hdcp_qseecom.c 32 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404
  1. // SPDX-License-Identifier: GPL-2.0-only
  2. /*
  3. * Copyright (c) 2015-2022 The Linux Foundation. All rights reserved.
  4. * Copyright (c) 2022-2023 Qualcomm Innovation Center, Inc. All rights reserved.
  5. */
  6. #include <linux/errno.h>
  7. #include <linux/hdcp_qseecom.h>
  8. #include <linux/kernel.h>
  9. #include <linux/sched.h>
  10. #include <linux/slab.h>
  11. #include <linux/types.h>
  12. #include <misc/qseecom_kernel.h>
  13. #include "hdcp_qseecom.h"
  14. #include "hdcp_main.h"
  15. #define HDCP_CMD_STATUS_TO_STR(x) #x
  16. #define hdcp2_app_init_var(x) \
  17. struct hdcp_##x##_req *req_buf = NULL; \
  18. struct hdcp_##x##_rsp *rsp_buf = NULL; \
  19. if (!handle->qseecom_handle) { \
  20. pr_err("invalid qseecom_handle while processing %s\n", #x); \
  21. rc = -EINVAL; \
  22. goto error; \
  23. } \
  24. req_buf = (struct hdcp_##x##_req *)handle->qseecom_handle->sbuf; \
  25. rsp_buf = (struct hdcp_##x##_rsp *)(handle->qseecom_handle->sbuf + \
  26. QSEECOM_ALIGN(sizeof(struct hdcp_##x##_req))); \
  27. req_buf->commandid = hdcp_cmd_##x
  28. #define hdcp2_app_process_cmd(x) \
  29. ({ \
  30. int rc = qseecom_send_command( \
  31. handle->qseecom_handle, req_buf, \
  32. QSEECOM_ALIGN(sizeof(struct hdcp_##x##_req)), rsp_buf, \
  33. QSEECOM_ALIGN(sizeof(struct hdcp_##x##_rsp))); \
  34. if ((rc < 0) || (rsp_buf->status != HDCP_SUCCESS)) { \
  35. pr_err("qseecom cmd %s failed with err = %d, status = %d:%s\n", \
  36. #x, rc, rsp_buf->status, \
  37. hdcp_cmd_status_to_str(rsp_buf->status)); \
  38. rc = -EINVAL; \
  39. } \
  40. rc; \
  41. })
  42. const char *hdcp_errors[] = {"HDCP_SUCCESS",
  43. "HDCP_FAIL",
  44. "HDCP_BAD_PARAM",
  45. "HDCP_DEVICE_TYPE_UNSUPPORTED",
  46. "HDCP_INVALID_COMMAND",
  47. "HDCP_INVALID_COMMAND_HANDLE",
  48. "HDCP_ERROR_SIZE_IN",
  49. "HDCP_ERROR_SIZE_OUT",
  50. "HDCP_DATA_SIZE_INSUFFICIENT",
  51. "HDCP_UNSUPPORTED_RX_VERSION",
  52. "HDCP_WRONG_RX_CAPAB_MASK",
  53. "HDCP_WRONG_RX_RSVD",
  54. "HDCP_WRONG_RX_HDCP_CAPABLE",
  55. "HDCP_RSA_SIGNATURE_VERIFY_FAILED",
  56. "HDCP_VERIFY_H_PRIME_FAILED",
  57. "HDCP_LC_FAILED",
  58. "HDCP_MESSAGE_TIMEOUT",
  59. "HDCP_COUNTER_ROLL_OVER",
  60. "HDCP_WRONG_RXINFO_RSVD",
  61. "HDCP_RXINFO_MAX_DEVS",
  62. "HDCP_RXINFO_MAX_CASCADE",
  63. "HDCP_WRONG_INITIAL_SEQ_NUM_V",
  64. "HDCP_SEQ_NUM_V_ROLL_OVER",
  65. "HDCP_WRONG_SEQ_NUM_V",
  66. "HDCP_VERIFY_V_FAILED",
  67. "HDCP_RPT_METHOD_INVOKED",
  68. "HDCP_RPT_STRM_LEN_WRONG",
  69. "HDCP_VERIFY_STRM_M_FAILED",
  70. "HDCP_TRANSMITTER_NOT_FOUND",
  71. "HDCP_SESSION_NOT_FOUND",
  72. "HDCP_MAX_SESSION_EXCEEDED",
  73. "HDCP_MAX_CONNECTION_EXCEEDED",
  74. "HDCP_MAX_STREAMS_EXCEEDED",
  75. "HDCP_MAX_DEVICES",
  76. "HDCP_ALLOC_FAILED",
  77. "HDCP_CONNECTION_NOT_FOUND",
  78. "HDCP_HASH_FAILED",
  79. "HDCP_BN_FAILED",
  80. "HDCP_ENCRYPT_KM_FAILED",
  81. "HDCP_DECRYPT_KM_FAILED",
  82. "HDCP_HMAC_FAILED",
  83. "HDCP_GET_RANDOM_FAILED",
  84. "HDCP_INVALID_KEY_HEADER",
  85. "HDCP_INVALID_KEY_LC_HASH",
  86. "HDCP_INVALID_KEY_HASH",
  87. "HDCP_KEY_WRITE_FAILED",
  88. "HDCP_KEY_READ_FAILED",
  89. "HDCP_KEY_DECRYPT_FAILED",
  90. "HDCP_TEST_KEY_ON_SECURE_DEVICE",
  91. "HDCP_KEY_VERSION_UNSUPPORTED",
  92. "HDCP_RXID_NOT_FOUND",
  93. "HDCP_STORAGE_INIT_FAILED",
  94. "HDCP_STORAGE_FILE_OPEN_FAILED",
  95. "HDCP_STORAGE_FILE_READ_FAILED",
  96. "HDCP_STORAGE_FILE_WRITE_FAILED",
  97. "HDCP_STORAGE_ID_UNSUPPORTED",
  98. "HDCP_MUTUAL_EXCLUSIVE_DEVICE_PRESENT",
  99. "HDCP_INVALID_STATE",
  100. "HDCP_CONFIG_READ_FAILED",
  101. "HDCP_OPEN_TZ_SERVICE_FAILED",
  102. "HDCP_HW_CLOCK_OFF",
  103. "HDCP_SET_HW_KEY_FAILED",
  104. "HDCP_CLEAR_HW_KEY_FAILED",
  105. "HDCP_GET_CONTENT_LEVEL_FAILED",
  106. "HDCP_STREAMID_INUSE",
  107. "HDCP_STREAM_NOT_FOUND",
  108. "HDCP_FORCE_ENCRYPTION_FAILED",
  109. "HDCP_STREAMNUMBER_INUSE"};
  110. #define HDCP_TXMTR_SERVICE_ID 0x0001000
  111. #define SERVICE_CREATE_CMD(x) (HDCP_TXMTR_SERVICE_ID | x)
  112. #define HDCP_CMD_STATUS_TO_STR(x) #x
  113. enum {
  114. hdcp_cmd_tx_init = SERVICE_CREATE_CMD(1),
  115. hdcp_cmd_tx_init_v1 = SERVICE_CREATE_CMD(1),
  116. hdcp_cmd_tx_deinit = SERVICE_CREATE_CMD(2),
  117. hdcp_cmd_rcvd_msg = SERVICE_CREATE_CMD(3),
  118. hdcp_cmd_send_timeout = SERVICE_CREATE_CMD(4),
  119. hdcp_cmd_set_hw_key = SERVICE_CREATE_CMD(5),
  120. hdcp_cmd_query_stream_type = SERVICE_CREATE_CMD(6),
  121. hdcp_cmd_init_v1 = SERVICE_CREATE_CMD(11),
  122. hdcp_cmd_init = SERVICE_CREATE_CMD(11),
  123. hdcp_cmd_deinit = SERVICE_CREATE_CMD(12),
  124. hdcp_cmd_version = SERVICE_CREATE_CMD(14),
  125. hdcp_cmd_verify_key = SERVICE_CREATE_CMD(15),
  126. hdcp_cmd_session_init = SERVICE_CREATE_CMD(16),
  127. hdcp_cmd_session_deinit = SERVICE_CREATE_CMD(17),
  128. hdcp_cmd_start_auth = SERVICE_CREATE_CMD(18),
  129. hdcp_cmd_session_open_stream = SERVICE_CREATE_CMD(20),
  130. hdcp_cmd_session_close_stream = SERVICE_CREATE_CMD(21),
  131. hdcp_cmd_force_encryption = SERVICE_CREATE_CMD(22),
  132. };
  133. static struct qseecom_handle *qseecom_handle_g;
  134. static struct qseecom_handle *hdcpsrm_qseecom_handle_g;
  135. static int hdcp2_app_started;
  136. static struct qseecom_handle *hdcp1_qseecom_handle_g;
  137. static int hdcp1_app_started;
  138. static const char *hdcp_cmd_status_to_str(uint32_t err)
  139. {
  140. int len = ARRAY_SIZE(hdcp_errors);
  141. if (err >= 0 && err < len)
  142. return hdcp_errors[err];
  143. else
  144. return "";
  145. }
  146. static int hdcp1_app_load(struct hdcp1_qsee_handle *handle)
  147. {
  148. int rc = 0;
  149. if (!handle) {
  150. pr_err("invalid handle\n");
  151. goto error;
  152. }
  153. if (!hdcp1_qseecom_handle_g) {
  154. rc = qseecom_start_app(&hdcp1_qseecom_handle_g, handle->app_name,
  155. QSEECOM_SBUFF_SIZE);
  156. if (rc) {
  157. pr_err("%s app load failed (%d)\n", handle->app_name, rc);
  158. goto error;
  159. }
  160. }
  161. handle->qseecom_handle = hdcp1_qseecom_handle_g;
  162. hdcp1_app_started++;
  163. rc = qseecom_start_app(&handle->hdcpops_handle, HDCP1OPS_APP_NAME,
  164. QSEECOM_SBUFF_SIZE);
  165. if (rc) {
  166. pr_warn("%s app load failed (%d)\n", HDCP1OPS_APP_NAME, rc);
  167. handle->hdcpops_handle = NULL;
  168. }
  169. handle->hdcp_state |= HDCP_STATE_APP_LOADED;
  170. pr_debug("%s app loaded\n", handle->app_name);
  171. error:
  172. return rc;
  173. }
  174. static void hdcp1_app_unload(struct hdcp1_qsee_handle *handle)
  175. {
  176. int rc = 0;
  177. if (!handle || !handle->qseecom_handle) {
  178. pr_err("invalid handle\n");
  179. return;
  180. }
  181. if (!(handle->hdcp_state & HDCP_STATE_APP_LOADED)) {
  182. pr_warn("%s app not loaded\n", handle->app_name);
  183. return;
  184. }
  185. if (handle->hdcpops_handle) {
  186. /* deallocate the resources for HDCP 1.x ops handle */
  187. rc = qseecom_shutdown_app(&handle->hdcpops_handle);
  188. if (rc)
  189. pr_warn("%s app unload failed (%d)\n", HDCP1OPS_APP_NAME, rc);
  190. }
  191. /* deallocate the resources for qseecom HDCP 1.x handle */
  192. rc = qseecom_shutdown_app(&handle->qseecom_handle);
  193. if (rc) {
  194. pr_err("%s app unload failed (%d)\n", handle->app_name, rc);
  195. return;
  196. }
  197. handle->hdcp_state &= ~HDCP_STATE_APP_LOADED;
  198. pr_debug("%s app unloaded\n", handle->app_name);
  199. }
  200. static int hdcp1_set_key(struct hdcp1_qsee_handle *hdcp1_handle, u32 *aksv_msb,
  201. u32 *aksv_lsb)
  202. {
  203. int rc = 0;
  204. struct hdcp1_key_set_req *key_set_req;
  205. struct hdcp1_key_set_rsp *key_set_rsp;
  206. struct qseecom_handle *handle = NULL;
  207. if (aksv_msb == NULL || aksv_lsb == NULL) {
  208. pr_err("invalid aksv\n");
  209. return -EINVAL;
  210. }
  211. if (!hdcp1_handle || !hdcp1_handle->qseecom_handle) {
  212. pr_err("invalid HDCP 1.x handle\n");
  213. return -EINVAL;
  214. }
  215. if (!(hdcp1_handle->hdcp_state & HDCP_STATE_APP_LOADED)) {
  216. pr_err("%s app not loaded\n", hdcp1_handle->app_name);
  217. return -EINVAL;
  218. }
  219. handle = hdcp1_handle->qseecom_handle;
  220. /* set keys and request aksv */
  221. key_set_req = (struct hdcp1_key_set_req *)handle->sbuf;
  222. key_set_req->commandid = HDCP1_SET_KEY;
  223. key_set_rsp = (struct hdcp1_key_set_rsp *)(handle->sbuf +
  224. QSEECOM_ALIGN(sizeof(struct hdcp1_key_set_req)));
  225. rc = qseecom_send_command(
  226. handle, key_set_req, QSEECOM_ALIGN(sizeof(struct hdcp1_key_set_req)),
  227. key_set_rsp, QSEECOM_ALIGN(sizeof(struct hdcp1_key_set_rsp)));
  228. if (rc < 0) {
  229. pr_err("qseecom cmd failed err=%d\n", rc);
  230. return -ENOKEY;
  231. }
  232. rc = key_set_rsp->ret;
  233. if (rc) {
  234. pr_err("set key cmd failed, rsp=%d\n", key_set_rsp->ret);
  235. return -ENOKEY;
  236. }
  237. /* copy bytes into msb and lsb */
  238. *aksv_msb = key_set_rsp->ksv[0] << 24 | key_set_rsp->ksv[1] << 16 |
  239. key_set_rsp->ksv[2] << 8 | key_set_rsp->ksv[3];
  240. *aksv_lsb = key_set_rsp->ksv[4] << 24 | key_set_rsp->ksv[5] << 16 |
  241. key_set_rsp->ksv[6] << 8 | key_set_rsp->ksv[7];
  242. rc = hdcp1_validate_aksv(*aksv_msb, *aksv_lsb);
  243. if (rc) {
  244. pr_err("aksv validation failed (%d)\n", rc);
  245. return rc;
  246. }
  247. return 0;
  248. }
  249. static int hdcp1_verify_key(struct hdcp1_qsee_handle *hdcp1_handle)
  250. {
  251. int rc = 0;
  252. struct hdcp1_key_verify_req *key_verify_req;
  253. struct hdcp1_key_verify_rsp *key_verify_rsp;
  254. struct qseecom_handle *handle = NULL;
  255. if (!hdcp1_handle || !hdcp1_handle->qseecom_handle) {
  256. pr_err("invalid HDCP 1.x handle\n");
  257. return -EINVAL;
  258. }
  259. if (!(hdcp1_handle->hdcp_state & HDCP_STATE_APP_LOADED)) {
  260. pr_err("%s app not loaded\n", hdcp1_handle->app_name);
  261. return -EINVAL;
  262. }
  263. handle = hdcp1_handle->qseecom_handle;
  264. key_verify_req = (struct hdcp1_key_verify_req *)handle->sbuf;
  265. key_verify_req->commandid = HDCP1_KEY_VERIFY;
  266. key_verify_rsp =
  267. (struct hdcp1_key_verify_rsp *)(handle->sbuf +
  268. QSEECOM_ALIGN(sizeof(struct hdcp1_key_verify_req)));
  269. rc = qseecom_send_command(
  270. handle, key_verify_req,
  271. QSEECOM_ALIGN(sizeof(struct hdcp1_key_verify_req)), key_verify_rsp,
  272. QSEECOM_ALIGN(sizeof(struct hdcp1_key_set_rsp)));
  273. if (rc < 0) {
  274. pr_err("command HDCP1_KEY_VERIFY failed (%d)\n", rc);
  275. return -EINVAL;
  276. }
  277. rc = key_verify_rsp->ret;
  278. if (rc) {
  279. pr_err("key_verify failed, rsp=%d\n", key_verify_rsp->ret);
  280. return -EINVAL;
  281. }
  282. pr_debug("success\n");
  283. return 0;
  284. }
  285. static int hdcp2_app_unload(struct hdcp2_qsee_handle *handle)
  286. {
  287. int rc = 0;
  288. hdcp2_app_init_var(deinit);
  289. hdcp2_app_started--;
  290. if (!hdcp2_app_started) {
  291. hdcp2_app_process_cmd(deinit);
  292. /* deallocate the resources for qseecom HDCPSRM handle */
  293. rc = qseecom_shutdown_app(&handle->hdcpsrm_qseecom_handle);
  294. if (rc)
  295. pr_err("qseecom_shutdown_app failed for HDCPSRM (%d)\n", rc);
  296. hdcpsrm_qseecom_handle_g = NULL;
  297. /* deallocate the resources for qseecom HDCP2P2 handle */
  298. rc = qseecom_shutdown_app(&handle->qseecom_handle);
  299. if (rc) {
  300. pr_err("qseecom_shutdown_app failed for HDCP2P2 (%d)\n", rc);
  301. return rc;
  302. }
  303. qseecom_handle_g = NULL;
  304. }
  305. handle->qseecom_handle = NULL;
  306. handle->hdcpsrm_qseecom_handle = NULL;
  307. handle->hdcp_state &= ~HDCP_STATE_APP_LOADED;
  308. pr_debug("%s app unloaded\n", handle->app_name);
  309. return rc;
  310. error:
  311. if (!hdcp2_app_started)
  312. qseecom_shutdown_app(&handle->hdcpsrm_qseecom_handle);
  313. return rc;
  314. }
  315. static int hdcp2_verify_key(struct hdcp2_qsee_handle *handle)
  316. {
  317. int rc = 0;
  318. hdcp2_app_init_var(verify_key);
  319. if (!(handle->hdcp_state & HDCP_STATE_APP_LOADED)) {
  320. pr_err("%s app not loaded\n", handle->app_name);
  321. rc = -EINVAL;
  322. goto error;
  323. }
  324. rc = hdcp2_app_process_cmd(verify_key);
  325. pr_debug("verify_key = %d\n", rc);
  326. error:
  327. return rc;
  328. }
  329. static int hdcp2_app_tx_deinit(struct hdcp2_qsee_handle *handle)
  330. {
  331. int rc = 0;
  332. hdcp2_app_init_var(tx_deinit);
  333. if (!(handle->hdcp_state & HDCP_STATE_APP_LOADED)) {
  334. pr_err("%s app not loaded\n", handle->app_name);
  335. rc = -EINVAL;
  336. goto error;
  337. }
  338. if (!(handle->hdcp_state & HDCP_STATE_TXMTR_INIT)) {
  339. pr_err("txmtr not initialized\n");
  340. rc = -EINVAL;
  341. goto error;
  342. }
  343. req_buf->ctxhandle = handle->tz_ctxhandle;
  344. rc = hdcp2_app_process_cmd(tx_deinit);
  345. if (rc)
  346. goto error;
  347. handle->hdcp_state &= ~HDCP_STATE_TXMTR_INIT;
  348. pr_debug("success\n");
  349. error:
  350. return rc;
  351. }
  352. static int hdcp2_app_session_deinit(struct hdcp2_qsee_handle *handle)
  353. {
  354. int rc = 0;
  355. hdcp2_app_init_var(session_deinit);
  356. if (!(handle->hdcp_state & HDCP_STATE_APP_LOADED)) {
  357. pr_err("%s app not loaded\n", handle->app_name);
  358. rc = -EINVAL;
  359. goto error;
  360. }
  361. if (!(handle->hdcp_state & HDCP_STATE_SESSION_INIT)) {
  362. pr_err("session not initialized\n");
  363. rc = -EINVAL;
  364. goto error;
  365. }
  366. req_buf->sessionid = handle->session_id;
  367. rc = hdcp2_app_process_cmd(session_deinit);
  368. if (rc)
  369. goto error;
  370. handle->hdcp_state &= ~HDCP_STATE_SESSION_INIT;
  371. pr_debug("success\n");
  372. error:
  373. return rc;
  374. }
  375. void *hdcp1_init_qseecom(void)
  376. {
  377. struct hdcp1_qsee_handle *handle =
  378. kzalloc(sizeof(struct hdcp1_qsee_handle), GFP_KERNEL);
  379. if (!handle)
  380. goto error;
  381. handle->app_name = HDCP1_APP_NAME;
  382. error:
  383. return handle;
  384. }
  385. bool hdcp1_feature_supported_qseecom(void *data)
  386. {
  387. bool supported = false;
  388. struct hdcp1_qsee_handle *handle = data;
  389. int rc = 0;
  390. if (!handle) {
  391. pr_err("invalid handle\n");
  392. goto error;
  393. }
  394. if (handle->feature_supported) {
  395. supported = true;
  396. goto error;
  397. }
  398. rc = hdcp1_app_load(handle);
  399. if (!rc && (handle->hdcp_state & HDCP_STATE_APP_LOADED)) {
  400. if (!hdcp1_verify_key(handle)) {
  401. pr_debug("HDCP 1.x supported\n");
  402. handle->feature_supported = true;
  403. supported = true;
  404. }
  405. hdcp1_app_unload(handle);
  406. }
  407. error:
  408. return supported;
  409. }
  410. int hdcp1_set_enc_qseecom(void *data, bool enable)
  411. {
  412. int rc = 0;
  413. struct hdcp1_set_enc_req *set_enc_req;
  414. struct hdcp1_set_enc_rsp *set_enc_rsp;
  415. struct hdcp1_qsee_handle *hdcp1_handle = data;
  416. struct qseecom_handle *handle = NULL;
  417. if (!hdcp1_handle || !hdcp1_handle->qseecom_handle) {
  418. pr_err("invalid HDCP 1.x handle\n");
  419. return -EINVAL;
  420. }
  421. if (!hdcp1_handle->feature_supported) {
  422. pr_err("HDCP 1.x not supported\n");
  423. return -EINVAL;
  424. }
  425. if (!(hdcp1_handle->hdcp_state & HDCP_STATE_APP_LOADED)) {
  426. pr_err("%s app not loaded\n", hdcp1_handle->app_name);
  427. return -EINVAL;
  428. }
  429. handle = hdcp1_handle->qseecom_handle;
  430. /* set keys and request aksv */
  431. set_enc_req = (struct hdcp1_set_enc_req *)handle->sbuf;
  432. set_enc_req->commandid = HDCP1_SET_ENC;
  433. set_enc_req->enable = enable;
  434. set_enc_rsp = (struct hdcp1_set_enc_rsp *)(handle->sbuf +
  435. QSEECOM_ALIGN(sizeof(struct hdcp1_set_enc_req)));
  436. rc = qseecom_send_command(
  437. handle, set_enc_req, QSEECOM_ALIGN(sizeof(struct hdcp1_set_enc_req)),
  438. set_enc_rsp, QSEECOM_ALIGN(sizeof(struct hdcp1_set_enc_rsp)));
  439. if (rc < 0) {
  440. pr_err("qseecom cmd failed err=%d\n", rc);
  441. return -EINVAL;
  442. }
  443. rc = set_enc_rsp->ret;
  444. if (rc) {
  445. pr_err("enc cmd failed, rsp=%d\n", set_enc_rsp->ret);
  446. return -EINVAL;
  447. }
  448. pr_debug("success\n");
  449. return 0;
  450. }
  451. int hdcp1_ops_notify_qseecom(void *data, void *topo, bool is_authenticated)
  452. {
  453. int rc = 0;
  454. struct hdcp1_ops_notify_req *ops_notify_req;
  455. struct hdcp1_ops_notify_rsp *ops_notify_rsp;
  456. struct hdcp1_qsee_handle *hdcp1_handle = data;
  457. struct qseecom_handle *handle = NULL;
  458. struct hdcp1_topology *topology = NULL;
  459. if (!hdcp1_handle || !hdcp1_handle->hdcpops_handle) {
  460. pr_err("invalid HDCP 1.x ops handle\n");
  461. return -EINVAL;
  462. }
  463. if (!hdcp1_handle->feature_supported) {
  464. pr_err("HDCP 1.x not supported\n");
  465. return -EINVAL;
  466. }
  467. if (!(hdcp1_handle->hdcp_state & HDCP_STATE_APP_LOADED)) {
  468. pr_err("%s app not loaded\n", HDCP1OPS_APP_NAME);
  469. return -EINVAL;
  470. }
  471. handle = hdcp1_handle->hdcpops_handle;
  472. topology = (struct hdcp1_topology *)topo;
  473. /* set keys and request aksv */
  474. ops_notify_req = (struct hdcp1_ops_notify_req *)handle->sbuf;
  475. ops_notify_req->commandid = HDCP1_NOTIFY_TOPOLOGY;
  476. ops_notify_req->device_type = DEVICE_TYPE_DP;
  477. ops_notify_req->is_authenticated = is_authenticated;
  478. ops_notify_req->topology.depth = topology->depth;
  479. ops_notify_req->topology.device_count = topology->device_count;
  480. ops_notify_req->topology.max_devices_exceeded =
  481. topology->max_devices_exceeded;
  482. ops_notify_req->topology.max_cascade_exceeded =
  483. topology->max_cascade_exceeded;
  484. /*
  485. * For hdcp1.4 below two nodes are not applicable but as
  486. * TZ ops ta talks with other drivers with same structure
  487. * and want to maintain same interface across hdcp versions,
  488. * we are setting the values to 0.
  489. */
  490. ops_notify_req->topology.hdcp2LegacyDeviceDownstream = 0;
  491. ops_notify_req->topology.hdcp1DeviceDownstream = 0;
  492. memset(ops_notify_req->recv_id_list, 0,
  493. sizeof(uint8_t) * MAX_REC_ID_LIST_SIZE);
  494. ops_notify_rsp =
  495. (struct hdcp1_ops_notify_rsp *)(handle->sbuf +
  496. QSEECOM_ALIGN(sizeof(struct hdcp1_ops_notify_req)));
  497. rc = qseecom_send_command(
  498. handle, ops_notify_req,
  499. QSEECOM_ALIGN(sizeof(struct hdcp1_ops_notify_req)), ops_notify_rsp,
  500. QSEECOM_ALIGN(sizeof(struct hdcp1_ops_notify_rsp)));
  501. rc = ops_notify_rsp->ret;
  502. if (rc < 0) {
  503. pr_warn("Ops notify cmd failed, rsp=%d\n", ops_notify_rsp->ret);
  504. return -EINVAL;
  505. }
  506. pr_debug("ops notify success\n");
  507. return 0;
  508. }
  509. int hdcp1_start_qseecom(void *data, u32 *aksv_msb, u32 *aksv_lsb)
  510. {
  511. int rc = 0;
  512. struct hdcp1_qsee_handle *handle = data;
  513. if (!aksv_msb || !aksv_lsb) {
  514. pr_err("invalid aksv output buffer\n");
  515. rc = -EINVAL;
  516. goto error;
  517. }
  518. if (!handle) {
  519. pr_err("invalid handle\n");
  520. rc = -EINVAL;
  521. goto error;
  522. }
  523. if (!handle->feature_supported) {
  524. pr_err("feature not supported\n");
  525. rc = -EINVAL;
  526. goto error;
  527. }
  528. if (handle->hdcp_state & HDCP_STATE_APP_LOADED) {
  529. pr_debug("%s app already loaded\n", handle->app_name);
  530. goto error;
  531. }
  532. rc = hdcp1_app_load(handle);
  533. if (rc)
  534. goto error;
  535. rc = hdcp1_set_key(handle, aksv_msb, aksv_lsb);
  536. if (rc)
  537. goto key_error;
  538. pr_debug("success\n");
  539. return rc;
  540. key_error:
  541. hdcp1_app_unload(handle);
  542. error:
  543. return rc;
  544. }
  545. void hdcp1_stop_qseecom(void *data)
  546. {
  547. struct hdcp1_qsee_handle *hdcp1_handle = data;
  548. if (!hdcp1_handle || !hdcp1_handle->qseecom_handle ||
  549. !hdcp1_handle->hdcpops_handle) {
  550. pr_err("invalid handle\n");
  551. return;
  552. }
  553. if (!(hdcp1_handle->hdcp_state & HDCP_STATE_APP_LOADED)) {
  554. pr_debug("%s app not loaded\n", hdcp1_handle->app_name);
  555. return;
  556. }
  557. hdcp1_app_unload(hdcp1_handle);
  558. }
  559. static int hdcp2_app_init_legacy(struct hdcp2_qsee_handle *handle)
  560. {
  561. int rc = 0;
  562. hdcp2_app_init_var(init_v1);
  563. if (!handle->legacy_app) {
  564. pr_err("wrong init function\n");
  565. rc = -EINVAL;
  566. goto error;
  567. }
  568. if (handle->hdcp_state & HDCP_STATE_APP_LOADED) {
  569. pr_err("library already loaded\n");
  570. goto error;
  571. }
  572. rc = hdcp2_app_process_cmd(init_v1);
  573. if (rc)
  574. goto error;
  575. pr_debug("success\n");
  576. error:
  577. return rc;
  578. }
  579. static int hdcp2_app_tx_init_legacy(struct hdcp2_qsee_handle *handle)
  580. {
  581. int rc = 0;
  582. hdcp2_app_init_var(tx_init_v1);
  583. if (!(handle->hdcp_state & HDCP_STATE_APP_LOADED)) {
  584. pr_err("app not loaded\n");
  585. rc = -EINVAL;
  586. goto error;
  587. }
  588. if (handle->hdcp_state & HDCP_STATE_TXMTR_INIT) {
  589. pr_err("txmtr already initialized\n");
  590. goto error;
  591. }
  592. rc = hdcp2_app_process_cmd(tx_init_v1);
  593. if (rc)
  594. goto error;
  595. handle->app_data.response.data = rsp_buf->message;
  596. handle->app_data.response.length = rsp_buf->msglen;
  597. handle->app_data.timeout = rsp_buf->timeout;
  598. handle->tz_ctxhandle = rsp_buf->ctxhandle;
  599. handle->hdcp_state |= HDCP_STATE_TXMTR_INIT;
  600. pr_debug("success\n");
  601. error:
  602. return rc;
  603. }
  604. static int hdcp2_app_init(struct hdcp2_qsee_handle *handle)
  605. {
  606. int rc = 0;
  607. uint32_t app_minor_version = 0;
  608. hdcp2_app_init_var(init);
  609. if (handle->legacy_app) {
  610. pr_err("wrong init function\n");
  611. rc = -EINVAL;
  612. goto error;
  613. }
  614. if (handle->hdcp_state & HDCP_STATE_APP_LOADED) {
  615. pr_err("library already loaded\n");
  616. goto error;
  617. }
  618. req_buf->clientversion = HDCP_CLIENT_MAKE_VERSION(
  619. HDCP_CLIENT_MAJOR_VERSION, HDCP_CLIENT_MINOR_VERSION,
  620. HDCP_CLIENT_PATCH_VERSION);
  621. rc = hdcp2_app_process_cmd(init);
  622. if (rc)
  623. goto error;
  624. app_minor_version = HCDP_TXMTR_GET_MINOR_VERSION(rsp_buf->appversion);
  625. if (app_minor_version != HDCP_CLIENT_MINOR_VERSION) {
  626. pr_err("client-app minor version mismatch app(%d), client(%d)\n",
  627. app_minor_version, HDCP_CLIENT_MINOR_VERSION);
  628. rc = -1;
  629. goto error;
  630. }
  631. pr_debug("success\n");
  632. pr_debug("client version major(%d), minor(%d), patch(%d)\n",
  633. HDCP_CLIENT_MAJOR_VERSION, HDCP_CLIENT_MINOR_VERSION,
  634. HDCP_CLIENT_PATCH_VERSION);
  635. pr_debug("app version major(%d), minor(%d), patch(%d)\n",
  636. HCDP_TXMTR_GET_MAJOR_VERSION(rsp_buf->appversion),
  637. HCDP_TXMTR_GET_MINOR_VERSION(rsp_buf->appversion),
  638. HCDP_TXMTR_GET_PATCH_VERSION(rsp_buf->appversion));
  639. error:
  640. return rc;
  641. }
  642. static int hdcp2_app_tx_init(struct hdcp2_qsee_handle *handle)
  643. {
  644. int rc = 0;
  645. hdcp2_app_init_var(tx_init);
  646. if (!(handle->hdcp_state & HDCP_STATE_SESSION_INIT)) {
  647. pr_err("session not initialized\n");
  648. rc = -EINVAL;
  649. goto error;
  650. }
  651. if (handle->hdcp_state & HDCP_STATE_TXMTR_INIT) {
  652. pr_err("txmtr already initialized\n");
  653. goto error;
  654. }
  655. req_buf->sessionid = handle->session_id;
  656. rc = hdcp2_app_process_cmd(tx_init);
  657. if (rc)
  658. goto error;
  659. handle->tz_ctxhandle = rsp_buf->ctxhandle;
  660. handle->hdcp_state |= HDCP_STATE_TXMTR_INIT;
  661. pr_debug("success\n");
  662. error:
  663. return rc;
  664. }
  665. static int hdcp_get_version(struct hdcp2_qsee_handle *handle)
  666. {
  667. int rc = 0;
  668. uint32_t app_major_version = 0;
  669. hdcp2_app_init_var(version);
  670. if (handle->hdcp_state & HDCP_STATE_APP_LOADED) {
  671. pr_err("library already loaded\n");
  672. goto error;
  673. }
  674. rc = hdcp2_app_process_cmd(version);
  675. if (rc)
  676. goto error;
  677. app_major_version = HCDP_TXMTR_GET_MAJOR_VERSION(rsp_buf->appversion);
  678. pr_debug("hdp2p2 app major version %d, app version %d\n", app_major_version,
  679. rsp_buf->appversion);
  680. if (app_major_version == 1)
  681. handle->legacy_app = true;
  682. error:
  683. return rc;
  684. }
  685. static int hdcp2_app_load(struct hdcp2_qsee_handle *handle)
  686. {
  687. int rc = 0;
  688. if (!handle) {
  689. pr_err("invalid input\n");
  690. rc = -EINVAL;
  691. goto error;
  692. }
  693. if (handle->hdcp_state & HDCP_STATE_APP_LOADED) {
  694. pr_err("%s app already loaded\n", handle->app_name);
  695. goto error;
  696. }
  697. if (!qseecom_handle_g) {
  698. rc = qseecom_start_app(&qseecom_handle_g,
  699. handle->app_name, QSEECOM_SBUFF_SIZE);
  700. if (rc) {
  701. pr_err("qseecom_start_app failed for HDCP2P2 (%d)\n", rc);
  702. goto error;
  703. }
  704. }
  705. handle->qseecom_handle = qseecom_handle_g;
  706. if (!hdcpsrm_qseecom_handle_g) {
  707. rc = qseecom_start_app(&hdcpsrm_qseecom_handle_g,
  708. HDCPSRM_APP_NAME, QSEECOM_SBUFF_SIZE);
  709. if (rc) {
  710. pr_err("qseecom_start_app failed for HDCPSRM (%d)\n", rc);
  711. goto hdcpsrm_error;
  712. }
  713. }
  714. handle->hdcpsrm_qseecom_handle = hdcpsrm_qseecom_handle_g;
  715. pr_debug("qseecom_start_app success\n");
  716. rc = hdcp_get_version(handle);
  717. if (rc) {
  718. pr_err("library get version failed\n");
  719. goto get_version_error;
  720. }
  721. if (handle->legacy_app) {
  722. handle->app_init = hdcp2_app_init_legacy;
  723. handle->tx_init = hdcp2_app_tx_init_legacy;
  724. } else {
  725. handle->app_init = hdcp2_app_init;
  726. handle->tx_init = hdcp2_app_tx_init;
  727. }
  728. if (!hdcp2_app_started) {
  729. rc = handle->app_init(handle);
  730. if (rc) {
  731. pr_err("app init failed\n");
  732. goto get_version_error;
  733. }
  734. }
  735. hdcp2_app_started++;
  736. handle->hdcp_state |= HDCP_STATE_APP_LOADED;
  737. return rc;
  738. get_version_error:
  739. if (!hdcp2_app_started) {
  740. qseecom_shutdown_app(&hdcpsrm_qseecom_handle_g);
  741. hdcpsrm_qseecom_handle_g = NULL;
  742. }
  743. handle->hdcpsrm_qseecom_handle = NULL;
  744. hdcpsrm_error:
  745. if (!hdcp2_app_started) {
  746. qseecom_shutdown_app(&qseecom_handle_g);
  747. qseecom_handle_g = NULL;
  748. }
  749. handle->qseecom_handle = NULL;
  750. error:
  751. return rc;
  752. }
  753. static int hdcp2_app_session_init(struct hdcp2_qsee_handle *handle)
  754. {
  755. int rc = 0;
  756. hdcp2_app_init_var(session_init);
  757. if (!handle->qseecom_handle || !handle->qseecom_handle->sbuf) {
  758. pr_err("invalid handle\n");
  759. rc = -EINVAL;
  760. goto error;
  761. }
  762. if (!(handle->hdcp_state & HDCP_STATE_APP_LOADED)) {
  763. pr_err("%s app not loaded\n", handle->app_name);
  764. rc = -EINVAL;
  765. goto error;
  766. }
  767. if (handle->hdcp_state & HDCP_STATE_SESSION_INIT) {
  768. pr_err("session already initialized\n");
  769. goto error;
  770. }
  771. req_buf->deviceid = handle->device_type;
  772. rc = hdcp2_app_process_cmd(session_init);
  773. if (rc)
  774. goto error;
  775. pr_debug("session id %d\n", rsp_buf->sessionid);
  776. handle->session_id = rsp_buf->sessionid;
  777. handle->hdcp_state |= HDCP_STATE_SESSION_INIT;
  778. pr_debug("success\n");
  779. error:
  780. return rc;
  781. }
  782. void *hdcp2_init_qseecom(u32 device_type)
  783. {
  784. struct hdcp2_qsee_handle *handle =
  785. kzalloc(sizeof(struct hdcp2_qsee_handle), GFP_KERNEL);
  786. if (!handle)
  787. goto error;
  788. handle->device_type = device_type;
  789. handle->app_name = HDCP2P2_APP_NAME;
  790. handle->res_buf = kmalloc(QSEECOM_SBUFF_SIZE, GFP_KERNEL);
  791. if (!handle->res_buf) {
  792. kfree_sensitive(handle);
  793. return NULL;
  794. }
  795. handle->req_buf = kmalloc(QSEECOM_SBUFF_SIZE, GFP_KERNEL);
  796. if (!handle->req_buf) {
  797. kfree_sensitive(handle->res_buf);
  798. kfree_sensitive(handle);
  799. return NULL;
  800. }
  801. handle->app_data.request.data = handle->req_buf;
  802. handle->app_data.response.data = handle->res_buf;
  803. error:
  804. return handle;
  805. }
  806. void hdcp2_deinit_qseecom(void *ctx)
  807. {
  808. struct hdcp2_qsee_handle *handle = NULL;
  809. int rc = 0;
  810. handle = ctx;
  811. if (!handle) {
  812. pr_err("invalid handle\n");
  813. rc = -EINVAL;
  814. goto error;
  815. }
  816. kfree_sensitive(handle->res_buf);
  817. kfree_sensitive(handle->req_buf);
  818. error:
  819. kfree_sensitive(ctx);
  820. }
  821. int hdcp2_app_start_qseecom(void *ctx, uint32_t req_len)
  822. {
  823. struct hdcp2_qsee_handle *handle = NULL;
  824. int rc = 0;
  825. handle = ctx;
  826. if (!handle) {
  827. pr_err("invalid handle\n");
  828. rc = -EINVAL;
  829. goto error;
  830. }
  831. handle->app_data.request.length = req_len;
  832. rc = hdcp2_app_load(handle);
  833. if (rc)
  834. goto error;
  835. if (!handle->legacy_app) {
  836. rc = hdcp2_app_session_init(handle);
  837. if (rc)
  838. goto error;
  839. }
  840. if (handle->tx_init == NULL) {
  841. pr_err("invalid txmtr init function pointer\n");
  842. rc = -EINVAL;
  843. goto error;
  844. }
  845. rc = handle->tx_init(handle);
  846. error:
  847. return rc;
  848. }
  849. int hdcp2_app_start_auth_qseecom(void *ctx, uint32_t req_len)
  850. {
  851. int rc = 0;
  852. struct hdcp2_qsee_handle *handle = (struct hdcp2_qsee_handle *)ctx;
  853. hdcp2_app_init_var(start_auth);
  854. if (!handle) {
  855. pr_err("invalid handle\n");
  856. rc = -EINVAL;
  857. goto error;
  858. }
  859. handle->app_data.request.length = req_len;
  860. if (!(handle->hdcp_state & HDCP_STATE_SESSION_INIT)) {
  861. pr_err("session not initialized\n");
  862. rc = -EINVAL;
  863. goto error;
  864. }
  865. if (!(handle->hdcp_state & HDCP_STATE_TXMTR_INIT)) {
  866. pr_err("txmtr not initialized\n");
  867. rc = -EINVAL;
  868. goto error;
  869. }
  870. req_buf->ctxHandle = handle->tz_ctxhandle;
  871. rc = hdcp2_app_process_cmd(start_auth);
  872. if (rc)
  873. goto error;
  874. memcpy(handle->res_buf, rsp_buf->message, rsp_buf->msglen);
  875. handle->app_data.response.length = rsp_buf->msglen;
  876. handle->app_data.timeout = rsp_buf->timeout;
  877. handle->app_data.repeater_flag = false;
  878. handle->tz_ctxhandle = rsp_buf->ctxhandle;
  879. pr_debug("success\n");
  880. error:
  881. return rc;
  882. }
  883. int hdcp2_app_process_msg_qseecom(void *ctx, uint32_t req_len)
  884. {
  885. int rc = 0;
  886. struct hdcp2_qsee_handle *handle = (struct hdcp2_qsee_handle *)ctx;
  887. hdcp2_app_init_var(rcvd_msg);
  888. if (!handle) {
  889. pr_err("invalid handle\n");
  890. rc = -EINVAL;
  891. goto error;
  892. }
  893. handle->app_data.request.length = req_len;
  894. if (!handle->app_data.request.data) {
  895. pr_err("invalid request buffer\n");
  896. rc = -EINVAL;
  897. goto error;
  898. }
  899. req_buf->msglen = handle->app_data.request.length;
  900. req_buf->ctxhandle = handle->tz_ctxhandle;
  901. memcpy(req_buf->msg, handle->req_buf, handle->app_data.request.length);
  902. rc = hdcp2_app_process_cmd(rcvd_msg);
  903. if (rc)
  904. goto error;
  905. /* check if it's a repeater */
  906. if (rsp_buf->flag == HDCP_TXMTR_SUBSTATE_WAITING_FOR_RECIEVERID_LIST)
  907. handle->app_data.repeater_flag = true;
  908. memcpy(handle->res_buf, rsp_buf->msg, rsp_buf->msglen);
  909. handle->app_data.response.length = rsp_buf->msglen;
  910. handle->app_data.timeout = rsp_buf->timeout;
  911. error:
  912. return rc;
  913. }
  914. int hdcp2_app_timeout_qseecom(void *ctx, uint32_t req_len)
  915. {
  916. int rc = 0;
  917. struct hdcp2_qsee_handle *handle = (struct hdcp2_qsee_handle *)ctx;
  918. hdcp2_app_init_var(send_timeout);
  919. if (!handle) {
  920. pr_err("invalid handle\n");
  921. rc = -EINVAL;
  922. goto error;
  923. }
  924. handle->app_data.request.length = req_len;
  925. rc = hdcp2_app_process_cmd(send_timeout);
  926. if (rc)
  927. goto error;
  928. memcpy(handle->res_buf, rsp_buf->message, rsp_buf->msglen);
  929. handle->app_data.response.length = rsp_buf->msglen;
  930. handle->app_data.timeout = rsp_buf->timeout;
  931. error:
  932. return rc;
  933. }
  934. int hdcp2_app_enable_encryption_qseecom(void *ctx, uint32_t req_len)
  935. {
  936. int rc = 0;
  937. struct hdcp2_qsee_handle *handle = (struct hdcp2_qsee_handle *)ctx;
  938. hdcp2_app_init_var(set_hw_key);
  939. if (!handle) {
  940. pr_err("Invalid handle\n");
  941. rc = -EINVAL;
  942. goto error;
  943. }
  944. handle->app_data.request.length = req_len;
  945. /*
  946. * wait at least 200ms before enabling encryption
  947. * as per hdcp2p2 specifications.
  948. */
  949. msleep(SLEEP_SET_HW_KEY_MS);
  950. req_buf->ctxhandle = handle->tz_ctxhandle;
  951. rc = hdcp2_app_process_cmd(set_hw_key);
  952. if (rc)
  953. goto error;
  954. handle->hdcp_state |= HDCP_STATE_AUTHENTICATED;
  955. error:
  956. return rc;
  957. }
  958. int hdcp2_app_query_stream_qseecom(void *ctx, uint32_t req_len)
  959. {
  960. int rc = 0;
  961. struct hdcp2_qsee_handle *handle = (struct hdcp2_qsee_handle *)ctx;
  962. hdcp2_app_init_var(query_stream_type);
  963. if (!handle) {
  964. pr_err("Invalid handle\n");
  965. rc = -EINVAL;
  966. goto error;
  967. }
  968. handle->app_data.request.length = req_len;
  969. req_buf->ctxhandle = handle->tz_ctxhandle;
  970. rc = hdcp2_app_process_cmd(query_stream_type);
  971. if (rc)
  972. goto error;
  973. memcpy(handle->res_buf, rsp_buf->msg, rsp_buf->msglen);
  974. handle->app_data.response.length = rsp_buf->msglen;
  975. handle->app_data.timeout = rsp_buf->timeout;
  976. error:
  977. return rc;
  978. }
  979. int hdcp2_app_stop_qseecom(void *ctx)
  980. {
  981. int rc = 0;
  982. struct hdcp2_qsee_handle *handle = (struct hdcp2_qsee_handle *)ctx;
  983. if (!handle) {
  984. pr_err("Invalid handle\n");
  985. rc = -EINVAL;
  986. goto error;
  987. }
  988. rc = hdcp2_app_tx_deinit(handle);
  989. if (rc)
  990. goto error;
  991. if (!handle->legacy_app) {
  992. rc = hdcp2_app_session_deinit(handle);
  993. if (rc)
  994. goto error;
  995. }
  996. rc = hdcp2_app_unload(handle);
  997. error:
  998. return rc;
  999. }
  1000. bool hdcp2_feature_supported_qseecom(void *ctx)
  1001. {
  1002. int rc = 0;
  1003. bool supported = false;
  1004. struct hdcp2_qsee_handle *handle = (struct hdcp2_qsee_handle *)ctx;
  1005. if (!handle) {
  1006. pr_err("invalid input\n");
  1007. rc = -EINVAL;
  1008. goto error;
  1009. }
  1010. if (handle->feature_supported) {
  1011. supported = true;
  1012. goto error;
  1013. }
  1014. rc = hdcp2_app_load(handle);
  1015. if (!rc) {
  1016. if (!hdcp2_verify_key(handle)) {
  1017. pr_debug("HDCP 2.2 supported\n");
  1018. handle->feature_supported = true;
  1019. supported = true;
  1020. }
  1021. hdcp2_app_unload(handle);
  1022. }
  1023. error:
  1024. return supported;
  1025. }
  1026. int hdcp2_force_encryption_qseecom(void *ctx, uint32_t enable)
  1027. {
  1028. int rc = 0;
  1029. struct hdcp2_qsee_handle *handle = (struct hdcp2_qsee_handle *)ctx;
  1030. hdcp2_app_init_var(force_encryption);
  1031. if (!handle) {
  1032. pr_err("invalid input\n");
  1033. rc = -EINVAL;
  1034. goto error;
  1035. }
  1036. if (handle->hdcp_state == HDCP_STATE_AUTHENTICATED)
  1037. msleep(SLEEP_FORCE_ENCRYPTION_MS);
  1038. req_buf->ctxhandle = handle->tz_ctxhandle;
  1039. req_buf->enable = enable;
  1040. rc = hdcp2_app_process_cmd(force_encryption);
  1041. if (rc || (rsp_buf->commandid != hdcp_cmd_force_encryption))
  1042. goto error;
  1043. error:
  1044. return rc;
  1045. }
  1046. int hdcp2_open_stream_qseecom(void *ctx, uint8_t vc_payload_id,
  1047. uint8_t stream_number, uint32_t *stream_id)
  1048. {
  1049. struct hdcp2_qsee_handle *handle = (struct hdcp2_qsee_handle *)ctx;
  1050. int rc = 0;
  1051. hdcp2_app_init_var(session_open_stream);
  1052. if (!handle) {
  1053. pr_err("invalid input\n");
  1054. rc = -EINVAL;
  1055. goto error;
  1056. }
  1057. if (!(handle->hdcp_state & HDCP_STATE_SESSION_INIT)) {
  1058. pr_err("session not initialized\n");
  1059. rc = -EINVAL;
  1060. goto error;
  1061. }
  1062. if (!(handle->hdcp_state & HDCP_STATE_TXMTR_INIT)) {
  1063. pr_err("txmtr not initialized\n");
  1064. rc = -EINVAL;
  1065. goto error;
  1066. }
  1067. req_buf->sessionid = handle->session_id;
  1068. req_buf->vcpayloadid = vc_payload_id;
  1069. req_buf->stream_number = stream_number;
  1070. req_buf->streamMediaType = 0;
  1071. rc = hdcp2_app_process_cmd(session_open_stream);
  1072. if (rc)
  1073. goto error;
  1074. *stream_id = rsp_buf->streamid;
  1075. pr_debug("success\n");
  1076. error:
  1077. return rc;
  1078. }
  1079. int hdcp2_close_stream_qseecom(void *ctx, uint32_t stream_id)
  1080. {
  1081. struct hdcp2_qsee_handle *handle = (struct hdcp2_qsee_handle *)ctx;
  1082. int rc = 0;
  1083. hdcp2_app_init_var(session_close_stream);
  1084. if (!handle) {
  1085. pr_err("invalid input\n");
  1086. rc = -EINVAL;
  1087. goto error;
  1088. }
  1089. if (!(handle->hdcp_state & HDCP_STATE_SESSION_INIT)) {
  1090. pr_err("session not initialized\n");
  1091. rc = -EINVAL;
  1092. goto error;
  1093. }
  1094. if (!(handle->hdcp_state & HDCP_STATE_TXMTR_INIT)) {
  1095. pr_err("txmtr not initialized\n");
  1096. rc = -EINVAL;
  1097. goto error;
  1098. }
  1099. req_buf->sessionid = handle->session_id;
  1100. req_buf->streamid = stream_id;
  1101. rc = hdcp2_app_process_cmd(session_close_stream);
  1102. if (rc)
  1103. goto error;
  1104. pr_debug("success\n");
  1105. error:
  1106. return rc;
  1107. }
  1108. int hdcp2_update_app_data_qseecom(void *ctx, struct hdcp2_app_data *app_data)
  1109. {
  1110. int rc = 0;
  1111. struct hdcp2_qsee_handle *handle = (struct hdcp2_qsee_handle *)ctx;
  1112. if (!handle) {
  1113. pr_err("invalid input\n");
  1114. rc = -EINVAL;
  1115. goto error;
  1116. }
  1117. app_data->request.data = handle->app_data.request.data;
  1118. app_data->request.length = handle->app_data.request.length;
  1119. app_data->response.data = handle->app_data.response.data;
  1120. app_data->response.length = handle->app_data.response.length;
  1121. app_data->timeout = handle->app_data.timeout;
  1122. app_data->repeater_flag = handle->app_data.repeater_flag;
  1123. error:
  1124. return rc;
  1125. }