]>
git.ipfire.org Git - thirdparty/u-boot.git/blob - lib/tpm_api.c
1 // SPDX-License-Identifier: GPL-2.0+
3 * Copyright 2019 Google LLC
14 u32
tpm_startup(struct udevice
*dev
, enum tpm_startup_type mode
)
17 return tpm1_startup(dev
, mode
);
18 } else if (tpm_is_v2(dev
)) {
19 enum tpm2_startup_types type
;
29 case TPM_ST_DEACTIVATED
:
32 return tpm2_startup(dev
, type
);
38 u32
tpm_auto_start(struct udevice
*dev
)
41 return tpm2_auto_start(dev
);
46 u32
tpm_resume(struct udevice
*dev
)
49 return tpm1_startup(dev
, TPM_ST_STATE
);
50 else if (tpm_is_v2(dev
))
51 return tpm2_startup(dev
, TPM2_SU_STATE
);
56 u32
tpm_self_test_full(struct udevice
*dev
)
59 return tpm1_self_test_full(dev
);
60 else if (tpm_is_v2(dev
))
61 return tpm2_self_test(dev
, TPMI_YES
);
66 u32
tpm_continue_self_test(struct udevice
*dev
)
69 return tpm1_continue_self_test(dev
);
70 else if (tpm_is_v2(dev
))
71 return tpm2_self_test(dev
, TPMI_NO
);
76 u32
tpm_clear_and_reenable(struct udevice
*dev
)
80 log_info("TPM: Clear and re-enable\n");
81 ret
= tpm_force_clear(dev
);
82 if (ret
!= TPM_SUCCESS
) {
83 log_err("Can't initiate a force clear\n");
88 ret
= tpm1_physical_enable(dev
);
89 if (ret
!= TPM_SUCCESS
) {
90 log_err("TPM: Can't set enabled state\n");
94 ret
= tpm1_physical_set_deactivated(dev
, 0);
95 if (ret
!= TPM_SUCCESS
) {
96 log_err("TPM: Can't set deactivated state\n");
104 u32
tpm_nv_enable_locking(struct udevice
*dev
)
107 return tpm1_nv_define_space(dev
, TPM_NV_INDEX_LOCK
, 0, 0);
108 else if (tpm_is_v2(dev
))
114 u32
tpm_nv_read_value(struct udevice
*dev
, u32 index
, void *data
, u32 count
)
117 return tpm1_nv_read_value(dev
, index
, data
, count
);
118 else if (tpm_is_v2(dev
))
119 return tpm2_nv_read_value(dev
, index
, data
, count
);
124 u32
tpm_nv_write_value(struct udevice
*dev
, u32 index
, const void *data
,
128 return tpm1_nv_write_value(dev
, index
, data
, count
);
129 else if (tpm_is_v2(dev
))
130 return tpm2_nv_write_value(dev
, index
, data
, count
);
135 u32
tpm_set_global_lock(struct udevice
*dev
)
137 return tpm_nv_write_value(dev
, TPM_NV_INDEX_0
, NULL
, 0);
140 u32
tpm_write_lock(struct udevice
*dev
, u32 index
)
144 else if (tpm_is_v2(dev
))
145 return tpm2_write_lock(dev
, index
);
150 u32
tpm_pcr_extend(struct udevice
*dev
, u32 index
, const void *in_digest
,
151 uint size
, void *out_digest
, const char *name
)
153 if (tpm_is_v1(dev
)) {
154 return tpm1_extend(dev
, index
, in_digest
, out_digest
);
155 } else if (tpm_is_v2(dev
)) {
156 return tpm2_pcr_extend(dev
, index
, TPM2_ALG_SHA256
, in_digest
,
158 /* @name is ignored as we do not support the TPM log here */
164 u32
tpm_pcr_read(struct udevice
*dev
, u32 index
, void *data
, size_t count
)
167 return tpm1_pcr_read(dev
, index
, data
, count
);
168 else if (tpm_is_v2(dev
))
174 u32
tpm_tsc_physical_presence(struct udevice
*dev
, u16 presence
)
177 return tpm1_tsc_physical_presence(dev
, presence
);
180 * Nothing to do on TPM2 for this; use platform hierarchy availability
183 else if (tpm_is_v2(dev
))
189 u32
tpm_finalise_physical_presence(struct udevice
*dev
)
192 return tpm1_finalise_physical_presence(dev
);
194 /* Nothing needs to be done with tpm2 */
195 else if (tpm_is_v2(dev
))
201 u32
tpm_read_pubek(struct udevice
*dev
, void *data
, size_t count
)
204 return tpm1_read_pubek(dev
, data
, count
);
205 else if (tpm_is_v2(dev
))
206 return -ENOSYS
; /* not implemented yet */
211 u32
tpm_force_clear(struct udevice
*dev
)
214 return tpm1_force_clear(dev
);
215 else if (tpm_is_v2(dev
))
216 return tpm2_clear(dev
, TPM2_RH_PLATFORM
, NULL
, 0);
221 u32
tpm_physical_enable(struct udevice
*dev
)
224 return tpm1_physical_enable(dev
);
226 /* Nothing needs to be done with tpm2 */
227 else if (tpm_is_v2(dev
))
233 u32
tpm_physical_disable(struct udevice
*dev
)
236 return tpm1_physical_disable(dev
);
238 /* Nothing needs to be done with tpm2 */
239 else if (tpm_is_v2(dev
))
245 u32
tpm_physical_set_deactivated(struct udevice
*dev
, u8 state
)
248 return tpm1_physical_set_deactivated(dev
, state
);
249 /* Nothing needs to be done with tpm2 */
250 else if (tpm_is_v2(dev
))
256 u32
tpm_get_capability(struct udevice
*dev
, u32 cap_area
, u32 sub_cap
,
257 void *cap
, size_t count
)
260 return tpm1_get_capability(dev
, cap_area
, sub_cap
, cap
, count
);
261 else if (tpm_is_v2(dev
))
262 return tpm2_get_capability(dev
, cap_area
, sub_cap
, cap
, count
);
267 u32
tpm_get_permissions(struct udevice
*dev
, u32 index
, u32
*perm
)
270 return tpm1_get_permissions(dev
, index
, perm
);
271 else if (tpm_is_v2(dev
))
272 return -ENOSYS
; /* not implemented yet */
277 u32
tpm_get_random(struct udevice
*dev
, void *data
, u32 count
)
280 return tpm1_get_random(dev
, data
, count
);
281 else if (tpm_is_v2(dev
))
282 return tpm2_get_random(dev
, data
, count
);