summaryrefslogtreecommitdiff
path: root/src/include/tpm.h
diff options
context:
space:
mode:
authorPhilipp Deppenwiese <zaolin@das-labor.org>2017-10-18 17:13:07 +0200
committerStefan Reinauer <stefan.reinauer@coreboot.org>2018-01-18 01:35:31 +0000
commit64e2d19082636de9e82674ccfca574269bb34712 (patch)
treedfe44c9b1cebbb611b99474c1ee096e23f930796 /src/include/tpm.h
parent4fef7818ecd002e5971ea6287e402fd9276b7266 (diff)
downloadcoreboot-64e2d19082636de9e82674ccfca574269bb34712.tar.xz
security/tpm: Move tpm TSS and TSPI layer to security section
* Move code from src/lib and src/include into src/security/tpm * Split TPM TSS 1.2 and 2.0 * Fix header includes * Add a new directory structure with kconfig and makefile includes Change-Id: Id15a9aa6bd367560318dfcfd450bf5626ea0ec2b Signed-off-by: Philipp Deppenwiese <zaolin@das-labor.org> Reviewed-on: https://review.coreboot.org/22103 Tested-by: build bot (Jenkins) <no-reply@coreboot.org> Reviewed-by: Stefan Reinauer <stefan.reinauer@coreboot.org>
Diffstat (limited to 'src/include/tpm.h')
-rw-r--r--src/include/tpm.h102
1 files changed, 0 insertions, 102 deletions
diff --git a/src/include/tpm.h b/src/include/tpm.h
deleted file mode 100644
index 32a44c17eb..0000000000
--- a/src/include/tpm.h
+++ /dev/null
@@ -1,102 +0,0 @@
-/*
- * This file is part of the coreboot project.
- *
- * Copyright 2011 Google Inc.
- *
- * This program is free software; you can redistribute it and/or modify
- * it under the terms of the GNU General Public License as published by
- * the Free Software Foundation; version 2 of the License.
- *
- * This program is distributed in the hope that it will be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- * GNU General Public License for more details.
- */
-
-#ifndef TPM_H_
-#define TPM_H_
-
-#include <stddef.h>
-#include <stdint.h>
-
-enum tis_access {
- TPM_ACCESS_VALID = (1 << 7),
- TPM_ACCESS_ACTIVE_LOCALITY = (1 << 5),
- TPM_ACCESS_REQUEST_PENDING = (1 << 2),
- TPM_ACCESS_REQUEST_USE = (1 << 1),
- TPM_ACCESS_ESTABLISHMENT = (1 << 0),
-};
-
-enum tis_status {
- TPM_STS_FAMILY_SHIFT = 26,
- TPM_STS_FAMILY_MASK = (0x3 << TPM_STS_FAMILY_SHIFT),
- TPM_STS_FAMILY_TPM_2_0 = (1 << TPM_STS_FAMILY_SHIFT),
- TPM_STS_FAMILY_TPM_1_2 = (0 << TPM_STS_FAMILY_SHIFT),
- TPM_STS_RESET_ESTABLISHMENT = (1 << 25),
- TPM_STS_COMMAND_CANCEL = (1 << 24),
- TPM_STS_BURST_COUNT_SHIFT = 8,
- TPM_STS_BURST_COUNT_MASK = (0xFFFF << TPM_STS_BURST_COUNT_SHIFT),
- TPM_STS_VALID = (1 << 7),
- TPM_STS_COMMAND_READY = (1 << 6),
- TPM_STS_GO = (1 << 5),
- TPM_STS_DATA_AVAIL = (1 << 4),
- TPM_STS_DATA_EXPECT = (1 << 3),
- TPM_STS_SELF_TEST_DONE = (1 << 2),
- TPM_STS_RESPONSE_RETRY = (1 << 1),
-};
-
-/*
- * tis_init()
- *
- * Initialize the TPM device. Returns 0 on success or -1 on
- * failure (in case device probing did not succeed).
- */
-int tis_init(void);
-
-/*
- * tis_open()
- *
- * Requests access to locality 0 for the caller. After all commands have been
- * completed the caller is supposed to call tis_close().
- *
- * Returns 0 on success, -1 on failure.
- */
-int tis_open(void);
-
-/*
- * tis_close()
- *
- * terminate the currect session with the TPM by releasing the locked
- * locality. Returns 0 on success of -1 on failure (in case lock
- * removal did not succeed).
- */
-int tis_close(void);
-
-/*
- * tis_sendrecv()
- *
- * Send the requested data to the TPM and then try to get its response
- *
- * @sendbuf - buffer of the data to send
- * @send_size size of the data to send
- * @recvbuf - memory to save the response to
- * @recv_len - pointer to the size of the response buffer
- *
- * Returns 0 on success (and places the number of response bytes at recv_len)
- * or -1 on failure.
- */
-int tis_sendrecv(const u8 *sendbuf, size_t send_size, u8 *recvbuf,
- size_t *recv_len);
-
-void init_tpm(int s3resume);
-
-/*
- * tis_plat_irq_status()
- *
- * Check tpm irq and clear it.
- *
- * Returns 1 when irq pending or 0 when not.
- */
-int tis_plat_irq_status(void);
-
-#endif /* TPM_H_ */