blob: 0b54ed965b673ce456bdb6529bae90fc71cdd145 [file] [log] [blame]
// SPDX-License-Identifier: GPL-2.0-only
/*
* Copyright (c) 2022 Samsung Electronics Co., Ltd.
*
* Samsung DisplayPort driver.
*
* This program is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License version 2 as
* published by the Free Software Foundation.
*/
#include <linux/module.h>
#include <linux/slab.h>
#include <linux/uaccess.h>
#include <linux/smc.h>
#include <asm/cacheflush.h>
#include <linux/soc/samsung/exynos-smc.h>
#include <linux/types.h>
#include <linux/delay.h>
#include <drm/drm_dp_helper.h>
#include "exynos-hdcp-interface.h"
#include "auth-control.h"
#include "auth22.h"
#include "auth22-internal.h"
#include "dpcd.h"
#include "hdcp-log.h"
#include "teeif.h"
#define RECVID_WAIT_RETRY_COUNT (5)
#define DP_RXCAPS_HDCP_CAPABLE (0x1 << 1)
#define DP_RXCAPS_REPEATER (0x1 << 0)
#define DP_RXCAPS_HDCP_VERSION_2 (0x2)
static struct hdcp_link_data lkd;
static int auth22_determine_rx_hdcp_cap(struct hdcp_link_data *lk)
{
int ret;
uint8_t rxcaps[HDCP_CAPS_BYTE_LEN];
ret = hdcp_dplink_recv(DP_HDCP_2_2_REG_RX_CAPS_OFFSET, rxcaps,
sizeof(rxcaps));
if (ret) {
hdcp_err("check rx caps recv fail: ret(%d)\n", ret);
return -EIO;
}
if (!(rxcaps[2] & DP_RXCAPS_HDCP_CAPABLE)) {
hdcp_err("RX is not HDCP capable. rxcaps(0x%02x%02x%02x)\n",
rxcaps[0], rxcaps[1], rxcaps[2]);
return -EIO;
}
if (rxcaps[0] != DP_RXCAPS_HDCP_VERSION_2) {
hdcp_err("RX does not support V2. rxcaps(0x%02x%02x%02x)\n",
rxcaps[0], rxcaps[1], rxcaps[2]);
return -EIO;
}
lk->is_repeater = rxcaps[2] & DP_RXCAPS_REPEATER;
return 0;
}
int hdcp22_dplink_authenticate(void)
{
struct hdcp_link_data *lk_data = &lkd;
bool rp_ready = lk_data->rp_ready;
memset(&lkd, 0, sizeof(lkd));
if (rp_ready)
UPDATE_LINK_STATE(lk_data, LINK_ST_A7_VERIFY_RECEIVER_ID_LIST);
else
UPDATE_LINK_STATE(lk_data, LINK_ST_A0_DETERMINE_RX_HDCP_CAP);
do {
switch (lk_data->state) {
case LINK_ST_H1_TX_LOW_VALUE_CONTENT:
return -EIO;
case LINK_ST_A0_DETERMINE_RX_HDCP_CAP:
if (auth22_determine_rx_hdcp_cap(lk_data) == 0) {
UPDATE_LINK_STATE(lk_data, LINK_ST_A1_EXCHANGE_MASTER_KEY);
} else {
UPDATE_LINK_STATE(lk_data, LINK_ST_H1_TX_LOW_VALUE_CONTENT);
}
break;
case LINK_ST_A1_EXCHANGE_MASTER_KEY:
if (auth22_exchange_master_key(lk_data) == 0) {
UPDATE_LINK_STATE(lk_data, LINK_ST_A2_LOCALITY_CHECK);
} else {
UPDATE_LINK_STATE(lk_data, LINK_ST_H1_TX_LOW_VALUE_CONTENT);
return -EAGAIN;
}
break;
case LINK_ST_A2_LOCALITY_CHECK:
if (auth22_locality_check(lk_data) == 0) {
UPDATE_LINK_STATE(lk_data, LINK_ST_A3_EXCHANGE_SESSION_KEY);
} else {
UPDATE_LINK_STATE(lk_data, LINK_ST_H1_TX_LOW_VALUE_CONTENT);
return -EAGAIN;
}
break;
case LINK_ST_A3_EXCHANGE_SESSION_KEY:
if (auth22_exchange_session_key(lk_data) == 0) {
UPDATE_LINK_STATE(lk_data, LINK_ST_A4_TEST_REPEATER);
} else {
UPDATE_LINK_STATE(lk_data, LINK_ST_H1_TX_LOW_VALUE_CONTENT);
}
break;
case LINK_ST_A4_TEST_REPEATER:
if (lk_data->is_repeater) {
/* if it is a repeater, verify Rcv ID list */
UPDATE_LINK_STATE(lk_data, LINK_ST_A6_WAIT_RECEIVER_ID_LIST);
hdcp_info("It`s repeater link !\n");
} else {
/* if it is not a repeater, complete authentication */
UPDATE_LINK_STATE(lk_data, LINK_ST_A5_AUTHENTICATED);
hdcp_info("It`s Rx link !\n");
}
break;
case LINK_ST_A5_AUTHENTICATED:
return 0;
case LINK_ST_A6_WAIT_RECEIVER_ID_LIST:
if (auth22_wait_for_receiver_id_list(lk_data) == 0) {
UPDATE_LINK_STATE(lk_data, LINK_ST_A7_VERIFY_RECEIVER_ID_LIST);
} else {
UPDATE_LINK_STATE(lk_data, LINK_ST_H1_TX_LOW_VALUE_CONTENT);
}
break;
case LINK_ST_A7_VERIFY_RECEIVER_ID_LIST:
if (auth22_verify_receiver_id_list(lk_data) == 0) {
UPDATE_LINK_STATE(lk_data, LINK_ST_A9_CONTENT_STREAM_MGT);
} else {
UPDATE_LINK_STATE(lk_data, LINK_ST_H1_TX_LOW_VALUE_CONTENT);
}
break;
case LINK_ST_A9_CONTENT_STREAM_MGT:
if (auth22_stream_manage(lk_data) == 0) {
UPDATE_LINK_STATE(lk_data, LINK_ST_A5_AUTHENTICATED);
} else {
UPDATE_LINK_STATE(lk_data, LINK_ST_H1_TX_LOW_VALUE_CONTENT);
}
break;
default:
UPDATE_LINK_STATE(lk_data, LINK_ST_H1_TX_LOW_VALUE_CONTENT);
break;
}
} while (1);
}
int hdcp22_dplink_abort(void) {
lkd.is_aborted = 1;
return 0;
}
int hdcp22_dplink_handle_irq(void) {
uint8_t rxstatus = 0;
/* check as polling mode */
int ret = hdcp_dplink_recv(DP_HDCP_2_2_REG_RXSTATUS_OFFSET, &rxstatus,
sizeof(uint8_t));
if (ret) {
hdcp_err("RXStatus read fail (%d)\n", ret);
return -EIO;
}
hdcp_info("RxStatus: %x\n", rxstatus);
if (HDCP_2_2_DP_RXSTATUS_LINK_FAILED(rxstatus)) {
hdcp_info("integrity check fail.\n");
hdcp_tee_disable_enc();
return 0;
} else if (HDCP_2_2_DP_RXSTATUS_REAUTH_REQ(rxstatus)) {
hdcp_info("reauth requested.\n");
hdcp_tee_disable_enc();
return -EAGAIN;
} else if (HDCP_2_2_DP_RXSTATUS_PAIRING(rxstatus)) {
hdcp_info("pairing avaible\n");
lkd.pairing_ready = 1;
return 0;
} else if (HDCP_2_2_DP_RXSTATUS_H_PRIME(rxstatus)) {
hdcp_info("h-prime avaible\n");
lkd.hprime_ready = 1;
return 0;
} else if (HDCP_2_2_DP_RXSTATUS_READY(rxstatus)) {
hdcp_info("ready avaible\n");
lkd.rp_ready = 1;
if (hdcp_get_auth_state() == HDCP2_AUTH_DONE)
return -EAGAIN;
return 0;
}
hdcp_err("undefined RxStatus(0x%x). ignore\n", rxstatus);
return -EINVAL;
}