From: Ilias Apalodimas <ilias.apalodimas@linaro.org>
To: Sughosh Ganu <sughosh.ganu@linaro.org>
Cc: u-boot@lists.denx.de, Heinrich Schuchardt <xypron.glpk@gmx.de>,
Simon Glass <sjg@chromium.org>, Tom Rini <trini@konsulko.com>
Subject: Re: [PATCH v6 2/7] tpm: rng: Add driver model interface for TPM RNG device
Date: Wed, 6 Jul 2022 16:26:49 +0300 [thread overview]
Message-ID: <YsWNmXqf3KEgNVzH@hera> (raw)
In-Reply-To: <20220704133444.1110715-3-sughosh.ganu@linaro.org>
On Mon, Jul 04, 2022 at 07:04:39PM +0530, Sughosh Ganu wrote:
> The TPM device has a builtin random number generator(RNG)
> functionality. Expose the RNG functions of the TPM device to the
> driver model so that they can be used by the EFI_RNG_PROTOCOL if the
> protocol is installed.
>
> Also change the function arguments and return type of the random
> number functions to comply with the driver model api.
>
> Signed-off-by: Sughosh Ganu <sughosh.ganu@linaro.org>
> ---
> Changes since V5:
> * Use the dev_get_parent() interface for getting the TPM device when
> calling the tpm_get_random() function
>
> drivers/rng/Kconfig | 11 +++++++++++
> drivers/rng/Makefile | 1 +
> drivers/rng/tpm_rng.c | 23 +++++++++++++++++++++++
> lib/Kconfig | 1 +
> lib/tpm-v1.c | 13 +++++++------
> lib/tpm-v2.c | 6 +++---
> lib/tpm_api.c | 6 +++---
> 7 files changed, 49 insertions(+), 12 deletions(-)
> create mode 100644 drivers/rng/tpm_rng.c
>
> diff --git a/drivers/rng/Kconfig b/drivers/rng/Kconfig
> index c10f7d345b..67c65311c7 100644
> --- a/drivers/rng/Kconfig
> +++ b/drivers/rng/Kconfig
> @@ -58,4 +58,15 @@ config RNG_IPROC200
> depends on DM_RNG
> help
> Enable random number generator for RPI4.
> +
> +config TPM_RNG
> + bool "Enable random number generator on TPM device"
> + depends on TPM
> + default y
> + help
> + The TPM device has an inbuilt random number generator
> + functionality. Enable random number generator on TPM
> + devices.
Maybe we discussed this on a previous version, but why do we want to have
this as a config option? Code size? A TPM will always be able to generate
a random number. Couldn't we compile this based on an existing TPM Kconfig
option?
> +
> +
> endif
> diff --git a/drivers/rng/Makefile b/drivers/rng/Makefile
> index 435b3b965a..e4ca9c4149 100644
> --- a/drivers/rng/Makefile
> +++ b/drivers/rng/Makefile
> @@ -11,3 +11,4 @@ obj-$(CONFIG_RNG_OPTEE) += optee_rng.o
> obj-$(CONFIG_RNG_STM32MP1) += stm32mp1_rng.o
> obj-$(CONFIG_RNG_ROCKCHIP) += rockchip_rng.o
> obj-$(CONFIG_RNG_IPROC200) += iproc_rng200.o
> +obj-$(CONFIG_TPM_RNG) += tpm_rng.o
> diff --git a/drivers/rng/tpm_rng.c b/drivers/rng/tpm_rng.c
> new file mode 100644
> index 0000000000..1a5e9e2e4b
> --- /dev/null
> +++ b/drivers/rng/tpm_rng.c
> @@ -0,0 +1,23 @@
> +// SPDX-License-Identifier: GPL-2.0-or-later
> +/*
> + * Copyright (c) 2022, Linaro Limited
> + */
> +
> +#include <dm.h>
> +#include <rng.h>
> +#include <tpm_api.h>
> +
> +static int rng_tpm_random_read(struct udevice *dev, void *data, size_t count)
> +{
> + return tpm_get_random(dev_get_parent(dev), data, count);
> +}
> +
> +static const struct dm_rng_ops tpm_rng_ops = {
> + .read = rng_tpm_random_read,
> +};
> +
> +U_BOOT_DRIVER(tpm_rng) = {
> + .name = "tpm-rng",
> + .id = UCLASS_RNG,
> + .ops = &tpm_rng_ops,
> +};
> diff --git a/lib/Kconfig b/lib/Kconfig
> index acc0ac081a..17efaa4c80 100644
> --- a/lib/Kconfig
> +++ b/lib/Kconfig
> @@ -358,6 +358,7 @@ source lib/crypt/Kconfig
> config TPM
> bool "Trusted Platform Module (TPM) Support"
> depends on DM
> + imply DM_RNG
> help
> This enables support for TPMs which can be used to provide security
> features for your board. The TPM can be connected via LPC or I2C
> diff --git a/lib/tpm-v1.c b/lib/tpm-v1.c
> index 22a769c587..f7091e5bc7 100644
> --- a/lib/tpm-v1.c
> +++ b/lib/tpm-v1.c
> @@ -9,12 +9,13 @@
> #include <common.h>
> #include <dm.h>
> #include <log.h>
> -#include <asm/unaligned.h>
> -#include <u-boot/sha1.h>
> #include <tpm-common.h>
> #include <tpm-v1.h>
> #include "tpm-utils.h"
>
> +#include <asm/unaligned.h>
> +#include <u-boot/sha1.h>
> +
> #ifdef CONFIG_TPM_AUTH_SESSIONS
>
> #ifndef CONFIG_SHA1
> @@ -892,19 +893,19 @@ u32 tpm1_get_random(struct udevice *dev, void *data, u32 count)
> if (pack_byte_string(buf, sizeof(buf), "sd",
> 0, command, sizeof(command),
> length_offset, this_bytes))
> - return TPM_LIB_ERROR;
> + return -EIO;
> err = tpm_sendrecv_command(dev, buf, response,
> &response_length);
> if (err)
> return err;
> if (unpack_byte_string(response, response_length, "d",
> data_size_offset, &data_size))
> - return TPM_LIB_ERROR;
> + return -EIO;
> if (data_size > count)
> - return TPM_LIB_ERROR;
> + return -EIO;
> if (unpack_byte_string(response, response_length, "s",
> data_offset, out, data_size))
> - return TPM_LIB_ERROR;
> + return -EIO;
>
> count -= data_size;
> out += data_size;
> diff --git a/lib/tpm-v2.c b/lib/tpm-v2.c
> index 1bf627853a..abca9a14b0 100644
> --- a/lib/tpm-v2.c
> +++ b/lib/tpm-v2.c
> @@ -585,19 +585,19 @@ u32 tpm2_get_random(struct udevice *dev, void *data, u32 count)
> if (pack_byte_string(buf, sizeof(buf), "sw",
> 0, command_v2, sizeof(command_v2),
> sizeof(command_v2), this_bytes))
> - return TPM_LIB_ERROR;
> + return -EIO;
> err = tpm_sendrecv_command(dev, buf, response,
> &response_length);
> if (err)
> return err;
> if (unpack_byte_string(response, response_length, "w",
> data_size_offset, &data_size))
> - return TPM_LIB_ERROR;
> + return -EIO;
> if (data_size > this_bytes)
> return TPM_LIB_ERROR;
> if (unpack_byte_string(response, response_length, "s",
> data_offset, out, data_size))
> - return TPM_LIB_ERROR;
> + return -EIO;
>
> count -= data_size;
> out += data_size;
> diff --git a/lib/tpm_api.c b/lib/tpm_api.c
> index 4ac4612c81..032f383ca0 100644
> --- a/lib/tpm_api.c
> +++ b/lib/tpm_api.c
> @@ -269,7 +269,7 @@ u32 tpm_get_random(struct udevice *dev, void *data, u32 count)
> if (tpm_is_v1(dev))
> return tpm1_get_random(dev, data, count);
> else if (tpm_is_v2(dev))
> - return -ENOSYS; /* not implemented yet */
> - else
> - return -ENOSYS;
> + return tpm2_get_random(dev, data, count);
> +
> + return -ENOSYS;
> }
> --
> 2.25.1
>
Thanks
/Ilias
next prev parent reply other threads:[~2022-07-06 13:26 UTC|newest]
Thread overview: 30+ messages / expand[flat|nested] mbox.gz Atom feed top
2022-07-04 13:34 [PATCH v6 0/7] tpm: rng: Move TPM RNG functionality to driver model Sughosh Ganu
2022-07-04 13:34 ` [PATCH v6 1/7] tpm: Export the TPM-version functions Sughosh Ganu
2022-07-06 8:59 ` Ilias Apalodimas
2022-07-04 13:34 ` [PATCH v6 2/7] tpm: rng: Add driver model interface for TPM RNG device Sughosh Ganu
2022-07-05 9:47 ` Simon Glass
2022-07-05 17:23 ` Sughosh Ganu
2022-07-12 10:58 ` Simon Glass
2022-07-06 13:26 ` Ilias Apalodimas [this message]
2022-07-04 13:34 ` [PATCH v6 3/7] tpm: Add the RNG child device Sughosh Ganu
2022-07-05 9:47 ` Simon Glass
2022-07-08 8:23 ` Ilias Apalodimas
2022-07-12 10:58 ` Simon Glass
2022-07-12 14:11 ` Rob Herring
2022-07-13 15:28 ` Simon Glass
2022-07-13 18:09 ` Tom Rini
2022-07-14 10:21 ` Simon Glass
2022-07-14 11:19 ` Tom Rini
2022-07-14 14:51 ` Simon Glass
2022-07-14 15:47 ` Ilias Apalodimas
2022-07-14 16:04 ` Tom Rini
2022-07-14 17:55 ` Rob Herring
2022-07-15 15:38 ` Simon Glass
2022-07-04 13:34 ` [PATCH v6 4/7] cmd: rng: Add support for selecting RNG device Sughosh Ganu
2022-07-04 13:34 ` [PATCH v6 5/7] cmd: rng: Use a statically allocated array for random bytes Sughosh Ganu
2022-07-05 9:47 ` Simon Glass
2022-07-06 13:31 ` Ilias Apalodimas
2022-07-04 13:34 ` [PATCH v6 6/7] doc: rng: Add documentation for the rng command Sughosh Ganu
2022-07-04 13:34 ` [PATCH v6 7/7] test: rng: Add a UT testcase " Sughosh Ganu
2022-07-06 13:32 ` Ilias Apalodimas
2022-07-05 9:47 ` [PATCH v6 0/7] tpm: rng: Move TPM RNG functionality to driver model Simon Glass
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=YsWNmXqf3KEgNVzH@hera \
--to=ilias.apalodimas@linaro.org \
--cc=sjg@chromium.org \
--cc=sughosh.ganu@linaro.org \
--cc=trini@konsulko.com \
--cc=u-boot@lists.denx.de \
--cc=xypron.glpk@gmx.de \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox