260b297a89
1. Move common TIS macros to include/tpm.h. 2. Use common TIS macros while referring to status and access registers. 3. Add a new function claim_locality to properly check for required access bits and claim locality 0. BUG=b:36873582 Change-Id: I11bf3e8b6e1f50b7868c9fe4394a858488367287 Signed-off-by: Furquan Shaikh <furquan@chromium.org> Reviewed-on: https://review.coreboot.org/19213 Tested-by: build bot (Jenkins) Reviewed-by: Duncan Laurie <dlaurie@chromium.org>
102 lines
2.6 KiB
C
102 lines
2.6 KiB
C
/*
|
|
* This file is part of the coreboot project.
|
|
*
|
|
* Copyright 2011 Google Inc.
|
|
*
|
|
* This program is free software; you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License as published by
|
|
* the Free Software Foundation; version 2 of the License.
|
|
*
|
|
* This program is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
*/
|
|
|
|
#ifndef TPM_H_
|
|
#define TPM_H_
|
|
|
|
#include <stddef.h>
|
|
#include <stdint.h>
|
|
|
|
enum tis_access {
|
|
TPM_ACCESS_VALID = (1 << 7),
|
|
TPM_ACCESS_ACTIVE_LOCALITY = (1 << 5),
|
|
TPM_ACCESS_REQUEST_PENDING = (1 << 2),
|
|
TPM_ACCESS_REQUEST_USE = (1 << 1),
|
|
TPM_ACCESS_ESTABLISHMENT = (1 << 0),
|
|
};
|
|
|
|
enum tis_status {
|
|
TPM_STS_FAMILY_SHIFT = 26,
|
|
TPM_STS_FAMILY_MASK = (0x3 << TPM_STS_FAMILY_SHIFT),
|
|
TPM_STS_FAMILY_TPM_2_0 = (1 << TPM_STS_FAMILY_SHIFT),
|
|
TPM_STS_FAMILY_TPM_1_2 = (0 << TPM_STS_FAMILY_SHIFT),
|
|
TPM_STS_RESET_ESTABLISHMENT = (1 << 25),
|
|
TPM_STS_COMMAND_CANCEL = (1 << 24),
|
|
TPM_STS_BURST_COUNT_SHIFT = 8,
|
|
TPM_STS_BURST_COUNT_MASK = (0xFFFF << TPM_STS_BURST_COUNT_SHIFT),
|
|
TPM_STS_VALID = (1 << 7),
|
|
TPM_STS_COMMAND_READY = (1 << 6),
|
|
TPM_STS_GO = (1 << 5),
|
|
TPM_STS_DATA_AVAIL = (1 << 4),
|
|
TPM_STS_DATA_EXPECT = (1 << 3),
|
|
TPM_STS_SELF_TEST_DONE = (1 << 2),
|
|
TPM_STS_RESPONSE_RETRY = (1 << 1),
|
|
};
|
|
|
|
/*
|
|
* tis_init()
|
|
*
|
|
* Initialize the TPM device. Returns 0 on success or -1 on
|
|
* failure (in case device probing did not succeed).
|
|
*/
|
|
int tis_init(void);
|
|
|
|
/*
|
|
* tis_open()
|
|
*
|
|
* Requests access to locality 0 for the caller. After all commands have been
|
|
* completed the caller is supposed to call tis_close().
|
|
*
|
|
* Returns 0 on success, -1 on failure.
|
|
*/
|
|
int tis_open(void);
|
|
|
|
/*
|
|
* tis_close()
|
|
*
|
|
* terminate the currect session with the TPM by releasing the locked
|
|
* locality. Returns 0 on success of -1 on failure (in case lock
|
|
* removal did not succeed).
|
|
*/
|
|
int tis_close(void);
|
|
|
|
/*
|
|
* tis_sendrecv()
|
|
*
|
|
* Send the requested data to the TPM and then try to get its response
|
|
*
|
|
* @sendbuf - buffer of the data to send
|
|
* @send_size size of the data to send
|
|
* @recvbuf - memory to save the response to
|
|
* @recv_len - pointer to the size of the response buffer
|
|
*
|
|
* Returns 0 on success (and places the number of response bytes at recv_len)
|
|
* or -1 on failure.
|
|
*/
|
|
int tis_sendrecv(const u8 *sendbuf, size_t send_size, u8 *recvbuf,
|
|
size_t *recv_len);
|
|
|
|
void init_tpm(int s3resume);
|
|
|
|
/*
|
|
* tis_plat_irq_status()
|
|
*
|
|
* Check tpm irq and clear it.
|
|
*
|
|
* Returns 1 when irq pending or 0 when not.
|
|
*/
|
|
int tis_plat_irq_status(void);
|
|
|
|
#endif /* TPM_H_ */
|