOCK || !CONFIG(VBOOT);
90}
Tim Wawrzynczak63632d72022-02-16 13:44:48 -070091
Philipp Deppenwiesed88fb362017-10-18 20:26:18 +020092#endif /* TIS_H_ */