diff options
author | Philipp Deppenwiese <zaolin@das-labor.org> | 2017-10-18 20:26:18 +0200 |
---|---|---|
committer | Stefan Reinauer <stefan.reinauer@coreboot.org> | 2018-01-18 01:45:35 +0000 |
commit | d88fb36e61beac7b52b6183385de4434895a4995 (patch) | |
tree | 285f48686df7f318b7b57044991bf70ebd4cd42c /src/security/tpm/tpm.h | |
parent | 64e2d19082636de9e82674ccfca574269bb34712 (diff) |
security/tpm: Change TPM naming for different layers.
* Rename tlcl* to tss* as tpm software stack layer.
* Fix inconsistent naming.
Change-Id: I206dd6a32dbd303a6d4d987e424407ebf5c518fa
Signed-off-by: Philipp Deppenwiese <zaolin@das-labor.org>
Reviewed-on: https://review.coreboot.org/22104
Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
Reviewed-by: Stefan Reinauer <stefan.reinauer@coreboot.org>
Diffstat (limited to 'src/security/tpm/tpm.h')
-rw-r--r-- | src/security/tpm/tpm.h | 102 |
1 files changed, 0 insertions, 102 deletions
diff --git a/src/security/tpm/tpm.h b/src/security/tpm/tpm.h deleted file mode 100644 index 32a44c17eb..0000000000 --- a/src/security/tpm/tpm.h +++ /dev/null @@ -1,102 +0,0 @@ -/* - * This file is part of the coreboot project. - * - * Copyright 2011 Google Inc. - * - * This program is free software; you can redistribute it and/or modify - * it under the terms of the GNU General Public License as published by - * the Free Software Foundation; version 2 of the License. - * - * This program is distributed in the hope that it will be useful, - * but WITHOUT ANY WARRANTY; without even the implied warranty of - * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the - * GNU General Public License for more details. - */ - -#ifndef TPM_H_ -#define TPM_H_ - -#include <stddef.h> -#include <stdint.h> - -enum tis_access { - TPM_ACCESS_VALID = (1 << 7), - TPM_ACCESS_ACTIVE_LOCALITY = (1 << 5), - TPM_ACCESS_REQUEST_PENDING = (1 << 2), - TPM_ACCESS_REQUEST_USE = (1 << 1), - TPM_ACCESS_ESTABLISHMENT = (1 << 0), -}; - -enum tis_status { - TPM_STS_FAMILY_SHIFT = 26, - TPM_STS_FAMILY_MASK = (0x3 << TPM_STS_FAMILY_SHIFT), - TPM_STS_FAMILY_TPM_2_0 = (1 << TPM_STS_FAMILY_SHIFT), - TPM_STS_FAMILY_TPM_1_2 = (0 << TPM_STS_FAMILY_SHIFT), - TPM_STS_RESET_ESTABLISHMENT = (1 << 25), - TPM_STS_COMMAND_CANCEL = (1 << 24), - TPM_STS_BURST_COUNT_SHIFT = 8, - TPM_STS_BURST_COUNT_MASK = (0xFFFF << TPM_STS_BURST_COUNT_SHIFT), - TPM_STS_VALID = (1 << 7), - TPM_STS_COMMAND_READY = (1 << 6), - TPM_STS_GO = (1 << 5), - TPM_STS_DATA_AVAIL = (1 << 4), - TPM_STS_DATA_EXPECT = (1 << 3), - TPM_STS_SELF_TEST_DONE = (1 << 2), - TPM_STS_RESPONSE_RETRY = (1 << 1), -}; - -/* - * tis_init() - * - * Initialize the TPM device. Returns 0 on success or -1 on - * failure (in case device probing did not succeed). - */ -int tis_init(void); - -/* - * tis_open() - * - * Requests access to locality 0 for the caller. After all commands have been - * completed the caller is supposed to call tis_close(). - * - * Returns 0 on success, -1 on failure. - */ -int tis_open(void); - -/* - * tis_close() - * - * terminate the currect session with the TPM by releasing the locked - * locality. Returns 0 on success of -1 on failure (in case lock - * removal did not succeed). - */ -int tis_close(void); - -/* - * tis_sendrecv() - * - * Send the requested data to the TPM and then try to get its response - * - * @sendbuf - buffer of the data to send - * @send_size size of the data to send - * @recvbuf - memory to save the response to - * @recv_len - pointer to the size of the response buffer - * - * Returns 0 on success (and places the number of response bytes at recv_len) - * or -1 on failure. - */ -int tis_sendrecv(const u8 *sendbuf, size_t send_size, u8 *recvbuf, - size_t *recv_len); - -void init_tpm(int s3resume); - -/* - * tis_plat_irq_status() - * - * Check tpm irq and clear it. - * - * Returns 1 when irq pending or 0 when not. - */ -int tis_plat_irq_status(void); - -#endif /* TPM_H_ */ |