Blame view

include/keys/trusted_tpm.h 3.18 KB
b24413180   Greg Kroah-Hartman   License cleanup: ...
1
  /* SPDX-License-Identifier: GPL-2.0 */
47f9c2796   Sumit Garg   KEYS: trusted: Cr...
2
3
4
5
6
  #ifndef __TRUSTED_TPM_H
  #define __TRUSTED_TPM_H
  
  #include <keys/trusted-type.h>
  #include <linux/tpm_command.h>
d00a1c72f   Mimi Zohar   keys: add new tru...
7
8
  
  /* implementation specific TPM constants */
e1ea9f860   Denis Kenzior   KEYS: trusted: Ex...
9
  #define MAX_BUF_SIZE			1024
d00a1c72f   Mimi Zohar   keys: add new tru...
10
  #define TPM_GETRANDOM_SIZE		14
d00a1c72f   Mimi Zohar   keys: add new tru...
11
12
13
14
15
16
17
  #define TPM_SIZE_OFFSET			2
  #define TPM_RETURN_OFFSET		6
  #define TPM_DATA_OFFSET			10
  
  #define LOAD32(buffer, offset)	(ntohl(*(uint32_t *)&buffer[offset]))
  #define LOAD32N(buffer, offset)	(*(uint32_t *)&buffer[offset])
  #define LOAD16(buffer, offset)	(ntohs(*(uint16_t *)&buffer[offset]))
d00a1c72f   Mimi Zohar   keys: add new tru...
18
19
20
21
22
23
24
25
26
27
28
  struct osapsess {
  	uint32_t handle;
  	unsigned char secret[SHA1_DIGEST_SIZE];
  	unsigned char enonce[TPM_NONCE_SIZE];
  };
  
  /* discrete values, but have to store in uint16_t for TPM use */
  enum {
  	SEAL_keytype = 1,
  	SRK_keytype = 4
  };
e1ea9f860   Denis Kenzior   KEYS: trusted: Ex...
29
30
  int TSS_authhmac(unsigned char *digest, const unsigned char *key,
  			unsigned int keylen, unsigned char *h1,
be24b37e2   ndesaulniers@google.com   KEYS: trusted: fi...
31
  			unsigned char *h2, unsigned int h3, ...);
e1ea9f860   Denis Kenzior   KEYS: trusted: Ex...
32
33
34
35
36
37
38
  int TSS_checkhmac1(unsigned char *buffer,
  			  const uint32_t command,
  			  const unsigned char *ononce,
  			  const unsigned char *key,
  			  unsigned int keylen, ...);
  
  int trusted_tpm_send(unsigned char *cmd, size_t buflen);
c6f61e597   Sumit Garg   KEYS: Use common ...
39
  int oiap(struct tpm_buf *tb, uint32_t *handle, unsigned char *nonce);
e1ea9f860   Denis Kenzior   KEYS: trusted: Ex...
40

2e19e1013   Sumit Garg   KEYS: trusted: Mo...
41
42
43
44
45
46
  int tpm2_seal_trusted(struct tpm_chip *chip,
  		      struct trusted_key_payload *payload,
  		      struct trusted_key_options *options);
  int tpm2_unseal_trusted(struct tpm_chip *chip,
  			struct trusted_key_payload *payload,
  			struct trusted_key_options *options);
d00a1c72f   Mimi Zohar   keys: add new tru...
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
  #define TPM_DEBUG 0
  
  #if TPM_DEBUG
  static inline void dump_options(struct trusted_key_options *o)
  {
  	pr_info("trusted_key: sealing key type %d
  ", o->keytype);
  	pr_info("trusted_key: sealing key handle %0X
  ", o->keyhandle);
  	pr_info("trusted_key: pcrlock %d
  ", o->pcrlock);
  	pr_info("trusted_key: pcrinfo %d
  ", o->pcrinfo_len);
  	print_hex_dump(KERN_INFO, "pcrinfo ", DUMP_PREFIX_NONE,
  		       16, 1, o->pcrinfo, o->pcrinfo_len, 0);
  }
  
  static inline void dump_payload(struct trusted_key_payload *p)
  {
  	pr_info("trusted_key: key_len %d
  ", p->key_len);
  	print_hex_dump(KERN_INFO, "key ", DUMP_PREFIX_NONE,
  		       16, 1, p->key, p->key_len, 0);
  	pr_info("trusted_key: bloblen %d
  ", p->blob_len);
  	print_hex_dump(KERN_INFO, "blob ", DUMP_PREFIX_NONE,
  		       16, 1, p->blob, p->blob_len, 0);
  	pr_info("trusted_key: migratable %d
  ", p->migratable);
  }
  
  static inline void dump_sess(struct osapsess *s)
  {
  	print_hex_dump(KERN_INFO, "trusted-key: handle ", DUMP_PREFIX_NONE,
  		       16, 1, &s->handle, 4, 0);
  	pr_info("trusted-key: secret:
  ");
  	print_hex_dump(KERN_INFO, "", DUMP_PREFIX_NONE,
  		       16, 1, &s->secret, SHA1_DIGEST_SIZE, 0);
  	pr_info("trusted-key: enonce:
  ");
  	print_hex_dump(KERN_INFO, "", DUMP_PREFIX_NONE,
  		       16, 1, &s->enonce, SHA1_DIGEST_SIZE, 0);
  }
  
  static inline void dump_tpm_buf(unsigned char *buf)
  {
  	int len;
  
  	pr_info("
  trusted-key: tpm buffer
  ");
  	len = LOAD32(buf, TPM_SIZE_OFFSET);
  	print_hex_dump(KERN_INFO, "", DUMP_PREFIX_NONE, 16, 1, buf, len, 0);
  }
  #else
  static inline void dump_options(struct trusted_key_options *o)
  {
  }
  
  static inline void dump_payload(struct trusted_key_payload *p)
  {
  }
  
  static inline void dump_sess(struct osapsess *s)
  {
  }
  
  static inline void dump_tpm_buf(unsigned char *buf)
  {
  }
  #endif
d00a1c72f   Mimi Zohar   keys: add new tru...
119
  #endif