summaryrefslogtreecommitdiff
path: root/auth22.c
diff options
context:
space:
mode:
Diffstat (limited to 'auth22.c')
-rw-r--r--auth22.c194
1 files changed, 194 insertions, 0 deletions
diff --git a/auth22.c b/auth22.c
new file mode 100644
index 0000000..0b54ed9
--- /dev/null
+++ b/auth22.c
@@ -0,0 +1,194 @@
+// SPDX-License-Identifier: GPL-2.0-only
+/*
+ * Copyright (c) 2022 Samsung Electronics Co., Ltd.
+ *
+ * Samsung DisplayPort driver.
+ *
+ * This program is free software; you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License version 2 as
+ * published by the Free Software Foundation.
+ */
+#include <linux/module.h>
+#include <linux/slab.h>
+#include <linux/uaccess.h>
+#include <linux/smc.h>
+#include <asm/cacheflush.h>
+#include <linux/soc/samsung/exynos-smc.h>
+#include <linux/types.h>
+#include <linux/delay.h>
+#include <drm/drm_dp_helper.h>
+
+#include "exynos-hdcp-interface.h"
+
+#include "auth-control.h"
+#include "auth22.h"
+#include "auth22-internal.h"
+#include "dpcd.h"
+#include "hdcp-log.h"
+#include "teeif.h"
+
+#define RECVID_WAIT_RETRY_COUNT (5)
+#define DP_RXCAPS_HDCP_CAPABLE (0x1 << 1)
+#define DP_RXCAPS_REPEATER (0x1 << 0)
+#define DP_RXCAPS_HDCP_VERSION_2 (0x2)
+
+static struct hdcp_link_data lkd;
+
+static int auth22_determine_rx_hdcp_cap(struct hdcp_link_data *lk)
+{
+ int ret;
+ uint8_t rxcaps[HDCP_CAPS_BYTE_LEN];
+
+ ret = hdcp_dplink_recv(DP_HDCP_2_2_REG_RX_CAPS_OFFSET, rxcaps,
+ sizeof(rxcaps));
+ if (ret) {
+ hdcp_err("check rx caps recv fail: ret(%d)\n", ret);
+ return -EIO;
+ }
+
+ if (!(rxcaps[2] & DP_RXCAPS_HDCP_CAPABLE)) {
+ hdcp_err("RX is not HDCP capable. rxcaps(0x%02x%02x%02x)\n",
+ rxcaps[0], rxcaps[1], rxcaps[2]);
+ return -EIO;
+ }
+
+ if (rxcaps[0] != DP_RXCAPS_HDCP_VERSION_2) {
+ hdcp_err("RX does not support V2. rxcaps(0x%02x%02x%02x)\n",
+ rxcaps[0], rxcaps[1], rxcaps[2]);
+ return -EIO;
+ }
+
+ lk->is_repeater = rxcaps[2] & DP_RXCAPS_REPEATER;
+ return 0;
+}
+
+int hdcp22_dplink_authenticate(void)
+{
+ struct hdcp_link_data *lk_data = &lkd;
+ bool rp_ready = lk_data->rp_ready;
+
+ memset(&lkd, 0, sizeof(lkd));
+ if (rp_ready)
+ UPDATE_LINK_STATE(lk_data, LINK_ST_A7_VERIFY_RECEIVER_ID_LIST);
+ else
+ UPDATE_LINK_STATE(lk_data, LINK_ST_A0_DETERMINE_RX_HDCP_CAP);
+
+ do {
+ switch (lk_data->state) {
+ case LINK_ST_H1_TX_LOW_VALUE_CONTENT:
+ return -EIO;
+ case LINK_ST_A0_DETERMINE_RX_HDCP_CAP:
+ if (auth22_determine_rx_hdcp_cap(lk_data) == 0) {
+ UPDATE_LINK_STATE(lk_data, LINK_ST_A1_EXCHANGE_MASTER_KEY);
+ } else {
+ UPDATE_LINK_STATE(lk_data, LINK_ST_H1_TX_LOW_VALUE_CONTENT);
+ }
+ break;
+ case LINK_ST_A1_EXCHANGE_MASTER_KEY:
+ if (auth22_exchange_master_key(lk_data) == 0) {
+ UPDATE_LINK_STATE(lk_data, LINK_ST_A2_LOCALITY_CHECK);
+ } else {
+ UPDATE_LINK_STATE(lk_data, LINK_ST_H1_TX_LOW_VALUE_CONTENT);
+ return -EAGAIN;
+ }
+ break;
+ case LINK_ST_A2_LOCALITY_CHECK:
+ if (auth22_locality_check(lk_data) == 0) {
+ UPDATE_LINK_STATE(lk_data, LINK_ST_A3_EXCHANGE_SESSION_KEY);
+ } else {
+ UPDATE_LINK_STATE(lk_data, LINK_ST_H1_TX_LOW_VALUE_CONTENT);
+ return -EAGAIN;
+ }
+ break;
+ case LINK_ST_A3_EXCHANGE_SESSION_KEY:
+ if (auth22_exchange_session_key(lk_data) == 0) {
+ UPDATE_LINK_STATE(lk_data, LINK_ST_A4_TEST_REPEATER);
+ } else {
+ UPDATE_LINK_STATE(lk_data, LINK_ST_H1_TX_LOW_VALUE_CONTENT);
+ }
+ break;
+ case LINK_ST_A4_TEST_REPEATER:
+ if (lk_data->is_repeater) {
+ /* if it is a repeater, verify Rcv ID list */
+ UPDATE_LINK_STATE(lk_data, LINK_ST_A6_WAIT_RECEIVER_ID_LIST);
+ hdcp_info("It`s repeater link !\n");
+ } else {
+ /* if it is not a repeater, complete authentication */
+ UPDATE_LINK_STATE(lk_data, LINK_ST_A5_AUTHENTICATED);
+ hdcp_info("It`s Rx link !\n");
+ }
+ break;
+ case LINK_ST_A5_AUTHENTICATED:
+ return 0;
+ case LINK_ST_A6_WAIT_RECEIVER_ID_LIST:
+ if (auth22_wait_for_receiver_id_list(lk_data) == 0) {
+ UPDATE_LINK_STATE(lk_data, LINK_ST_A7_VERIFY_RECEIVER_ID_LIST);
+ } else {
+ UPDATE_LINK_STATE(lk_data, LINK_ST_H1_TX_LOW_VALUE_CONTENT);
+ }
+ break;
+ case LINK_ST_A7_VERIFY_RECEIVER_ID_LIST:
+ if (auth22_verify_receiver_id_list(lk_data) == 0) {
+ UPDATE_LINK_STATE(lk_data, LINK_ST_A9_CONTENT_STREAM_MGT);
+ } else {
+ UPDATE_LINK_STATE(lk_data, LINK_ST_H1_TX_LOW_VALUE_CONTENT);
+ }
+ break;
+ case LINK_ST_A9_CONTENT_STREAM_MGT:
+ if (auth22_stream_manage(lk_data) == 0) {
+ UPDATE_LINK_STATE(lk_data, LINK_ST_A5_AUTHENTICATED);
+ } else {
+ UPDATE_LINK_STATE(lk_data, LINK_ST_H1_TX_LOW_VALUE_CONTENT);
+ }
+ break;
+ default:
+ UPDATE_LINK_STATE(lk_data, LINK_ST_H1_TX_LOW_VALUE_CONTENT);
+ break;
+ }
+ } while (1);
+}
+
+int hdcp22_dplink_abort(void) {
+ lkd.is_aborted = 1;
+ return 0;
+}
+
+int hdcp22_dplink_handle_irq(void) {
+ uint8_t rxstatus = 0;
+
+ /* check as polling mode */
+ int ret = hdcp_dplink_recv(DP_HDCP_2_2_REG_RXSTATUS_OFFSET, &rxstatus,
+ sizeof(uint8_t));
+ if (ret) {
+ hdcp_err("RXStatus read fail (%d)\n", ret);
+ return -EIO;
+ }
+ hdcp_info("RxStatus: %x\n", rxstatus);
+
+ if (HDCP_2_2_DP_RXSTATUS_LINK_FAILED(rxstatus)) {
+ hdcp_info("integrity check fail.\n");
+ hdcp_tee_disable_enc();
+ return 0;
+ } else if (HDCP_2_2_DP_RXSTATUS_REAUTH_REQ(rxstatus)) {
+ hdcp_info("reauth requested.\n");
+ hdcp_tee_disable_enc();
+ return -EAGAIN;
+ } else if (HDCP_2_2_DP_RXSTATUS_PAIRING(rxstatus)) {
+ hdcp_info("pairing avaible\n");
+ lkd.pairing_ready = 1;
+ return 0;
+ } else if (HDCP_2_2_DP_RXSTATUS_H_PRIME(rxstatus)) {
+ hdcp_info("h-prime avaible\n");
+ lkd.hprime_ready = 1;
+ return 0;
+ } else if (HDCP_2_2_DP_RXSTATUS_READY(rxstatus)) {
+ hdcp_info("ready avaible\n");
+ lkd.rp_ready = 1;
+ if (hdcp_get_auth_state() == HDCP2_AUTH_DONE)
+ return -EAGAIN;
+ return 0;
+ }
+
+ hdcp_err("undefined RxStatus(0x%x). ignore\n", rxstatus);
+ return -EINVAL;
+}