hdcp_qseecom.c 42 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683168416851686168716881689169016911692169316941695169616971698169917001701170217031704170517061707170817091710171117121713171417151716171717181719172017211722172317241725172617271728172917301731173217331734173517361737173817391740174117421743174417451746174717481749175017511752175317541755175617571758175917601761176217631764176517661767176817691770177117721773177417751776177717781779178017811782178317841785178617871788178917901791179217931794179517961797179817991800180118021803180418051806180718081809181018111812181318141815181618171818181918201821182218231824182518261827182818291830183118321833183418351836183718381839184018411842184318441845184618471848184918501851185218531854185518561857185818591860186118621863186418651866186718681869
  1. // SPDX-License-Identifier: GPL-2.0-only
  2. /*
  3. * Copyright (c) 2015-2022, The Linux Foundation. All rights reserved.
  4. * Copyright (c) 2022 Qualcomm Innovation Center, Inc. All rights reserved.
  5. */
  6. #define pr_fmt(fmt) "[hdcp-qseecom] %s: " fmt, __func__
  7. #include <linux/kernel.h>
  8. #include <linux/slab.h>
  9. #include <linux/module.h>
  10. #include <linux/fs.h>
  11. #include <linux/cdev.h>
  12. #include <linux/sched.h>
  13. #include <linux/list.h>
  14. #include <linux/mutex.h>
  15. #include <linux/io.h>
  16. #include <linux/types.h>
  17. #include <linux/device.h>
  18. #include <linux/sched.h>
  19. #include <linux/delay.h>
  20. #include <linux/completion.h>
  21. #include <linux/errno.h>
  22. #include <linux/kthread.h>
  23. #include <linux/hdcp_qseecom.h>
  24. #if IS_ENABLED(CONFIG_QSEECOM_PROXY)
  25. #include <linux/qseecom_kernel.h>
  26. #else
  27. #include "misc/qseecom_kernel.h"
  28. #endif
  29. #define HDCP2P2_APP_NAME "hdcp2p2"
  30. #define HDCP1_APP_NAME "hdcp1"
  31. #define HDCP1OPS_APP_NAME "ops"
  32. #define HDCPSRM_APP_NAME "hdcpsrm"
  33. #define QSEECOM_SBUFF_SIZE 0x1000
  34. #define MAX_REC_ID_LIST_SIZE 160
  35. #define MAX_TX_MESSAGE_SIZE 129
  36. #define MAX_RX_MESSAGE_SIZE 534
  37. #define MAX_TOPOLOGY_ELEMS 32
  38. #define HDCP1_NOTIFY_TOPOLOGY 1
  39. #define HDCP1_AKSV_SIZE 8
  40. #define HDCP1_SET_KEY 202
  41. #define HDCP1_KEY_VERIFY 204
  42. #define HDCP1_SET_ENC 205
  43. #define BITS_8_IN_BYTES 1
  44. #define BITS_16_IN_BYTES 2
  45. #define BITS_24_IN_BYTES 3
  46. #define BITS_32_IN_BYTES 4
  47. #define BITS_40_IN_BYTES 5
  48. #define BITS_64_IN_BYTES 8
  49. #define BITS_128_IN_BYTES 16
  50. #define BITS_160_IN_BYTES 20
  51. #define BITS_256_IN_BYTES 32
  52. #define BITS_1024_IN_BYTES 128
  53. #define BITS_3072_IN_BYTES 384
  54. #define TXCAPS_SIZE 3
  55. #define RXCAPS_SIZE 3
  56. #define RXINFO_SIZE 2
  57. #define SEQ_NUM_V_SIZE 3
  58. #define RCVR_ID_SIZE BITS_40_IN_BYTES
  59. #define MAX_RCVR_IDS_ALLOWED_IN_LIST 31
  60. #define MAX_RCVR_ID_LIST_SIZE \
  61. (RCVR_ID_SIZE*MAX_RCVR_IDS_ALLOWED_IN_LIST)
  62. /*
  63. * minimum wait as per standard is 200 ms. keep it 300 ms
  64. * to be on safe side.
  65. */
  66. #define SLEEP_SET_HW_KEY_MS 300
  67. /* Wait 200ms after authentication */
  68. #define SLEEP_FORCE_ENCRYPTION_MS 200
  69. /* hdcp command status */
  70. #define HDCP_SUCCESS 0
  71. /* DP device type */
  72. #define DEVICE_TYPE_DP 0x8002
  73. const char *HdcpErrors[] = {
  74. "HDCP_SUCCESS",
  75. "HDCP_FAIL",
  76. "HDCP_BAD_PARAM",
  77. "HDCP_DEVICE_TYPE_UNSUPPORTED",
  78. "HDCP_INVALID_COMMAND",
  79. "HDCP_INVALID_COMMAND_HANDLE",
  80. "HDCP_ERROR_SIZE_IN",
  81. "HDCP_ERROR_SIZE_OUT",
  82. "HDCP_DATA_SIZE_INSUFFICIENT",
  83. "HDCP_UNSUPPORTED_RX_VERSION",
  84. "HDCP_WRONG_RX_CAPAB_MASK",
  85. "HDCP_WRONG_RX_RSVD",
  86. "HDCP_WRONG_RX_HDCP_CAPABLE",
  87. "HDCP_RSA_SIGNATURE_VERIFY_FAILED",
  88. "HDCP_VERIFY_H_PRIME_FAILED",
  89. "HDCP_LC_FAILED",
  90. "HDCP_MESSAGE_TIMEOUT",
  91. "HDCP_COUNTER_ROLL_OVER",
  92. "HDCP_WRONG_RXINFO_RSVD",
  93. "HDCP_RXINFO_MAX_DEVS",
  94. "HDCP_RXINFO_MAX_CASCADE",
  95. "HDCP_WRONG_INITIAL_SEQ_NUM_V",
  96. "HDCP_SEQ_NUM_V_ROLL_OVER",
  97. "HDCP_WRONG_SEQ_NUM_V",
  98. "HDCP_VERIFY_V_FAILED",
  99. "HDCP_RPT_METHOD_INVOKED",
  100. "HDCP_RPT_STRM_LEN_WRONG",
  101. "HDCP_VERIFY_STRM_M_FAILED",
  102. "HDCP_TRANSMITTER_NOT_FOUND",
  103. "HDCP_SESSION_NOT_FOUND",
  104. "HDCP_MAX_SESSION_EXCEEDED",
  105. "HDCP_MAX_CONNECTION_EXCEEDED",
  106. "HDCP_MAX_STREAMS_EXCEEDED",
  107. "HDCP_MAX_DEVICES",
  108. "HDCP_ALLOC_FAILED",
  109. "HDCP_CONNECTION_NOT_FOUND",
  110. "HDCP_HASH_FAILED",
  111. "HDCP_BN_FAILED",
  112. "HDCP_ENCRYPT_KM_FAILED",
  113. "HDCP_DECRYPT_KM_FAILED",
  114. "HDCP_HMAC_FAILED",
  115. "HDCP_GET_RANDOM_FAILED",
  116. "HDCP_INVALID_KEY_HEADER",
  117. "HDCP_INVALID_KEY_LC_HASH",
  118. "HDCP_INVALID_KEY_HASH",
  119. "HDCP_KEY_WRITE_FAILED",
  120. "HDCP_KEY_READ_FAILED",
  121. "HDCP_KEY_DECRYPT_FAILED",
  122. "HDCP_TEST_KEY_ON_SECURE_DEVICE",
  123. "HDCP_KEY_VERSION_UNSUPPORTED",
  124. "HDCP_RXID_NOT_FOUND",
  125. "HDCP_STORAGE_INIT_FAILED",
  126. "HDCP_STORAGE_FILE_OPEN_FAILED",
  127. "HDCP_STORAGE_FILE_READ_FAILED",
  128. "HDCP_STORAGE_FILE_WRITE_FAILED",
  129. "HDCP_STORAGE_ID_UNSUPPORTED",
  130. "HDCP_MUTUAL_EXCLUSIVE_DEVICE_PRESENT",
  131. "HDCP_INVALID_STATE",
  132. "HDCP_CONFIG_READ_FAILED",
  133. "HDCP_OPEN_TZ_SERVICE_FAILED",
  134. "HDCP_HW_CLOCK_OFF",
  135. "HDCP_SET_HW_KEY_FAILED",
  136. "HDCP_CLEAR_HW_KEY_FAILED",
  137. "HDCP_GET_CONTENT_LEVEL_FAILED",
  138. "HDCP_STREAMID_INUSE",
  139. "HDCP_STREAM_NOT_FOUND",
  140. "HDCP_FORCE_ENCRYPTION_FAILED",
  141. "HDCP_STREAMNUMBER_INUSE"
  142. };
  143. /* flags set by tz in response message */
  144. #define HDCP_TXMTR_SUBSTATE_INIT 0
  145. #define HDCP_TXMTR_SUBSTATE_WAITING_FOR_RECIEVERID_LIST 1
  146. #define HDCP_TXMTR_SUBSTATE_PROCESSED_RECIEVERID_LIST 2
  147. #define HDCP_TXMTR_SUBSTATE_WAITING_FOR_STREAM_READY_MESSAGE 3
  148. #define HDCP_TXMTR_SUBSTATE_REPEATER_AUTH_COMPLETE 4
  149. #define HDCP_DEVICE_ID 0x0008000
  150. #define HDCP_CREATE_DEVICE_ID(x) (HDCP_DEVICE_ID | (x))
  151. #define HDCP_TXMTR_HDMI HDCP_CREATE_DEVICE_ID(1)
  152. #define HDCP_TXMTR_SERVICE_ID 0x0001000
  153. #define SERVICE_CREATE_CMD(x) (HDCP_TXMTR_SERVICE_ID | x)
  154. #define HCDP_TXMTR_GET_MAJOR_VERSION(v) (((v) >> 16) & 0xFF)
  155. #define HCDP_TXMTR_GET_MINOR_VERSION(v) (((v) >> 8) & 0xFF)
  156. #define HCDP_TXMTR_GET_PATCH_VERSION(v) ((v) & 0xFF)
  157. #define HDCP_CLIENT_MAJOR_VERSION 2
  158. #define HDCP_CLIENT_MINOR_VERSION 1
  159. #define HDCP_CLIENT_PATCH_VERSION 0
  160. #define HDCP_CLIENT_MAKE_VERSION(maj, min, patch) \
  161. ((((maj) & 0xFF) << 16) | (((min) & 0xFF) << 8) | ((patch) & 0xFF))
  162. #define hdcp2_app_init_var(x) \
  163. struct hdcp_##x##_req *req_buf = NULL; \
  164. struct hdcp_##x##_rsp *rsp_buf = NULL; \
  165. if (!handle->qseecom_handle) { \
  166. pr_err("invalid qseecom_handle while processing %s\n", #x); \
  167. rc = -EINVAL; \
  168. goto error; \
  169. } \
  170. req_buf = (struct hdcp_##x##_req *) handle->qseecom_handle->sbuf; \
  171. rsp_buf = (struct hdcp_##x##_rsp *) (handle->qseecom_handle->sbuf + \
  172. QSEECOM_ALIGN(sizeof(struct hdcp_##x##_req))); \
  173. req_buf->commandid = hdcp_cmd_##x
  174. #define hdcp2_app_process_cmd(x) \
  175. ({ \
  176. int rc = qseecom_send_command(handle->qseecom_handle, \
  177. req_buf, QSEECOM_ALIGN(sizeof(struct hdcp_##x##_req)), \
  178. rsp_buf, QSEECOM_ALIGN(sizeof(struct hdcp_##x##_rsp))); \
  179. if ((rc < 0) || (rsp_buf->status != HDCP_SUCCESS)) { \
  180. pr_err("qseecom cmd %s failed with err = %d, status = %d:%s\n" \
  181. , #x, rc, rsp_buf->status, \
  182. hdcp_cmd_status_to_str(rsp_buf->status)); \
  183. rc = -EINVAL; \
  184. } \
  185. rc; \
  186. })
  187. enum {
  188. hdcp_cmd_tx_init = SERVICE_CREATE_CMD(1),
  189. hdcp_cmd_tx_init_v1 = SERVICE_CREATE_CMD(1),
  190. hdcp_cmd_tx_deinit = SERVICE_CREATE_CMD(2),
  191. hdcp_cmd_rcvd_msg = SERVICE_CREATE_CMD(3),
  192. hdcp_cmd_send_timeout = SERVICE_CREATE_CMD(4),
  193. hdcp_cmd_set_hw_key = SERVICE_CREATE_CMD(5),
  194. hdcp_cmd_query_stream_type = SERVICE_CREATE_CMD(6),
  195. hdcp_cmd_init_v1 = SERVICE_CREATE_CMD(11),
  196. hdcp_cmd_init = SERVICE_CREATE_CMD(11),
  197. hdcp_cmd_deinit = SERVICE_CREATE_CMD(12),
  198. hdcp_cmd_version = SERVICE_CREATE_CMD(14),
  199. hdcp_cmd_verify_key = SERVICE_CREATE_CMD(15),
  200. hdcp_cmd_session_init = SERVICE_CREATE_CMD(16),
  201. hdcp_cmd_session_deinit = SERVICE_CREATE_CMD(17),
  202. hdcp_cmd_start_auth = SERVICE_CREATE_CMD(18),
  203. hdcp_cmd_session_open_stream = SERVICE_CREATE_CMD(20),
  204. hdcp_cmd_session_close_stream = SERVICE_CREATE_CMD(21),
  205. hdcp_cmd_force_encryption = SERVICE_CREATE_CMD(22),
  206. };
  207. enum hdcp_state {
  208. HDCP_STATE_INIT = 0x00,
  209. HDCP_STATE_APP_LOADED = 0x01,
  210. HDCP_STATE_SESSION_INIT = 0x02,
  211. HDCP_STATE_TXMTR_INIT = 0x04,
  212. HDCP_STATE_AUTHENTICATED = 0x08,
  213. HDCP_STATE_ERROR = 0x10
  214. };
  215. enum hdcp_element {
  216. HDCP_TYPE_UNKNOWN,
  217. HDCP_TYPE_RECEIVER,
  218. HDCP_TYPE_REPEATER,
  219. };
  220. enum hdcp_version {
  221. HDCP_VERSION_UNKNOWN,
  222. HDCP_VERSION_2_2,
  223. HDCP_VERSION_1_4
  224. };
  225. struct receiver_info {
  226. unsigned char rcvrInfo[RCVR_ID_SIZE];
  227. enum hdcp_element elem_type;
  228. enum hdcp_version hdcp_version;
  229. };
  230. struct topology_info {
  231. unsigned int nNumRcvrs;
  232. struct receiver_info rcvinfo[MAX_TOPOLOGY_ELEMS];
  233. };
  234. struct __attribute__ ((__packed__)) hdcp1_key_set_req {
  235. uint32_t commandid;
  236. };
  237. struct __attribute__ ((__packed__)) hdcp1_key_set_rsp {
  238. uint32_t commandid;
  239. uint32_t ret;
  240. uint8_t ksv[HDCP1_AKSV_SIZE];
  241. };
  242. struct __attribute__ ((__packed__)) hdcp_version_req {
  243. uint32_t commandid;
  244. };
  245. struct __attribute__ ((__packed__)) hdcp_version_rsp {
  246. uint32_t status;
  247. uint32_t commandId;
  248. uint32_t appversion;
  249. };
  250. struct __attribute__ ((__packed__)) hdcp_verify_key_req {
  251. uint32_t commandid;
  252. };
  253. struct __attribute__ ((__packed__)) hdcp_verify_key_rsp {
  254. uint32_t status;
  255. uint32_t commandId;
  256. };
  257. struct __attribute__ ((__packed__)) hdcp1_key_verify_req {
  258. uint32_t commandid;
  259. uint32_t key_type;
  260. };
  261. struct __attribute__ ((__packed__)) hdcp1_key_verify_rsp {
  262. uint32_t commandId;
  263. uint32_t ret;
  264. };
  265. struct __attribute__ ((__packed__)) hdcp_init_v1_req {
  266. uint32_t commandid;
  267. };
  268. struct __attribute__ ((__packed__)) hdcp_init_v1_rsp {
  269. uint32_t status;
  270. uint32_t commandid;
  271. uint32_t ctxhandle;
  272. uint32_t timeout;
  273. uint32_t msglen;
  274. uint8_t message[MAX_TX_MESSAGE_SIZE];
  275. };
  276. struct __attribute__ ((__packed__)) hdcp_init_req {
  277. uint32_t commandid;
  278. uint32_t clientversion;
  279. };
  280. struct __attribute__ ((__packed__)) hdcp_init_rsp {
  281. uint32_t status;
  282. uint32_t commandid;
  283. uint32_t appversion;
  284. };
  285. struct __attribute__ ((__packed__)) hdcp_deinit_req {
  286. uint32_t commandid;
  287. };
  288. struct __attribute__ ((__packed__)) hdcp_deinit_rsp {
  289. uint32_t status;
  290. uint32_t commandid;
  291. };
  292. struct __attribute__ ((__packed__)) hdcp_session_init_req {
  293. uint32_t commandid;
  294. uint32_t deviceid;
  295. };
  296. struct __attribute__ ((__packed__)) hdcp_session_init_rsp {
  297. uint32_t status;
  298. uint32_t commandid;
  299. uint32_t sessionid;
  300. };
  301. struct __attribute__ ((__packed__)) hdcp_session_deinit_req {
  302. uint32_t commandid;
  303. uint32_t sessionid;
  304. };
  305. struct __attribute__ ((__packed__)) hdcp_session_deinit_rsp {
  306. uint32_t status;
  307. uint32_t commandid;
  308. };
  309. struct __attribute__ ((__packed__)) hdcp_tx_init_v1_req {
  310. uint32_t commandid;
  311. };
  312. struct __attribute__ ((__packed__)) hdcp_tx_init_v1_rsp {
  313. uint32_t status;
  314. uint32_t commandid;
  315. uint32_t ctxhandle;
  316. uint32_t timeout;
  317. uint32_t msglen;
  318. uint8_t message[MAX_TX_MESSAGE_SIZE];
  319. };
  320. struct __attribute__ ((__packed__)) hdcp_tx_init_req {
  321. uint32_t commandid;
  322. uint32_t sessionid;
  323. };
  324. struct __attribute__ ((__packed__)) hdcp_tx_init_rsp {
  325. uint32_t status;
  326. uint32_t commandid;
  327. uint32_t ctxhandle;
  328. };
  329. struct __attribute__ ((__packed__)) hdcp_tx_deinit_req {
  330. uint32_t commandid;
  331. uint32_t ctxhandle;
  332. };
  333. struct __attribute__ ((__packed__)) hdcp_tx_deinit_rsp {
  334. uint32_t status;
  335. uint32_t commandid;
  336. };
  337. struct __attribute__ ((__packed__)) hdcp_rcvd_msg_req {
  338. uint32_t commandid;
  339. uint32_t ctxhandle;
  340. uint32_t msglen;
  341. uint8_t msg[MAX_RX_MESSAGE_SIZE];
  342. };
  343. struct __attribute__ ((__packed__)) hdcp_rcvd_msg_rsp {
  344. uint32_t status;
  345. uint32_t commandid;
  346. uint32_t state;
  347. uint32_t timeout;
  348. uint32_t flag;
  349. uint32_t msglen;
  350. uint8_t msg[MAX_TX_MESSAGE_SIZE];
  351. };
  352. struct __attribute__ ((__packed__)) hdcp_set_hw_key_req {
  353. uint32_t commandid;
  354. uint32_t ctxhandle;
  355. };
  356. struct __attribute__ ((__packed__)) hdcp_set_hw_key_rsp {
  357. uint32_t status;
  358. uint32_t commandid;
  359. };
  360. struct __attribute__ ((__packed__)) hdcp_send_timeout_req {
  361. uint32_t commandid;
  362. uint32_t ctxhandle;
  363. };
  364. struct __attribute__ ((__packed__)) hdcp_send_timeout_rsp {
  365. uint32_t status;
  366. uint32_t commandid;
  367. uint32_t timeout;
  368. uint32_t msglen;
  369. uint8_t message[MAX_TX_MESSAGE_SIZE];
  370. };
  371. struct __attribute__ ((__packed__)) hdcp_query_stream_type_req {
  372. uint32_t commandid;
  373. uint32_t ctxhandle;
  374. };
  375. struct __attribute__ ((__packed__)) hdcp_query_stream_type_rsp {
  376. uint32_t status;
  377. uint32_t commandid;
  378. uint32_t timeout;
  379. uint32_t msglen;
  380. uint8_t msg[MAX_TX_MESSAGE_SIZE];
  381. };
  382. struct __attribute__ ((__packed__)) hdcp_set_stream_type_req {
  383. uint32_t commandid;
  384. uint32_t ctxhandle;
  385. uint8_t streamtype;
  386. };
  387. struct __attribute__ ((__packed__)) hdcp_set_stream_type_rsp {
  388. uint32_t status;
  389. uint32_t commandid;
  390. uint32_t timeout;
  391. uint32_t msglen;
  392. uint8_t message[MAX_TX_MESSAGE_SIZE];
  393. };
  394. struct __attribute__ ((__packed__)) hdcp_update_srm_req {
  395. uint32_t commandid;
  396. uint32_t ctxhandle;
  397. uint32_t srmoffset;
  398. uint32_t srmlength;
  399. };
  400. struct __attribute__ ((__packed__)) hdcp_update_srm_rsp {
  401. uint32_t status;
  402. uint32_t commandid;
  403. };
  404. struct __attribute__ ((__packed__)) hdcp_get_topology_req {
  405. uint32_t commandid;
  406. uint32_t ctxhandle;
  407. };
  408. struct __attribute__ ((__packed__)) hdcp_get_topology_rsp {
  409. uint32_t status;
  410. uint32_t commandid;
  411. struct topology_info topologyinfo;
  412. };
  413. struct __attribute__ ((__packed__)) rxvr_info_struct {
  414. uint8_t rcvrCert[522];
  415. uint8_t rrx[BITS_64_IN_BYTES];
  416. uint8_t rxcaps[RXCAPS_SIZE];
  417. bool repeater;
  418. };
  419. struct __attribute__ ((__packed__)) repeater_info_struct {
  420. uint8_t RxInfo[RXINFO_SIZE];
  421. uint8_t seq_num_V[SEQ_NUM_V_SIZE];
  422. bool seq_num_V_Rollover_flag;
  423. uint8_t ReceiverIDList[MAX_RCVR_ID_LIST_SIZE];
  424. uint32_t ReceiverIDListLen;
  425. };
  426. struct __attribute__ ((__packed__)) hdcp1_set_enc_req {
  427. uint32_t commandid;
  428. uint32_t enable;
  429. };
  430. struct __attribute__ ((__packed__)) hdcp1_set_enc_rsp {
  431. uint32_t commandid;
  432. uint32_t ret;
  433. };
  434. struct __attribute__ ((__packed__)) hdcp1_ops_notify_req {
  435. uint32_t commandid;
  436. uint32_t device_type;
  437. uint8_t recv_id_list[MAX_REC_ID_LIST_SIZE];
  438. int32_t recv_id_len;
  439. struct hdcp1_topology topology;
  440. bool is_authenticated;
  441. };
  442. struct __attribute__ ((__packed__)) hdcp1_ops_notify_rsp {
  443. uint32_t commandid;
  444. uint32_t ret;
  445. };
  446. struct __attribute__ ((__packed__)) hdcp_start_auth_req {
  447. uint32_t commandid;
  448. uint32_t ctxHandle;
  449. };
  450. struct __attribute__ ((__packed__)) hdcp_start_auth_rsp {
  451. uint32_t status;
  452. uint32_t commandid;
  453. uint32_t ctxhandle;
  454. uint32_t timeout;
  455. uint32_t msglen;
  456. uint8_t message[MAX_TX_MESSAGE_SIZE];
  457. };
  458. struct __attribute__((__packed__)) hdcp_session_open_stream_req {
  459. uint32_t commandid;
  460. uint32_t sessionid;
  461. uint32_t vcpayloadid;
  462. uint32_t stream_number;
  463. uint32_t streamMediaType;
  464. };
  465. struct __attribute__((__packed__)) hdcp_session_open_stream_rsp {
  466. uint32_t status;
  467. uint32_t commandid;
  468. uint32_t streamid;
  469. };
  470. struct __attribute__((__packed__)) hdcp_session_close_stream_req {
  471. uint32_t commandid;
  472. uint32_t sessionid;
  473. uint32_t streamid;
  474. };
  475. struct __attribute__((__packed__)) hdcp_session_close_stream_rsp {
  476. uint32_t status;
  477. uint32_t commandid;
  478. };
  479. struct __attribute__((__packed__)) hdcp_force_encryption_req {
  480. uint32_t commandid;
  481. uint32_t ctxhandle;
  482. uint32_t enable;
  483. };
  484. struct __attribute__ ((__packed__)) hdcp_force_encryption_rsp {
  485. uint32_t status;
  486. uint32_t commandid;
  487. };
  488. struct hdcp2_handle {
  489. struct hdcp2_app_data app_data;
  490. uint32_t tz_ctxhandle;
  491. bool feature_supported;
  492. enum hdcp_state hdcp_state;
  493. struct qseecom_handle *qseecom_handle;
  494. struct qseecom_handle *hdcpsrm_qseecom_handle;
  495. uint32_t session_id;
  496. bool legacy_app;
  497. uint32_t device_type;
  498. char *app_name;
  499. int (*app_init)(struct hdcp2_handle *handle);
  500. int (*tx_init)(struct hdcp2_handle *handle);
  501. };
  502. /*
  503. * struct hdcp1_handle - handle for HDCP 1.x client
  504. * @qseecom_handle - for sending commands to qseecom
  505. * @hdcpops_handle - for sending commands to ops TA
  506. * @feature_supported - set to true if the platform supports HDCP 1.x
  507. * @device_type - the interface type (HDMI or DisplayPort)
  508. */
  509. struct hdcp1_handle {
  510. struct qseecom_handle *qseecom_handle;
  511. struct qseecom_handle *hdcpops_handle;
  512. bool feature_supported;
  513. uint32_t device_type;
  514. enum hdcp_state hdcp_state;
  515. char *app_name;
  516. };
  517. #define HDCP_CMD_STATUS_TO_STR(x) #x
  518. static const char *hdcp_cmd_status_to_str(uint32_t err)
  519. {
  520. int len = ARRAY_SIZE(HdcpErrors);
  521. if (err >= 0 && err < len)
  522. return HdcpErrors[err];
  523. else
  524. return "";
  525. }
  526. static int hdcp_get_version(struct hdcp2_handle *handle)
  527. {
  528. int rc = 0;
  529. uint32_t app_major_version = 0;
  530. hdcp2_app_init_var(version);
  531. if (handle->hdcp_state & HDCP_STATE_APP_LOADED) {
  532. pr_err("library already loaded\n");
  533. goto error;
  534. }
  535. rc = hdcp2_app_process_cmd(version);
  536. if (rc)
  537. goto error;
  538. app_major_version = HCDP_TXMTR_GET_MAJOR_VERSION(rsp_buf->appversion);
  539. pr_debug("hdp2p2 app major version %d, app version %d\n",
  540. app_major_version, rsp_buf->appversion);
  541. if (app_major_version == 1)
  542. handle->legacy_app = true;
  543. error:
  544. return rc;
  545. }
  546. static int hdcp2_app_init_legacy(struct hdcp2_handle *handle)
  547. {
  548. int rc = 0;
  549. hdcp2_app_init_var(init_v1);
  550. if (!handle->legacy_app) {
  551. pr_err("wrong init function\n");
  552. rc = -EINVAL;
  553. goto error;
  554. }
  555. if (handle->hdcp_state & HDCP_STATE_APP_LOADED) {
  556. pr_err("library already loaded\n");
  557. goto error;
  558. }
  559. rc = hdcp2_app_process_cmd(init_v1);
  560. if (rc)
  561. goto error;
  562. pr_debug("success\n");
  563. error:
  564. return rc;
  565. }
  566. static int hdcp2_app_init(struct hdcp2_handle *handle)
  567. {
  568. int rc = 0;
  569. uint32_t app_minor_version = 0;
  570. hdcp2_app_init_var(init);
  571. if (handle->legacy_app) {
  572. pr_err("wrong init function\n");
  573. rc = -EINVAL;
  574. goto error;
  575. }
  576. if (handle->hdcp_state & HDCP_STATE_APP_LOADED) {
  577. pr_err("library already loaded\n");
  578. goto error;
  579. }
  580. req_buf->clientversion =
  581. HDCP_CLIENT_MAKE_VERSION(HDCP_CLIENT_MAJOR_VERSION,
  582. HDCP_CLIENT_MINOR_VERSION,
  583. HDCP_CLIENT_PATCH_VERSION);
  584. rc = hdcp2_app_process_cmd(init);
  585. if (rc)
  586. goto error;
  587. app_minor_version = HCDP_TXMTR_GET_MINOR_VERSION(rsp_buf->appversion);
  588. if (app_minor_version != HDCP_CLIENT_MINOR_VERSION) {
  589. pr_err
  590. ("client-app minor version mismatch app(%d), client(%d)\n",
  591. app_minor_version, HDCP_CLIENT_MINOR_VERSION);
  592. rc = -1;
  593. goto error;
  594. }
  595. pr_debug("success\n");
  596. pr_debug("client version major(%d), minor(%d), patch(%d)\n",
  597. HDCP_CLIENT_MAJOR_VERSION, HDCP_CLIENT_MINOR_VERSION,
  598. HDCP_CLIENT_PATCH_VERSION);
  599. pr_debug("app version major(%d), minor(%d), patch(%d)\n",
  600. HCDP_TXMTR_GET_MAJOR_VERSION(rsp_buf->appversion),
  601. HCDP_TXMTR_GET_MINOR_VERSION(rsp_buf->appversion),
  602. HCDP_TXMTR_GET_PATCH_VERSION(rsp_buf->appversion));
  603. error:
  604. return rc;
  605. }
  606. static int hdcp2_app_tx_init(struct hdcp2_handle *handle)
  607. {
  608. int rc = 0;
  609. hdcp2_app_init_var(tx_init);
  610. if (!(handle->hdcp_state & HDCP_STATE_SESSION_INIT)) {
  611. pr_err("session not initialized\n");
  612. rc = -EINVAL;
  613. goto error;
  614. }
  615. if (handle->hdcp_state & HDCP_STATE_TXMTR_INIT) {
  616. pr_err("txmtr already initialized\n");
  617. goto error;
  618. }
  619. req_buf->sessionid = handle->session_id;
  620. rc = hdcp2_app_process_cmd(tx_init);
  621. if (rc)
  622. goto error;
  623. handle->tz_ctxhandle = rsp_buf->ctxhandle;
  624. handle->hdcp_state |= HDCP_STATE_TXMTR_INIT;
  625. pr_debug("success\n");
  626. error:
  627. return rc;
  628. }
  629. static int hdcp2_app_tx_init_legacy(struct hdcp2_handle *handle)
  630. {
  631. int rc = 0;
  632. hdcp2_app_init_var(tx_init_v1);
  633. if (!(handle->hdcp_state & HDCP_STATE_APP_LOADED)) {
  634. pr_err("app not loaded\n");
  635. rc = -EINVAL;
  636. goto error;
  637. }
  638. if (handle->hdcp_state & HDCP_STATE_TXMTR_INIT) {
  639. pr_err("txmtr already initialized\n");
  640. goto error;
  641. }
  642. rc = hdcp2_app_process_cmd(tx_init_v1);
  643. if (rc)
  644. goto error;
  645. handle->app_data.response.data = rsp_buf->message;
  646. handle->app_data.response.length = rsp_buf->msglen;
  647. handle->app_data.timeout = rsp_buf->timeout;
  648. handle->tz_ctxhandle = rsp_buf->ctxhandle;
  649. handle->hdcp_state |= HDCP_STATE_TXMTR_INIT;
  650. pr_debug("success\n");
  651. error:
  652. return rc;
  653. }
  654. static int hdcp2_app_load(struct hdcp2_handle *handle)
  655. {
  656. int rc = 0;
  657. if (!handle) {
  658. pr_err("invalid input\n");
  659. rc = -EINVAL;
  660. goto error;
  661. }
  662. if (handle->hdcp_state & HDCP_STATE_APP_LOADED) {
  663. pr_err("%s app already loaded\n", handle->app_name);
  664. goto error;
  665. }
  666. rc = qseecom_start_app(&handle->qseecom_handle,
  667. handle->app_name, QSEECOM_SBUFF_SIZE);
  668. if (rc) {
  669. pr_err("qseecom_start_app failed for HDCP2P2 (%d)\n", rc);
  670. goto error;
  671. }
  672. rc = qseecom_start_app(&handle->hdcpsrm_qseecom_handle,
  673. HDCPSRM_APP_NAME, QSEECOM_SBUFF_SIZE);
  674. if (rc) {
  675. pr_err("qseecom_start_app failed for HDCPSRM (%d)\n", rc);
  676. goto hdcpsrm_error;
  677. }
  678. pr_debug("qseecom_start_app success\n");
  679. rc = hdcp_get_version(handle);
  680. if (rc) {
  681. pr_err("library get version failed\n");
  682. goto get_version_error;
  683. }
  684. if (handle->legacy_app) {
  685. handle->app_init = hdcp2_app_init_legacy;
  686. handle->tx_init = hdcp2_app_tx_init_legacy;
  687. } else {
  688. handle->app_init = hdcp2_app_init;
  689. handle->tx_init = hdcp2_app_tx_init;
  690. }
  691. rc = handle->app_init(handle);
  692. if (rc) {
  693. pr_err("app init failed\n");
  694. goto get_version_error;
  695. }
  696. handle->hdcp_state |= HDCP_STATE_APP_LOADED;
  697. return rc;
  698. get_version_error:
  699. qseecom_shutdown_app(&handle->hdcpsrm_qseecom_handle);
  700. hdcpsrm_error:
  701. qseecom_shutdown_app(&handle->qseecom_handle);
  702. error:
  703. return rc;
  704. }
  705. static int hdcp2_app_unload(struct hdcp2_handle *handle)
  706. {
  707. int rc = 0;
  708. hdcp2_app_init_var(deinit);
  709. hdcp2_app_process_cmd(deinit);
  710. /* deallocate the resources for qseecom HDCPSRM handle */
  711. rc = qseecom_shutdown_app(&handle->hdcpsrm_qseecom_handle);
  712. if (rc)
  713. pr_err("qseecom_shutdown_app failed for HDCPSRM (%d)\n", rc);
  714. /* deallocate the resources for qseecom HDCP2P2 handle */
  715. rc = qseecom_shutdown_app(&handle->qseecom_handle);
  716. if (rc) {
  717. pr_err("qseecom_shutdown_app failed for HDCP2P2 (%d)\n", rc);
  718. return rc;
  719. }
  720. handle->hdcp_state &= ~HDCP_STATE_APP_LOADED;
  721. pr_debug("%s app unloaded\n", handle->app_name);
  722. return rc;
  723. error:
  724. qseecom_shutdown_app(&handle->hdcpsrm_qseecom_handle);
  725. return rc;
  726. }
  727. static int hdcp2_verify_key(struct hdcp2_handle *handle)
  728. {
  729. int rc = 0;
  730. hdcp2_app_init_var(verify_key);
  731. if (!(handle->hdcp_state & HDCP_STATE_APP_LOADED)) {
  732. pr_err("%s app not loaded\n", handle->app_name);
  733. rc = -EINVAL;
  734. goto error;
  735. }
  736. rc = hdcp2_app_process_cmd(verify_key);
  737. pr_debug("verify_key = %d\n", rc);
  738. error:
  739. return rc;
  740. }
  741. bool hdcp2_feature_supported(void *data)
  742. {
  743. int rc = 0;
  744. bool supported = false;
  745. struct hdcp2_handle *handle = data;
  746. if (!handle) {
  747. pr_err("invalid input\n");
  748. rc = -EINVAL;
  749. goto error;
  750. }
  751. if (handle->feature_supported) {
  752. supported = true;
  753. goto error;
  754. }
  755. rc = hdcp2_app_load(handle);
  756. if (!rc) {
  757. if (!hdcp2_verify_key(handle)) {
  758. pr_debug("HDCP 2.2 supported\n");
  759. handle->feature_supported = true;
  760. supported = true;
  761. }
  762. hdcp2_app_unload(handle);
  763. }
  764. error:
  765. return supported;
  766. }
  767. EXPORT_SYMBOL(hdcp2_feature_supported);
  768. static int hdcp2_app_session_init(struct hdcp2_handle *handle)
  769. {
  770. int rc = 0;
  771. hdcp2_app_init_var(session_init);
  772. if (!handle->qseecom_handle || !handle->qseecom_handle->sbuf) {
  773. pr_err("invalid handle\n");
  774. rc = -EINVAL;
  775. goto error;
  776. }
  777. if (!(handle->hdcp_state & HDCP_STATE_APP_LOADED)) {
  778. pr_err("%s app not loaded\n", handle->app_name);
  779. rc = -EINVAL;
  780. goto error;
  781. }
  782. if (handle->hdcp_state & HDCP_STATE_SESSION_INIT) {
  783. pr_err("session already initialized\n");
  784. goto error;
  785. }
  786. req_buf->deviceid = handle->device_type;
  787. rc = hdcp2_app_process_cmd(session_init);
  788. if (rc)
  789. goto error;
  790. pr_debug("session id %d\n", rsp_buf->sessionid);
  791. handle->session_id = rsp_buf->sessionid;
  792. handle->hdcp_state |= HDCP_STATE_SESSION_INIT;
  793. pr_debug("success\n");
  794. error:
  795. return rc;
  796. }
  797. static int hdcp2_app_session_deinit(struct hdcp2_handle *handle)
  798. {
  799. int rc = 0;
  800. hdcp2_app_init_var(session_deinit);
  801. if (!(handle->hdcp_state & HDCP_STATE_APP_LOADED)) {
  802. pr_err("%s app not loaded\n", handle->app_name);
  803. rc = -EINVAL;
  804. goto error;
  805. }
  806. if (!(handle->hdcp_state & HDCP_STATE_SESSION_INIT)) {
  807. pr_err("session not initialized\n");
  808. rc = -EINVAL;
  809. goto error;
  810. }
  811. req_buf->sessionid = handle->session_id;
  812. rc = hdcp2_app_process_cmd(session_deinit);
  813. if (rc)
  814. goto error;
  815. handle->hdcp_state &= ~HDCP_STATE_SESSION_INIT;
  816. pr_debug("success\n");
  817. error:
  818. return rc;
  819. }
  820. static int hdcp2_app_tx_deinit(struct hdcp2_handle *handle)
  821. {
  822. int rc = 0;
  823. hdcp2_app_init_var(tx_deinit);
  824. if (!(handle->hdcp_state & HDCP_STATE_APP_LOADED)) {
  825. pr_err("%s app not loaded\n", handle->app_name);
  826. rc = -EINVAL;
  827. goto error;
  828. }
  829. if (!(handle->hdcp_state & HDCP_STATE_TXMTR_INIT)) {
  830. pr_err("txmtr not initialized\n");
  831. rc = -EINVAL;
  832. goto error;
  833. }
  834. req_buf->ctxhandle = handle->tz_ctxhandle;
  835. rc = hdcp2_app_process_cmd(tx_deinit);
  836. if (rc)
  837. goto error;
  838. handle->hdcp_state &= ~HDCP_STATE_TXMTR_INIT;
  839. pr_debug("success\n");
  840. error:
  841. return rc;
  842. }
  843. static int hdcp2_app_start_auth(struct hdcp2_handle *handle)
  844. {
  845. int rc = 0;
  846. hdcp2_app_init_var(start_auth);
  847. if (!(handle->hdcp_state & HDCP_STATE_SESSION_INIT)) {
  848. pr_err("session not initialized\n");
  849. rc = -EINVAL;
  850. goto error;
  851. }
  852. if (!(handle->hdcp_state & HDCP_STATE_TXMTR_INIT)) {
  853. pr_err("txmtr not initialized\n");
  854. rc = -EINVAL;
  855. goto error;
  856. }
  857. req_buf->ctxHandle = handle->tz_ctxhandle;
  858. rc = hdcp2_app_process_cmd(start_auth);
  859. if (rc)
  860. goto error;
  861. handle->app_data.response.data = rsp_buf->message;
  862. handle->app_data.response.length = rsp_buf->msglen;
  863. handle->app_data.timeout = rsp_buf->timeout;
  864. handle->app_data.repeater_flag = false;
  865. handle->tz_ctxhandle = rsp_buf->ctxhandle;
  866. pr_debug("success\n");
  867. error:
  868. return rc;
  869. }
  870. static int hdcp2_app_start(struct hdcp2_handle *handle)
  871. {
  872. int rc = 0;
  873. rc = hdcp2_app_load(handle);
  874. if (rc)
  875. goto error;
  876. if (!handle->legacy_app) {
  877. rc = hdcp2_app_session_init(handle);
  878. if (rc)
  879. goto error;
  880. }
  881. if (handle->tx_init == NULL) {
  882. pr_err("invalid txmtr init function pointer\n");
  883. rc = -EINVAL;
  884. goto error;
  885. }
  886. rc = handle->tx_init(handle);
  887. error:
  888. return rc;
  889. }
  890. static int hdcp2_app_stop(struct hdcp2_handle *handle)
  891. {
  892. int rc = 0;
  893. rc = hdcp2_app_tx_deinit(handle);
  894. if (rc)
  895. goto end;
  896. if (!handle->legacy_app) {
  897. rc = hdcp2_app_session_deinit(handle);
  898. if (rc)
  899. goto end;
  900. }
  901. rc = hdcp2_app_unload(handle);
  902. end:
  903. return rc;
  904. }
  905. static int hdcp2_app_process_msg(struct hdcp2_handle *handle)
  906. {
  907. int rc = 0;
  908. hdcp2_app_init_var(rcvd_msg);
  909. if (!handle->app_data.request.data) {
  910. pr_err("invalid request buffer\n");
  911. rc = -EINVAL;
  912. goto error;
  913. }
  914. req_buf->msglen = handle->app_data.request.length;
  915. req_buf->ctxhandle = handle->tz_ctxhandle;
  916. rc = hdcp2_app_process_cmd(rcvd_msg);
  917. if (rc)
  918. goto error;
  919. /* check if it's a repeater */
  920. if (rsp_buf->flag == HDCP_TXMTR_SUBSTATE_WAITING_FOR_RECIEVERID_LIST)
  921. handle->app_data.repeater_flag = true;
  922. handle->app_data.response.data = rsp_buf->msg;
  923. handle->app_data.response.length = rsp_buf->msglen;
  924. handle->app_data.timeout = rsp_buf->timeout;
  925. error:
  926. return rc;
  927. }
  928. static int hdcp2_app_timeout(struct hdcp2_handle *handle)
  929. {
  930. int rc = 0;
  931. hdcp2_app_init_var(send_timeout);
  932. rc = hdcp2_app_process_cmd(send_timeout);
  933. if (rc)
  934. goto error;
  935. handle->app_data.response.data = rsp_buf->message;
  936. handle->app_data.response.length = rsp_buf->msglen;
  937. handle->app_data.timeout = rsp_buf->timeout;
  938. error:
  939. return rc;
  940. }
  941. static int hdcp2_app_enable_encryption(struct hdcp2_handle *handle)
  942. {
  943. int rc = 0;
  944. hdcp2_app_init_var(set_hw_key);
  945. /*
  946. * wait at least 200ms before enabling encryption
  947. * as per hdcp2p2 specifications.
  948. */
  949. msleep(SLEEP_SET_HW_KEY_MS);
  950. req_buf->ctxhandle = handle->tz_ctxhandle;
  951. rc = hdcp2_app_process_cmd(set_hw_key);
  952. if (rc)
  953. goto error;
  954. handle->hdcp_state |= HDCP_STATE_AUTHENTICATED;
  955. pr_debug("success\n");
  956. return rc;
  957. error:
  958. return rc;
  959. }
  960. static int hdcp2_force_encryption_utility(struct hdcp2_handle *handle,
  961. uint32_t enable)
  962. {
  963. int rc = 0;
  964. hdcp2_app_init_var(force_encryption);
  965. if (handle->hdcp_state == HDCP_STATE_AUTHENTICATED)
  966. msleep(SLEEP_FORCE_ENCRYPTION_MS);
  967. req_buf->ctxhandle = handle->tz_ctxhandle;
  968. req_buf->enable = enable;
  969. rc = hdcp2_app_process_cmd(force_encryption);
  970. if (rc || (rsp_buf->commandid != hdcp_cmd_force_encryption))
  971. goto error;
  972. return 0;
  973. error:
  974. return rc;
  975. }
  976. int hdcp2_force_encryption(void *ctx, uint32_t enable)
  977. {
  978. int rc = 0;
  979. struct hdcp2_handle *handle = NULL;
  980. if (!ctx) {
  981. pr_err("invalid input\n");
  982. return -EINVAL;
  983. }
  984. handle = ctx;
  985. rc = hdcp2_force_encryption_utility(handle, enable);
  986. if (rc)
  987. goto error;
  988. pr_debug("success\n");
  989. return 0;
  990. error:
  991. pr_err("failed, rc=%d\n", rc);
  992. return rc;
  993. }
  994. EXPORT_SYMBOL(hdcp2_force_encryption);
  995. static int hdcp2_app_query_stream(struct hdcp2_handle *handle)
  996. {
  997. int rc = 0;
  998. hdcp2_app_init_var(query_stream_type);
  999. req_buf->ctxhandle = handle->tz_ctxhandle;
  1000. rc = hdcp2_app_process_cmd(query_stream_type);
  1001. if (rc)
  1002. goto error;
  1003. handle->app_data.response.data = rsp_buf->msg;
  1004. handle->app_data.response.length = rsp_buf->msglen;
  1005. handle->app_data.timeout = rsp_buf->timeout;
  1006. error:
  1007. return rc;
  1008. }
  1009. static unsigned char *hdcp2_get_recv_buf(struct hdcp2_handle *handle)
  1010. {
  1011. struct hdcp_rcvd_msg_req *req_buf;
  1012. req_buf = (struct hdcp_rcvd_msg_req *)(handle->qseecom_handle->sbuf);
  1013. return req_buf->msg;
  1014. }
  1015. int hdcp2_app_comm(void *ctx, enum hdcp2_app_cmd cmd,
  1016. struct hdcp2_app_data *app_data)
  1017. {
  1018. struct hdcp2_handle *handle = NULL;
  1019. int rc = 0;
  1020. if (!ctx || !app_data) {
  1021. pr_err("invalid input\n");
  1022. return -EINVAL;
  1023. }
  1024. handle = ctx;
  1025. handle->app_data.request.length = app_data->request.length;
  1026. pr_debug("command %s\n", hdcp2_app_cmd_str(cmd));
  1027. switch (cmd) {
  1028. case HDCP2_CMD_START:
  1029. rc = hdcp2_app_start(handle);
  1030. break;
  1031. case HDCP2_CMD_START_AUTH:
  1032. rc = hdcp2_app_start_auth(handle);
  1033. break;
  1034. case HDCP2_CMD_PROCESS_MSG:
  1035. rc = hdcp2_app_process_msg(handle);
  1036. break;
  1037. case HDCP2_CMD_TIMEOUT:
  1038. rc = hdcp2_app_timeout(handle);
  1039. break;
  1040. case HDCP2_CMD_EN_ENCRYPTION:
  1041. rc = hdcp2_app_enable_encryption(handle);
  1042. break;
  1043. case HDCP2_CMD_QUERY_STREAM:
  1044. rc = hdcp2_app_query_stream(handle);
  1045. break;
  1046. case HDCP2_CMD_STOP:
  1047. rc = hdcp2_app_stop(handle);
  1048. goto error;
  1049. default:
  1050. rc = -EINVAL;
  1051. break;
  1052. }
  1053. if (rc)
  1054. goto error;
  1055. handle->app_data.request.data = hdcp2_get_recv_buf(handle);
  1056. app_data->request.data = handle->app_data.request.data;
  1057. app_data->request.length = handle->app_data.request.length;
  1058. app_data->response.data = handle->app_data.response.data;
  1059. app_data->response.length = handle->app_data.response.length;
  1060. app_data->timeout = handle->app_data.timeout;
  1061. app_data->repeater_flag = handle->app_data.repeater_flag;
  1062. error:
  1063. return rc;
  1064. }
  1065. EXPORT_SYMBOL(hdcp2_app_comm);
  1066. static int hdcp2_open_stream_helper(struct hdcp2_handle *handle,
  1067. uint8_t vc_payload_id,
  1068. uint8_t stream_number,
  1069. uint32_t *stream_id)
  1070. {
  1071. int rc = 0;
  1072. hdcp2_app_init_var(session_open_stream);
  1073. if (!(handle->hdcp_state & HDCP_STATE_SESSION_INIT)) {
  1074. pr_err("session not initialized\n");
  1075. rc = -EINVAL;
  1076. goto error;
  1077. }
  1078. if (!(handle->hdcp_state & HDCP_STATE_TXMTR_INIT)) {
  1079. pr_err("txmtr not initialized\n");
  1080. rc = -EINVAL;
  1081. goto error;
  1082. }
  1083. req_buf->sessionid = handle->session_id;
  1084. req_buf->vcpayloadid = vc_payload_id;
  1085. req_buf->stream_number = stream_number;
  1086. req_buf->streamMediaType = 0;
  1087. rc = hdcp2_app_process_cmd(session_open_stream);
  1088. if (rc)
  1089. goto error;
  1090. *stream_id = rsp_buf->streamid;
  1091. pr_debug("success\n");
  1092. error:
  1093. return rc;
  1094. }
  1095. int hdcp2_open_stream(void *ctx, uint8_t vc_payload_id, uint8_t stream_number,
  1096. uint32_t *stream_id)
  1097. {
  1098. struct hdcp2_handle *handle = NULL;
  1099. if (!ctx) {
  1100. pr_err("invalid input\n");
  1101. return -EINVAL;
  1102. }
  1103. handle = ctx;
  1104. return hdcp2_open_stream_helper(handle, vc_payload_id, stream_number,
  1105. stream_id);
  1106. }
  1107. EXPORT_SYMBOL(hdcp2_open_stream);
  1108. static int hdcp2_close_stream_helper(struct hdcp2_handle *handle,
  1109. uint32_t stream_id)
  1110. {
  1111. int rc = 0;
  1112. hdcp2_app_init_var(session_close_stream);
  1113. if (!(handle->hdcp_state & HDCP_STATE_SESSION_INIT)) {
  1114. pr_err("session not initialized\n");
  1115. rc = -EINVAL;
  1116. goto error;
  1117. }
  1118. if (!(handle->hdcp_state & HDCP_STATE_TXMTR_INIT)) {
  1119. pr_err("txmtr not initialized\n");
  1120. rc = -EINVAL;
  1121. goto error;
  1122. }
  1123. req_buf->sessionid = handle->session_id;
  1124. req_buf->streamid = stream_id;
  1125. rc = hdcp2_app_process_cmd(session_close_stream);
  1126. if (rc)
  1127. goto error;
  1128. pr_debug("success\n");
  1129. error:
  1130. return rc;
  1131. }
  1132. int hdcp2_close_stream(void *ctx, uint32_t stream_id)
  1133. {
  1134. struct hdcp2_handle *handle = NULL;
  1135. if (!ctx) {
  1136. pr_err("invalid input\n");
  1137. return -EINVAL;
  1138. }
  1139. handle = ctx;
  1140. return hdcp2_close_stream_helper(handle, stream_id);
  1141. }
  1142. EXPORT_SYMBOL(hdcp2_close_stream);
  1143. void *hdcp2_init(u32 device_type)
  1144. {
  1145. struct hdcp2_handle *handle = NULL;
  1146. handle = kzalloc(sizeof(struct hdcp2_handle), GFP_KERNEL);
  1147. if (!handle)
  1148. goto error;
  1149. handle->device_type = device_type;
  1150. handle->app_name = HDCP2P2_APP_NAME;
  1151. error:
  1152. return handle;
  1153. }
  1154. EXPORT_SYMBOL(hdcp2_init);
  1155. void hdcp2_deinit(void *ctx)
  1156. {
  1157. kfree_sensitive(ctx);
  1158. }
  1159. EXPORT_SYMBOL(hdcp2_deinit);
  1160. void *hdcp1_init(void)
  1161. {
  1162. struct hdcp1_handle *handle =
  1163. kzalloc(sizeof(struct hdcp1_handle), GFP_KERNEL);
  1164. if (!handle)
  1165. goto error;
  1166. handle->app_name = HDCP1_APP_NAME;
  1167. error:
  1168. return handle;
  1169. }
  1170. EXPORT_SYMBOL(hdcp1_init);
  1171. void hdcp1_deinit(void *data)
  1172. {
  1173. kfree(data);
  1174. }
  1175. EXPORT_SYMBOL(hdcp1_deinit);
  1176. static int hdcp1_count_ones(u8 *array, u8 len)
  1177. {
  1178. int i, j, count = 0;
  1179. for (i = 0; i < len; i++)
  1180. for (j = 0; j < 8; j++)
  1181. count += (((array[i] >> j) & 0x1) ? 1 : 0);
  1182. return count;
  1183. }
  1184. static int hdcp1_validate_aksv(u32 aksv_msb, u32 aksv_lsb)
  1185. {
  1186. int const number_of_ones = 20;
  1187. u8 aksv[5];
  1188. pr_debug("AKSV=%02x%08x\n", aksv_msb, aksv_lsb);
  1189. aksv[0] = aksv_lsb & 0xFF;
  1190. aksv[1] = (aksv_lsb >> 8) & 0xFF;
  1191. aksv[2] = (aksv_lsb >> 16) & 0xFF;
  1192. aksv[3] = (aksv_lsb >> 24) & 0xFF;
  1193. aksv[4] = aksv_msb & 0xFF;
  1194. /* check there are 20 ones in AKSV */
  1195. if (hdcp1_count_ones(aksv, 5) != number_of_ones) {
  1196. pr_err("AKSV bit count failed\n");
  1197. return -EINVAL;
  1198. }
  1199. return 0;
  1200. }
  1201. static int hdcp1_set_key(struct hdcp1_handle *hdcp1_handle, u32 *aksv_msb,
  1202. u32 *aksv_lsb)
  1203. {
  1204. int rc = 0;
  1205. struct hdcp1_key_set_req *key_set_req;
  1206. struct hdcp1_key_set_rsp *key_set_rsp;
  1207. struct qseecom_handle *handle = NULL;
  1208. if (aksv_msb == NULL || aksv_lsb == NULL) {
  1209. pr_err("invalid aksv\n");
  1210. return -EINVAL;
  1211. }
  1212. if (!hdcp1_handle || !hdcp1_handle->qseecom_handle) {
  1213. pr_err("invalid HDCP 1.x handle\n");
  1214. return -EINVAL;
  1215. }
  1216. if (!(hdcp1_handle->hdcp_state & HDCP_STATE_APP_LOADED)) {
  1217. pr_err("%s app not loaded\n", hdcp1_handle->app_name);
  1218. return -EINVAL;
  1219. }
  1220. handle = hdcp1_handle->qseecom_handle;
  1221. /* set keys and request aksv */
  1222. key_set_req = (struct hdcp1_key_set_req *)handle->sbuf;
  1223. key_set_req->commandid = HDCP1_SET_KEY;
  1224. key_set_rsp = (struct hdcp1_key_set_rsp *)(handle->sbuf +
  1225. QSEECOM_ALIGN(sizeof(struct hdcp1_key_set_req)));
  1226. rc = qseecom_send_command(handle, key_set_req,
  1227. QSEECOM_ALIGN(sizeof
  1228. (struct hdcp1_key_set_req)),
  1229. key_set_rsp,
  1230. QSEECOM_ALIGN(sizeof
  1231. (struct hdcp1_key_set_rsp)));
  1232. if (rc < 0) {
  1233. pr_err("qseecom cmd failed err=%d\n", rc);
  1234. return -ENOKEY;
  1235. }
  1236. rc = key_set_rsp->ret;
  1237. if (rc) {
  1238. pr_err("set key cmd failed, rsp=%d\n", key_set_rsp->ret);
  1239. return -ENOKEY;
  1240. }
  1241. /* copy bytes into msb and lsb */
  1242. *aksv_msb = key_set_rsp->ksv[0] << 24 | key_set_rsp->ksv[1] << 16 |
  1243. key_set_rsp->ksv[2] << 8 | key_set_rsp->ksv[3];
  1244. *aksv_lsb = key_set_rsp->ksv[4] << 24 | key_set_rsp->ksv[5] << 16 |
  1245. key_set_rsp->ksv[6] << 8 | key_set_rsp->ksv[7];
  1246. rc = hdcp1_validate_aksv(*aksv_msb, *aksv_lsb);
  1247. if (rc) {
  1248. pr_err("aksv validation failed (%d)\n", rc);
  1249. return rc;
  1250. }
  1251. return 0;
  1252. }
  1253. static int hdcp1_app_load(struct hdcp1_handle *handle)
  1254. {
  1255. int rc = 0;
  1256. if (!handle) {
  1257. pr_err("invalid handle\n");
  1258. goto error;
  1259. }
  1260. rc = qseecom_start_app(&handle->qseecom_handle, handle->app_name,
  1261. QSEECOM_SBUFF_SIZE);
  1262. if (rc) {
  1263. pr_err("%s app load failed (%d)\n", handle->app_name, rc);
  1264. goto error;
  1265. }
  1266. rc = qseecom_start_app(&handle->hdcpops_handle, HDCP1OPS_APP_NAME,
  1267. QSEECOM_SBUFF_SIZE);
  1268. if (rc) {
  1269. pr_warn("%s app load failed (%d)\n", HDCP1OPS_APP_NAME, rc);
  1270. handle->hdcpops_handle = NULL;
  1271. }
  1272. handle->hdcp_state |= HDCP_STATE_APP_LOADED;
  1273. pr_debug("%s app loaded\n", handle->app_name);
  1274. error:
  1275. return rc;
  1276. }
  1277. static void hdcp1_app_unload(struct hdcp1_handle *handle)
  1278. {
  1279. int rc = 0;
  1280. if (!handle || !handle->qseecom_handle) {
  1281. pr_err("invalid handle\n");
  1282. return;
  1283. }
  1284. if (!(handle->hdcp_state & HDCP_STATE_APP_LOADED)) {
  1285. pr_warn("%s app not loaded\n", handle->app_name);
  1286. return;
  1287. }
  1288. if (handle->hdcpops_handle) {
  1289. /* deallocate the resources for HDCP 1.x ops handle */
  1290. rc = qseecom_shutdown_app(&handle->hdcpops_handle);
  1291. if (rc)
  1292. pr_warn("%s app unload failed (%d)\n", HDCP1OPS_APP_NAME, rc);
  1293. }
  1294. /* deallocate the resources for qseecom HDCP 1.x handle */
  1295. rc = qseecom_shutdown_app(&handle->qseecom_handle);
  1296. if (rc) {
  1297. pr_err("%s app unload failed (%d)\n", handle->app_name, rc);
  1298. return;
  1299. }
  1300. handle->hdcp_state &= ~HDCP_STATE_APP_LOADED;
  1301. pr_debug("%s app unloaded\n", handle->app_name);
  1302. }
  1303. static int hdcp1_verify_key(struct hdcp1_handle *hdcp1_handle)
  1304. {
  1305. int rc = 0;
  1306. struct hdcp1_key_verify_req *key_verify_req;
  1307. struct hdcp1_key_verify_rsp *key_verify_rsp;
  1308. struct qseecom_handle *handle = NULL;
  1309. if (!hdcp1_handle || !hdcp1_handle->qseecom_handle) {
  1310. pr_err("invalid HDCP 1.x handle\n");
  1311. return -EINVAL;
  1312. }
  1313. if (!(hdcp1_handle->hdcp_state & HDCP_STATE_APP_LOADED)) {
  1314. pr_err("%s app not loaded\n", hdcp1_handle->app_name);
  1315. return -EINVAL;
  1316. }
  1317. handle = hdcp1_handle->qseecom_handle;
  1318. key_verify_req = (struct hdcp1_key_verify_req *)handle->sbuf;
  1319. key_verify_req->commandid = HDCP1_KEY_VERIFY;
  1320. key_verify_rsp = (struct hdcp1_key_verify_rsp *)(handle->sbuf +
  1321. QSEECOM_ALIGN(sizeof(struct hdcp1_key_verify_req)));
  1322. rc = qseecom_send_command(handle, key_verify_req,
  1323. QSEECOM_ALIGN(sizeof
  1324. (struct hdcp1_key_verify_req)),
  1325. key_verify_rsp,
  1326. QSEECOM_ALIGN(sizeof
  1327. (struct hdcp1_key_set_rsp)));
  1328. if (rc < 0) {
  1329. pr_err("command HDCP1_KEY_VERIFY failed (%d)\n", rc);
  1330. return -EINVAL;
  1331. }
  1332. rc = key_verify_rsp->ret;
  1333. if (rc) {
  1334. pr_err("key_verify failed, rsp=%d\n", key_verify_rsp->ret);
  1335. return -EINVAL;
  1336. }
  1337. pr_debug("success\n");
  1338. return 0;
  1339. }
  1340. bool hdcp1_feature_supported(void *data)
  1341. {
  1342. bool supported = false;
  1343. struct hdcp1_handle *handle = data;
  1344. int rc = 0;
  1345. if (!handle) {
  1346. pr_err("invalid handle\n");
  1347. goto error;
  1348. }
  1349. if (handle->feature_supported) {
  1350. supported = true;
  1351. goto error;
  1352. }
  1353. rc = hdcp1_app_load(handle);
  1354. if (!rc && (handle->hdcp_state & HDCP_STATE_APP_LOADED)) {
  1355. if (!hdcp1_verify_key(handle)) {
  1356. pr_debug("HDCP 1.x supported\n");
  1357. handle->feature_supported = true;
  1358. supported = true;
  1359. }
  1360. hdcp1_app_unload(handle);
  1361. }
  1362. error:
  1363. return supported;
  1364. }
  1365. EXPORT_SYMBOL(hdcp1_feature_supported);
  1366. int hdcp1_set_enc(void *data, bool enable)
  1367. {
  1368. int rc = 0;
  1369. struct hdcp1_set_enc_req *set_enc_req;
  1370. struct hdcp1_set_enc_rsp *set_enc_rsp;
  1371. struct hdcp1_handle *hdcp1_handle = data;
  1372. struct qseecom_handle *handle = NULL;
  1373. if (!hdcp1_handle || !hdcp1_handle->qseecom_handle) {
  1374. pr_err("invalid HDCP 1.x handle\n");
  1375. return -EINVAL;
  1376. }
  1377. if (!hdcp1_handle->feature_supported) {
  1378. pr_err("HDCP 1.x not supported\n");
  1379. return -EINVAL;
  1380. }
  1381. if (!(hdcp1_handle->hdcp_state & HDCP_STATE_APP_LOADED)) {
  1382. pr_err("%s app not loaded\n", hdcp1_handle->app_name);
  1383. return -EINVAL;
  1384. }
  1385. handle = hdcp1_handle->qseecom_handle;
  1386. /* set keys and request aksv */
  1387. set_enc_req = (struct hdcp1_set_enc_req *)handle->sbuf;
  1388. set_enc_req->commandid = HDCP1_SET_ENC;
  1389. set_enc_req->enable = enable;
  1390. set_enc_rsp = (struct hdcp1_set_enc_rsp *)(handle->sbuf +
  1391. QSEECOM_ALIGN(sizeof(struct hdcp1_set_enc_req)));
  1392. rc = qseecom_send_command(handle, set_enc_req,
  1393. QSEECOM_ALIGN(sizeof
  1394. (struct hdcp1_set_enc_req)),
  1395. set_enc_rsp,
  1396. QSEECOM_ALIGN(sizeof
  1397. (struct hdcp1_set_enc_rsp)));
  1398. if (rc < 0) {
  1399. pr_err("qseecom cmd failed err=%d\n", rc);
  1400. return -EINVAL;
  1401. }
  1402. rc = set_enc_rsp->ret;
  1403. if (rc) {
  1404. pr_err("enc cmd failed, rsp=%d\n", set_enc_rsp->ret);
  1405. return -EINVAL;
  1406. }
  1407. pr_debug("success\n");
  1408. return 0;
  1409. }
  1410. EXPORT_SYMBOL(hdcp1_set_enc);
  1411. int hdcp1_ops_notify(void *data, void *topo, bool is_authenticated)
  1412. {
  1413. int rc = 0;
  1414. struct hdcp1_ops_notify_req *ops_notify_req;
  1415. struct hdcp1_ops_notify_rsp *ops_notify_rsp;
  1416. struct hdcp1_handle *hdcp1_handle = data;
  1417. struct qseecom_handle *handle = NULL;
  1418. struct hdcp1_topology *topology = NULL;
  1419. if (!hdcp1_handle || !hdcp1_handle->hdcpops_handle) {
  1420. pr_err("invalid HDCP 1.x ops handle\n");
  1421. return -EINVAL;
  1422. }
  1423. if (!hdcp1_handle->feature_supported) {
  1424. pr_err("HDCP 1.x not supported\n");
  1425. return -EINVAL;
  1426. }
  1427. if (!(hdcp1_handle->hdcp_state & HDCP_STATE_APP_LOADED)) {
  1428. pr_err("%s app not loaded\n", HDCP1OPS_APP_NAME);
  1429. return -EINVAL;
  1430. }
  1431. handle = hdcp1_handle->hdcpops_handle;
  1432. topology = (struct hdcp1_topology *)topo;
  1433. /* set keys and request aksv */
  1434. ops_notify_req = (struct hdcp1_ops_notify_req *)handle->sbuf;
  1435. ops_notify_req->commandid = HDCP1_NOTIFY_TOPOLOGY;
  1436. ops_notify_req->device_type = DEVICE_TYPE_DP;
  1437. ops_notify_req->is_authenticated = is_authenticated;
  1438. ops_notify_req->topology.depth = topology->depth;
  1439. ops_notify_req->topology.device_count = topology->device_count;
  1440. ops_notify_req->topology.max_devices_exceeded = topology->max_devices_exceeded;
  1441. ops_notify_req->topology.max_cascade_exceeded = topology->max_cascade_exceeded;
  1442. /*
  1443. * For hdcp1.4 below two nodes are not applicable but as
  1444. * TZ ops ta talks with other drivers with same structure
  1445. * and want to maintain same interface across hdcp versions,
  1446. * we are setting the values to 0.
  1447. */
  1448. ops_notify_req->topology.hdcp2LegacyDeviceDownstream = 0;
  1449. ops_notify_req->topology.hdcp1DeviceDownstream = 0;
  1450. memset(ops_notify_req->recv_id_list, 0, sizeof(uint8_t) * MAX_REC_ID_LIST_SIZE);
  1451. ops_notify_rsp = (struct hdcp1_ops_notify_rsp *)(handle->sbuf +
  1452. QSEECOM_ALIGN(sizeof(struct hdcp1_ops_notify_req)));
  1453. rc = qseecom_send_command(handle, ops_notify_req,
  1454. QSEECOM_ALIGN(sizeof(struct hdcp1_ops_notify_req)),
  1455. ops_notify_rsp,
  1456. QSEECOM_ALIGN(sizeof(struct hdcp1_ops_notify_rsp)));
  1457. rc = ops_notify_rsp->ret;
  1458. if (rc < 0) {
  1459. pr_warn("Ops notify cmd failed, rsp=%d\n", ops_notify_rsp->ret);
  1460. return -EINVAL;
  1461. }
  1462. pr_debug("ops notify success\n");
  1463. return 0;
  1464. }
  1465. EXPORT_SYMBOL(hdcp1_ops_notify);
  1466. int hdcp1_start(void *data, u32 *aksv_msb, u32 *aksv_lsb)
  1467. {
  1468. int rc = 0;
  1469. struct hdcp1_handle *hdcp1_handle = data;
  1470. if (!aksv_msb || !aksv_lsb) {
  1471. pr_err("invalid aksv output buffer\n");
  1472. rc = -EINVAL;
  1473. goto error;
  1474. }
  1475. if (!hdcp1_handle) {
  1476. pr_err("invalid handle\n");
  1477. rc = -EINVAL;
  1478. goto error;
  1479. }
  1480. if (!hdcp1_handle->feature_supported) {
  1481. pr_err("feature not supported\n");
  1482. rc = -EINVAL;
  1483. goto error;
  1484. }
  1485. if (hdcp1_handle->hdcp_state & HDCP_STATE_APP_LOADED) {
  1486. pr_debug("%s app already loaded\n", hdcp1_handle->app_name);
  1487. goto error;
  1488. }
  1489. rc = hdcp1_app_load(hdcp1_handle);
  1490. if (rc)
  1491. goto error;
  1492. rc = hdcp1_set_key(hdcp1_handle, aksv_msb, aksv_lsb);
  1493. if (rc)
  1494. goto key_error;
  1495. pr_debug("success\n");
  1496. return rc;
  1497. key_error:
  1498. hdcp1_app_unload(hdcp1_handle);
  1499. error:
  1500. return rc;
  1501. }
  1502. EXPORT_SYMBOL(hdcp1_start);
  1503. void hdcp1_stop(void *data)
  1504. {
  1505. struct hdcp1_handle *hdcp1_handle = data;
  1506. if (!hdcp1_handle || !hdcp1_handle->qseecom_handle || !hdcp1_handle->hdcpops_handle) {
  1507. pr_err("invalid handle\n");
  1508. return;
  1509. }
  1510. if (!(hdcp1_handle->hdcp_state & HDCP_STATE_APP_LOADED)) {
  1511. pr_debug("%s app not loaded\n", hdcp1_handle->app_name);
  1512. return;
  1513. }
  1514. hdcp1_app_unload(hdcp1_handle);
  1515. }
  1516. EXPORT_SYMBOL(hdcp1_stop);
  1517. static int __init hdcp_module_init(void){ return 0; }
  1518. static void __exit hdcp_module_exit(void){ return; }
  1519. MODULE_LICENSE("GPL v2");
  1520. MODULE_DESCRIPTION("HDCP driver");
  1521. module_init(hdcp_module_init);
  1522. module_exit(hdcp_module_exit);