hdcp_qseecom.c 32 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409
  1. // SPDX-License-Identifier: GPL-2.0-only
  2. /*
  3. * Copyright (c) 2015-2022 The Linux Foundation. All rights reserved.
  4. * Copyright (c) 2022-2023 Qualcomm Innovation Center, Inc. All rights reserved.
  5. */
  6. #include <linux/errno.h>
  7. #include <linux/hdcp_qseecom.h>
  8. #include <linux/kernel.h>
  9. #include <linux/sched.h>
  10. #include <linux/slab.h>
  11. #include <linux/types.h>
  12. #include <misc/qseecom_kernel.h>
  13. #include "hdcp_qseecom.h"
  14. #include "hdcp_main.h"
  15. #define HDCP_CMD_STATUS_TO_STR(x) #x
  16. #define hdcp2_app_init_var(x) \
  17. struct hdcp_##x##_req *req_buf = NULL; \
  18. struct hdcp_##x##_rsp *rsp_buf = NULL; \
  19. if (!handle || !handle->qseecom_handle) { \
  20. pr_err("invalid qseecom_handle while processing %s\n", #x); \
  21. rc = -EINVAL; \
  22. goto error; \
  23. } \
  24. req_buf = (struct hdcp_##x##_req *)handle->qseecom_handle->sbuf; \
  25. rsp_buf = (struct hdcp_##x##_rsp *)(handle->qseecom_handle->sbuf + \
  26. QSEECOM_ALIGN(sizeof(struct hdcp_##x##_req))); \
  27. req_buf->commandid = hdcp_cmd_##x
  28. #define hdcp2_app_process_cmd(x) \
  29. ({ \
  30. int rc = qseecom_send_command( \
  31. handle->qseecom_handle, req_buf, \
  32. QSEECOM_ALIGN(sizeof(struct hdcp_##x##_req)), rsp_buf, \
  33. QSEECOM_ALIGN(sizeof(struct hdcp_##x##_rsp))); \
  34. if ((rc < 0) || (rsp_buf->status != HDCP_SUCCESS)) { \
  35. pr_err("qseecom cmd %s failed with err = %d, status = %d:%s\n", \
  36. #x, rc, rsp_buf->status, \
  37. hdcp_cmd_status_to_str(rsp_buf->status)); \
  38. rc = -EINVAL; \
  39. } \
  40. rc; \
  41. })
  42. const char *hdcp_errors[] = {"HDCP_SUCCESS",
  43. "HDCP_FAIL",
  44. "HDCP_BAD_PARAM",
  45. "HDCP_DEVICE_TYPE_UNSUPPORTED",
  46. "HDCP_INVALID_COMMAND",
  47. "HDCP_INVALID_COMMAND_HANDLE",
  48. "HDCP_ERROR_SIZE_IN",
  49. "HDCP_ERROR_SIZE_OUT",
  50. "HDCP_DATA_SIZE_INSUFFICIENT",
  51. "HDCP_UNSUPPORTED_RX_VERSION",
  52. "HDCP_WRONG_RX_CAPAB_MASK",
  53. "HDCP_WRONG_RX_RSVD",
  54. "HDCP_WRONG_RX_HDCP_CAPABLE",
  55. "HDCP_RSA_SIGNATURE_VERIFY_FAILED",
  56. "HDCP_VERIFY_H_PRIME_FAILED",
  57. "HDCP_LC_FAILED",
  58. "HDCP_MESSAGE_TIMEOUT",
  59. "HDCP_COUNTER_ROLL_OVER",
  60. "HDCP_WRONG_RXINFO_RSVD",
  61. "HDCP_RXINFO_MAX_DEVS",
  62. "HDCP_RXINFO_MAX_CASCADE",
  63. "HDCP_WRONG_INITIAL_SEQ_NUM_V",
  64. "HDCP_SEQ_NUM_V_ROLL_OVER",
  65. "HDCP_WRONG_SEQ_NUM_V",
  66. "HDCP_VERIFY_V_FAILED",
  67. "HDCP_RPT_METHOD_INVOKED",
  68. "HDCP_RPT_STRM_LEN_WRONG",
  69. "HDCP_VERIFY_STRM_M_FAILED",
  70. "HDCP_TRANSMITTER_NOT_FOUND",
  71. "HDCP_SESSION_NOT_FOUND",
  72. "HDCP_MAX_SESSION_EXCEEDED",
  73. "HDCP_MAX_CONNECTION_EXCEEDED",
  74. "HDCP_MAX_STREAMS_EXCEEDED",
  75. "HDCP_MAX_DEVICES",
  76. "HDCP_ALLOC_FAILED",
  77. "HDCP_CONNECTION_NOT_FOUND",
  78. "HDCP_HASH_FAILED",
  79. "HDCP_BN_FAILED",
  80. "HDCP_ENCRYPT_KM_FAILED",
  81. "HDCP_DECRYPT_KM_FAILED",
  82. "HDCP_HMAC_FAILED",
  83. "HDCP_GET_RANDOM_FAILED",
  84. "HDCP_INVALID_KEY_HEADER",
  85. "HDCP_INVALID_KEY_LC_HASH",
  86. "HDCP_INVALID_KEY_HASH",
  87. "HDCP_KEY_WRITE_FAILED",
  88. "HDCP_KEY_READ_FAILED",
  89. "HDCP_KEY_DECRYPT_FAILED",
  90. "HDCP_TEST_KEY_ON_SECURE_DEVICE",
  91. "HDCP_KEY_VERSION_UNSUPPORTED",
  92. "HDCP_RXID_NOT_FOUND",
  93. "HDCP_STORAGE_INIT_FAILED",
  94. "HDCP_STORAGE_FILE_OPEN_FAILED",
  95. "HDCP_STORAGE_FILE_READ_FAILED",
  96. "HDCP_STORAGE_FILE_WRITE_FAILED",
  97. "HDCP_STORAGE_ID_UNSUPPORTED",
  98. "HDCP_MUTUAL_EXCLUSIVE_DEVICE_PRESENT",
  99. "HDCP_INVALID_STATE",
  100. "HDCP_CONFIG_READ_FAILED",
  101. "HDCP_OPEN_TZ_SERVICE_FAILED",
  102. "HDCP_HW_CLOCK_OFF",
  103. "HDCP_SET_HW_KEY_FAILED",
  104. "HDCP_CLEAR_HW_KEY_FAILED",
  105. "HDCP_GET_CONTENT_LEVEL_FAILED",
  106. "HDCP_STREAMID_INUSE",
  107. "HDCP_STREAM_NOT_FOUND",
  108. "HDCP_FORCE_ENCRYPTION_FAILED",
  109. "HDCP_STREAMNUMBER_INUSE"};
  110. #define HDCP_TXMTR_SERVICE_ID 0x0001000
  111. #define SERVICE_CREATE_CMD(x) (HDCP_TXMTR_SERVICE_ID | x)
  112. #define HDCP_CMD_STATUS_TO_STR(x) #x
  113. enum {
  114. hdcp_cmd_tx_init = SERVICE_CREATE_CMD(1),
  115. hdcp_cmd_tx_init_v1 = SERVICE_CREATE_CMD(1),
  116. hdcp_cmd_tx_deinit = SERVICE_CREATE_CMD(2),
  117. hdcp_cmd_rcvd_msg = SERVICE_CREATE_CMD(3),
  118. hdcp_cmd_send_timeout = SERVICE_CREATE_CMD(4),
  119. hdcp_cmd_set_hw_key = SERVICE_CREATE_CMD(5),
  120. hdcp_cmd_query_stream_type = SERVICE_CREATE_CMD(6),
  121. hdcp_cmd_init_v1 = SERVICE_CREATE_CMD(11),
  122. hdcp_cmd_init = SERVICE_CREATE_CMD(11),
  123. hdcp_cmd_deinit = SERVICE_CREATE_CMD(12),
  124. hdcp_cmd_version = SERVICE_CREATE_CMD(14),
  125. hdcp_cmd_verify_key = SERVICE_CREATE_CMD(15),
  126. hdcp_cmd_session_init = SERVICE_CREATE_CMD(16),
  127. hdcp_cmd_session_deinit = SERVICE_CREATE_CMD(17),
  128. hdcp_cmd_start_auth = SERVICE_CREATE_CMD(18),
  129. hdcp_cmd_session_open_stream = SERVICE_CREATE_CMD(20),
  130. hdcp_cmd_session_close_stream = SERVICE_CREATE_CMD(21),
  131. hdcp_cmd_force_encryption = SERVICE_CREATE_CMD(22),
  132. };
  133. static struct qseecom_handle *qseecom_handle_g;
  134. static struct qseecom_handle *hdcpsrm_qseecom_handle_g;
  135. static int hdcp2_app_started;
  136. static struct qseecom_handle *hdcp1_qseecom_handle_g;
  137. static int hdcp1_app_started;
  138. static const char *hdcp_cmd_status_to_str(uint32_t err)
  139. {
  140. int len = ARRAY_SIZE(hdcp_errors);
  141. if (err >= 0 && err < len)
  142. return hdcp_errors[err];
  143. else
  144. return "";
  145. }
  146. static int hdcp1_app_load(struct hdcp1_qsee_handle *handle)
  147. {
  148. int rc = 0;
  149. if (!handle) {
  150. pr_err("invalid handle\n");
  151. goto error;
  152. }
  153. if (!hdcp1_qseecom_handle_g) {
  154. rc = qseecom_start_app(&hdcp1_qseecom_handle_g, handle->app_name,
  155. QSEECOM_SBUFF_SIZE);
  156. if (rc) {
  157. pr_err("%s app load failed (%d)\n", handle->app_name, rc);
  158. goto error;
  159. }
  160. }
  161. handle->qseecom_handle = hdcp1_qseecom_handle_g;
  162. hdcp1_app_started++;
  163. rc = qseecom_start_app(&handle->hdcpops_handle, HDCP1OPS_APP_NAME,
  164. QSEECOM_SBUFF_SIZE);
  165. if (rc) {
  166. pr_warn("%s app load failed (%d)\n", HDCP1OPS_APP_NAME, rc);
  167. handle->hdcpops_handle = NULL;
  168. }
  169. handle->hdcp_state |= HDCP_STATE_APP_LOADED;
  170. pr_debug("%s app loaded\n", handle->app_name);
  171. error:
  172. return rc;
  173. }
  174. static void hdcp1_app_unload(struct hdcp1_qsee_handle *handle)
  175. {
  176. int rc = 0;
  177. if (!handle || !handle->qseecom_handle) {
  178. pr_err("invalid handle\n");
  179. return;
  180. }
  181. if (!(handle->hdcp_state & HDCP_STATE_APP_LOADED)) {
  182. pr_warn("%s app not loaded\n", handle->app_name);
  183. return;
  184. }
  185. if (handle->hdcpops_handle) {
  186. /* deallocate the resources for HDCP 1.x ops handle */
  187. rc = qseecom_shutdown_app(&handle->hdcpops_handle);
  188. if (rc)
  189. pr_warn("%s app unload failed (%d)\n", HDCP1OPS_APP_NAME, rc);
  190. }
  191. hdcp1_app_started--;
  192. if (!hdcp1_app_started) {
  193. /* deallocate the resources for qseecom HDCP 1.x handle */
  194. rc = qseecom_shutdown_app(&hdcp1_qseecom_handle_g);
  195. if (rc) {
  196. pr_err("%s app unload failed (%d)\n", handle->app_name, rc);
  197. return;
  198. }
  199. hdcp1_qseecom_handle_g = NULL;
  200. }
  201. handle->qseecom_handle = NULL;
  202. handle->hdcp_state &= ~HDCP_STATE_APP_LOADED;
  203. pr_debug("%s app unloaded\n", handle->app_name);
  204. }
  205. static int hdcp1_set_key(struct hdcp1_qsee_handle *hdcp1_handle, u32 *aksv_msb,
  206. u32 *aksv_lsb)
  207. {
  208. int rc = 0;
  209. struct hdcp1_key_set_req *key_set_req;
  210. struct hdcp1_key_set_rsp *key_set_rsp;
  211. struct qseecom_handle *handle = NULL;
  212. if (aksv_msb == NULL || aksv_lsb == NULL) {
  213. pr_err("invalid aksv\n");
  214. return -EINVAL;
  215. }
  216. if (!hdcp1_handle || !hdcp1_handle->qseecom_handle) {
  217. pr_err("invalid HDCP 1.x handle\n");
  218. return -EINVAL;
  219. }
  220. if (!(hdcp1_handle->hdcp_state & HDCP_STATE_APP_LOADED)) {
  221. pr_err("%s app not loaded\n", hdcp1_handle->app_name);
  222. return -EINVAL;
  223. }
  224. handle = hdcp1_handle->qseecom_handle;
  225. /* set keys and request aksv */
  226. key_set_req = (struct hdcp1_key_set_req *)handle->sbuf;
  227. key_set_req->commandid = HDCP1_SET_KEY;
  228. key_set_rsp = (struct hdcp1_key_set_rsp *)(handle->sbuf +
  229. QSEECOM_ALIGN(sizeof(struct hdcp1_key_set_req)));
  230. rc = qseecom_send_command(
  231. handle, key_set_req, QSEECOM_ALIGN(sizeof(struct hdcp1_key_set_req)),
  232. key_set_rsp, QSEECOM_ALIGN(sizeof(struct hdcp1_key_set_rsp)));
  233. if (rc < 0) {
  234. pr_err("qseecom cmd failed err=%d\n", rc);
  235. return -ENOKEY;
  236. }
  237. rc = key_set_rsp->ret;
  238. if (rc) {
  239. pr_err("set key cmd failed, rsp=%d\n", key_set_rsp->ret);
  240. return -ENOKEY;
  241. }
  242. /* copy bytes into msb and lsb */
  243. *aksv_msb = key_set_rsp->ksv[0] << 24 | key_set_rsp->ksv[1] << 16 |
  244. key_set_rsp->ksv[2] << 8 | key_set_rsp->ksv[3];
  245. *aksv_lsb = key_set_rsp->ksv[4] << 24 | key_set_rsp->ksv[5] << 16 |
  246. key_set_rsp->ksv[6] << 8 | key_set_rsp->ksv[7];
  247. rc = hdcp1_validate_aksv(*aksv_msb, *aksv_lsb);
  248. if (rc) {
  249. pr_err("aksv validation failed (%d)\n", rc);
  250. return rc;
  251. }
  252. return 0;
  253. }
  254. static int hdcp1_verify_key(struct hdcp1_qsee_handle *hdcp1_handle)
  255. {
  256. int rc = 0;
  257. struct hdcp1_key_verify_req *key_verify_req;
  258. struct hdcp1_key_verify_rsp *key_verify_rsp;
  259. struct qseecom_handle *handle = NULL;
  260. if (!hdcp1_handle || !hdcp1_handle->qseecom_handle) {
  261. pr_err("invalid HDCP 1.x handle\n");
  262. return -EINVAL;
  263. }
  264. if (!(hdcp1_handle->hdcp_state & HDCP_STATE_APP_LOADED)) {
  265. pr_err("%s app not loaded\n", hdcp1_handle->app_name);
  266. return -EINVAL;
  267. }
  268. handle = hdcp1_handle->qseecom_handle;
  269. key_verify_req = (struct hdcp1_key_verify_req *)handle->sbuf;
  270. key_verify_req->commandid = HDCP1_KEY_VERIFY;
  271. key_verify_rsp =
  272. (struct hdcp1_key_verify_rsp *)(handle->sbuf +
  273. QSEECOM_ALIGN(sizeof(struct hdcp1_key_verify_req)));
  274. rc = qseecom_send_command(
  275. handle, key_verify_req,
  276. QSEECOM_ALIGN(sizeof(struct hdcp1_key_verify_req)), key_verify_rsp,
  277. QSEECOM_ALIGN(sizeof(struct hdcp1_key_set_rsp)));
  278. if (rc < 0) {
  279. pr_err("command HDCP1_KEY_VERIFY failed (%d)\n", rc);
  280. return -EINVAL;
  281. }
  282. rc = key_verify_rsp->ret;
  283. if (rc) {
  284. pr_err("key_verify failed, rsp=%d\n", key_verify_rsp->ret);
  285. return -EINVAL;
  286. }
  287. pr_debug("success\n");
  288. return 0;
  289. }
  290. static int hdcp2_app_unload(struct hdcp2_qsee_handle *handle)
  291. {
  292. int rc = 0;
  293. hdcp2_app_init_var(deinit);
  294. hdcp2_app_started--;
  295. if (!hdcp2_app_started) {
  296. hdcp2_app_process_cmd(deinit);
  297. /* deallocate the resources for qseecom HDCPSRM handle */
  298. rc = qseecom_shutdown_app(&handle->hdcpsrm_qseecom_handle);
  299. if (rc)
  300. pr_err("qseecom_shutdown_app failed for HDCPSRM (%d)\n", rc);
  301. hdcpsrm_qseecom_handle_g = NULL;
  302. /* deallocate the resources for qseecom HDCP2P2 handle */
  303. rc = qseecom_shutdown_app(&handle->qseecom_handle);
  304. if (rc) {
  305. pr_err("qseecom_shutdown_app failed for HDCP2P2 (%d)\n", rc);
  306. return rc;
  307. }
  308. qseecom_handle_g = NULL;
  309. }
  310. handle->qseecom_handle = NULL;
  311. handle->hdcpsrm_qseecom_handle = NULL;
  312. handle->hdcp_state &= ~HDCP_STATE_APP_LOADED;
  313. pr_debug("%s app unloaded\n", handle->app_name);
  314. return rc;
  315. error:
  316. if (!hdcp2_app_started)
  317. qseecom_shutdown_app(&handle->hdcpsrm_qseecom_handle);
  318. return rc;
  319. }
  320. static int hdcp2_verify_key(struct hdcp2_qsee_handle *handle)
  321. {
  322. int rc = 0;
  323. hdcp2_app_init_var(verify_key);
  324. if (!(handle->hdcp_state & HDCP_STATE_APP_LOADED)) {
  325. pr_err("%s app not loaded\n", handle->app_name);
  326. rc = -EINVAL;
  327. goto error;
  328. }
  329. rc = hdcp2_app_process_cmd(verify_key);
  330. pr_debug("verify_key = %d\n", rc);
  331. error:
  332. return rc;
  333. }
  334. static int hdcp2_app_tx_deinit(struct hdcp2_qsee_handle *handle)
  335. {
  336. int rc = 0;
  337. hdcp2_app_init_var(tx_deinit);
  338. if (!(handle->hdcp_state & HDCP_STATE_APP_LOADED)) {
  339. pr_err("%s app not loaded\n", handle->app_name);
  340. rc = -EINVAL;
  341. goto error;
  342. }
  343. if (!(handle->hdcp_state & HDCP_STATE_TXMTR_INIT)) {
  344. pr_err("txmtr not initialized\n");
  345. rc = -EINVAL;
  346. goto error;
  347. }
  348. req_buf->ctxhandle = handle->tz_ctxhandle;
  349. rc = hdcp2_app_process_cmd(tx_deinit);
  350. if (rc)
  351. goto error;
  352. handle->hdcp_state &= ~HDCP_STATE_TXMTR_INIT;
  353. pr_debug("success\n");
  354. error:
  355. return rc;
  356. }
  357. static int hdcp2_app_session_deinit(struct hdcp2_qsee_handle *handle)
  358. {
  359. int rc = 0;
  360. hdcp2_app_init_var(session_deinit);
  361. if (!(handle->hdcp_state & HDCP_STATE_APP_LOADED)) {
  362. pr_err("%s app not loaded\n", handle->app_name);
  363. rc = -EINVAL;
  364. goto error;
  365. }
  366. if (!(handle->hdcp_state & HDCP_STATE_SESSION_INIT)) {
  367. pr_err("session not initialized\n");
  368. rc = -EINVAL;
  369. goto error;
  370. }
  371. req_buf->sessionid = handle->session_id;
  372. rc = hdcp2_app_process_cmd(session_deinit);
  373. if (rc)
  374. goto error;
  375. handle->hdcp_state &= ~HDCP_STATE_SESSION_INIT;
  376. pr_debug("success\n");
  377. error:
  378. return rc;
  379. }
  380. void *hdcp1_init_qseecom(void)
  381. {
  382. struct hdcp1_qsee_handle *handle =
  383. kzalloc(sizeof(struct hdcp1_qsee_handle), GFP_KERNEL);
  384. if (!handle)
  385. goto error;
  386. handle->app_name = HDCP1_APP_NAME;
  387. error:
  388. return handle;
  389. }
  390. bool hdcp1_feature_supported_qseecom(void *data)
  391. {
  392. bool supported = false;
  393. struct hdcp1_qsee_handle *handle = data;
  394. int rc = 0;
  395. if (!handle) {
  396. pr_err("invalid handle\n");
  397. goto error;
  398. }
  399. if (handle->feature_supported) {
  400. supported = true;
  401. goto error;
  402. }
  403. rc = hdcp1_app_load(handle);
  404. if (!rc && (handle->hdcp_state & HDCP_STATE_APP_LOADED)) {
  405. if (!hdcp1_verify_key(handle)) {
  406. pr_debug("HDCP 1.x supported\n");
  407. handle->feature_supported = true;
  408. supported = true;
  409. }
  410. hdcp1_app_unload(handle);
  411. }
  412. error:
  413. return supported;
  414. }
  415. int hdcp1_set_enc_qseecom(void *data, bool enable)
  416. {
  417. int rc = 0;
  418. struct hdcp1_set_enc_req *set_enc_req;
  419. struct hdcp1_set_enc_rsp *set_enc_rsp;
  420. struct hdcp1_qsee_handle *hdcp1_handle = data;
  421. struct qseecom_handle *handle = NULL;
  422. if (!hdcp1_handle || !hdcp1_handle->qseecom_handle) {
  423. pr_err("invalid HDCP 1.x handle\n");
  424. return -EINVAL;
  425. }
  426. if (!hdcp1_handle->feature_supported) {
  427. pr_err("HDCP 1.x not supported\n");
  428. return -EINVAL;
  429. }
  430. if (!(hdcp1_handle->hdcp_state & HDCP_STATE_APP_LOADED)) {
  431. pr_err("%s app not loaded\n", hdcp1_handle->app_name);
  432. return -EINVAL;
  433. }
  434. handle = hdcp1_handle->qseecom_handle;
  435. /* set keys and request aksv */
  436. set_enc_req = (struct hdcp1_set_enc_req *)handle->sbuf;
  437. set_enc_req->commandid = HDCP1_SET_ENC;
  438. set_enc_req->enable = enable;
  439. set_enc_rsp = (struct hdcp1_set_enc_rsp *)(handle->sbuf +
  440. QSEECOM_ALIGN(sizeof(struct hdcp1_set_enc_req)));
  441. rc = qseecom_send_command(
  442. handle, set_enc_req, QSEECOM_ALIGN(sizeof(struct hdcp1_set_enc_req)),
  443. set_enc_rsp, QSEECOM_ALIGN(sizeof(struct hdcp1_set_enc_rsp)));
  444. if (rc < 0) {
  445. pr_err("qseecom cmd failed err=%d\n", rc);
  446. return -EINVAL;
  447. }
  448. rc = set_enc_rsp->ret;
  449. if (rc) {
  450. pr_err("enc cmd failed, rsp=%d\n", set_enc_rsp->ret);
  451. return -EINVAL;
  452. }
  453. pr_debug("success\n");
  454. return 0;
  455. }
  456. int hdcp1_ops_notify_qseecom(void *data, void *topo, bool is_authenticated)
  457. {
  458. int rc = 0;
  459. struct hdcp1_ops_notify_req *ops_notify_req;
  460. struct hdcp1_ops_notify_rsp *ops_notify_rsp;
  461. struct hdcp1_qsee_handle *hdcp1_handle = data;
  462. struct qseecom_handle *handle = NULL;
  463. struct hdcp1_topology *topology = NULL;
  464. if (!hdcp1_handle || !hdcp1_handle->hdcpops_handle) {
  465. pr_err("invalid HDCP 1.x ops handle\n");
  466. return -EINVAL;
  467. }
  468. if (!hdcp1_handle->feature_supported) {
  469. pr_err("HDCP 1.x not supported\n");
  470. return -EINVAL;
  471. }
  472. if (!(hdcp1_handle->hdcp_state & HDCP_STATE_APP_LOADED)) {
  473. pr_err("%s app not loaded\n", HDCP1OPS_APP_NAME);
  474. return -EINVAL;
  475. }
  476. handle = hdcp1_handle->hdcpops_handle;
  477. topology = (struct hdcp1_topology *)topo;
  478. /* set keys and request aksv */
  479. ops_notify_req = (struct hdcp1_ops_notify_req *)handle->sbuf;
  480. ops_notify_req->commandid = HDCP1_NOTIFY_TOPOLOGY;
  481. ops_notify_req->device_type = DEVICE_TYPE_DP;
  482. ops_notify_req->is_authenticated = is_authenticated;
  483. ops_notify_req->topology.depth = topology->depth;
  484. ops_notify_req->topology.device_count = topology->device_count;
  485. ops_notify_req->topology.max_devices_exceeded =
  486. topology->max_devices_exceeded;
  487. ops_notify_req->topology.max_cascade_exceeded =
  488. topology->max_cascade_exceeded;
  489. /*
  490. * For hdcp1.4 below two nodes are not applicable but as
  491. * TZ ops ta talks with other drivers with same structure
  492. * and want to maintain same interface across hdcp versions,
  493. * we are setting the values to 0.
  494. */
  495. ops_notify_req->topology.hdcp2LegacyDeviceDownstream = 0;
  496. ops_notify_req->topology.hdcp1DeviceDownstream = 0;
  497. memset(ops_notify_req->recv_id_list, 0,
  498. sizeof(uint8_t) * MAX_REC_ID_LIST_SIZE);
  499. ops_notify_rsp =
  500. (struct hdcp1_ops_notify_rsp *)(handle->sbuf +
  501. QSEECOM_ALIGN(sizeof(struct hdcp1_ops_notify_req)));
  502. rc = qseecom_send_command(
  503. handle, ops_notify_req,
  504. QSEECOM_ALIGN(sizeof(struct hdcp1_ops_notify_req)), ops_notify_rsp,
  505. QSEECOM_ALIGN(sizeof(struct hdcp1_ops_notify_rsp)));
  506. rc = ops_notify_rsp->ret;
  507. if (rc < 0) {
  508. pr_warn("Ops notify cmd failed, rsp=%d\n", ops_notify_rsp->ret);
  509. return -EINVAL;
  510. }
  511. pr_debug("ops notify success\n");
  512. return 0;
  513. }
  514. int hdcp1_start_qseecom(void *data, u32 *aksv_msb, u32 *aksv_lsb)
  515. {
  516. int rc = 0;
  517. struct hdcp1_qsee_handle *handle = data;
  518. if (!aksv_msb || !aksv_lsb) {
  519. pr_err("invalid aksv output buffer\n");
  520. rc = -EINVAL;
  521. goto error;
  522. }
  523. if (!handle) {
  524. pr_err("invalid handle\n");
  525. rc = -EINVAL;
  526. goto error;
  527. }
  528. if (!handle->feature_supported) {
  529. pr_err("feature not supported\n");
  530. rc = -EINVAL;
  531. goto error;
  532. }
  533. if (handle->hdcp_state & HDCP_STATE_APP_LOADED) {
  534. pr_debug("%s app already loaded\n", handle->app_name);
  535. goto error;
  536. }
  537. rc = hdcp1_app_load(handle);
  538. if (rc)
  539. goto error;
  540. rc = hdcp1_set_key(handle, aksv_msb, aksv_lsb);
  541. if (rc)
  542. goto key_error;
  543. pr_debug("success\n");
  544. return rc;
  545. key_error:
  546. hdcp1_app_unload(handle);
  547. error:
  548. return rc;
  549. }
  550. void hdcp1_stop_qseecom(void *data)
  551. {
  552. struct hdcp1_qsee_handle *hdcp1_handle = data;
  553. if (!hdcp1_handle || !hdcp1_handle->qseecom_handle ||
  554. !hdcp1_handle->hdcpops_handle) {
  555. pr_err("invalid handle\n");
  556. return;
  557. }
  558. if (!(hdcp1_handle->hdcp_state & HDCP_STATE_APP_LOADED)) {
  559. pr_debug("%s app not loaded\n", hdcp1_handle->app_name);
  560. return;
  561. }
  562. hdcp1_app_unload(hdcp1_handle);
  563. }
  564. static int hdcp2_app_init_legacy(struct hdcp2_qsee_handle *handle)
  565. {
  566. int rc = 0;
  567. hdcp2_app_init_var(init_v1);
  568. if (!handle->legacy_app) {
  569. pr_err("wrong init function\n");
  570. rc = -EINVAL;
  571. goto error;
  572. }
  573. if (handle->hdcp_state & HDCP_STATE_APP_LOADED) {
  574. pr_err("library already loaded\n");
  575. goto error;
  576. }
  577. rc = hdcp2_app_process_cmd(init_v1);
  578. if (rc)
  579. goto error;
  580. pr_debug("success\n");
  581. error:
  582. return rc;
  583. }
  584. static int hdcp2_app_tx_init_legacy(struct hdcp2_qsee_handle *handle)
  585. {
  586. int rc = 0;
  587. hdcp2_app_init_var(tx_init_v1);
  588. if (!(handle->hdcp_state & HDCP_STATE_APP_LOADED)) {
  589. pr_err("app not loaded\n");
  590. rc = -EINVAL;
  591. goto error;
  592. }
  593. if (handle->hdcp_state & HDCP_STATE_TXMTR_INIT) {
  594. pr_err("txmtr already initialized\n");
  595. goto error;
  596. }
  597. rc = hdcp2_app_process_cmd(tx_init_v1);
  598. if (rc)
  599. goto error;
  600. handle->app_data.response.data = rsp_buf->message;
  601. handle->app_data.response.length = rsp_buf->msglen;
  602. handle->app_data.timeout = rsp_buf->timeout;
  603. handle->tz_ctxhandle = rsp_buf->ctxhandle;
  604. handle->hdcp_state |= HDCP_STATE_TXMTR_INIT;
  605. pr_debug("success\n");
  606. error:
  607. return rc;
  608. }
  609. static int hdcp2_app_init(struct hdcp2_qsee_handle *handle)
  610. {
  611. int rc = 0;
  612. uint32_t app_minor_version = 0;
  613. hdcp2_app_init_var(init);
  614. if (handle->legacy_app) {
  615. pr_err("wrong init function\n");
  616. rc = -EINVAL;
  617. goto error;
  618. }
  619. if (handle->hdcp_state & HDCP_STATE_APP_LOADED) {
  620. pr_err("library already loaded\n");
  621. goto error;
  622. }
  623. req_buf->clientversion = HDCP_CLIENT_MAKE_VERSION(
  624. HDCP_CLIENT_MAJOR_VERSION, HDCP_CLIENT_MINOR_VERSION,
  625. HDCP_CLIENT_PATCH_VERSION);
  626. rc = hdcp2_app_process_cmd(init);
  627. if (rc)
  628. goto error;
  629. app_minor_version = HCDP_TXMTR_GET_MINOR_VERSION(rsp_buf->appversion);
  630. if (app_minor_version != HDCP_CLIENT_MINOR_VERSION) {
  631. pr_err("client-app minor version mismatch app(%d), client(%d)\n",
  632. app_minor_version, HDCP_CLIENT_MINOR_VERSION);
  633. rc = -1;
  634. goto error;
  635. }
  636. pr_debug("success\n");
  637. pr_debug("client version major(%d), minor(%d), patch(%d)\n",
  638. HDCP_CLIENT_MAJOR_VERSION, HDCP_CLIENT_MINOR_VERSION,
  639. HDCP_CLIENT_PATCH_VERSION);
  640. pr_debug("app version major(%d), minor(%d), patch(%d)\n",
  641. HCDP_TXMTR_GET_MAJOR_VERSION(rsp_buf->appversion),
  642. HCDP_TXMTR_GET_MINOR_VERSION(rsp_buf->appversion),
  643. HCDP_TXMTR_GET_PATCH_VERSION(rsp_buf->appversion));
  644. error:
  645. return rc;
  646. }
  647. static int hdcp2_app_tx_init(struct hdcp2_qsee_handle *handle)
  648. {
  649. int rc = 0;
  650. hdcp2_app_init_var(tx_init);
  651. if (!(handle->hdcp_state & HDCP_STATE_SESSION_INIT)) {
  652. pr_err("session not initialized\n");
  653. rc = -EINVAL;
  654. goto error;
  655. }
  656. if (handle->hdcp_state & HDCP_STATE_TXMTR_INIT) {
  657. pr_err("txmtr already initialized\n");
  658. goto error;
  659. }
  660. req_buf->sessionid = handle->session_id;
  661. rc = hdcp2_app_process_cmd(tx_init);
  662. if (rc)
  663. goto error;
  664. handle->tz_ctxhandle = rsp_buf->ctxhandle;
  665. handle->hdcp_state |= HDCP_STATE_TXMTR_INIT;
  666. pr_debug("success\n");
  667. error:
  668. return rc;
  669. }
  670. static int hdcp_get_version(struct hdcp2_qsee_handle *handle)
  671. {
  672. int rc = 0;
  673. uint32_t app_major_version = 0;
  674. hdcp2_app_init_var(version);
  675. if (handle->hdcp_state & HDCP_STATE_APP_LOADED) {
  676. pr_err("library already loaded\n");
  677. goto error;
  678. }
  679. rc = hdcp2_app_process_cmd(version);
  680. if (rc)
  681. goto error;
  682. app_major_version = HCDP_TXMTR_GET_MAJOR_VERSION(rsp_buf->appversion);
  683. pr_debug("hdp2p2 app major version %d, app version %d\n", app_major_version,
  684. rsp_buf->appversion);
  685. if (app_major_version == 1)
  686. handle->legacy_app = true;
  687. error:
  688. return rc;
  689. }
  690. static int hdcp2_app_load(struct hdcp2_qsee_handle *handle)
  691. {
  692. int rc = 0;
  693. if (!handle) {
  694. pr_err("invalid input\n");
  695. rc = -EINVAL;
  696. goto error;
  697. }
  698. if (handle->hdcp_state & HDCP_STATE_APP_LOADED) {
  699. pr_err("%s app already loaded\n", handle->app_name);
  700. goto error;
  701. }
  702. if (!qseecom_handle_g) {
  703. rc = qseecom_start_app(&qseecom_handle_g,
  704. handle->app_name, QSEECOM_SBUFF_SIZE);
  705. if (rc) {
  706. pr_err("qseecom_start_app failed for HDCP2P2 (%d)\n", rc);
  707. goto error;
  708. }
  709. }
  710. handle->qseecom_handle = qseecom_handle_g;
  711. if (!hdcpsrm_qseecom_handle_g) {
  712. rc = qseecom_start_app(&hdcpsrm_qseecom_handle_g,
  713. HDCPSRM_APP_NAME, QSEECOM_SBUFF_SIZE);
  714. if (rc) {
  715. pr_err("qseecom_start_app failed for HDCPSRM (%d)\n", rc);
  716. goto hdcpsrm_error;
  717. }
  718. }
  719. handle->hdcpsrm_qseecom_handle = hdcpsrm_qseecom_handle_g;
  720. pr_debug("qseecom_start_app success\n");
  721. rc = hdcp_get_version(handle);
  722. if (rc) {
  723. pr_err("library get version failed\n");
  724. goto get_version_error;
  725. }
  726. if (handle->legacy_app) {
  727. handle->app_init = hdcp2_app_init_legacy;
  728. handle->tx_init = hdcp2_app_tx_init_legacy;
  729. } else {
  730. handle->app_init = hdcp2_app_init;
  731. handle->tx_init = hdcp2_app_tx_init;
  732. }
  733. if (!hdcp2_app_started) {
  734. rc = handle->app_init(handle);
  735. if (rc) {
  736. pr_err("app init failed\n");
  737. goto get_version_error;
  738. }
  739. }
  740. hdcp2_app_started++;
  741. handle->hdcp_state |= HDCP_STATE_APP_LOADED;
  742. return rc;
  743. get_version_error:
  744. if (!hdcp2_app_started) {
  745. qseecom_shutdown_app(&hdcpsrm_qseecom_handle_g);
  746. hdcpsrm_qseecom_handle_g = NULL;
  747. }
  748. handle->hdcpsrm_qseecom_handle = NULL;
  749. hdcpsrm_error:
  750. if (!hdcp2_app_started) {
  751. qseecom_shutdown_app(&qseecom_handle_g);
  752. qseecom_handle_g = NULL;
  753. }
  754. handle->qseecom_handle = NULL;
  755. error:
  756. return rc;
  757. }
  758. static int hdcp2_app_session_init(struct hdcp2_qsee_handle *handle)
  759. {
  760. int rc = 0;
  761. hdcp2_app_init_var(session_init);
  762. if (!handle->qseecom_handle || !handle->qseecom_handle->sbuf) {
  763. pr_err("invalid handle\n");
  764. rc = -EINVAL;
  765. goto error;
  766. }
  767. if (!(handle->hdcp_state & HDCP_STATE_APP_LOADED)) {
  768. pr_err("%s app not loaded\n", handle->app_name);
  769. rc = -EINVAL;
  770. goto error;
  771. }
  772. if (handle->hdcp_state & HDCP_STATE_SESSION_INIT) {
  773. pr_err("session already initialized\n");
  774. goto error;
  775. }
  776. req_buf->deviceid = handle->device_type;
  777. rc = hdcp2_app_process_cmd(session_init);
  778. if (rc)
  779. goto error;
  780. pr_debug("session id %d\n", rsp_buf->sessionid);
  781. handle->session_id = rsp_buf->sessionid;
  782. handle->hdcp_state |= HDCP_STATE_SESSION_INIT;
  783. pr_debug("success\n");
  784. error:
  785. return rc;
  786. }
  787. void *hdcp2_init_qseecom(u32 device_type)
  788. {
  789. struct hdcp2_qsee_handle *handle =
  790. kzalloc(sizeof(struct hdcp2_qsee_handle), GFP_KERNEL);
  791. if (!handle)
  792. goto error;
  793. handle->device_type = device_type;
  794. handle->app_name = HDCP2P2_APP_NAME;
  795. handle->res_buf = kmalloc(QSEECOM_SBUFF_SIZE, GFP_KERNEL);
  796. if (!handle->res_buf) {
  797. kfree_sensitive(handle);
  798. return NULL;
  799. }
  800. handle->req_buf = kmalloc(QSEECOM_SBUFF_SIZE, GFP_KERNEL);
  801. if (!handle->req_buf) {
  802. kfree_sensitive(handle->res_buf);
  803. kfree_sensitive(handle);
  804. return NULL;
  805. }
  806. handle->app_data.request.data = handle->req_buf;
  807. handle->app_data.response.data = handle->res_buf;
  808. error:
  809. return handle;
  810. }
  811. void hdcp2_deinit_qseecom(void *ctx)
  812. {
  813. struct hdcp2_qsee_handle *handle = NULL;
  814. int rc = 0;
  815. handle = ctx;
  816. if (!handle) {
  817. pr_err("invalid handle\n");
  818. rc = -EINVAL;
  819. goto error;
  820. }
  821. kfree_sensitive(handle->res_buf);
  822. kfree_sensitive(handle->req_buf);
  823. error:
  824. kfree_sensitive(ctx);
  825. }
  826. int hdcp2_app_start_qseecom(void *ctx, uint32_t req_len)
  827. {
  828. struct hdcp2_qsee_handle *handle = NULL;
  829. int rc = 0;
  830. handle = ctx;
  831. if (!handle) {
  832. pr_err("invalid handle\n");
  833. rc = -EINVAL;
  834. goto error;
  835. }
  836. handle->app_data.request.length = req_len;
  837. rc = hdcp2_app_load(handle);
  838. if (rc)
  839. goto error;
  840. if (!handle->legacy_app) {
  841. rc = hdcp2_app_session_init(handle);
  842. if (rc)
  843. goto error;
  844. }
  845. if (handle->tx_init == NULL) {
  846. pr_err("invalid txmtr init function pointer\n");
  847. rc = -EINVAL;
  848. goto error;
  849. }
  850. rc = handle->tx_init(handle);
  851. error:
  852. return rc;
  853. }
  854. int hdcp2_app_start_auth_qseecom(void *ctx, uint32_t req_len)
  855. {
  856. int rc = 0;
  857. struct hdcp2_qsee_handle *handle = (struct hdcp2_qsee_handle *)ctx;
  858. hdcp2_app_init_var(start_auth);
  859. if (!handle) {
  860. pr_err("invalid handle\n");
  861. rc = -EINVAL;
  862. goto error;
  863. }
  864. handle->app_data.request.length = req_len;
  865. if (!(handle->hdcp_state & HDCP_STATE_SESSION_INIT)) {
  866. pr_err("session not initialized\n");
  867. rc = -EINVAL;
  868. goto error;
  869. }
  870. if (!(handle->hdcp_state & HDCP_STATE_TXMTR_INIT)) {
  871. pr_err("txmtr not initialized\n");
  872. rc = -EINVAL;
  873. goto error;
  874. }
  875. req_buf->ctxHandle = handle->tz_ctxhandle;
  876. rc = hdcp2_app_process_cmd(start_auth);
  877. if (rc)
  878. goto error;
  879. memcpy(handle->res_buf, rsp_buf->message, rsp_buf->msglen);
  880. handle->app_data.response.length = rsp_buf->msglen;
  881. handle->app_data.timeout = rsp_buf->timeout;
  882. handle->app_data.repeater_flag = false;
  883. handle->tz_ctxhandle = rsp_buf->ctxhandle;
  884. pr_debug("success\n");
  885. error:
  886. return rc;
  887. }
  888. int hdcp2_app_process_msg_qseecom(void *ctx, uint32_t req_len)
  889. {
  890. int rc = 0;
  891. struct hdcp2_qsee_handle *handle = (struct hdcp2_qsee_handle *)ctx;
  892. hdcp2_app_init_var(rcvd_msg);
  893. if (!handle) {
  894. pr_err("invalid handle\n");
  895. rc = -EINVAL;
  896. goto error;
  897. }
  898. handle->app_data.request.length = req_len;
  899. if (!handle->app_data.request.data) {
  900. pr_err("invalid request buffer\n");
  901. rc = -EINVAL;
  902. goto error;
  903. }
  904. req_buf->msglen = handle->app_data.request.length;
  905. req_buf->ctxhandle = handle->tz_ctxhandle;
  906. memcpy(req_buf->msg, handle->req_buf, handle->app_data.request.length);
  907. rc = hdcp2_app_process_cmd(rcvd_msg);
  908. if (rc)
  909. goto error;
  910. /* check if it's a repeater */
  911. if (rsp_buf->flag == HDCP_TXMTR_SUBSTATE_WAITING_FOR_RECIEVERID_LIST)
  912. handle->app_data.repeater_flag = true;
  913. memcpy(handle->res_buf, rsp_buf->msg, rsp_buf->msglen);
  914. handle->app_data.response.length = rsp_buf->msglen;
  915. handle->app_data.timeout = rsp_buf->timeout;
  916. error:
  917. return rc;
  918. }
  919. int hdcp2_app_timeout_qseecom(void *ctx, uint32_t req_len)
  920. {
  921. int rc = 0;
  922. struct hdcp2_qsee_handle *handle = (struct hdcp2_qsee_handle *)ctx;
  923. hdcp2_app_init_var(send_timeout);
  924. if (!handle) {
  925. pr_err("invalid handle\n");
  926. rc = -EINVAL;
  927. goto error;
  928. }
  929. handle->app_data.request.length = req_len;
  930. rc = hdcp2_app_process_cmd(send_timeout);
  931. if (rc)
  932. goto error;
  933. memcpy(handle->res_buf, rsp_buf->message, rsp_buf->msglen);
  934. handle->app_data.response.length = rsp_buf->msglen;
  935. handle->app_data.timeout = rsp_buf->timeout;
  936. error:
  937. return rc;
  938. }
  939. int hdcp2_app_enable_encryption_qseecom(void *ctx, uint32_t req_len)
  940. {
  941. int rc = 0;
  942. struct hdcp2_qsee_handle *handle = (struct hdcp2_qsee_handle *)ctx;
  943. hdcp2_app_init_var(set_hw_key);
  944. if (!handle) {
  945. pr_err("Invalid handle\n");
  946. rc = -EINVAL;
  947. goto error;
  948. }
  949. handle->app_data.request.length = req_len;
  950. /*
  951. * wait at least 200ms before enabling encryption
  952. * as per hdcp2p2 specifications.
  953. */
  954. msleep(SLEEP_SET_HW_KEY_MS);
  955. req_buf->ctxhandle = handle->tz_ctxhandle;
  956. rc = hdcp2_app_process_cmd(set_hw_key);
  957. if (rc)
  958. goto error;
  959. handle->hdcp_state |= HDCP_STATE_AUTHENTICATED;
  960. error:
  961. return rc;
  962. }
  963. int hdcp2_app_query_stream_qseecom(void *ctx, uint32_t req_len)
  964. {
  965. int rc = 0;
  966. struct hdcp2_qsee_handle *handle = (struct hdcp2_qsee_handle *)ctx;
  967. hdcp2_app_init_var(query_stream_type);
  968. if (!handle) {
  969. pr_err("Invalid handle\n");
  970. rc = -EINVAL;
  971. goto error;
  972. }
  973. handle->app_data.request.length = req_len;
  974. req_buf->ctxhandle = handle->tz_ctxhandle;
  975. rc = hdcp2_app_process_cmd(query_stream_type);
  976. if (rc)
  977. goto error;
  978. memcpy(handle->res_buf, rsp_buf->msg, rsp_buf->msglen);
  979. handle->app_data.response.length = rsp_buf->msglen;
  980. handle->app_data.timeout = rsp_buf->timeout;
  981. error:
  982. return rc;
  983. }
  984. int hdcp2_app_stop_qseecom(void *ctx)
  985. {
  986. int rc = 0;
  987. struct hdcp2_qsee_handle *handle = (struct hdcp2_qsee_handle *)ctx;
  988. if (!handle) {
  989. pr_err("Invalid handle\n");
  990. rc = -EINVAL;
  991. goto error;
  992. }
  993. rc = hdcp2_app_tx_deinit(handle);
  994. if (rc)
  995. goto error;
  996. if (!handle->legacy_app) {
  997. rc = hdcp2_app_session_deinit(handle);
  998. if (rc)
  999. goto error;
  1000. }
  1001. rc = hdcp2_app_unload(handle);
  1002. error:
  1003. return rc;
  1004. }
  1005. bool hdcp2_feature_supported_qseecom(void *ctx)
  1006. {
  1007. int rc = 0;
  1008. bool supported = false;
  1009. struct hdcp2_qsee_handle *handle = (struct hdcp2_qsee_handle *)ctx;
  1010. if (!handle) {
  1011. pr_err("invalid input\n");
  1012. rc = -EINVAL;
  1013. goto error;
  1014. }
  1015. if (handle->feature_supported) {
  1016. supported = true;
  1017. goto error;
  1018. }
  1019. rc = hdcp2_app_load(handle);
  1020. if (!rc) {
  1021. if (!hdcp2_verify_key(handle)) {
  1022. pr_debug("HDCP 2.2 supported\n");
  1023. handle->feature_supported = true;
  1024. supported = true;
  1025. }
  1026. hdcp2_app_unload(handle);
  1027. }
  1028. error:
  1029. return supported;
  1030. }
  1031. int hdcp2_force_encryption_qseecom(void *ctx, uint32_t enable)
  1032. {
  1033. int rc = 0;
  1034. struct hdcp2_qsee_handle *handle = (struct hdcp2_qsee_handle *)ctx;
  1035. hdcp2_app_init_var(force_encryption);
  1036. if (!handle) {
  1037. pr_err("invalid input\n");
  1038. rc = -EINVAL;
  1039. goto error;
  1040. }
  1041. if (handle->hdcp_state == HDCP_STATE_AUTHENTICATED)
  1042. msleep(SLEEP_FORCE_ENCRYPTION_MS);
  1043. req_buf->ctxhandle = handle->tz_ctxhandle;
  1044. req_buf->enable = enable;
  1045. rc = hdcp2_app_process_cmd(force_encryption);
  1046. if (rc || (rsp_buf->commandid != hdcp_cmd_force_encryption))
  1047. goto error;
  1048. error:
  1049. return rc;
  1050. }
  1051. int hdcp2_open_stream_qseecom(void *ctx, uint8_t vc_payload_id,
  1052. uint8_t stream_number, uint32_t *stream_id)
  1053. {
  1054. struct hdcp2_qsee_handle *handle = (struct hdcp2_qsee_handle *)ctx;
  1055. int rc = 0;
  1056. hdcp2_app_init_var(session_open_stream);
  1057. if (!handle) {
  1058. pr_err("invalid input\n");
  1059. rc = -EINVAL;
  1060. goto error;
  1061. }
  1062. if (!(handle->hdcp_state & HDCP_STATE_SESSION_INIT)) {
  1063. pr_err("session not initialized\n");
  1064. rc = -EINVAL;
  1065. goto error;
  1066. }
  1067. if (!(handle->hdcp_state & HDCP_STATE_TXMTR_INIT)) {
  1068. pr_err("txmtr not initialized\n");
  1069. rc = -EINVAL;
  1070. goto error;
  1071. }
  1072. req_buf->sessionid = handle->session_id;
  1073. req_buf->vcpayloadid = vc_payload_id;
  1074. req_buf->stream_number = stream_number;
  1075. req_buf->streamMediaType = 0;
  1076. rc = hdcp2_app_process_cmd(session_open_stream);
  1077. if (rc)
  1078. goto error;
  1079. *stream_id = rsp_buf->streamid;
  1080. pr_debug("success\n");
  1081. error:
  1082. return rc;
  1083. }
  1084. int hdcp2_close_stream_qseecom(void *ctx, uint32_t stream_id)
  1085. {
  1086. struct hdcp2_qsee_handle *handle = (struct hdcp2_qsee_handle *)ctx;
  1087. int rc = 0;
  1088. hdcp2_app_init_var(session_close_stream);
  1089. if (!handle) {
  1090. pr_err("invalid input\n");
  1091. rc = -EINVAL;
  1092. goto error;
  1093. }
  1094. if (!(handle->hdcp_state & HDCP_STATE_SESSION_INIT)) {
  1095. pr_err("session not initialized\n");
  1096. rc = -EINVAL;
  1097. goto error;
  1098. }
  1099. if (!(handle->hdcp_state & HDCP_STATE_TXMTR_INIT)) {
  1100. pr_err("txmtr not initialized\n");
  1101. rc = -EINVAL;
  1102. goto error;
  1103. }
  1104. req_buf->sessionid = handle->session_id;
  1105. req_buf->streamid = stream_id;
  1106. rc = hdcp2_app_process_cmd(session_close_stream);
  1107. if (rc)
  1108. goto error;
  1109. pr_debug("success\n");
  1110. error:
  1111. return rc;
  1112. }
  1113. int hdcp2_update_app_data_qseecom(void *ctx, struct hdcp2_app_data *app_data)
  1114. {
  1115. int rc = 0;
  1116. struct hdcp2_qsee_handle *handle = (struct hdcp2_qsee_handle *)ctx;
  1117. if (!handle) {
  1118. pr_err("invalid input\n");
  1119. rc = -EINVAL;
  1120. goto error;
  1121. }
  1122. app_data->request.data = handle->app_data.request.data;
  1123. app_data->request.length = handle->app_data.request.length;
  1124. app_data->response.data = handle->app_data.response.data;
  1125. app_data->response.length = handle->app_data.response.length;
  1126. app_data->timeout = handle->app_data.timeout;
  1127. app_data->repeater_flag = handle->app_data.repeater_flag;
  1128. error:
  1129. return rc;
  1130. }