hdcp_qseecom.c 42 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683168416851686168716881689169016911692169316941695169616971698169917001701170217031704170517061707170817091710171117121713171417151716171717181719172017211722172317241725172617271728172917301731173217331734173517361737173817391740174117421743174417451746174717481749175017511752175317541755175617571758175917601761176217631764176517661767176817691770177117721773177417751776177717781779178017811782178317841785178617871788178917901791179217931794179517961797179817991800180118021803180418051806180718081809181018111812181318141815181618171818181918201821182218231824182518261827182818291830183118321833183418351836183718381839184018411842184318441845184618471848184918501851185218531854185518561857185818591860186118621863
  1. // SPDX-License-Identifier: GPL-2.0-only
  2. /*
  3. * Copyright (c) 2015-2022, The Linux Foundation. All rights reserved.
  4. * Copyright (c) 2022 Qualcomm Innovation Center, Inc. All rights reserved.
  5. */
  6. #define pr_fmt(fmt) "[hdcp-qseecom] %s: " fmt, __func__
  7. #include <linux/kernel.h>
  8. #include <linux/slab.h>
  9. #include <linux/module.h>
  10. #include <linux/fs.h>
  11. #include <linux/cdev.h>
  12. #include <linux/sched.h>
  13. #include <linux/list.h>
  14. #include <linux/mutex.h>
  15. #include <linux/io.h>
  16. #include <linux/types.h>
  17. #include <linux/device.h>
  18. #include <linux/sched.h>
  19. #include <linux/delay.h>
  20. #include <linux/completion.h>
  21. #include <linux/errno.h>
  22. #include <linux/kthread.h>
  23. #include <linux/hdcp_qseecom.h>
  24. #include "misc/qseecom_kernel.h"
  25. #define HDCP2P2_APP_NAME "hdcp2p2"
  26. #define HDCP1_APP_NAME "hdcp1"
  27. #define HDCP1OPS_APP_NAME "ops"
  28. #define HDCPSRM_APP_NAME "hdcpsrm"
  29. #define QSEECOM_SBUFF_SIZE 0x1000
  30. #define MAX_REC_ID_LIST_SIZE 160
  31. #define MAX_TX_MESSAGE_SIZE 129
  32. #define MAX_RX_MESSAGE_SIZE 534
  33. #define MAX_TOPOLOGY_ELEMS 32
  34. #define HDCP1_NOTIFY_TOPOLOGY 1
  35. #define HDCP1_AKSV_SIZE 8
  36. #define HDCP1_SET_KEY 202
  37. #define HDCP1_KEY_VERIFY 204
  38. #define HDCP1_SET_ENC 205
  39. #define BITS_8_IN_BYTES 1
  40. #define BITS_16_IN_BYTES 2
  41. #define BITS_24_IN_BYTES 3
  42. #define BITS_32_IN_BYTES 4
  43. #define BITS_40_IN_BYTES 5
  44. #define BITS_64_IN_BYTES 8
  45. #define BITS_128_IN_BYTES 16
  46. #define BITS_160_IN_BYTES 20
  47. #define BITS_256_IN_BYTES 32
  48. #define BITS_1024_IN_BYTES 128
  49. #define BITS_3072_IN_BYTES 384
  50. #define TXCAPS_SIZE 3
  51. #define RXCAPS_SIZE 3
  52. #define RXINFO_SIZE 2
  53. #define SEQ_NUM_V_SIZE 3
  54. #define RCVR_ID_SIZE BITS_40_IN_BYTES
  55. #define MAX_RCVR_IDS_ALLOWED_IN_LIST 31
  56. #define MAX_RCVR_ID_LIST_SIZE \
  57. (RCVR_ID_SIZE*MAX_RCVR_IDS_ALLOWED_IN_LIST)
  58. /*
  59. * minimum wait as per standard is 200 ms. keep it 300 ms
  60. * to be on safe side.
  61. */
  62. #define SLEEP_SET_HW_KEY_MS 300
  63. /* Wait 200ms after authentication */
  64. #define SLEEP_FORCE_ENCRYPTION_MS 200
  65. /* hdcp command status */
  66. #define HDCP_SUCCESS 0
  67. /* DP device type */
  68. #define DEVICE_TYPE_DP 0x8002
  69. const char *HdcpErrors[] = {
  70. "HDCP_SUCCESS",
  71. "HDCP_FAIL",
  72. "HDCP_BAD_PARAM",
  73. "HDCP_DEVICE_TYPE_UNSUPPORTED",
  74. "HDCP_INVALID_COMMAND",
  75. "HDCP_INVALID_COMMAND_HANDLE",
  76. "HDCP_ERROR_SIZE_IN",
  77. "HDCP_ERROR_SIZE_OUT",
  78. "HDCP_DATA_SIZE_INSUFFICIENT",
  79. "HDCP_UNSUPPORTED_RX_VERSION",
  80. "HDCP_WRONG_RX_CAPAB_MASK",
  81. "HDCP_WRONG_RX_RSVD",
  82. "HDCP_WRONG_RX_HDCP_CAPABLE",
  83. "HDCP_RSA_SIGNATURE_VERIFY_FAILED",
  84. "HDCP_VERIFY_H_PRIME_FAILED",
  85. "HDCP_LC_FAILED",
  86. "HDCP_MESSAGE_TIMEOUT",
  87. "HDCP_COUNTER_ROLL_OVER",
  88. "HDCP_WRONG_RXINFO_RSVD",
  89. "HDCP_RXINFO_MAX_DEVS",
  90. "HDCP_RXINFO_MAX_CASCADE",
  91. "HDCP_WRONG_INITIAL_SEQ_NUM_V",
  92. "HDCP_SEQ_NUM_V_ROLL_OVER",
  93. "HDCP_WRONG_SEQ_NUM_V",
  94. "HDCP_VERIFY_V_FAILED",
  95. "HDCP_RPT_METHOD_INVOKED",
  96. "HDCP_RPT_STRM_LEN_WRONG",
  97. "HDCP_VERIFY_STRM_M_FAILED",
  98. "HDCP_TRANSMITTER_NOT_FOUND",
  99. "HDCP_SESSION_NOT_FOUND",
  100. "HDCP_MAX_SESSION_EXCEEDED",
  101. "HDCP_MAX_CONNECTION_EXCEEDED",
  102. "HDCP_MAX_STREAMS_EXCEEDED",
  103. "HDCP_MAX_DEVICES",
  104. "HDCP_ALLOC_FAILED",
  105. "HDCP_CONNECTION_NOT_FOUND",
  106. "HDCP_HASH_FAILED",
  107. "HDCP_BN_FAILED",
  108. "HDCP_ENCRYPT_KM_FAILED",
  109. "HDCP_DECRYPT_KM_FAILED",
  110. "HDCP_HMAC_FAILED",
  111. "HDCP_GET_RANDOM_FAILED",
  112. "HDCP_INVALID_KEY_HEADER",
  113. "HDCP_INVALID_KEY_LC_HASH",
  114. "HDCP_INVALID_KEY_HASH",
  115. "HDCP_KEY_WRITE_FAILED",
  116. "HDCP_KEY_READ_FAILED",
  117. "HDCP_KEY_DECRYPT_FAILED",
  118. "HDCP_TEST_KEY_ON_SECURE_DEVICE",
  119. "HDCP_KEY_VERSION_UNSUPPORTED",
  120. "HDCP_RXID_NOT_FOUND",
  121. "HDCP_STORAGE_INIT_FAILED",
  122. "HDCP_STORAGE_FILE_OPEN_FAILED",
  123. "HDCP_STORAGE_FILE_READ_FAILED",
  124. "HDCP_STORAGE_FILE_WRITE_FAILED",
  125. "HDCP_STORAGE_ID_UNSUPPORTED",
  126. "HDCP_MUTUAL_EXCLUSIVE_DEVICE_PRESENT",
  127. "HDCP_INVALID_STATE",
  128. "HDCP_CONFIG_READ_FAILED",
  129. "HDCP_OPEN_TZ_SERVICE_FAILED",
  130. "HDCP_HW_CLOCK_OFF",
  131. "HDCP_SET_HW_KEY_FAILED",
  132. "HDCP_CLEAR_HW_KEY_FAILED",
  133. "HDCP_GET_CONTENT_LEVEL_FAILED",
  134. "HDCP_STREAMID_INUSE",
  135. "HDCP_STREAM_NOT_FOUND",
  136. "HDCP_FORCE_ENCRYPTION_FAILED",
  137. "HDCP_STREAMNUMBER_INUSE"
  138. };
  139. /* flags set by tz in response message */
  140. #define HDCP_TXMTR_SUBSTATE_INIT 0
  141. #define HDCP_TXMTR_SUBSTATE_WAITING_FOR_RECIEVERID_LIST 1
  142. #define HDCP_TXMTR_SUBSTATE_PROCESSED_RECIEVERID_LIST 2
  143. #define HDCP_TXMTR_SUBSTATE_WAITING_FOR_STREAM_READY_MESSAGE 3
  144. #define HDCP_TXMTR_SUBSTATE_REPEATER_AUTH_COMPLETE 4
  145. #define HDCP_DEVICE_ID 0x0008000
  146. #define HDCP_CREATE_DEVICE_ID(x) (HDCP_DEVICE_ID | (x))
  147. #define HDCP_TXMTR_HDMI HDCP_CREATE_DEVICE_ID(1)
  148. #define HDCP_TXMTR_SERVICE_ID 0x0001000
  149. #define SERVICE_CREATE_CMD(x) (HDCP_TXMTR_SERVICE_ID | x)
  150. #define HCDP_TXMTR_GET_MAJOR_VERSION(v) (((v) >> 16) & 0xFF)
  151. #define HCDP_TXMTR_GET_MINOR_VERSION(v) (((v) >> 8) & 0xFF)
  152. #define HCDP_TXMTR_GET_PATCH_VERSION(v) ((v) & 0xFF)
  153. #define HDCP_CLIENT_MAJOR_VERSION 2
  154. #define HDCP_CLIENT_MINOR_VERSION 1
  155. #define HDCP_CLIENT_PATCH_VERSION 0
  156. #define HDCP_CLIENT_MAKE_VERSION(maj, min, patch) \
  157. ((((maj) & 0xFF) << 16) | (((min) & 0xFF) << 8) | ((patch) & 0xFF))
  158. #define hdcp2_app_init_var(x) \
  159. struct hdcp_##x##_req *req_buf = NULL; \
  160. struct hdcp_##x##_rsp *rsp_buf = NULL; \
  161. if (!handle->qseecom_handle) { \
  162. pr_err("invalid qseecom_handle while processing %s\n", #x); \
  163. rc = -EINVAL; \
  164. goto error; \
  165. } \
  166. req_buf = (struct hdcp_##x##_req *) handle->qseecom_handle->sbuf; \
  167. rsp_buf = (struct hdcp_##x##_rsp *) (handle->qseecom_handle->sbuf + \
  168. QSEECOM_ALIGN(sizeof(struct hdcp_##x##_req))); \
  169. req_buf->commandid = hdcp_cmd_##x
  170. #define hdcp2_app_process_cmd(x) \
  171. ({ \
  172. int rc = qseecom_send_command(handle->qseecom_handle, \
  173. req_buf, QSEECOM_ALIGN(sizeof(struct hdcp_##x##_req)), \
  174. rsp_buf, QSEECOM_ALIGN(sizeof(struct hdcp_##x##_rsp))); \
  175. if ((rc < 0) || (rsp_buf->status != HDCP_SUCCESS)) { \
  176. pr_err("qseecom cmd %s failed with err = %d, status = %d:%s\n" \
  177. , #x, rc, rsp_buf->status, \
  178. hdcp_cmd_status_to_str(rsp_buf->status)); \
  179. rc = -EINVAL; \
  180. } \
  181. rc; \
  182. })
  183. enum {
  184. hdcp_cmd_tx_init = SERVICE_CREATE_CMD(1),
  185. hdcp_cmd_tx_init_v1 = SERVICE_CREATE_CMD(1),
  186. hdcp_cmd_tx_deinit = SERVICE_CREATE_CMD(2),
  187. hdcp_cmd_rcvd_msg = SERVICE_CREATE_CMD(3),
  188. hdcp_cmd_send_timeout = SERVICE_CREATE_CMD(4),
  189. hdcp_cmd_set_hw_key = SERVICE_CREATE_CMD(5),
  190. hdcp_cmd_query_stream_type = SERVICE_CREATE_CMD(6),
  191. hdcp_cmd_init_v1 = SERVICE_CREATE_CMD(11),
  192. hdcp_cmd_init = SERVICE_CREATE_CMD(11),
  193. hdcp_cmd_deinit = SERVICE_CREATE_CMD(12),
  194. hdcp_cmd_version = SERVICE_CREATE_CMD(14),
  195. hdcp_cmd_verify_key = SERVICE_CREATE_CMD(15),
  196. hdcp_cmd_session_init = SERVICE_CREATE_CMD(16),
  197. hdcp_cmd_session_deinit = SERVICE_CREATE_CMD(17),
  198. hdcp_cmd_start_auth = SERVICE_CREATE_CMD(18),
  199. hdcp_cmd_session_open_stream = SERVICE_CREATE_CMD(20),
  200. hdcp_cmd_session_close_stream = SERVICE_CREATE_CMD(21),
  201. hdcp_cmd_force_encryption = SERVICE_CREATE_CMD(22),
  202. };
  203. enum hdcp_state {
  204. HDCP_STATE_INIT = 0x00,
  205. HDCP_STATE_APP_LOADED = 0x01,
  206. HDCP_STATE_SESSION_INIT = 0x02,
  207. HDCP_STATE_TXMTR_INIT = 0x04,
  208. HDCP_STATE_AUTHENTICATED = 0x08,
  209. HDCP_STATE_ERROR = 0x10
  210. };
  211. enum hdcp_element {
  212. HDCP_TYPE_UNKNOWN,
  213. HDCP_TYPE_RECEIVER,
  214. HDCP_TYPE_REPEATER,
  215. };
  216. enum hdcp_version {
  217. HDCP_VERSION_UNKNOWN,
  218. HDCP_VERSION_2_2,
  219. HDCP_VERSION_1_4
  220. };
  221. struct receiver_info {
  222. unsigned char rcvrInfo[RCVR_ID_SIZE];
  223. enum hdcp_element elem_type;
  224. enum hdcp_version hdcp_version;
  225. };
  226. struct topology_info {
  227. unsigned int nNumRcvrs;
  228. struct receiver_info rcvinfo[MAX_TOPOLOGY_ELEMS];
  229. };
  230. struct __attribute__ ((__packed__)) hdcp1_key_set_req {
  231. uint32_t commandid;
  232. };
  233. struct __attribute__ ((__packed__)) hdcp1_key_set_rsp {
  234. uint32_t commandid;
  235. uint32_t ret;
  236. uint8_t ksv[HDCP1_AKSV_SIZE];
  237. };
  238. struct __attribute__ ((__packed__)) hdcp_version_req {
  239. uint32_t commandid;
  240. };
  241. struct __attribute__ ((__packed__)) hdcp_version_rsp {
  242. uint32_t status;
  243. uint32_t commandId;
  244. uint32_t appversion;
  245. };
  246. struct __attribute__ ((__packed__)) hdcp_verify_key_req {
  247. uint32_t commandid;
  248. };
  249. struct __attribute__ ((__packed__)) hdcp_verify_key_rsp {
  250. uint32_t status;
  251. uint32_t commandId;
  252. };
  253. struct __attribute__ ((__packed__)) hdcp1_key_verify_req {
  254. uint32_t commandid;
  255. uint32_t key_type;
  256. };
  257. struct __attribute__ ((__packed__)) hdcp1_key_verify_rsp {
  258. uint32_t commandId;
  259. uint32_t ret;
  260. };
  261. struct __attribute__ ((__packed__)) hdcp_init_v1_req {
  262. uint32_t commandid;
  263. };
  264. struct __attribute__ ((__packed__)) hdcp_init_v1_rsp {
  265. uint32_t status;
  266. uint32_t commandid;
  267. uint32_t ctxhandle;
  268. uint32_t timeout;
  269. uint32_t msglen;
  270. uint8_t message[MAX_TX_MESSAGE_SIZE];
  271. };
  272. struct __attribute__ ((__packed__)) hdcp_init_req {
  273. uint32_t commandid;
  274. uint32_t clientversion;
  275. };
  276. struct __attribute__ ((__packed__)) hdcp_init_rsp {
  277. uint32_t status;
  278. uint32_t commandid;
  279. uint32_t appversion;
  280. };
  281. struct __attribute__ ((__packed__)) hdcp_deinit_req {
  282. uint32_t commandid;
  283. };
  284. struct __attribute__ ((__packed__)) hdcp_deinit_rsp {
  285. uint32_t status;
  286. uint32_t commandid;
  287. };
  288. struct __attribute__ ((__packed__)) hdcp_session_init_req {
  289. uint32_t commandid;
  290. uint32_t deviceid;
  291. };
  292. struct __attribute__ ((__packed__)) hdcp_session_init_rsp {
  293. uint32_t status;
  294. uint32_t commandid;
  295. uint32_t sessionid;
  296. };
  297. struct __attribute__ ((__packed__)) hdcp_session_deinit_req {
  298. uint32_t commandid;
  299. uint32_t sessionid;
  300. };
  301. struct __attribute__ ((__packed__)) hdcp_session_deinit_rsp {
  302. uint32_t status;
  303. uint32_t commandid;
  304. };
  305. struct __attribute__ ((__packed__)) hdcp_tx_init_v1_req {
  306. uint32_t commandid;
  307. };
  308. struct __attribute__ ((__packed__)) hdcp_tx_init_v1_rsp {
  309. uint32_t status;
  310. uint32_t commandid;
  311. uint32_t ctxhandle;
  312. uint32_t timeout;
  313. uint32_t msglen;
  314. uint8_t message[MAX_TX_MESSAGE_SIZE];
  315. };
  316. struct __attribute__ ((__packed__)) hdcp_tx_init_req {
  317. uint32_t commandid;
  318. uint32_t sessionid;
  319. };
  320. struct __attribute__ ((__packed__)) hdcp_tx_init_rsp {
  321. uint32_t status;
  322. uint32_t commandid;
  323. uint32_t ctxhandle;
  324. };
  325. struct __attribute__ ((__packed__)) hdcp_tx_deinit_req {
  326. uint32_t commandid;
  327. uint32_t ctxhandle;
  328. };
  329. struct __attribute__ ((__packed__)) hdcp_tx_deinit_rsp {
  330. uint32_t status;
  331. uint32_t commandid;
  332. };
  333. struct __attribute__ ((__packed__)) hdcp_rcvd_msg_req {
  334. uint32_t commandid;
  335. uint32_t ctxhandle;
  336. uint32_t msglen;
  337. uint8_t msg[MAX_RX_MESSAGE_SIZE];
  338. };
  339. struct __attribute__ ((__packed__)) hdcp_rcvd_msg_rsp {
  340. uint32_t status;
  341. uint32_t commandid;
  342. uint32_t state;
  343. uint32_t timeout;
  344. uint32_t flag;
  345. uint32_t msglen;
  346. uint8_t msg[MAX_TX_MESSAGE_SIZE];
  347. };
  348. struct __attribute__ ((__packed__)) hdcp_set_hw_key_req {
  349. uint32_t commandid;
  350. uint32_t ctxhandle;
  351. };
  352. struct __attribute__ ((__packed__)) hdcp_set_hw_key_rsp {
  353. uint32_t status;
  354. uint32_t commandid;
  355. };
  356. struct __attribute__ ((__packed__)) hdcp_send_timeout_req {
  357. uint32_t commandid;
  358. uint32_t ctxhandle;
  359. };
  360. struct __attribute__ ((__packed__)) hdcp_send_timeout_rsp {
  361. uint32_t status;
  362. uint32_t commandid;
  363. uint32_t timeout;
  364. uint32_t msglen;
  365. uint8_t message[MAX_TX_MESSAGE_SIZE];
  366. };
  367. struct __attribute__ ((__packed__)) hdcp_query_stream_type_req {
  368. uint32_t commandid;
  369. uint32_t ctxhandle;
  370. };
  371. struct __attribute__ ((__packed__)) hdcp_query_stream_type_rsp {
  372. uint32_t status;
  373. uint32_t commandid;
  374. uint32_t timeout;
  375. uint32_t msglen;
  376. uint8_t msg[MAX_TX_MESSAGE_SIZE];
  377. };
  378. struct __attribute__ ((__packed__)) hdcp_set_stream_type_req {
  379. uint32_t commandid;
  380. uint32_t ctxhandle;
  381. uint8_t streamtype;
  382. };
  383. struct __attribute__ ((__packed__)) hdcp_set_stream_type_rsp {
  384. uint32_t status;
  385. uint32_t commandid;
  386. uint32_t timeout;
  387. uint32_t msglen;
  388. uint8_t message[MAX_TX_MESSAGE_SIZE];
  389. };
  390. struct __attribute__ ((__packed__)) hdcp_update_srm_req {
  391. uint32_t commandid;
  392. uint32_t ctxhandle;
  393. uint32_t srmoffset;
  394. uint32_t srmlength;
  395. };
  396. struct __attribute__ ((__packed__)) hdcp_update_srm_rsp {
  397. uint32_t status;
  398. uint32_t commandid;
  399. };
  400. struct __attribute__ ((__packed__)) hdcp_get_topology_req {
  401. uint32_t commandid;
  402. uint32_t ctxhandle;
  403. };
  404. struct __attribute__ ((__packed__)) hdcp_get_topology_rsp {
  405. uint32_t status;
  406. uint32_t commandid;
  407. struct topology_info topologyinfo;
  408. };
  409. struct __attribute__ ((__packed__)) rxvr_info_struct {
  410. uint8_t rcvrCert[522];
  411. uint8_t rrx[BITS_64_IN_BYTES];
  412. uint8_t rxcaps[RXCAPS_SIZE];
  413. bool repeater;
  414. };
  415. struct __attribute__ ((__packed__)) repeater_info_struct {
  416. uint8_t RxInfo[RXINFO_SIZE];
  417. uint8_t seq_num_V[SEQ_NUM_V_SIZE];
  418. bool seq_num_V_Rollover_flag;
  419. uint8_t ReceiverIDList[MAX_RCVR_ID_LIST_SIZE];
  420. uint32_t ReceiverIDListLen;
  421. };
  422. struct __attribute__ ((__packed__)) hdcp1_set_enc_req {
  423. uint32_t commandid;
  424. uint32_t enable;
  425. };
  426. struct __attribute__ ((__packed__)) hdcp1_set_enc_rsp {
  427. uint32_t commandid;
  428. uint32_t ret;
  429. };
  430. struct __attribute__ ((__packed__)) hdcp1_ops_notify_req {
  431. uint32_t commandid;
  432. uint32_t device_type;
  433. uint8_t recv_id_list[MAX_REC_ID_LIST_SIZE];
  434. int32_t recv_id_len;
  435. struct hdcp1_topology topology;
  436. bool is_authenticated;
  437. };
  438. struct __attribute__ ((__packed__)) hdcp1_ops_notify_rsp {
  439. uint32_t commandid;
  440. uint32_t ret;
  441. };
  442. struct __attribute__ ((__packed__)) hdcp_start_auth_req {
  443. uint32_t commandid;
  444. uint32_t ctxHandle;
  445. };
  446. struct __attribute__ ((__packed__)) hdcp_start_auth_rsp {
  447. uint32_t status;
  448. uint32_t commandid;
  449. uint32_t ctxhandle;
  450. uint32_t timeout;
  451. uint32_t msglen;
  452. uint8_t message[MAX_TX_MESSAGE_SIZE];
  453. };
  454. struct __attribute__((__packed__)) hdcp_session_open_stream_req {
  455. uint32_t commandid;
  456. uint32_t sessionid;
  457. uint32_t vcpayloadid;
  458. uint32_t stream_number;
  459. uint32_t streamMediaType;
  460. };
  461. struct __attribute__((__packed__)) hdcp_session_open_stream_rsp {
  462. uint32_t status;
  463. uint32_t commandid;
  464. uint32_t streamid;
  465. };
  466. struct __attribute__((__packed__)) hdcp_session_close_stream_req {
  467. uint32_t commandid;
  468. uint32_t sessionid;
  469. uint32_t streamid;
  470. };
  471. struct __attribute__((__packed__)) hdcp_session_close_stream_rsp {
  472. uint32_t status;
  473. uint32_t commandid;
  474. };
  475. struct __attribute__((__packed__)) hdcp_force_encryption_req {
  476. uint32_t commandid;
  477. uint32_t ctxhandle;
  478. uint32_t enable;
  479. };
  480. struct __attribute__ ((__packed__)) hdcp_force_encryption_rsp {
  481. uint32_t status;
  482. uint32_t commandid;
  483. };
  484. struct hdcp2_handle {
  485. struct hdcp2_app_data app_data;
  486. uint32_t tz_ctxhandle;
  487. bool feature_supported;
  488. enum hdcp_state hdcp_state;
  489. struct qseecom_handle *qseecom_handle;
  490. struct qseecom_handle *hdcpsrm_qseecom_handle;
  491. uint32_t session_id;
  492. bool legacy_app;
  493. uint32_t device_type;
  494. char *app_name;
  495. int (*app_init)(struct hdcp2_handle *handle);
  496. int (*tx_init)(struct hdcp2_handle *handle);
  497. };
  498. /*
  499. * struct hdcp1_handle - handle for HDCP 1.x client
  500. * @qseecom_handle - for sending commands to qseecom
  501. * @hdcpops_handle - for sending commands to ops TA
  502. * @feature_supported - set to true if the platform supports HDCP 1.x
  503. * @device_type - the interface type (HDMI or DisplayPort)
  504. */
  505. struct hdcp1_handle {
  506. struct qseecom_handle *qseecom_handle;
  507. struct qseecom_handle *hdcpops_handle;
  508. bool feature_supported;
  509. uint32_t device_type;
  510. enum hdcp_state hdcp_state;
  511. char *app_name;
  512. };
  513. #define HDCP_CMD_STATUS_TO_STR(x) #x
  514. static const char *hdcp_cmd_status_to_str(uint32_t err)
  515. {
  516. int len = ARRAY_SIZE(HdcpErrors);
  517. if (err >= 0 && err < len)
  518. return HdcpErrors[err];
  519. else
  520. return "";
  521. }
  522. static int hdcp_get_version(struct hdcp2_handle *handle)
  523. {
  524. int rc = 0;
  525. uint32_t app_major_version = 0;
  526. hdcp2_app_init_var(version);
  527. if (handle->hdcp_state & HDCP_STATE_APP_LOADED) {
  528. pr_err("library already loaded\n");
  529. goto error;
  530. }
  531. rc = hdcp2_app_process_cmd(version);
  532. if (rc)
  533. goto error;
  534. app_major_version = HCDP_TXMTR_GET_MAJOR_VERSION(rsp_buf->appversion);
  535. pr_debug("hdp2p2 app major version %d, app version %d\n",
  536. app_major_version, rsp_buf->appversion);
  537. if (app_major_version == 1)
  538. handle->legacy_app = true;
  539. error:
  540. return rc;
  541. }
  542. static int hdcp2_app_init_legacy(struct hdcp2_handle *handle)
  543. {
  544. int rc = 0;
  545. hdcp2_app_init_var(init_v1);
  546. if (!handle->legacy_app) {
  547. pr_err("wrong init function\n");
  548. rc = -EINVAL;
  549. goto error;
  550. }
  551. if (handle->hdcp_state & HDCP_STATE_APP_LOADED) {
  552. pr_err("library already loaded\n");
  553. goto error;
  554. }
  555. rc = hdcp2_app_process_cmd(init_v1);
  556. if (rc)
  557. goto error;
  558. pr_debug("success\n");
  559. error:
  560. return rc;
  561. }
  562. static int hdcp2_app_init(struct hdcp2_handle *handle)
  563. {
  564. int rc = 0;
  565. uint32_t app_minor_version = 0;
  566. hdcp2_app_init_var(init);
  567. if (handle->legacy_app) {
  568. pr_err("wrong init function\n");
  569. rc = -EINVAL;
  570. goto error;
  571. }
  572. if (handle->hdcp_state & HDCP_STATE_APP_LOADED) {
  573. pr_err("library already loaded\n");
  574. goto error;
  575. }
  576. req_buf->clientversion =
  577. HDCP_CLIENT_MAKE_VERSION(HDCP_CLIENT_MAJOR_VERSION,
  578. HDCP_CLIENT_MINOR_VERSION,
  579. HDCP_CLIENT_PATCH_VERSION);
  580. rc = hdcp2_app_process_cmd(init);
  581. if (rc)
  582. goto error;
  583. app_minor_version = HCDP_TXMTR_GET_MINOR_VERSION(rsp_buf->appversion);
  584. if (app_minor_version != HDCP_CLIENT_MINOR_VERSION) {
  585. pr_err
  586. ("client-app minor version mismatch app(%d), client(%d)\n",
  587. app_minor_version, HDCP_CLIENT_MINOR_VERSION);
  588. rc = -1;
  589. goto error;
  590. }
  591. pr_debug("success\n");
  592. pr_debug("client version major(%d), minor(%d), patch(%d)\n",
  593. HDCP_CLIENT_MAJOR_VERSION, HDCP_CLIENT_MINOR_VERSION,
  594. HDCP_CLIENT_PATCH_VERSION);
  595. pr_debug("app version major(%d), minor(%d), patch(%d)\n",
  596. HCDP_TXMTR_GET_MAJOR_VERSION(rsp_buf->appversion),
  597. HCDP_TXMTR_GET_MINOR_VERSION(rsp_buf->appversion),
  598. HCDP_TXMTR_GET_PATCH_VERSION(rsp_buf->appversion));
  599. error:
  600. return rc;
  601. }
  602. static int hdcp2_app_tx_init(struct hdcp2_handle *handle)
  603. {
  604. int rc = 0;
  605. hdcp2_app_init_var(tx_init);
  606. if (!(handle->hdcp_state & HDCP_STATE_SESSION_INIT)) {
  607. pr_err("session not initialized\n");
  608. rc = -EINVAL;
  609. goto error;
  610. }
  611. if (handle->hdcp_state & HDCP_STATE_TXMTR_INIT) {
  612. pr_err("txmtr already initialized\n");
  613. goto error;
  614. }
  615. req_buf->sessionid = handle->session_id;
  616. rc = hdcp2_app_process_cmd(tx_init);
  617. if (rc)
  618. goto error;
  619. handle->tz_ctxhandle = rsp_buf->ctxhandle;
  620. handle->hdcp_state |= HDCP_STATE_TXMTR_INIT;
  621. pr_debug("success\n");
  622. error:
  623. return rc;
  624. }
  625. static int hdcp2_app_tx_init_legacy(struct hdcp2_handle *handle)
  626. {
  627. int rc = 0;
  628. hdcp2_app_init_var(tx_init_v1);
  629. if (!(handle->hdcp_state & HDCP_STATE_APP_LOADED)) {
  630. pr_err("app not loaded\n");
  631. rc = -EINVAL;
  632. goto error;
  633. }
  634. if (handle->hdcp_state & HDCP_STATE_TXMTR_INIT) {
  635. pr_err("txmtr already initialized\n");
  636. goto error;
  637. }
  638. rc = hdcp2_app_process_cmd(tx_init_v1);
  639. if (rc)
  640. goto error;
  641. handle->app_data.response.data = rsp_buf->message;
  642. handle->app_data.response.length = rsp_buf->msglen;
  643. handle->app_data.timeout = rsp_buf->timeout;
  644. handle->tz_ctxhandle = rsp_buf->ctxhandle;
  645. handle->hdcp_state |= HDCP_STATE_TXMTR_INIT;
  646. pr_debug("success\n");
  647. error:
  648. return rc;
  649. }
  650. static int hdcp2_app_load(struct hdcp2_handle *handle)
  651. {
  652. int rc = 0;
  653. if (!handle) {
  654. pr_err("invalid input\n");
  655. rc = -EINVAL;
  656. goto error;
  657. }
  658. if (handle->hdcp_state & HDCP_STATE_APP_LOADED) {
  659. pr_err("%s app already loaded\n", handle->app_name);
  660. goto error;
  661. }
  662. rc = qseecom_start_app(&handle->qseecom_handle,
  663. handle->app_name, QSEECOM_SBUFF_SIZE);
  664. if (rc) {
  665. pr_err("qseecom_start_app failed for HDCP2P2 (%d)\n", rc);
  666. goto error;
  667. }
  668. rc = qseecom_start_app(&handle->hdcpsrm_qseecom_handle,
  669. HDCPSRM_APP_NAME, QSEECOM_SBUFF_SIZE);
  670. if (rc) {
  671. pr_err("qseecom_start_app failed for HDCPSRM (%d)\n", rc);
  672. goto hdcpsrm_error;
  673. }
  674. pr_debug("qseecom_start_app success\n");
  675. rc = hdcp_get_version(handle);
  676. if (rc) {
  677. pr_err("library get version failed\n");
  678. goto get_version_error;
  679. }
  680. if (handle->legacy_app) {
  681. handle->app_init = hdcp2_app_init_legacy;
  682. handle->tx_init = hdcp2_app_tx_init_legacy;
  683. } else {
  684. handle->app_init = hdcp2_app_init;
  685. handle->tx_init = hdcp2_app_tx_init;
  686. }
  687. rc = handle->app_init(handle);
  688. if (rc) {
  689. pr_err("app init failed\n");
  690. goto get_version_error;
  691. }
  692. handle->hdcp_state |= HDCP_STATE_APP_LOADED;
  693. return rc;
  694. get_version_error:
  695. qseecom_shutdown_app(&handle->hdcpsrm_qseecom_handle);
  696. hdcpsrm_error:
  697. qseecom_shutdown_app(&handle->qseecom_handle);
  698. error:
  699. return rc;
  700. }
  701. static int hdcp2_app_unload(struct hdcp2_handle *handle)
  702. {
  703. int rc = 0;
  704. hdcp2_app_init_var(deinit);
  705. hdcp2_app_process_cmd(deinit);
  706. /* deallocate the resources for qseecom HDCPSRM handle */
  707. rc = qseecom_shutdown_app(&handle->hdcpsrm_qseecom_handle);
  708. if (rc)
  709. pr_err("qseecom_shutdown_app failed for HDCPSRM (%d)\n", rc);
  710. /* deallocate the resources for qseecom HDCP2P2 handle */
  711. rc = qseecom_shutdown_app(&handle->qseecom_handle);
  712. if (rc) {
  713. pr_err("qseecom_shutdown_app failed for HDCP2P2 (%d)\n", rc);
  714. return rc;
  715. }
  716. handle->hdcp_state &= ~HDCP_STATE_APP_LOADED;
  717. pr_debug("%s app unloaded\n", handle->app_name);
  718. return rc;
  719. error:
  720. qseecom_shutdown_app(&handle->hdcpsrm_qseecom_handle);
  721. return rc;
  722. }
  723. static int hdcp2_verify_key(struct hdcp2_handle *handle)
  724. {
  725. int rc = 0;
  726. hdcp2_app_init_var(verify_key);
  727. if (!(handle->hdcp_state & HDCP_STATE_APP_LOADED)) {
  728. pr_err("%s app not loaded\n", handle->app_name);
  729. rc = -EINVAL;
  730. goto error;
  731. }
  732. rc = hdcp2_app_process_cmd(verify_key);
  733. pr_debug("verify_key = %d\n", rc);
  734. error:
  735. return rc;
  736. }
  737. bool hdcp2_feature_supported(void *data)
  738. {
  739. int rc = 0;
  740. bool supported = false;
  741. struct hdcp2_handle *handle = data;
  742. if (!handle) {
  743. pr_err("invalid input\n");
  744. rc = -EINVAL;
  745. goto error;
  746. }
  747. if (handle->feature_supported) {
  748. supported = true;
  749. goto error;
  750. }
  751. rc = hdcp2_app_load(handle);
  752. if (!rc) {
  753. if (!hdcp2_verify_key(handle)) {
  754. pr_debug("HDCP 2.2 supported\n");
  755. handle->feature_supported = true;
  756. supported = true;
  757. }
  758. hdcp2_app_unload(handle);
  759. }
  760. error:
  761. return supported;
  762. }
  763. EXPORT_SYMBOL(hdcp2_feature_supported);
  764. static int hdcp2_app_session_init(struct hdcp2_handle *handle)
  765. {
  766. int rc = 0;
  767. hdcp2_app_init_var(session_init);
  768. if (!handle->qseecom_handle || !handle->qseecom_handle->sbuf) {
  769. pr_err("invalid handle\n");
  770. rc = -EINVAL;
  771. goto error;
  772. }
  773. if (!(handle->hdcp_state & HDCP_STATE_APP_LOADED)) {
  774. pr_err("%s app not loaded\n", handle->app_name);
  775. rc = -EINVAL;
  776. goto error;
  777. }
  778. if (handle->hdcp_state & HDCP_STATE_SESSION_INIT) {
  779. pr_err("session already initialized\n");
  780. goto error;
  781. }
  782. req_buf->deviceid = handle->device_type;
  783. rc = hdcp2_app_process_cmd(session_init);
  784. if (rc)
  785. goto error;
  786. pr_debug("session id %d\n", rsp_buf->sessionid);
  787. handle->session_id = rsp_buf->sessionid;
  788. handle->hdcp_state |= HDCP_STATE_SESSION_INIT;
  789. pr_debug("success\n");
  790. error:
  791. return rc;
  792. }
  793. static int hdcp2_app_session_deinit(struct hdcp2_handle *handle)
  794. {
  795. int rc = 0;
  796. hdcp2_app_init_var(session_deinit);
  797. if (!(handle->hdcp_state & HDCP_STATE_APP_LOADED)) {
  798. pr_err("%s app not loaded\n", handle->app_name);
  799. rc = -EINVAL;
  800. goto error;
  801. }
  802. if (!(handle->hdcp_state & HDCP_STATE_SESSION_INIT)) {
  803. pr_err("session not initialized\n");
  804. rc = -EINVAL;
  805. goto error;
  806. }
  807. req_buf->sessionid = handle->session_id;
  808. rc = hdcp2_app_process_cmd(session_deinit);
  809. if (rc)
  810. goto error;
  811. handle->hdcp_state &= ~HDCP_STATE_SESSION_INIT;
  812. pr_debug("success\n");
  813. error:
  814. return rc;
  815. }
  816. static int hdcp2_app_tx_deinit(struct hdcp2_handle *handle)
  817. {
  818. int rc = 0;
  819. hdcp2_app_init_var(tx_deinit);
  820. if (!(handle->hdcp_state & HDCP_STATE_APP_LOADED)) {
  821. pr_err("%s app not loaded\n", handle->app_name);
  822. rc = -EINVAL;
  823. goto error;
  824. }
  825. if (!(handle->hdcp_state & HDCP_STATE_TXMTR_INIT)) {
  826. pr_err("txmtr not initialized\n");
  827. rc = -EINVAL;
  828. goto error;
  829. }
  830. req_buf->ctxhandle = handle->tz_ctxhandle;
  831. rc = hdcp2_app_process_cmd(tx_deinit);
  832. if (rc)
  833. goto error;
  834. handle->hdcp_state &= ~HDCP_STATE_TXMTR_INIT;
  835. pr_debug("success\n");
  836. error:
  837. return rc;
  838. }
  839. static int hdcp2_app_start_auth(struct hdcp2_handle *handle)
  840. {
  841. int rc = 0;
  842. hdcp2_app_init_var(start_auth);
  843. if (!(handle->hdcp_state & HDCP_STATE_SESSION_INIT)) {
  844. pr_err("session not initialized\n");
  845. rc = -EINVAL;
  846. goto error;
  847. }
  848. if (!(handle->hdcp_state & HDCP_STATE_TXMTR_INIT)) {
  849. pr_err("txmtr not initialized\n");
  850. rc = -EINVAL;
  851. goto error;
  852. }
  853. req_buf->ctxHandle = handle->tz_ctxhandle;
  854. rc = hdcp2_app_process_cmd(start_auth);
  855. if (rc)
  856. goto error;
  857. handle->app_data.response.data = rsp_buf->message;
  858. handle->app_data.response.length = rsp_buf->msglen;
  859. handle->app_data.timeout = rsp_buf->timeout;
  860. handle->app_data.repeater_flag = false;
  861. handle->tz_ctxhandle = rsp_buf->ctxhandle;
  862. pr_debug("success\n");
  863. error:
  864. return rc;
  865. }
  866. static int hdcp2_app_start(struct hdcp2_handle *handle)
  867. {
  868. int rc = 0;
  869. rc = hdcp2_app_load(handle);
  870. if (rc)
  871. goto error;
  872. if (!handle->legacy_app) {
  873. rc = hdcp2_app_session_init(handle);
  874. if (rc)
  875. goto error;
  876. }
  877. if (handle->tx_init == NULL) {
  878. pr_err("invalid txmtr init function pointer\n");
  879. rc = -EINVAL;
  880. goto error;
  881. }
  882. rc = handle->tx_init(handle);
  883. error:
  884. return rc;
  885. }
  886. static int hdcp2_app_stop(struct hdcp2_handle *handle)
  887. {
  888. int rc = 0;
  889. rc = hdcp2_app_tx_deinit(handle);
  890. if (rc)
  891. goto end;
  892. if (!handle->legacy_app) {
  893. rc = hdcp2_app_session_deinit(handle);
  894. if (rc)
  895. goto end;
  896. }
  897. rc = hdcp2_app_unload(handle);
  898. end:
  899. return rc;
  900. }
  901. static int hdcp2_app_process_msg(struct hdcp2_handle *handle)
  902. {
  903. int rc = 0;
  904. hdcp2_app_init_var(rcvd_msg);
  905. if (!handle->app_data.request.data) {
  906. pr_err("invalid request buffer\n");
  907. rc = -EINVAL;
  908. goto error;
  909. }
  910. req_buf->msglen = handle->app_data.request.length;
  911. req_buf->ctxhandle = handle->tz_ctxhandle;
  912. rc = hdcp2_app_process_cmd(rcvd_msg);
  913. if (rc)
  914. goto error;
  915. /* check if it's a repeater */
  916. if (rsp_buf->flag == HDCP_TXMTR_SUBSTATE_WAITING_FOR_RECIEVERID_LIST)
  917. handle->app_data.repeater_flag = true;
  918. handle->app_data.response.data = rsp_buf->msg;
  919. handle->app_data.response.length = rsp_buf->msglen;
  920. handle->app_data.timeout = rsp_buf->timeout;
  921. error:
  922. return rc;
  923. }
  924. static int hdcp2_app_timeout(struct hdcp2_handle *handle)
  925. {
  926. int rc = 0;
  927. hdcp2_app_init_var(send_timeout);
  928. rc = hdcp2_app_process_cmd(send_timeout);
  929. if (rc)
  930. goto error;
  931. handle->app_data.response.data = rsp_buf->message;
  932. handle->app_data.response.length = rsp_buf->msglen;
  933. handle->app_data.timeout = rsp_buf->timeout;
  934. error:
  935. return rc;
  936. }
  937. static int hdcp2_app_enable_encryption(struct hdcp2_handle *handle)
  938. {
  939. int rc = 0;
  940. hdcp2_app_init_var(set_hw_key);
  941. /*
  942. * wait at least 200ms before enabling encryption
  943. * as per hdcp2p2 specifications.
  944. */
  945. msleep(SLEEP_SET_HW_KEY_MS);
  946. req_buf->ctxhandle = handle->tz_ctxhandle;
  947. rc = hdcp2_app_process_cmd(set_hw_key);
  948. if (rc)
  949. goto error;
  950. handle->hdcp_state |= HDCP_STATE_AUTHENTICATED;
  951. pr_debug("success\n");
  952. return rc;
  953. error:
  954. return rc;
  955. }
  956. static int hdcp2_force_encryption_utility(struct hdcp2_handle *handle,
  957. uint32_t enable)
  958. {
  959. int rc = 0;
  960. hdcp2_app_init_var(force_encryption);
  961. if (handle->hdcp_state == HDCP_STATE_AUTHENTICATED)
  962. msleep(SLEEP_FORCE_ENCRYPTION_MS);
  963. req_buf->ctxhandle = handle->tz_ctxhandle;
  964. req_buf->enable = enable;
  965. rc = hdcp2_app_process_cmd(force_encryption);
  966. if (rc || (rsp_buf->commandid != hdcp_cmd_force_encryption))
  967. goto error;
  968. return 0;
  969. error:
  970. return rc;
  971. }
  972. int hdcp2_force_encryption(void *ctx, uint32_t enable)
  973. {
  974. int rc = 0;
  975. struct hdcp2_handle *handle = NULL;
  976. if (!ctx) {
  977. pr_err("invalid input\n");
  978. return -EINVAL;
  979. }
  980. handle = ctx;
  981. rc = hdcp2_force_encryption_utility(handle, enable);
  982. if (rc)
  983. goto error;
  984. pr_debug("success\n");
  985. return 0;
  986. error:
  987. pr_err("failed, rc=%d\n", rc);
  988. return rc;
  989. }
  990. EXPORT_SYMBOL(hdcp2_force_encryption);
  991. static int hdcp2_app_query_stream(struct hdcp2_handle *handle)
  992. {
  993. int rc = 0;
  994. hdcp2_app_init_var(query_stream_type);
  995. req_buf->ctxhandle = handle->tz_ctxhandle;
  996. rc = hdcp2_app_process_cmd(query_stream_type);
  997. if (rc)
  998. goto error;
  999. handle->app_data.response.data = rsp_buf->msg;
  1000. handle->app_data.response.length = rsp_buf->msglen;
  1001. handle->app_data.timeout = rsp_buf->timeout;
  1002. error:
  1003. return rc;
  1004. }
  1005. static unsigned char *hdcp2_get_recv_buf(struct hdcp2_handle *handle)
  1006. {
  1007. struct hdcp_rcvd_msg_req *req_buf;
  1008. req_buf = (struct hdcp_rcvd_msg_req *)(handle->qseecom_handle->sbuf);
  1009. return req_buf->msg;
  1010. }
  1011. int hdcp2_app_comm(void *ctx, enum hdcp2_app_cmd cmd,
  1012. struct hdcp2_app_data *app_data)
  1013. {
  1014. struct hdcp2_handle *handle = NULL;
  1015. int rc = 0;
  1016. if (!ctx || !app_data) {
  1017. pr_err("invalid input\n");
  1018. return -EINVAL;
  1019. }
  1020. handle = ctx;
  1021. handle->app_data.request.length = app_data->request.length;
  1022. pr_debug("command %s\n", hdcp2_app_cmd_str(cmd));
  1023. switch (cmd) {
  1024. case HDCP2_CMD_START:
  1025. rc = hdcp2_app_start(handle);
  1026. break;
  1027. case HDCP2_CMD_START_AUTH:
  1028. rc = hdcp2_app_start_auth(handle);
  1029. break;
  1030. case HDCP2_CMD_PROCESS_MSG:
  1031. rc = hdcp2_app_process_msg(handle);
  1032. break;
  1033. case HDCP2_CMD_TIMEOUT:
  1034. rc = hdcp2_app_timeout(handle);
  1035. break;
  1036. case HDCP2_CMD_EN_ENCRYPTION:
  1037. rc = hdcp2_app_enable_encryption(handle);
  1038. break;
  1039. case HDCP2_CMD_QUERY_STREAM:
  1040. rc = hdcp2_app_query_stream(handle);
  1041. break;
  1042. case HDCP2_CMD_STOP:
  1043. rc = hdcp2_app_stop(handle);
  1044. default:
  1045. goto error;
  1046. }
  1047. if (rc)
  1048. goto error;
  1049. handle->app_data.request.data = hdcp2_get_recv_buf(handle);
  1050. app_data->request.data = handle->app_data.request.data;
  1051. app_data->request.length = handle->app_data.request.length;
  1052. app_data->response.data = handle->app_data.response.data;
  1053. app_data->response.length = handle->app_data.response.length;
  1054. app_data->timeout = handle->app_data.timeout;
  1055. app_data->repeater_flag = handle->app_data.repeater_flag;
  1056. error:
  1057. return rc;
  1058. }
  1059. EXPORT_SYMBOL(hdcp2_app_comm);
  1060. static int hdcp2_open_stream_helper(struct hdcp2_handle *handle,
  1061. uint8_t vc_payload_id,
  1062. uint8_t stream_number,
  1063. uint32_t *stream_id)
  1064. {
  1065. int rc = 0;
  1066. hdcp2_app_init_var(session_open_stream);
  1067. if (!(handle->hdcp_state & HDCP_STATE_SESSION_INIT)) {
  1068. pr_err("session not initialized\n");
  1069. rc = -EINVAL;
  1070. goto error;
  1071. }
  1072. if (!(handle->hdcp_state & HDCP_STATE_TXMTR_INIT)) {
  1073. pr_err("txmtr not initialized\n");
  1074. rc = -EINVAL;
  1075. goto error;
  1076. }
  1077. req_buf->sessionid = handle->session_id;
  1078. req_buf->vcpayloadid = vc_payload_id;
  1079. req_buf->stream_number = stream_number;
  1080. req_buf->streamMediaType = 0;
  1081. rc = hdcp2_app_process_cmd(session_open_stream);
  1082. if (rc)
  1083. goto error;
  1084. *stream_id = rsp_buf->streamid;
  1085. pr_debug("success\n");
  1086. error:
  1087. return rc;
  1088. }
  1089. int hdcp2_open_stream(void *ctx, uint8_t vc_payload_id, uint8_t stream_number,
  1090. uint32_t *stream_id)
  1091. {
  1092. struct hdcp2_handle *handle = NULL;
  1093. if (!ctx) {
  1094. pr_err("invalid input\n");
  1095. return -EINVAL;
  1096. }
  1097. handle = ctx;
  1098. return hdcp2_open_stream_helper(handle, vc_payload_id, stream_number,
  1099. stream_id);
  1100. }
  1101. EXPORT_SYMBOL(hdcp2_open_stream);
  1102. static int hdcp2_close_stream_helper(struct hdcp2_handle *handle,
  1103. uint32_t stream_id)
  1104. {
  1105. int rc = 0;
  1106. hdcp2_app_init_var(session_close_stream);
  1107. if (!(handle->hdcp_state & HDCP_STATE_SESSION_INIT)) {
  1108. pr_err("session not initialized\n");
  1109. rc = -EINVAL;
  1110. goto error;
  1111. }
  1112. if (!(handle->hdcp_state & HDCP_STATE_TXMTR_INIT)) {
  1113. pr_err("txmtr not initialized\n");
  1114. rc = -EINVAL;
  1115. goto error;
  1116. }
  1117. req_buf->sessionid = handle->session_id;
  1118. req_buf->streamid = stream_id;
  1119. rc = hdcp2_app_process_cmd(session_close_stream);
  1120. if (rc)
  1121. goto error;
  1122. pr_debug("success\n");
  1123. error:
  1124. return rc;
  1125. }
  1126. int hdcp2_close_stream(void *ctx, uint32_t stream_id)
  1127. {
  1128. struct hdcp2_handle *handle = NULL;
  1129. if (!ctx) {
  1130. pr_err("invalid input\n");
  1131. return -EINVAL;
  1132. }
  1133. handle = ctx;
  1134. return hdcp2_close_stream_helper(handle, stream_id);
  1135. }
  1136. EXPORT_SYMBOL(hdcp2_close_stream);
  1137. void *hdcp2_init(u32 device_type)
  1138. {
  1139. struct hdcp2_handle *handle = NULL;
  1140. handle = kzalloc(sizeof(struct hdcp2_handle), GFP_KERNEL);
  1141. if (!handle)
  1142. goto error;
  1143. handle->device_type = device_type;
  1144. handle->app_name = HDCP2P2_APP_NAME;
  1145. error:
  1146. return handle;
  1147. }
  1148. EXPORT_SYMBOL(hdcp2_init);
  1149. void hdcp2_deinit(void *ctx)
  1150. {
  1151. kfree_sensitive(ctx);
  1152. }
  1153. EXPORT_SYMBOL(hdcp2_deinit);
  1154. void *hdcp1_init(void)
  1155. {
  1156. struct hdcp1_handle *handle =
  1157. kzalloc(sizeof(struct hdcp1_handle), GFP_KERNEL);
  1158. if (!handle)
  1159. goto error;
  1160. handle->app_name = HDCP1_APP_NAME;
  1161. error:
  1162. return handle;
  1163. }
  1164. EXPORT_SYMBOL(hdcp1_init);
  1165. void hdcp1_deinit(void *data)
  1166. {
  1167. kfree(data);
  1168. }
  1169. EXPORT_SYMBOL(hdcp1_deinit);
  1170. static int hdcp1_count_ones(u8 *array, u8 len)
  1171. {
  1172. int i, j, count = 0;
  1173. for (i = 0; i < len; i++)
  1174. for (j = 0; j < 8; j++)
  1175. count += (((array[i] >> j) & 0x1) ? 1 : 0);
  1176. return count;
  1177. }
  1178. static int hdcp1_validate_aksv(u32 aksv_msb, u32 aksv_lsb)
  1179. {
  1180. int const number_of_ones = 20;
  1181. u8 aksv[5];
  1182. pr_debug("AKSV=%02x%08x\n", aksv_msb, aksv_lsb);
  1183. aksv[0] = aksv_lsb & 0xFF;
  1184. aksv[1] = (aksv_lsb >> 8) & 0xFF;
  1185. aksv[2] = (aksv_lsb >> 16) & 0xFF;
  1186. aksv[3] = (aksv_lsb >> 24) & 0xFF;
  1187. aksv[4] = aksv_msb & 0xFF;
  1188. /* check there are 20 ones in AKSV */
  1189. if (hdcp1_count_ones(aksv, 5) != number_of_ones) {
  1190. pr_err("AKSV bit count failed\n");
  1191. return -EINVAL;
  1192. }
  1193. return 0;
  1194. }
  1195. static int hdcp1_set_key(struct hdcp1_handle *hdcp1_handle, u32 *aksv_msb,
  1196. u32 *aksv_lsb)
  1197. {
  1198. int rc = 0;
  1199. struct hdcp1_key_set_req *key_set_req;
  1200. struct hdcp1_key_set_rsp *key_set_rsp;
  1201. struct qseecom_handle *handle = NULL;
  1202. if (aksv_msb == NULL || aksv_lsb == NULL) {
  1203. pr_err("invalid aksv\n");
  1204. return -EINVAL;
  1205. }
  1206. if (!hdcp1_handle || !hdcp1_handle->qseecom_handle) {
  1207. pr_err("invalid HDCP 1.x handle\n");
  1208. return -EINVAL;
  1209. }
  1210. if (!(hdcp1_handle->hdcp_state & HDCP_STATE_APP_LOADED)) {
  1211. pr_err("%s app not loaded\n", hdcp1_handle->app_name);
  1212. return -EINVAL;
  1213. }
  1214. handle = hdcp1_handle->qseecom_handle;
  1215. /* set keys and request aksv */
  1216. key_set_req = (struct hdcp1_key_set_req *)handle->sbuf;
  1217. key_set_req->commandid = HDCP1_SET_KEY;
  1218. key_set_rsp = (struct hdcp1_key_set_rsp *)(handle->sbuf +
  1219. QSEECOM_ALIGN(sizeof(struct hdcp1_key_set_req)));
  1220. rc = qseecom_send_command(handle, key_set_req,
  1221. QSEECOM_ALIGN(sizeof
  1222. (struct hdcp1_key_set_req)),
  1223. key_set_rsp,
  1224. QSEECOM_ALIGN(sizeof
  1225. (struct hdcp1_key_set_rsp)));
  1226. if (rc < 0) {
  1227. pr_err("qseecom cmd failed err=%d\n", rc);
  1228. return -ENOKEY;
  1229. }
  1230. rc = key_set_rsp->ret;
  1231. if (rc) {
  1232. pr_err("set key cmd failed, rsp=%d\n", key_set_rsp->ret);
  1233. return -ENOKEY;
  1234. }
  1235. /* copy bytes into msb and lsb */
  1236. *aksv_msb = key_set_rsp->ksv[0] << 24 | key_set_rsp->ksv[1] << 16 |
  1237. key_set_rsp->ksv[2] << 8 | key_set_rsp->ksv[3];
  1238. *aksv_lsb = key_set_rsp->ksv[4] << 24 | key_set_rsp->ksv[5] << 16 |
  1239. key_set_rsp->ksv[6] << 8 | key_set_rsp->ksv[7];
  1240. rc = hdcp1_validate_aksv(*aksv_msb, *aksv_lsb);
  1241. if (rc) {
  1242. pr_err("aksv validation failed (%d)\n", rc);
  1243. return rc;
  1244. }
  1245. return 0;
  1246. }
  1247. static int hdcp1_app_load(struct hdcp1_handle *handle)
  1248. {
  1249. int rc = 0;
  1250. if (!handle) {
  1251. pr_err("invalid handle\n");
  1252. goto error;
  1253. }
  1254. rc = qseecom_start_app(&handle->qseecom_handle, handle->app_name,
  1255. QSEECOM_SBUFF_SIZE);
  1256. if (rc) {
  1257. pr_err("%s app load failed (%d)\n", handle->app_name, rc);
  1258. goto error;
  1259. }
  1260. rc = qseecom_start_app(&handle->hdcpops_handle, HDCP1OPS_APP_NAME,
  1261. QSEECOM_SBUFF_SIZE);
  1262. if (rc) {
  1263. pr_warn("%s app load failed (%d)\n", HDCP1OPS_APP_NAME, rc);
  1264. handle->hdcpops_handle = NULL;
  1265. }
  1266. handle->hdcp_state |= HDCP_STATE_APP_LOADED;
  1267. pr_debug("%s app loaded\n", handle->app_name);
  1268. error:
  1269. return rc;
  1270. }
  1271. static void hdcp1_app_unload(struct hdcp1_handle *handle)
  1272. {
  1273. int rc = 0;
  1274. if (!handle || !handle->qseecom_handle) {
  1275. pr_err("invalid handle\n");
  1276. return;
  1277. }
  1278. if (!(handle->hdcp_state & HDCP_STATE_APP_LOADED)) {
  1279. pr_warn("%s app not loaded\n", handle->app_name);
  1280. return;
  1281. }
  1282. if (handle->hdcpops_handle) {
  1283. /* deallocate the resources for HDCP 1.x ops handle */
  1284. rc = qseecom_shutdown_app(&handle->hdcpops_handle);
  1285. if (rc)
  1286. pr_warn("%s app unload failed (%d)\n", HDCP1OPS_APP_NAME, rc);
  1287. }
  1288. /* deallocate the resources for qseecom HDCP 1.x handle */
  1289. rc = qseecom_shutdown_app(&handle->qseecom_handle);
  1290. if (rc) {
  1291. pr_err("%s app unload failed (%d)\n", handle->app_name, rc);
  1292. return;
  1293. }
  1294. handle->hdcp_state &= ~HDCP_STATE_APP_LOADED;
  1295. pr_debug("%s app unloaded\n", handle->app_name);
  1296. }
  1297. static int hdcp1_verify_key(struct hdcp1_handle *hdcp1_handle)
  1298. {
  1299. int rc = 0;
  1300. struct hdcp1_key_verify_req *key_verify_req;
  1301. struct hdcp1_key_verify_rsp *key_verify_rsp;
  1302. struct qseecom_handle *handle = NULL;
  1303. if (!hdcp1_handle || !hdcp1_handle->qseecom_handle) {
  1304. pr_err("invalid HDCP 1.x handle\n");
  1305. return -EINVAL;
  1306. }
  1307. if (!(hdcp1_handle->hdcp_state & HDCP_STATE_APP_LOADED)) {
  1308. pr_err("%s app not loaded\n", hdcp1_handle->app_name);
  1309. return -EINVAL;
  1310. }
  1311. handle = hdcp1_handle->qseecom_handle;
  1312. key_verify_req = (struct hdcp1_key_verify_req *)handle->sbuf;
  1313. key_verify_req->commandid = HDCP1_KEY_VERIFY;
  1314. key_verify_rsp = (struct hdcp1_key_verify_rsp *)(handle->sbuf +
  1315. QSEECOM_ALIGN(sizeof(struct hdcp1_key_verify_req)));
  1316. rc = qseecom_send_command(handle, key_verify_req,
  1317. QSEECOM_ALIGN(sizeof
  1318. (struct hdcp1_key_verify_req)),
  1319. key_verify_rsp,
  1320. QSEECOM_ALIGN(sizeof
  1321. (struct hdcp1_key_set_rsp)));
  1322. if (rc < 0) {
  1323. pr_err("command HDCP1_KEY_VERIFY failed (%d)\n", rc);
  1324. return -EINVAL;
  1325. }
  1326. rc = key_verify_rsp->ret;
  1327. if (rc) {
  1328. pr_err("key_verify failed, rsp=%d\n", key_verify_rsp->ret);
  1329. return -EINVAL;
  1330. }
  1331. pr_debug("success\n");
  1332. return 0;
  1333. }
  1334. bool hdcp1_feature_supported(void *data)
  1335. {
  1336. bool supported = false;
  1337. struct hdcp1_handle *handle = data;
  1338. int rc = 0;
  1339. if (!handle) {
  1340. pr_err("invalid handle\n");
  1341. goto error;
  1342. }
  1343. if (handle->feature_supported) {
  1344. supported = true;
  1345. goto error;
  1346. }
  1347. rc = hdcp1_app_load(handle);
  1348. if (!rc && (handle->hdcp_state & HDCP_STATE_APP_LOADED)) {
  1349. if (!hdcp1_verify_key(handle)) {
  1350. pr_debug("HDCP 1.x supported\n");
  1351. handle->feature_supported = true;
  1352. supported = true;
  1353. }
  1354. hdcp1_app_unload(handle);
  1355. }
  1356. error:
  1357. return supported;
  1358. }
  1359. EXPORT_SYMBOL(hdcp1_feature_supported);
  1360. int hdcp1_set_enc(void *data, bool enable)
  1361. {
  1362. int rc = 0;
  1363. struct hdcp1_set_enc_req *set_enc_req;
  1364. struct hdcp1_set_enc_rsp *set_enc_rsp;
  1365. struct hdcp1_handle *hdcp1_handle = data;
  1366. struct qseecom_handle *handle = NULL;
  1367. if (!hdcp1_handle || !hdcp1_handle->qseecom_handle) {
  1368. pr_err("invalid HDCP 1.x handle\n");
  1369. return -EINVAL;
  1370. }
  1371. if (!hdcp1_handle->feature_supported) {
  1372. pr_err("HDCP 1.x not supported\n");
  1373. return -EINVAL;
  1374. }
  1375. if (!(hdcp1_handle->hdcp_state & HDCP_STATE_APP_LOADED)) {
  1376. pr_err("%s app not loaded\n", hdcp1_handle->app_name);
  1377. return -EINVAL;
  1378. }
  1379. handle = hdcp1_handle->qseecom_handle;
  1380. /* set keys and request aksv */
  1381. set_enc_req = (struct hdcp1_set_enc_req *)handle->sbuf;
  1382. set_enc_req->commandid = HDCP1_SET_ENC;
  1383. set_enc_req->enable = enable;
  1384. set_enc_rsp = (struct hdcp1_set_enc_rsp *)(handle->sbuf +
  1385. QSEECOM_ALIGN(sizeof(struct hdcp1_set_enc_req)));
  1386. rc = qseecom_send_command(handle, set_enc_req,
  1387. QSEECOM_ALIGN(sizeof
  1388. (struct hdcp1_set_enc_req)),
  1389. set_enc_rsp,
  1390. QSEECOM_ALIGN(sizeof
  1391. (struct hdcp1_set_enc_rsp)));
  1392. if (rc < 0) {
  1393. pr_err("qseecom cmd failed err=%d\n", rc);
  1394. return -EINVAL;
  1395. }
  1396. rc = set_enc_rsp->ret;
  1397. if (rc) {
  1398. pr_err("enc cmd failed, rsp=%d\n", set_enc_rsp->ret);
  1399. return -EINVAL;
  1400. }
  1401. pr_debug("success\n");
  1402. return 0;
  1403. }
  1404. EXPORT_SYMBOL(hdcp1_set_enc);
  1405. int hdcp1_ops_notify(void *data, void *topo, bool is_authenticated)
  1406. {
  1407. int rc = 0;
  1408. struct hdcp1_ops_notify_req *ops_notify_req;
  1409. struct hdcp1_ops_notify_rsp *ops_notify_rsp;
  1410. struct hdcp1_handle *hdcp1_handle = data;
  1411. struct qseecom_handle *handle = NULL;
  1412. struct hdcp1_topology *topology = NULL;
  1413. if (!hdcp1_handle || !hdcp1_handle->hdcpops_handle) {
  1414. pr_err("invalid HDCP 1.x ops handle\n");
  1415. return -EINVAL;
  1416. }
  1417. if (!hdcp1_handle->feature_supported) {
  1418. pr_err("HDCP 1.x not supported\n");
  1419. return -EINVAL;
  1420. }
  1421. if (!(hdcp1_handle->hdcp_state & HDCP_STATE_APP_LOADED)) {
  1422. pr_err("%s app not loaded\n", HDCP1OPS_APP_NAME);
  1423. return -EINVAL;
  1424. }
  1425. handle = hdcp1_handle->hdcpops_handle;
  1426. topology = (struct hdcp1_topology *)topo;
  1427. /* set keys and request aksv */
  1428. ops_notify_req = (struct hdcp1_ops_notify_req *)handle->sbuf;
  1429. ops_notify_req->commandid = HDCP1_NOTIFY_TOPOLOGY;
  1430. ops_notify_req->device_type = DEVICE_TYPE_DP;
  1431. ops_notify_req->is_authenticated = is_authenticated;
  1432. ops_notify_req->topology.depth = topology->depth;
  1433. ops_notify_req->topology.device_count = topology->device_count;
  1434. ops_notify_req->topology.max_devices_exceeded = topology->max_devices_exceeded;
  1435. ops_notify_req->topology.max_cascade_exceeded = topology->max_cascade_exceeded;
  1436. /*
  1437. * For hdcp1.4 below two nodes are not applicable but as
  1438. * TZ ops ta talks with other drivers with same structure
  1439. * and want to maintain same interface across hdcp versions,
  1440. * we are setting the values to 0.
  1441. */
  1442. ops_notify_req->topology.hdcp2LegacyDeviceDownstream = 0;
  1443. ops_notify_req->topology.hdcp1DeviceDownstream = 0;
  1444. memset(ops_notify_req->recv_id_list, 0, sizeof(uint8_t) * MAX_REC_ID_LIST_SIZE);
  1445. ops_notify_rsp = (struct hdcp1_ops_notify_rsp *)(handle->sbuf +
  1446. QSEECOM_ALIGN(sizeof(struct hdcp1_ops_notify_req)));
  1447. rc = qseecom_send_command(handle, ops_notify_req,
  1448. QSEECOM_ALIGN(sizeof(struct hdcp1_ops_notify_req)),
  1449. ops_notify_rsp,
  1450. QSEECOM_ALIGN(sizeof(struct hdcp1_ops_notify_rsp)));
  1451. rc = ops_notify_rsp->ret;
  1452. if (rc < 0) {
  1453. pr_warn("Ops notify cmd failed, rsp=%d\n", ops_notify_rsp->ret);
  1454. return -EINVAL;
  1455. }
  1456. pr_debug("ops notify success\n");
  1457. return 0;
  1458. }
  1459. EXPORT_SYMBOL(hdcp1_ops_notify);
  1460. int hdcp1_start(void *data, u32 *aksv_msb, u32 *aksv_lsb)
  1461. {
  1462. int rc = 0;
  1463. struct hdcp1_handle *hdcp1_handle = data;
  1464. if (!aksv_msb || !aksv_lsb) {
  1465. pr_err("invalid aksv output buffer\n");
  1466. rc = -EINVAL;
  1467. goto error;
  1468. }
  1469. if (!hdcp1_handle) {
  1470. pr_err("invalid handle\n");
  1471. rc = -EINVAL;
  1472. goto error;
  1473. }
  1474. if (!hdcp1_handle->feature_supported) {
  1475. pr_err("feature not supported\n");
  1476. rc = -EINVAL;
  1477. goto error;
  1478. }
  1479. if (hdcp1_handle->hdcp_state & HDCP_STATE_APP_LOADED) {
  1480. pr_debug("%s app already loaded\n", hdcp1_handle->app_name);
  1481. goto error;
  1482. }
  1483. rc = hdcp1_app_load(hdcp1_handle);
  1484. if (rc)
  1485. goto error;
  1486. rc = hdcp1_set_key(hdcp1_handle, aksv_msb, aksv_lsb);
  1487. if (rc)
  1488. goto key_error;
  1489. pr_debug("success\n");
  1490. return rc;
  1491. key_error:
  1492. hdcp1_app_unload(hdcp1_handle);
  1493. error:
  1494. return rc;
  1495. }
  1496. EXPORT_SYMBOL(hdcp1_start);
  1497. void hdcp1_stop(void *data)
  1498. {
  1499. struct hdcp1_handle *hdcp1_handle = data;
  1500. if (!hdcp1_handle || !hdcp1_handle->qseecom_handle || !hdcp1_handle->hdcpops_handle) {
  1501. pr_err("invalid handle\n");
  1502. return;
  1503. }
  1504. if (!(hdcp1_handle->hdcp_state & HDCP_STATE_APP_LOADED)) {
  1505. pr_debug("%s app not loaded\n", hdcp1_handle->app_name);
  1506. return;
  1507. }
  1508. hdcp1_app_unload(hdcp1_handle);
  1509. }
  1510. EXPORT_SYMBOL(hdcp1_stop);
  1511. static int __init hdcp_module_init(void){ return 0; }
  1512. static void __exit hdcp_module_exit(void){ return; }
  1513. MODULE_LICENSE("GPL v2");
  1514. MODULE_DESCRIPTION("HDCP driver");
  1515. module_init(hdcp_module_init);
  1516. module_exit(hdcp_module_exit);