drm/amd/display: Add execution and transition states for HDCP2.2
The module works like a state machine +-------------+ ------> | Execution.c | ------ | +-------------+ | | V +----+ +--------+ +--------------+ | DM | -----> | Hdcp.c | <------------ | Transition.c | +----+ <----- +--------+ +--------------+ This patch adds the execution and transition files for 2.2 Signed-off-by: Bhawanpreet Lakha <Bhawanpreet.Lakha@amd.com> Reviewed-by: Harry Wentland <harry.wentland@amd.com> Signed-off-by: Alex Deucher <alexander.deucher@amd.com>
This commit is contained in:
parent
eff682f83c
commit
51466b3fd2
|
@ -24,7 +24,8 @@
|
|||
#
|
||||
|
||||
HDCP = hdcp_ddc.o hdcp_log.o hdcp_psp.o hdcp.o \
|
||||
hdcp1_execution.o hdcp1_transition.o
|
||||
hdcp1_execution.o hdcp1_transition.o \
|
||||
hdcp2_execution.o hdcp2_transition.o
|
||||
|
||||
AMD_DAL_HDCP = $(addprefix $(AMDDALPATH)/modules/hdcp/,$(HDCP))
|
||||
#$(info ************ DAL-HDCP_MAKEFILE ************)
|
||||
|
|
|
@ -37,24 +37,52 @@ static void push_error_status(struct mod_hdcp *hdcp,
|
|||
HDCP_ERROR_TRACE(hdcp, status);
|
||||
}
|
||||
|
||||
hdcp->connection.hdcp1_retry_count++;
|
||||
if (is_hdcp1(hdcp)) {
|
||||
hdcp->connection.hdcp1_retry_count++;
|
||||
} else if (is_hdcp2(hdcp)) {
|
||||
hdcp->connection.hdcp2_retry_count++;
|
||||
}
|
||||
}
|
||||
|
||||
static uint8_t is_cp_desired_hdcp1(struct mod_hdcp *hdcp)
|
||||
{
|
||||
int i, display_enabled = 0;
|
||||
int i, is_auth_needed = 0;
|
||||
|
||||
/* if all displays on the link are disabled, hdcp is not desired */
|
||||
/* if all displays on the link don't need authentication,
|
||||
* hdcp is not desired
|
||||
*/
|
||||
for (i = 0; i < MAX_NUM_OF_DISPLAYS; i++) {
|
||||
if (hdcp->connection.displays[i].state != MOD_HDCP_DISPLAY_INACTIVE &&
|
||||
!hdcp->connection.displays[i].adjust.disable) {
|
||||
display_enabled = 1;
|
||||
is_auth_needed = 1;
|
||||
break;
|
||||
}
|
||||
}
|
||||
|
||||
return (hdcp->connection.hdcp1_retry_count < MAX_NUM_OF_ATTEMPTS) &&
|
||||
display_enabled && !hdcp->connection.link.adjust.hdcp1.disable;
|
||||
is_auth_needed &&
|
||||
!hdcp->connection.link.adjust.hdcp1.disable;
|
||||
}
|
||||
|
||||
static uint8_t is_cp_desired_hdcp2(struct mod_hdcp *hdcp)
|
||||
{
|
||||
int i, is_auth_needed = 0;
|
||||
|
||||
/* if all displays on the link don't need authentication,
|
||||
* hdcp is not desired
|
||||
*/
|
||||
for (i = 0; i < MAX_NUM_OF_DISPLAYS; i++) {
|
||||
if (hdcp->connection.displays[i].state != MOD_HDCP_DISPLAY_INACTIVE &&
|
||||
!hdcp->connection.displays[i].adjust.disable) {
|
||||
is_auth_needed = 1;
|
||||
break;
|
||||
}
|
||||
}
|
||||
|
||||
return (hdcp->connection.hdcp2_retry_count < MAX_NUM_OF_ATTEMPTS) &&
|
||||
is_auth_needed &&
|
||||
!hdcp->connection.link.adjust.hdcp2.disable &&
|
||||
!hdcp->connection.is_hdcp2_revoked;
|
||||
}
|
||||
|
||||
static enum mod_hdcp_status execution(struct mod_hdcp *hdcp,
|
||||
|
@ -82,6 +110,11 @@ static enum mod_hdcp_status execution(struct mod_hdcp *hdcp,
|
|||
} else if (is_in_hdcp1_dp_states(hdcp)) {
|
||||
status = mod_hdcp_hdcp1_dp_execution(hdcp,
|
||||
event_ctx, &input->hdcp1);
|
||||
} else if (is_in_hdcp2_states(hdcp)) {
|
||||
status = mod_hdcp_hdcp2_execution(hdcp, event_ctx, &input->hdcp2);
|
||||
} else if (is_in_hdcp2_dp_states(hdcp)) {
|
||||
status = mod_hdcp_hdcp2_dp_execution(hdcp,
|
||||
event_ctx, &input->hdcp2);
|
||||
}
|
||||
out:
|
||||
return status;
|
||||
|
@ -99,7 +132,10 @@ static enum mod_hdcp_status transition(struct mod_hdcp *hdcp,
|
|||
|
||||
if (is_in_initialized_state(hdcp)) {
|
||||
if (is_dp_hdcp(hdcp))
|
||||
if (is_cp_desired_hdcp1(hdcp)) {
|
||||
if (is_cp_desired_hdcp2(hdcp)) {
|
||||
callback_in_ms(0, output);
|
||||
set_state_id(hdcp, output, D2_A0_DETERMINE_RX_HDCP_CAPABLE);
|
||||
} else if (is_cp_desired_hdcp1(hdcp)) {
|
||||
callback_in_ms(0, output);
|
||||
set_state_id(hdcp, output, D1_A0_DETERMINE_RX_HDCP_CAPABLE);
|
||||
} else {
|
||||
|
@ -107,7 +143,10 @@ static enum mod_hdcp_status transition(struct mod_hdcp *hdcp,
|
|||
set_state_id(hdcp, output, HDCP_CP_NOT_DESIRED);
|
||||
}
|
||||
else if (is_hdmi_dvi_sl_hdcp(hdcp))
|
||||
if (is_cp_desired_hdcp1(hdcp)) {
|
||||
if (is_cp_desired_hdcp2(hdcp)) {
|
||||
callback_in_ms(0, output);
|
||||
set_state_id(hdcp, output, H2_A0_KNOWN_HDCP2_CAPABLE_RX);
|
||||
} else if (is_cp_desired_hdcp1(hdcp)) {
|
||||
callback_in_ms(0, output);
|
||||
set_state_id(hdcp, output, H1_A0_WAIT_FOR_ACTIVE_RX);
|
||||
} else {
|
||||
|
@ -126,6 +165,12 @@ static enum mod_hdcp_status transition(struct mod_hdcp *hdcp,
|
|||
} else if (is_in_hdcp1_dp_states(hdcp)) {
|
||||
status = mod_hdcp_hdcp1_dp_transition(hdcp,
|
||||
event_ctx, &input->hdcp1, output);
|
||||
} else if (is_in_hdcp2_states(hdcp)) {
|
||||
status = mod_hdcp_hdcp2_transition(hdcp,
|
||||
event_ctx, &input->hdcp2, output);
|
||||
} else if (is_in_hdcp2_dp_states(hdcp)) {
|
||||
status = mod_hdcp_hdcp2_dp_transition(hdcp,
|
||||
event_ctx, &input->hdcp2, output);
|
||||
} else {
|
||||
status = MOD_HDCP_STATUS_INVALID_STATE;
|
||||
}
|
||||
|
@ -139,9 +184,13 @@ static enum mod_hdcp_status reset_authentication(struct mod_hdcp *hdcp,
|
|||
enum mod_hdcp_status status = MOD_HDCP_STATUS_SUCCESS;
|
||||
|
||||
if (is_hdcp1(hdcp)) {
|
||||
if (hdcp->auth.trans_input.hdcp1.create_session != UNKNOWN)
|
||||
if (hdcp->auth.trans_input.hdcp1.create_session != UNKNOWN) {
|
||||
/* TODO - update psp to unify create session failure
|
||||
* recovery between hdcp1 and 2.
|
||||
*/
|
||||
mod_hdcp_hdcp1_destroy_session(hdcp);
|
||||
|
||||
}
|
||||
if (hdcp->auth.trans_input.hdcp1.add_topology == PASS) {
|
||||
status = mod_hdcp_remove_display_topology(hdcp);
|
||||
if (status != MOD_HDCP_STATUS_SUCCESS) {
|
||||
|
@ -154,6 +203,27 @@ static enum mod_hdcp_status reset_authentication(struct mod_hdcp *hdcp,
|
|||
memset(&hdcp->auth, 0, sizeof(struct mod_hdcp_authentication));
|
||||
memset(&hdcp->state, 0, sizeof(struct mod_hdcp_state));
|
||||
set_state_id(hdcp, output, HDCP_INITIALIZED);
|
||||
} else if (is_hdcp2(hdcp)) {
|
||||
if (hdcp->auth.trans_input.hdcp2.create_session == PASS) {
|
||||
status = mod_hdcp_hdcp2_destroy_session(hdcp);
|
||||
if (status != MOD_HDCP_STATUS_SUCCESS) {
|
||||
output->callback_needed = 0;
|
||||
output->watchdog_timer_needed = 0;
|
||||
goto out;
|
||||
}
|
||||
}
|
||||
if (hdcp->auth.trans_input.hdcp2.add_topology == PASS) {
|
||||
status = mod_hdcp_remove_display_topology(hdcp);
|
||||
if (status != MOD_HDCP_STATUS_SUCCESS) {
|
||||
output->callback_needed = 0;
|
||||
output->watchdog_timer_needed = 0;
|
||||
goto out;
|
||||
}
|
||||
}
|
||||
HDCP_TOP_RESET_AUTH_TRACE(hdcp);
|
||||
memset(&hdcp->auth, 0, sizeof(struct mod_hdcp_authentication));
|
||||
memset(&hdcp->state, 0, sizeof(struct mod_hdcp_state));
|
||||
set_state_id(hdcp, output, HDCP_INITIALIZED);
|
||||
} else if (is_in_cp_not_desired_state(hdcp)) {
|
||||
status = mod_hdcp_remove_display_topology(hdcp);
|
||||
if (status != MOD_HDCP_STATUS_SUCCESS) {
|
||||
|
|
|
@ -44,11 +44,13 @@
|
|||
#define BINFO_MAX_DEVS_EXCEEDED_MASK_DP 0x0080
|
||||
#define BINFO_MAX_CASCADE_EXCEEDED_MASK_DP 0x0800
|
||||
|
||||
#define VERSION_HDCP2_MASK 0x04
|
||||
#define RXSTATUS_MSG_SIZE_MASK 0x03FF
|
||||
#define RXSTATUS_READY_MASK 0x0400
|
||||
#define RXSTATUS_REAUTH_REQUEST_MASK 0x0800
|
||||
#define RXIDLIST_DEVICE_COUNT_LOWER_MASK 0xf0
|
||||
#define RXIDLIST_DEVICE_COUNT_UPPER_MASK 0x01
|
||||
#define RXCAPS_BYTE2_HDCP2_VERSION_DP 0x02
|
||||
#define RXCAPS_BYTE0_HDCP_CAPABLE_MASK_DP 0x02
|
||||
#define RXSTATUS_READY_MASK_DP 0x0001
|
||||
#define RXSTATUS_H_P_AVAILABLE_MASK_DP 0x0002
|
||||
|
@ -92,8 +94,52 @@ struct mod_hdcp_transition_input_hdcp1 {
|
|||
uint8_t stream_encryption_dp;
|
||||
};
|
||||
|
||||
struct mod_hdcp_transition_input_hdcp2 {
|
||||
uint8_t hdcp2version_read;
|
||||
uint8_t hdcp2_capable_check;
|
||||
uint8_t add_topology;
|
||||
uint8_t create_session;
|
||||
uint8_t ake_init_prepare;
|
||||
uint8_t ake_init_write;
|
||||
uint8_t rxstatus_read;
|
||||
uint8_t ake_cert_available;
|
||||
uint8_t ake_cert_read;
|
||||
uint8_t ake_cert_validation;
|
||||
uint8_t stored_km_write;
|
||||
uint8_t no_stored_km_write;
|
||||
uint8_t h_prime_available;
|
||||
uint8_t h_prime_read;
|
||||
uint8_t pairing_available;
|
||||
uint8_t pairing_info_read;
|
||||
uint8_t h_prime_validation;
|
||||
uint8_t lc_init_prepare;
|
||||
uint8_t lc_init_write;
|
||||
uint8_t l_prime_available_poll;
|
||||
uint8_t l_prime_read;
|
||||
uint8_t l_prime_validation;
|
||||
uint8_t eks_prepare;
|
||||
uint8_t eks_write;
|
||||
uint8_t enable_encryption;
|
||||
uint8_t reauth_request_check;
|
||||
uint8_t rx_id_list_read;
|
||||
uint8_t device_count_check;
|
||||
uint8_t rx_id_list_validation;
|
||||
uint8_t repeater_auth_ack_write;
|
||||
uint8_t prepare_stream_manage;
|
||||
uint8_t stream_manage_write;
|
||||
uint8_t stream_ready_available;
|
||||
uint8_t stream_ready_read;
|
||||
uint8_t stream_ready_validation;
|
||||
|
||||
uint8_t rx_caps_read_dp;
|
||||
uint8_t content_stream_type_write;
|
||||
uint8_t link_integrity_check_dp;
|
||||
uint8_t stream_encryption_dp;
|
||||
};
|
||||
|
||||
union mod_hdcp_transition_input {
|
||||
struct mod_hdcp_transition_input_hdcp1 hdcp1;
|
||||
struct mod_hdcp_transition_input_hdcp2 hdcp2;
|
||||
};
|
||||
|
||||
struct mod_hdcp_message_hdcp1 {
|
||||
|
@ -150,8 +196,10 @@ struct mod_hdcp_connection {
|
|||
struct mod_hdcp_display displays[MAX_NUM_OF_DISPLAYS];
|
||||
uint8_t is_repeater;
|
||||
uint8_t is_km_stored;
|
||||
uint8_t is_hdcp2_revoked;
|
||||
struct mod_hdcp_trace trace;
|
||||
uint8_t hdcp1_retry_count;
|
||||
uint8_t hdcp2_retry_count;
|
||||
};
|
||||
|
||||
/* contains values per authentication cycle */
|
||||
|
@ -219,6 +267,50 @@ enum mod_hdcp_hdcp1_dp_state_id {
|
|||
HDCP1_DP_STATE_END = D1_A7_READ_KSV_LIST,
|
||||
};
|
||||
|
||||
enum mod_hdcp_hdcp2_state_id {
|
||||
HDCP2_STATE_START = HDCP1_DP_STATE_END,
|
||||
H2_A0_KNOWN_HDCP2_CAPABLE_RX,
|
||||
H2_A1_SEND_AKE_INIT,
|
||||
H2_A1_VALIDATE_AKE_CERT,
|
||||
H2_A1_SEND_NO_STORED_KM,
|
||||
H2_A1_READ_H_PRIME,
|
||||
H2_A1_READ_PAIRING_INFO_AND_VALIDATE_H_PRIME,
|
||||
H2_A1_SEND_STORED_KM,
|
||||
H2_A1_VALIDATE_H_PRIME,
|
||||
H2_A2_LOCALITY_CHECK,
|
||||
H2_A3_EXCHANGE_KS_AND_TEST_FOR_REPEATER,
|
||||
H2_ENABLE_ENCRYPTION,
|
||||
H2_A5_AUTHENTICATED,
|
||||
H2_A6_WAIT_FOR_RX_ID_LIST,
|
||||
H2_A78_VERIFY_RX_ID_LIST_AND_SEND_ACK,
|
||||
H2_A9_SEND_STREAM_MANAGEMENT,
|
||||
H2_A9_VALIDATE_STREAM_READY,
|
||||
HDCP2_STATE_END = H2_A9_VALIDATE_STREAM_READY,
|
||||
};
|
||||
|
||||
enum mod_hdcp_hdcp2_dp_state_id {
|
||||
HDCP2_DP_STATE_START = HDCP2_STATE_END,
|
||||
D2_A0_DETERMINE_RX_HDCP_CAPABLE,
|
||||
D2_A1_SEND_AKE_INIT,
|
||||
D2_A1_VALIDATE_AKE_CERT,
|
||||
D2_A1_SEND_NO_STORED_KM,
|
||||
D2_A1_READ_H_PRIME,
|
||||
D2_A1_READ_PAIRING_INFO_AND_VALIDATE_H_PRIME,
|
||||
D2_A1_SEND_STORED_KM,
|
||||
D2_A1_VALIDATE_H_PRIME,
|
||||
D2_A2_LOCALITY_CHECK,
|
||||
D2_A34_EXCHANGE_KS_AND_TEST_FOR_REPEATER,
|
||||
D2_SEND_CONTENT_STREAM_TYPE,
|
||||
D2_ENABLE_ENCRYPTION,
|
||||
D2_A5_AUTHENTICATED,
|
||||
D2_A6_WAIT_FOR_RX_ID_LIST,
|
||||
D2_A78_VERIFY_RX_ID_LIST_AND_SEND_ACK,
|
||||
D2_A9_SEND_STREAM_MANAGEMENT,
|
||||
D2_A9_VALIDATE_STREAM_READY,
|
||||
HDCP2_DP_STATE_END = D2_A9_VALIDATE_STREAM_READY,
|
||||
HDCP_STATE_END = HDCP2_DP_STATE_END,
|
||||
};
|
||||
|
||||
/* hdcp1 executions and transitions */
|
||||
typedef enum mod_hdcp_status (*mod_hdcp_action)(struct mod_hdcp *hdcp);
|
||||
uint8_t mod_hdcp_execute_and_set(
|
||||
|
@ -239,6 +331,22 @@ enum mod_hdcp_status mod_hdcp_hdcp1_dp_transition(struct mod_hdcp *hdcp,
|
|||
struct mod_hdcp_transition_input_hdcp1 *input,
|
||||
struct mod_hdcp_output *output);
|
||||
|
||||
/* hdcp2 executions and transitions */
|
||||
enum mod_hdcp_status mod_hdcp_hdcp2_execution(struct mod_hdcp *hdcp,
|
||||
struct mod_hdcp_event_context *event_ctx,
|
||||
struct mod_hdcp_transition_input_hdcp2 *input);
|
||||
enum mod_hdcp_status mod_hdcp_hdcp2_dp_execution(struct mod_hdcp *hdcp,
|
||||
struct mod_hdcp_event_context *event_ctx,
|
||||
struct mod_hdcp_transition_input_hdcp2 *input);
|
||||
enum mod_hdcp_status mod_hdcp_hdcp2_transition(struct mod_hdcp *hdcp,
|
||||
struct mod_hdcp_event_context *event_ctx,
|
||||
struct mod_hdcp_transition_input_hdcp2 *input,
|
||||
struct mod_hdcp_output *output);
|
||||
enum mod_hdcp_status mod_hdcp_hdcp2_dp_transition(struct mod_hdcp *hdcp,
|
||||
struct mod_hdcp_event_context *event_ctx,
|
||||
struct mod_hdcp_transition_input_hdcp2 *input,
|
||||
struct mod_hdcp_output *output);
|
||||
|
||||
/* log functions */
|
||||
void mod_hdcp_dump_binary_message(uint8_t *msg, uint32_t msg_size,
|
||||
uint8_t *buf, uint32_t buf_size);
|
||||
|
@ -289,6 +397,7 @@ enum mod_hdcp_status mod_hdcp_read_binfo(struct mod_hdcp *hdcp);
|
|||
enum mod_hdcp_status mod_hdcp_write_aksv(struct mod_hdcp *hdcp);
|
||||
enum mod_hdcp_status mod_hdcp_write_ainfo(struct mod_hdcp *hdcp);
|
||||
enum mod_hdcp_status mod_hdcp_write_an(struct mod_hdcp *hdcp);
|
||||
enum mod_hdcp_status mod_hdcp_read_hdcp2version(struct mod_hdcp *hdcp);
|
||||
enum mod_hdcp_status mod_hdcp_read_rxcaps(struct mod_hdcp *hdcp);
|
||||
enum mod_hdcp_status mod_hdcp_read_rxstatus(struct mod_hdcp *hdcp);
|
||||
enum mod_hdcp_status mod_hdcp_read_ake_cert(struct mod_hdcp *hdcp);
|
||||
|
@ -352,11 +461,28 @@ static inline uint8_t is_in_hdcp1_dp_states(struct mod_hdcp *hdcp)
|
|||
current_state(hdcp) <= HDCP1_DP_STATE_END);
|
||||
}
|
||||
|
||||
static inline uint8_t is_in_hdcp2_states(struct mod_hdcp *hdcp)
|
||||
{
|
||||
return (current_state(hdcp) > HDCP2_STATE_START &&
|
||||
current_state(hdcp) <= HDCP2_STATE_END);
|
||||
}
|
||||
|
||||
static inline uint8_t is_in_hdcp2_dp_states(struct mod_hdcp *hdcp)
|
||||
{
|
||||
return (current_state(hdcp) > HDCP2_DP_STATE_START &&
|
||||
current_state(hdcp) <= HDCP2_DP_STATE_END);
|
||||
}
|
||||
|
||||
static inline uint8_t is_hdcp1(struct mod_hdcp *hdcp)
|
||||
{
|
||||
return (is_in_hdcp1_states(hdcp) || is_in_hdcp1_dp_states(hdcp));
|
||||
}
|
||||
|
||||
static inline uint8_t is_hdcp2(struct mod_hdcp *hdcp)
|
||||
{
|
||||
return (is_in_hdcp2_states(hdcp) || is_in_hdcp2_dp_states(hdcp));
|
||||
}
|
||||
|
||||
static inline uint8_t is_in_cp_not_desired_state(struct mod_hdcp *hdcp)
|
||||
{
|
||||
return current_state(hdcp) == HDCP_CP_NOT_DESIRED;
|
||||
|
@ -481,6 +607,7 @@ static inline struct mod_hdcp_display *get_empty_display_container(
|
|||
static inline void reset_retry_counts(struct mod_hdcp *hdcp)
|
||||
{
|
||||
hdcp->connection.hdcp1_retry_count = 0;
|
||||
hdcp->connection.hdcp2_retry_count = 0;
|
||||
}
|
||||
|
||||
#endif /* HDCP_H_ */
|
||||
|
|
|
@ -0,0 +1,881 @@
|
|||
/*
|
||||
* Copyright 2018 Advanced Micro Devices, Inc.
|
||||
*
|
||||
* Permission is hereby granted, free of charge, to any person obtaining a
|
||||
* copy of this software and associated documentation files (the "Software"),
|
||||
* to deal in the Software without restriction, including without limitation
|
||||
* the rights to use, copy, modify, merge, publish, distribute, sublicense,
|
||||
* and/or sell copies of the Software, and to permit persons to whom the
|
||||
* Software is furnished to do so, subject to the following conditions:
|
||||
*
|
||||
* The above copyright notice and this permission notice shall be included in
|
||||
* all copies or substantial portions of the Software.
|
||||
*
|
||||
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
||||
* IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
||||
* FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL
|
||||
* THE COPYRIGHT HOLDER(S) OR AUTHOR(S) BE LIABLE FOR ANY CLAIM, DAMAGES OR
|
||||
* OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE,
|
||||
* ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR
|
||||
* OTHER DEALINGS IN THE SOFTWARE.
|
||||
*
|
||||
* Authors: AMD
|
||||
*
|
||||
*/
|
||||
|
||||
#include "hdcp.h"
|
||||
|
||||
static inline enum mod_hdcp_status check_receiver_id_list_ready(struct mod_hdcp *hdcp)
|
||||
{
|
||||
uint8_t is_ready = 0;
|
||||
|
||||
if (is_dp_hdcp(hdcp))
|
||||
is_ready = (hdcp->auth.msg.hdcp2.rxstatus & RXSTATUS_READY_MASK_DP) ? 1 : 0;
|
||||
else
|
||||
is_ready = ((hdcp->auth.msg.hdcp2.rxstatus & RXSTATUS_READY_MASK) &&
|
||||
(hdcp->auth.msg.hdcp2.rxstatus & RXSTATUS_MSG_SIZE_MASK)) ? 1 : 0;
|
||||
return is_ready ? MOD_HDCP_STATUS_SUCCESS :
|
||||
MOD_HDCP_STATUS_HDCP2_RX_ID_LIST_NOT_READY;
|
||||
}
|
||||
|
||||
static inline enum mod_hdcp_status check_hdcp2_capable(struct mod_hdcp *hdcp)
|
||||
{
|
||||
enum mod_hdcp_status status;
|
||||
|
||||
if (is_dp_hdcp(hdcp))
|
||||
status = ((hdcp->auth.msg.hdcp2.rxcaps_dp[2] &
|
||||
RXCAPS_BYTE0_HDCP_CAPABLE_MASK_DP) &&
|
||||
(hdcp->auth.msg.hdcp2.rxcaps_dp[0] ==
|
||||
RXCAPS_BYTE2_HDCP2_VERSION_DP)) ?
|
||||
MOD_HDCP_STATUS_SUCCESS :
|
||||
MOD_HDCP_STATUS_HDCP2_NOT_CAPABLE;
|
||||
else
|
||||
status = (hdcp->auth.msg.hdcp2.hdcp2version_hdmi & VERSION_HDCP2_MASK) ?
|
||||
MOD_HDCP_STATUS_SUCCESS :
|
||||
MOD_HDCP_STATUS_HDCP2_NOT_CAPABLE;
|
||||
return status;
|
||||
}
|
||||
|
||||
static inline enum mod_hdcp_status check_reauthentication_request(
|
||||
struct mod_hdcp *hdcp)
|
||||
{
|
||||
uint8_t ret = 0;
|
||||
|
||||
if (is_dp_hdcp(hdcp))
|
||||
ret = (hdcp->auth.msg.hdcp2.rxstatus &
|
||||
RXSTATUS_REAUTH_REQUEST_MASK_DP) ?
|
||||
MOD_HDCP_STATUS_HDCP2_REAUTH_REQUEST :
|
||||
MOD_HDCP_STATUS_SUCCESS;
|
||||
else
|
||||
ret = (hdcp->auth.msg.hdcp2.rxstatus & RXSTATUS_REAUTH_REQUEST_MASK) ?
|
||||
MOD_HDCP_STATUS_HDCP2_REAUTH_REQUEST :
|
||||
MOD_HDCP_STATUS_SUCCESS;
|
||||
return ret;
|
||||
}
|
||||
|
||||
static inline enum mod_hdcp_status check_link_integrity_failure_dp(
|
||||
struct mod_hdcp *hdcp)
|
||||
{
|
||||
return (hdcp->auth.msg.hdcp2.rxstatus &
|
||||
RXSTATUS_LINK_INTEGRITY_FAILURE_MASK_DP) ?
|
||||
MOD_HDCP_STATUS_HDCP2_REAUTH_LINK_INTEGRITY_FAILURE :
|
||||
MOD_HDCP_STATUS_SUCCESS;
|
||||
}
|
||||
|
||||
static enum mod_hdcp_status check_ake_cert_available(struct mod_hdcp *hdcp)
|
||||
{
|
||||
enum mod_hdcp_status status;
|
||||
uint16_t size;
|
||||
|
||||
if (is_dp_hdcp(hdcp)) {
|
||||
status = MOD_HDCP_STATUS_SUCCESS;
|
||||
} else {
|
||||
status = mod_hdcp_read_rxstatus(hdcp);
|
||||
if (status == MOD_HDCP_STATUS_SUCCESS) {
|
||||
size = hdcp->auth.msg.hdcp2.rxstatus & RXSTATUS_MSG_SIZE_MASK;
|
||||
status = (size == sizeof(hdcp->auth.msg.hdcp2.ake_cert)) ?
|
||||
MOD_HDCP_STATUS_SUCCESS :
|
||||
MOD_HDCP_STATUS_HDCP2_AKE_CERT_PENDING;
|
||||
}
|
||||
}
|
||||
return status;
|
||||
}
|
||||
|
||||
static enum mod_hdcp_status check_h_prime_available(struct mod_hdcp *hdcp)
|
||||
{
|
||||
enum mod_hdcp_status status;
|
||||
uint8_t size;
|
||||
|
||||
status = mod_hdcp_read_rxstatus(hdcp);
|
||||
if (status != MOD_HDCP_STATUS_SUCCESS)
|
||||
goto out;
|
||||
|
||||
if (is_dp_hdcp(hdcp)) {
|
||||
status = (hdcp->auth.msg.hdcp2.rxstatus & RXSTATUS_H_P_AVAILABLE_MASK_DP) ?
|
||||
MOD_HDCP_STATUS_SUCCESS :
|
||||
MOD_HDCP_STATUS_HDCP2_H_PRIME_PENDING;
|
||||
} else {
|
||||
size = hdcp->auth.msg.hdcp2.rxstatus & RXSTATUS_MSG_SIZE_MASK;
|
||||
status = (size == sizeof(hdcp->auth.msg.hdcp2.ake_h_prime)) ?
|
||||
MOD_HDCP_STATUS_SUCCESS :
|
||||
MOD_HDCP_STATUS_HDCP2_H_PRIME_PENDING;
|
||||
}
|
||||
out:
|
||||
return status;
|
||||
}
|
||||
|
||||
static enum mod_hdcp_status check_pairing_info_available(struct mod_hdcp *hdcp)
|
||||
{
|
||||
enum mod_hdcp_status status;
|
||||
uint8_t size;
|
||||
|
||||
status = mod_hdcp_read_rxstatus(hdcp);
|
||||
if (status != MOD_HDCP_STATUS_SUCCESS)
|
||||
goto out;
|
||||
|
||||
if (is_dp_hdcp(hdcp)) {
|
||||
status = (hdcp->auth.msg.hdcp2.rxstatus & RXSTATUS_PAIRING_AVAILABLE_MASK_DP) ?
|
||||
MOD_HDCP_STATUS_SUCCESS :
|
||||
MOD_HDCP_STATUS_HDCP2_PAIRING_INFO_PENDING;
|
||||
} else {
|
||||
size = hdcp->auth.msg.hdcp2.rxstatus & RXSTATUS_MSG_SIZE_MASK;
|
||||
status = (size == sizeof(hdcp->auth.msg.hdcp2.ake_pairing_info)) ?
|
||||
MOD_HDCP_STATUS_SUCCESS :
|
||||
MOD_HDCP_STATUS_HDCP2_PAIRING_INFO_PENDING;
|
||||
}
|
||||
out:
|
||||
return status;
|
||||
}
|
||||
|
||||
static enum mod_hdcp_status poll_l_prime_available(struct mod_hdcp *hdcp)
|
||||
{
|
||||
enum mod_hdcp_status status;
|
||||
uint8_t size;
|
||||
uint16_t max_wait = 20000; // units of us
|
||||
uint16_t num_polls = 5;
|
||||
uint16_t wait_time = max_wait / num_polls;
|
||||
|
||||
if (is_dp_hdcp(hdcp))
|
||||
status = MOD_HDCP_STATUS_INVALID_OPERATION;
|
||||
else
|
||||
for (; num_polls; num_polls--) {
|
||||
udelay(wait_time);
|
||||
|
||||
status = mod_hdcp_read_rxstatus(hdcp);
|
||||
if (status != MOD_HDCP_STATUS_SUCCESS)
|
||||
break;
|
||||
|
||||
size = hdcp->auth.msg.hdcp2.rxstatus & RXSTATUS_MSG_SIZE_MASK;
|
||||
status = (size == sizeof(hdcp->auth.msg.hdcp2.lc_l_prime)) ?
|
||||
MOD_HDCP_STATUS_SUCCESS :
|
||||
MOD_HDCP_STATUS_HDCP2_L_PRIME_PENDING;
|
||||
if (status == MOD_HDCP_STATUS_SUCCESS)
|
||||
break;
|
||||
}
|
||||
return status;
|
||||
}
|
||||
|
||||
static enum mod_hdcp_status check_stream_ready_available(struct mod_hdcp *hdcp)
|
||||
{
|
||||
enum mod_hdcp_status status;
|
||||
uint8_t size;
|
||||
|
||||
if (is_dp_hdcp(hdcp)) {
|
||||
status = MOD_HDCP_STATUS_INVALID_OPERATION;
|
||||
} else {
|
||||
status = mod_hdcp_read_rxstatus(hdcp);
|
||||
if (status != MOD_HDCP_STATUS_SUCCESS)
|
||||
goto out;
|
||||
size = hdcp->auth.msg.hdcp2.rxstatus & RXSTATUS_MSG_SIZE_MASK;
|
||||
status = (size == sizeof(hdcp->auth.msg.hdcp2.repeater_auth_stream_ready)) ?
|
||||
MOD_HDCP_STATUS_SUCCESS :
|
||||
MOD_HDCP_STATUS_HDCP2_STREAM_READY_PENDING;
|
||||
}
|
||||
out:
|
||||
return status;
|
||||
}
|
||||
|
||||
static inline uint8_t get_device_count(struct mod_hdcp *hdcp)
|
||||
{
|
||||
return ((hdcp->auth.msg.hdcp2.rx_id_list[2] & RXIDLIST_DEVICE_COUNT_LOWER_MASK) >> 4) +
|
||||
((hdcp->auth.msg.hdcp2.rx_id_list[1] & RXIDLIST_DEVICE_COUNT_UPPER_MASK) << 4);
|
||||
}
|
||||
|
||||
static enum mod_hdcp_status check_device_count(struct mod_hdcp *hdcp)
|
||||
{
|
||||
/* device count must be greater than or equal to tracked hdcp displays */
|
||||
return (get_device_count(hdcp) < get_added_display_count(hdcp)) ?
|
||||
MOD_HDCP_STATUS_HDCP2_DEVICE_COUNT_MISMATCH_FAILURE :
|
||||
MOD_HDCP_STATUS_SUCCESS;
|
||||
}
|
||||
|
||||
static uint8_t process_rxstatus(struct mod_hdcp *hdcp,
|
||||
struct mod_hdcp_event_context *event_ctx,
|
||||
struct mod_hdcp_transition_input_hdcp2 *input,
|
||||
enum mod_hdcp_status *status)
|
||||
{
|
||||
if (!mod_hdcp_execute_and_set(mod_hdcp_read_rxstatus,
|
||||
&input->rxstatus_read, status,
|
||||
hdcp, "rxstatus_read"))
|
||||
goto out;
|
||||
if (!mod_hdcp_execute_and_set(check_reauthentication_request,
|
||||
&input->reauth_request_check, status,
|
||||
hdcp, "reauth_request_check"))
|
||||
goto out;
|
||||
if (is_dp_hdcp(hdcp)) {
|
||||
if (!mod_hdcp_execute_and_set(check_link_integrity_failure_dp,
|
||||
&input->link_integrity_check_dp, status,
|
||||
hdcp, "link_integrity_check_dp"))
|
||||
goto out;
|
||||
}
|
||||
if (hdcp->connection.is_repeater)
|
||||
if (check_receiver_id_list_ready(hdcp) ==
|
||||
MOD_HDCP_STATUS_SUCCESS) {
|
||||
HDCP_INPUT_PASS_TRACE(hdcp, "rx_id_list_ready");
|
||||
event_ctx->rx_id_list_ready = 1;
|
||||
if (is_dp_hdcp(hdcp))
|
||||
hdcp->auth.msg.hdcp2.rx_id_list_size =
|
||||
sizeof(hdcp->auth.msg.hdcp2.rx_id_list);
|
||||
else
|
||||
hdcp->auth.msg.hdcp2.rx_id_list_size =
|
||||
hdcp->auth.msg.hdcp2.rxstatus & 0x3FF;
|
||||
}
|
||||
out:
|
||||
return (*status == MOD_HDCP_STATUS_SUCCESS);
|
||||
}
|
||||
|
||||
static enum mod_hdcp_status known_hdcp2_capable_rx(struct mod_hdcp *hdcp,
|
||||
struct mod_hdcp_event_context *event_ctx,
|
||||
struct mod_hdcp_transition_input_hdcp2 *input)
|
||||
{
|
||||
enum mod_hdcp_status status = MOD_HDCP_STATUS_SUCCESS;
|
||||
|
||||
if (event_ctx->event != MOD_HDCP_EVENT_CALLBACK) {
|
||||
event_ctx->unexpected_event = 1;
|
||||
goto out;
|
||||
}
|
||||
if (!mod_hdcp_execute_and_set(mod_hdcp_read_hdcp2version,
|
||||
&input->hdcp2version_read, &status,
|
||||
hdcp, "hdcp2version_read"))
|
||||
goto out;
|
||||
if (!mod_hdcp_execute_and_set(check_hdcp2_capable,
|
||||
&input->hdcp2_capable_check, &status,
|
||||
hdcp, "hdcp2_capable"))
|
||||
goto out;
|
||||
out:
|
||||
return status;
|
||||
}
|
||||
|
||||
static enum mod_hdcp_status send_ake_init(struct mod_hdcp *hdcp,
|
||||
struct mod_hdcp_event_context *event_ctx,
|
||||
struct mod_hdcp_transition_input_hdcp2 *input)
|
||||
{
|
||||
enum mod_hdcp_status status = MOD_HDCP_STATUS_SUCCESS;
|
||||
|
||||
if (event_ctx->event != MOD_HDCP_EVENT_CALLBACK) {
|
||||
event_ctx->unexpected_event = 1;
|
||||
goto out;
|
||||
}
|
||||
if (!mod_hdcp_execute_and_set(mod_hdcp_add_display_topology,
|
||||
&input->add_topology, &status,
|
||||
hdcp, "add_topology"))
|
||||
goto out;
|
||||
if (!mod_hdcp_execute_and_set(mod_hdcp_hdcp2_create_session,
|
||||
&input->create_session, &status,
|
||||
hdcp, "create_session"))
|
||||
goto out;
|
||||
if (!mod_hdcp_execute_and_set(mod_hdcp_hdcp2_prepare_ake_init,
|
||||
&input->ake_init_prepare, &status,
|
||||
hdcp, "ake_init_prepare"))
|
||||
goto out;
|
||||
if (!mod_hdcp_execute_and_set(mod_hdcp_write_ake_init,
|
||||
&input->ake_init_write, &status,
|
||||
hdcp, "ake_init_write"))
|
||||
goto out;
|
||||
out:
|
||||
return status;
|
||||
}
|
||||
|
||||
static enum mod_hdcp_status validate_ake_cert(struct mod_hdcp *hdcp,
|
||||
struct mod_hdcp_event_context *event_ctx,
|
||||
struct mod_hdcp_transition_input_hdcp2 *input)
|
||||
{
|
||||
enum mod_hdcp_status status = MOD_HDCP_STATUS_SUCCESS;
|
||||
|
||||
|
||||
if (event_ctx->event != MOD_HDCP_EVENT_CALLBACK &&
|
||||
event_ctx->event != MOD_HDCP_EVENT_WATCHDOG_TIMEOUT) {
|
||||
event_ctx->unexpected_event = 1;
|
||||
goto out;
|
||||
}
|
||||
|
||||
if (is_hdmi_dvi_sl_hdcp(hdcp))
|
||||
if (!mod_hdcp_execute_and_set(check_ake_cert_available,
|
||||
&input->ake_cert_available, &status,
|
||||
hdcp, "ake_cert_available"))
|
||||
goto out;
|
||||
if (!mod_hdcp_execute_and_set(mod_hdcp_read_ake_cert,
|
||||
&input->ake_cert_read, &status,
|
||||
hdcp, "ake_cert_read"))
|
||||
goto out;
|
||||
if (!mod_hdcp_execute_and_set(mod_hdcp_hdcp2_validate_ake_cert,
|
||||
&input->ake_cert_validation, &status,
|
||||
hdcp, "ake_cert_validation"))
|
||||
goto out;
|
||||
out:
|
||||
return status;
|
||||
}
|
||||
|
||||
static enum mod_hdcp_status send_no_stored_km(struct mod_hdcp *hdcp,
|
||||
struct mod_hdcp_event_context *event_ctx,
|
||||
struct mod_hdcp_transition_input_hdcp2 *input)
|
||||
{
|
||||
enum mod_hdcp_status status = MOD_HDCP_STATUS_SUCCESS;
|
||||
|
||||
if (event_ctx->event != MOD_HDCP_EVENT_CALLBACK) {
|
||||
event_ctx->unexpected_event = 1;
|
||||
goto out;
|
||||
}
|
||||
|
||||
if (!mod_hdcp_execute_and_set(mod_hdcp_write_no_stored_km,
|
||||
&input->no_stored_km_write, &status,
|
||||
hdcp, "no_stored_km_write"))
|
||||
goto out;
|
||||
out:
|
||||
return status;
|
||||
}
|
||||
|
||||
static enum mod_hdcp_status read_h_prime(struct mod_hdcp *hdcp,
|
||||
struct mod_hdcp_event_context *event_ctx,
|
||||
struct mod_hdcp_transition_input_hdcp2 *input)
|
||||
{
|
||||
enum mod_hdcp_status status = MOD_HDCP_STATUS_SUCCESS;
|
||||
|
||||
if (event_ctx->event != MOD_HDCP_EVENT_CALLBACK &&
|
||||
event_ctx->event != MOD_HDCP_EVENT_CPIRQ &&
|
||||
event_ctx->event != MOD_HDCP_EVENT_WATCHDOG_TIMEOUT) {
|
||||
event_ctx->unexpected_event = 1;
|
||||
goto out;
|
||||
}
|
||||
|
||||
if (!mod_hdcp_execute_and_set(check_h_prime_available,
|
||||
&input->h_prime_available, &status,
|
||||
hdcp, "h_prime_available"))
|
||||
goto out;
|
||||
|
||||
if (!mod_hdcp_execute_and_set(mod_hdcp_read_h_prime,
|
||||
&input->h_prime_read, &status,
|
||||
hdcp, "h_prime_read"))
|
||||
goto out;
|
||||
out:
|
||||
return status;
|
||||
}
|
||||
|
||||
static enum mod_hdcp_status read_pairing_info_and_validate_h_prime(
|
||||
struct mod_hdcp *hdcp,
|
||||
struct mod_hdcp_event_context *event_ctx,
|
||||
struct mod_hdcp_transition_input_hdcp2 *input)
|
||||
{
|
||||
enum mod_hdcp_status status = MOD_HDCP_STATUS_SUCCESS;
|
||||
|
||||
if (event_ctx->event != MOD_HDCP_EVENT_CALLBACK &&
|
||||
event_ctx->event != MOD_HDCP_EVENT_CPIRQ &&
|
||||
event_ctx->event != MOD_HDCP_EVENT_WATCHDOG_TIMEOUT) {
|
||||
event_ctx->unexpected_event = 1;
|
||||
goto out;
|
||||
}
|
||||
|
||||
if (!mod_hdcp_execute_and_set(check_pairing_info_available,
|
||||
&input->pairing_available, &status,
|
||||
hdcp, "pairing_available"))
|
||||
goto out;
|
||||
if (!mod_hdcp_execute_and_set(mod_hdcp_read_pairing_info,
|
||||
&input->pairing_info_read, &status,
|
||||
hdcp, "pairing_info_read"))
|
||||
goto out;
|
||||
if (!mod_hdcp_execute_and_set(mod_hdcp_hdcp2_validate_h_prime,
|
||||
&input->h_prime_validation, &status,
|
||||
hdcp, "h_prime_validation"))
|
||||
goto out;
|
||||
out:
|
||||
return status;
|
||||
}
|
||||
|
||||
static enum mod_hdcp_status send_stored_km(struct mod_hdcp *hdcp,
|
||||
struct mod_hdcp_event_context *event_ctx,
|
||||
struct mod_hdcp_transition_input_hdcp2 *input)
|
||||
{
|
||||
enum mod_hdcp_status status = MOD_HDCP_STATUS_SUCCESS;
|
||||
|
||||
if (event_ctx->event != MOD_HDCP_EVENT_CALLBACK) {
|
||||
event_ctx->unexpected_event = 1;
|
||||
goto out;
|
||||
}
|
||||
|
||||
if (!mod_hdcp_execute_and_set(mod_hdcp_write_stored_km,
|
||||
&input->stored_km_write, &status,
|
||||
hdcp, "stored_km_write"))
|
||||
goto out;
|
||||
out:
|
||||
return status;
|
||||
}
|
||||
|
||||
static enum mod_hdcp_status validate_h_prime(struct mod_hdcp *hdcp,
|
||||
struct mod_hdcp_event_context *event_ctx,
|
||||
struct mod_hdcp_transition_input_hdcp2 *input)
|
||||
{
|
||||
enum mod_hdcp_status status = MOD_HDCP_STATUS_SUCCESS;
|
||||
|
||||
if (event_ctx->event != MOD_HDCP_EVENT_CALLBACK &&
|
||||
event_ctx->event != MOD_HDCP_EVENT_CPIRQ &&
|
||||
event_ctx->event != MOD_HDCP_EVENT_WATCHDOG_TIMEOUT) {
|
||||
event_ctx->unexpected_event = 1;
|
||||
goto out;
|
||||
}
|
||||
|
||||
if (!mod_hdcp_execute_and_set(check_h_prime_available,
|
||||
&input->h_prime_available, &status,
|
||||
hdcp, "h_prime_available"))
|
||||
goto out;
|
||||
if (!mod_hdcp_execute_and_set(mod_hdcp_read_h_prime,
|
||||
&input->h_prime_read, &status,
|
||||
hdcp, "h_prime_read"))
|
||||
goto out;
|
||||
if (!mod_hdcp_execute_and_set(mod_hdcp_hdcp2_validate_h_prime,
|
||||
&input->h_prime_validation, &status,
|
||||
hdcp, "h_prime_validation"))
|
||||
goto out;
|
||||
out:
|
||||
return status;
|
||||
}
|
||||
|
||||
static enum mod_hdcp_status locality_check(struct mod_hdcp *hdcp,
|
||||
struct mod_hdcp_event_context *event_ctx,
|
||||
struct mod_hdcp_transition_input_hdcp2 *input)
|
||||
{
|
||||
enum mod_hdcp_status status = MOD_HDCP_STATUS_SUCCESS;
|
||||
|
||||
if (event_ctx->event != MOD_HDCP_EVENT_CALLBACK) {
|
||||
event_ctx->unexpected_event = 1;
|
||||
goto out;
|
||||
}
|
||||
|
||||
if (!mod_hdcp_execute_and_set(mod_hdcp_hdcp2_prepare_lc_init,
|
||||
&input->lc_init_prepare, &status,
|
||||
hdcp, "lc_init_prepare"))
|
||||
goto out;
|
||||
if (!mod_hdcp_execute_and_set(mod_hdcp_write_lc_init,
|
||||
&input->lc_init_write, &status,
|
||||
hdcp, "lc_init_write"))
|
||||
goto out;
|
||||
if (is_dp_hdcp(hdcp))
|
||||
udelay(16000);
|
||||
else
|
||||
if (!mod_hdcp_execute_and_set(poll_l_prime_available,
|
||||
&input->l_prime_available_poll, &status,
|
||||
hdcp, "l_prime_available_poll"))
|
||||
goto out;
|
||||
if (!mod_hdcp_execute_and_set(mod_hdcp_read_l_prime,
|
||||
&input->l_prime_read, &status,
|
||||
hdcp, "l_prime_read"))
|
||||
goto out;
|
||||
if (!mod_hdcp_execute_and_set(mod_hdcp_hdcp2_validate_l_prime,
|
||||
&input->l_prime_validation, &status,
|
||||
hdcp, "l_prime_validation"))
|
||||
goto out;
|
||||
out:
|
||||
return status;
|
||||
}
|
||||
|
||||
static enum mod_hdcp_status exchange_ks_and_test_for_repeater(struct mod_hdcp *hdcp,
|
||||
struct mod_hdcp_event_context *event_ctx,
|
||||
struct mod_hdcp_transition_input_hdcp2 *input)
|
||||
{
|
||||
enum mod_hdcp_status status = MOD_HDCP_STATUS_SUCCESS;
|
||||
|
||||
if (event_ctx->event != MOD_HDCP_EVENT_CALLBACK) {
|
||||
event_ctx->unexpected_event = 1;
|
||||
goto out;
|
||||
}
|
||||
|
||||
if (!mod_hdcp_execute_and_set(mod_hdcp_hdcp2_prepare_eks,
|
||||
&input->eks_prepare, &status,
|
||||
hdcp, "eks_prepare"))
|
||||
goto out;
|
||||
if (!mod_hdcp_execute_and_set(mod_hdcp_write_eks,
|
||||
&input->eks_write, &status,
|
||||
hdcp, "eks_write"))
|
||||
goto out;
|
||||
out:
|
||||
return status;
|
||||
}
|
||||
|
||||
static enum mod_hdcp_status enable_encryption(struct mod_hdcp *hdcp,
|
||||
struct mod_hdcp_event_context *event_ctx,
|
||||
struct mod_hdcp_transition_input_hdcp2 *input)
|
||||
{
|
||||
enum mod_hdcp_status status = MOD_HDCP_STATUS_SUCCESS;
|
||||
|
||||
if (event_ctx->event != MOD_HDCP_EVENT_CALLBACK &&
|
||||
event_ctx->event != MOD_HDCP_EVENT_CPIRQ) {
|
||||
event_ctx->unexpected_event = 1;
|
||||
goto out;
|
||||
}
|
||||
if (event_ctx->event == MOD_HDCP_EVENT_CPIRQ) {
|
||||
process_rxstatus(hdcp, event_ctx, input, &status);
|
||||
goto out;
|
||||
}
|
||||
|
||||
if (is_hdmi_dvi_sl_hdcp(hdcp)) {
|
||||
if (!process_rxstatus(hdcp, event_ctx, input, &status))
|
||||
goto out;
|
||||
if (event_ctx->rx_id_list_ready)
|
||||
goto out;
|
||||
}
|
||||
if (!mod_hdcp_execute_and_set(mod_hdcp_hdcp2_enable_encryption,
|
||||
&input->enable_encryption, &status,
|
||||
hdcp, "enable_encryption"))
|
||||
goto out;
|
||||
if (is_dp_mst_hdcp(hdcp)) {
|
||||
if (!mod_hdcp_execute_and_set(
|
||||
mod_hdcp_hdcp2_enable_dp_stream_encryption,
|
||||
&input->stream_encryption_dp, &status,
|
||||
hdcp, "stream_encryption_dp"))
|
||||
goto out;
|
||||
}
|
||||
out:
|
||||
return status;
|
||||
}
|
||||
|
||||
static enum mod_hdcp_status authenticated(struct mod_hdcp *hdcp,
|
||||
struct mod_hdcp_event_context *event_ctx,
|
||||
struct mod_hdcp_transition_input_hdcp2 *input)
|
||||
{
|
||||
enum mod_hdcp_status status = MOD_HDCP_STATUS_SUCCESS;
|
||||
|
||||
if (event_ctx->event != MOD_HDCP_EVENT_CALLBACK &&
|
||||
event_ctx->event != MOD_HDCP_EVENT_CPIRQ) {
|
||||
event_ctx->unexpected_event = 1;
|
||||
goto out;
|
||||
}
|
||||
|
||||
if (!process_rxstatus(hdcp, event_ctx, input, &status))
|
||||
goto out;
|
||||
if (event_ctx->rx_id_list_ready)
|
||||
goto out;
|
||||
out:
|
||||
return status;
|
||||
}
|
||||
|
||||
static enum mod_hdcp_status wait_for_rx_id_list(struct mod_hdcp *hdcp,
|
||||
struct mod_hdcp_event_context *event_ctx,
|
||||
struct mod_hdcp_transition_input_hdcp2 *input)
|
||||
{
|
||||
enum mod_hdcp_status status = MOD_HDCP_STATUS_SUCCESS;
|
||||
|
||||
if (event_ctx->event != MOD_HDCP_EVENT_CALLBACK &&
|
||||
event_ctx->event != MOD_HDCP_EVENT_CPIRQ &&
|
||||
event_ctx->event != MOD_HDCP_EVENT_WATCHDOG_TIMEOUT) {
|
||||
event_ctx->unexpected_event = 1;
|
||||
goto out;
|
||||
}
|
||||
|
||||
if (!process_rxstatus(hdcp, event_ctx, input, &status))
|
||||
goto out;
|
||||
if (!event_ctx->rx_id_list_ready) {
|
||||
status = MOD_HDCP_STATUS_HDCP2_RX_ID_LIST_NOT_READY;
|
||||
goto out;
|
||||
}
|
||||
out:
|
||||
return status;
|
||||
}
|
||||
|
||||
static enum mod_hdcp_status verify_rx_id_list_and_send_ack(struct mod_hdcp *hdcp,
|
||||
struct mod_hdcp_event_context *event_ctx,
|
||||
struct mod_hdcp_transition_input_hdcp2 *input)
|
||||
{
|
||||
enum mod_hdcp_status status = MOD_HDCP_STATUS_SUCCESS;
|
||||
|
||||
if (event_ctx->event != MOD_HDCP_EVENT_CALLBACK &&
|
||||
event_ctx->event != MOD_HDCP_EVENT_CPIRQ) {
|
||||
event_ctx->unexpected_event = 1;
|
||||
goto out;
|
||||
}
|
||||
if (event_ctx->event == MOD_HDCP_EVENT_CPIRQ) {
|
||||
process_rxstatus(hdcp, event_ctx, input, &status);
|
||||
goto out;
|
||||
}
|
||||
|
||||
if (!mod_hdcp_execute_and_set(mod_hdcp_read_rx_id_list,
|
||||
&input->rx_id_list_read,
|
||||
&status, hdcp, "receiver_id_list_read"))
|
||||
goto out;
|
||||
if (!mod_hdcp_execute_and_set(check_device_count,
|
||||
&input->device_count_check,
|
||||
&status, hdcp, "device_count_check"))
|
||||
goto out;
|
||||
if (!mod_hdcp_execute_and_set(mod_hdcp_hdcp2_validate_rx_id_list,
|
||||
&input->rx_id_list_validation,
|
||||
&status, hdcp, "rx_id_list_validation"))
|
||||
goto out;
|
||||
if (!mod_hdcp_execute_and_set(mod_hdcp_write_repeater_auth_ack,
|
||||
&input->repeater_auth_ack_write,
|
||||
&status, hdcp, "repeater_auth_ack_write"))
|
||||
goto out;
|
||||
out:
|
||||
return status;
|
||||
}
|
||||
|
||||
static enum mod_hdcp_status send_stream_management(struct mod_hdcp *hdcp,
|
||||
struct mod_hdcp_event_context *event_ctx,
|
||||
struct mod_hdcp_transition_input_hdcp2 *input)
|
||||
{
|
||||
enum mod_hdcp_status status = MOD_HDCP_STATUS_SUCCESS;
|
||||
|
||||
if (event_ctx->event != MOD_HDCP_EVENT_CALLBACK &&
|
||||
event_ctx->event != MOD_HDCP_EVENT_CPIRQ) {
|
||||
event_ctx->unexpected_event = 1;
|
||||
goto out;
|
||||
}
|
||||
if (event_ctx->event == MOD_HDCP_EVENT_CPIRQ) {
|
||||
process_rxstatus(hdcp, event_ctx, input, &status);
|
||||
goto out;
|
||||
}
|
||||
|
||||
if (is_hdmi_dvi_sl_hdcp(hdcp)) {
|
||||
if (!process_rxstatus(hdcp, event_ctx, input, &status))
|
||||
goto out;
|
||||
if (event_ctx->rx_id_list_ready)
|
||||
goto out;
|
||||
}
|
||||
if (!mod_hdcp_execute_and_set(mod_hdcp_hdcp2_prepare_stream_management,
|
||||
&input->prepare_stream_manage,
|
||||
&status, hdcp, "prepare_stream_manage"))
|
||||
goto out;
|
||||
|
||||
if (!mod_hdcp_execute_and_set(mod_hdcp_write_stream_manage,
|
||||
&input->stream_manage_write,
|
||||
&status, hdcp, "stream_manage_write"))
|
||||
goto out;
|
||||
out:
|
||||
return status;
|
||||
}
|
||||
|
||||
static enum mod_hdcp_status validate_stream_ready(struct mod_hdcp *hdcp,
|
||||
struct mod_hdcp_event_context *event_ctx,
|
||||
struct mod_hdcp_transition_input_hdcp2 *input)
|
||||
{
|
||||
enum mod_hdcp_status status = MOD_HDCP_STATUS_SUCCESS;
|
||||
|
||||
if (event_ctx->event != MOD_HDCP_EVENT_CALLBACK &&
|
||||
event_ctx->event != MOD_HDCP_EVENT_CPIRQ &&
|
||||
event_ctx->event != MOD_HDCP_EVENT_WATCHDOG_TIMEOUT) {
|
||||
event_ctx->unexpected_event = 1;
|
||||
goto out;
|
||||
}
|
||||
if (event_ctx->event == MOD_HDCP_EVENT_CPIRQ) {
|
||||
process_rxstatus(hdcp, event_ctx, input, &status);
|
||||
goto out;
|
||||
}
|
||||
|
||||
if (is_hdmi_dvi_sl_hdcp(hdcp)) {
|
||||
if (!process_rxstatus(hdcp, event_ctx, input, &status))
|
||||
goto out;
|
||||
if (event_ctx->rx_id_list_ready) {
|
||||
goto out;
|
||||
}
|
||||
}
|
||||
if (is_hdmi_dvi_sl_hdcp(hdcp))
|
||||
if (!mod_hdcp_execute_and_set(check_stream_ready_available,
|
||||
&input->stream_ready_available,
|
||||
&status, hdcp, "stream_ready_available"))
|
||||
goto out;
|
||||
if (!mod_hdcp_execute_and_set(mod_hdcp_read_stream_ready,
|
||||
&input->stream_ready_read,
|
||||
&status, hdcp, "stream_ready_read"))
|
||||
goto out;
|
||||
if (!mod_hdcp_execute_and_set(mod_hdcp_hdcp2_validate_stream_ready,
|
||||
&input->stream_ready_validation,
|
||||
&status, hdcp, "stream_ready_validation"))
|
||||
goto out;
|
||||
|
||||
out:
|
||||
return status;
|
||||
}
|
||||
|
||||
static enum mod_hdcp_status determine_rx_hdcp_capable_dp(struct mod_hdcp *hdcp,
|
||||
struct mod_hdcp_event_context *event_ctx,
|
||||
struct mod_hdcp_transition_input_hdcp2 *input)
|
||||
{
|
||||
enum mod_hdcp_status status = MOD_HDCP_STATUS_SUCCESS;
|
||||
|
||||
if (event_ctx->event != MOD_HDCP_EVENT_CALLBACK) {
|
||||
event_ctx->unexpected_event = 1;
|
||||
goto out;
|
||||
}
|
||||
|
||||
if (!mod_hdcp_execute_and_set(mod_hdcp_read_rxcaps,
|
||||
&input->rx_caps_read_dp,
|
||||
&status, hdcp, "rx_caps_read_dp"))
|
||||
goto out;
|
||||
if (!mod_hdcp_execute_and_set(check_hdcp2_capable,
|
||||
&input->hdcp2_capable_check, &status,
|
||||
hdcp, "hdcp2_capable_check"))
|
||||
goto out;
|
||||
out:
|
||||
return status;
|
||||
}
|
||||
|
||||
static enum mod_hdcp_status send_content_stream_type_dp(struct mod_hdcp *hdcp,
|
||||
struct mod_hdcp_event_context *event_ctx,
|
||||
struct mod_hdcp_transition_input_hdcp2 *input)
|
||||
{
|
||||
enum mod_hdcp_status status = MOD_HDCP_STATUS_SUCCESS;
|
||||
|
||||
if (event_ctx->event != MOD_HDCP_EVENT_CALLBACK &&
|
||||
event_ctx->event != MOD_HDCP_EVENT_CPIRQ) {
|
||||
event_ctx->unexpected_event = 1;
|
||||
goto out;
|
||||
}
|
||||
|
||||
if (!process_rxstatus(hdcp, event_ctx, input, &status))
|
||||
goto out;
|
||||
if (!mod_hdcp_execute_and_set(mod_hdcp_write_content_type,
|
||||
&input->content_stream_type_write, &status,
|
||||
hdcp, "content_stream_type_write"))
|
||||
goto out;
|
||||
out:
|
||||
return status;
|
||||
}
|
||||
|
||||
enum mod_hdcp_status mod_hdcp_hdcp2_execution(struct mod_hdcp *hdcp,
|
||||
struct mod_hdcp_event_context *event_ctx,
|
||||
struct mod_hdcp_transition_input_hdcp2 *input)
|
||||
{
|
||||
enum mod_hdcp_status status = MOD_HDCP_STATUS_SUCCESS;
|
||||
|
||||
switch (current_state(hdcp)) {
|
||||
case H2_A0_KNOWN_HDCP2_CAPABLE_RX:
|
||||
status = known_hdcp2_capable_rx(hdcp, event_ctx, input);
|
||||
break;
|
||||
case H2_A1_SEND_AKE_INIT:
|
||||
status = send_ake_init(hdcp, event_ctx, input);
|
||||
break;
|
||||
case H2_A1_VALIDATE_AKE_CERT:
|
||||
status = validate_ake_cert(hdcp, event_ctx, input);
|
||||
break;
|
||||
case H2_A1_SEND_NO_STORED_KM:
|
||||
status = send_no_stored_km(hdcp, event_ctx, input);
|
||||
break;
|
||||
case H2_A1_READ_H_PRIME:
|
||||
status = read_h_prime(hdcp, event_ctx, input);
|
||||
break;
|
||||
case H2_A1_READ_PAIRING_INFO_AND_VALIDATE_H_PRIME:
|
||||
status = read_pairing_info_and_validate_h_prime(hdcp,
|
||||
event_ctx, input);
|
||||
break;
|
||||
case H2_A1_SEND_STORED_KM:
|
||||
status = send_stored_km(hdcp, event_ctx, input);
|
||||
break;
|
||||
case H2_A1_VALIDATE_H_PRIME:
|
||||
status = validate_h_prime(hdcp, event_ctx, input);
|
||||
break;
|
||||
case H2_A2_LOCALITY_CHECK:
|
||||
status = locality_check(hdcp, event_ctx, input);
|
||||
break;
|
||||
case H2_A3_EXCHANGE_KS_AND_TEST_FOR_REPEATER:
|
||||
status = exchange_ks_and_test_for_repeater(hdcp, event_ctx, input);
|
||||
break;
|
||||
case H2_ENABLE_ENCRYPTION:
|
||||
status = enable_encryption(hdcp, event_ctx, input);
|
||||
break;
|
||||
case H2_A5_AUTHENTICATED:
|
||||
status = authenticated(hdcp, event_ctx, input);
|
||||
break;
|
||||
case H2_A6_WAIT_FOR_RX_ID_LIST:
|
||||
status = wait_for_rx_id_list(hdcp, event_ctx, input);
|
||||
break;
|
||||
case H2_A78_VERIFY_RX_ID_LIST_AND_SEND_ACK:
|
||||
status = verify_rx_id_list_and_send_ack(hdcp, event_ctx, input);
|
||||
break;
|
||||
case H2_A9_SEND_STREAM_MANAGEMENT:
|
||||
status = send_stream_management(hdcp, event_ctx, input);
|
||||
break;
|
||||
case H2_A9_VALIDATE_STREAM_READY:
|
||||
status = validate_stream_ready(hdcp, event_ctx, input);
|
||||
break;
|
||||
default:
|
||||
status = MOD_HDCP_STATUS_INVALID_STATE;
|
||||
break;
|
||||
}
|
||||
|
||||
return status;
|
||||
}
|
||||
|
||||
enum mod_hdcp_status mod_hdcp_hdcp2_dp_execution(struct mod_hdcp *hdcp,
|
||||
struct mod_hdcp_event_context *event_ctx,
|
||||
struct mod_hdcp_transition_input_hdcp2 *input)
|
||||
{
|
||||
enum mod_hdcp_status status = MOD_HDCP_STATUS_SUCCESS;
|
||||
|
||||
switch (current_state(hdcp)) {
|
||||
case D2_A0_DETERMINE_RX_HDCP_CAPABLE:
|
||||
status = determine_rx_hdcp_capable_dp(hdcp, event_ctx, input);
|
||||
break;
|
||||
case D2_A1_SEND_AKE_INIT:
|
||||
status = send_ake_init(hdcp, event_ctx, input);
|
||||
break;
|
||||
case D2_A1_VALIDATE_AKE_CERT:
|
||||
status = validate_ake_cert(hdcp, event_ctx, input);
|
||||
break;
|
||||
case D2_A1_SEND_NO_STORED_KM:
|
||||
status = send_no_stored_km(hdcp, event_ctx, input);
|
||||
break;
|
||||
case D2_A1_READ_H_PRIME:
|
||||
status = read_h_prime(hdcp, event_ctx, input);
|
||||
break;
|
||||
case D2_A1_READ_PAIRING_INFO_AND_VALIDATE_H_PRIME:
|
||||
status = read_pairing_info_and_validate_h_prime(hdcp,
|
||||
event_ctx, input);
|
||||
break;
|
||||
case D2_A1_SEND_STORED_KM:
|
||||
status = send_stored_km(hdcp, event_ctx, input);
|
||||
break;
|
||||
case D2_A1_VALIDATE_H_PRIME:
|
||||
status = validate_h_prime(hdcp, event_ctx, input);
|
||||
break;
|
||||
case D2_A2_LOCALITY_CHECK:
|
||||
status = locality_check(hdcp, event_ctx, input);
|
||||
break;
|
||||
case D2_A34_EXCHANGE_KS_AND_TEST_FOR_REPEATER:
|
||||
status = exchange_ks_and_test_for_repeater(hdcp,
|
||||
event_ctx, input);
|
||||
break;
|
||||
case D2_SEND_CONTENT_STREAM_TYPE:
|
||||
status = send_content_stream_type_dp(hdcp, event_ctx, input);
|
||||
break;
|
||||
case D2_ENABLE_ENCRYPTION:
|
||||
status = enable_encryption(hdcp, event_ctx, input);
|
||||
break;
|
||||
case D2_A5_AUTHENTICATED:
|
||||
status = authenticated(hdcp, event_ctx, input);
|
||||
break;
|
||||
case D2_A6_WAIT_FOR_RX_ID_LIST:
|
||||
status = wait_for_rx_id_list(hdcp, event_ctx, input);
|
||||
break;
|
||||
case D2_A78_VERIFY_RX_ID_LIST_AND_SEND_ACK:
|
||||
status = verify_rx_id_list_and_send_ack(hdcp, event_ctx, input);
|
||||
break;
|
||||
case D2_A9_SEND_STREAM_MANAGEMENT:
|
||||
status = send_stream_management(hdcp, event_ctx, input);
|
||||
break;
|
||||
case D2_A9_VALIDATE_STREAM_READY:
|
||||
status = validate_stream_ready(hdcp, event_ctx, input);
|
||||
break;
|
||||
default:
|
||||
status = MOD_HDCP_STATUS_INVALID_STATE;
|
||||
break;
|
||||
}
|
||||
|
||||
return status;
|
||||
}
|
|
@ -0,0 +1,674 @@
|
|||
/*
|
||||
* Copyright 2018 Advanced Micro Devices, Inc.
|
||||
*
|
||||
* Permission is hereby granted, free of charge, to any person obtaining a
|
||||
* copy of this software and associated documentation files (the "Software"),
|
||||
* to deal in the Software without restriction, including without limitation
|
||||
* the rights to use, copy, modify, merge, publish, distribute, sublicense,
|
||||
* and/or sell copies of the Software, and to permit persons to whom the
|
||||
* Software is furnished to do so, subject to the following conditions:
|
||||
*
|
||||
* The above copyright notice and this permission notice shall be included in
|
||||
* all copies or substantial portions of the Software.
|
||||
*
|
||||
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
||||
* IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
||||
* FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL
|
||||
* THE COPYRIGHT HOLDER(S) OR AUTHOR(S) BE LIABLE FOR ANY CLAIM, DAMAGES OR
|
||||
* OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE,
|
||||
* ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR
|
||||
* OTHER DEALINGS IN THE SOFTWARE.
|
||||
*
|
||||
* Authors: AMD
|
||||
*
|
||||
*/
|
||||
|
||||
#include "hdcp.h"
|
||||
|
||||
enum mod_hdcp_status mod_hdcp_hdcp2_transition(struct mod_hdcp *hdcp,
|
||||
struct mod_hdcp_event_context *event_ctx,
|
||||
struct mod_hdcp_transition_input_hdcp2 *input,
|
||||
struct mod_hdcp_output *output)
|
||||
{
|
||||
enum mod_hdcp_status status = MOD_HDCP_STATUS_SUCCESS;
|
||||
struct mod_hdcp_connection *conn = &hdcp->connection;
|
||||
struct mod_hdcp_link_adjustment *adjust = &hdcp->connection.link.adjust;
|
||||
|
||||
switch (current_state(hdcp)) {
|
||||
case H2_A0_KNOWN_HDCP2_CAPABLE_RX:
|
||||
if (input->hdcp2version_read != PASS ||
|
||||
input->hdcp2_capable_check != PASS) {
|
||||
adjust->hdcp2.disable = 1;
|
||||
callback_in_ms(0, output);
|
||||
set_state_id(hdcp, output, HDCP_INITIALIZED);
|
||||
} else {
|
||||
callback_in_ms(0, output);
|
||||
set_state_id(hdcp, output, H2_A1_SEND_AKE_INIT);
|
||||
}
|
||||
break;
|
||||
case H2_A1_SEND_AKE_INIT:
|
||||
if (input->add_topology != PASS ||
|
||||
input->create_session != PASS ||
|
||||
input->ake_init_prepare != PASS) {
|
||||
/* out of sync with psp state */
|
||||
adjust->hdcp2.disable = 1;
|
||||
fail_and_restart_in_ms(0, &status, output);
|
||||
break;
|
||||
} else if (input->ake_init_write != PASS) {
|
||||
fail_and_restart_in_ms(0, &status, output);
|
||||
break;
|
||||
}
|
||||
set_watchdog_in_ms(hdcp, 100, output);
|
||||
callback_in_ms(0, output);
|
||||
set_state_id(hdcp, output, H2_A1_VALIDATE_AKE_CERT);
|
||||
break;
|
||||
case H2_A1_VALIDATE_AKE_CERT:
|
||||
if (input->ake_cert_available != PASS) {
|
||||
if (event_ctx->event ==
|
||||
MOD_HDCP_EVENT_WATCHDOG_TIMEOUT) {
|
||||
/* 1A-08: consider ake timeout a failure */
|
||||
/* some hdmi receivers are not ready for HDCP
|
||||
* immediately after video becomes active,
|
||||
* delay 1s before retry on first HDCP message
|
||||
* timeout.
|
||||
*/
|
||||
fail_and_restart_in_ms(1000, &status, output);
|
||||
} else {
|
||||
/* continue ake cert polling*/
|
||||
callback_in_ms(10, output);
|
||||
increment_stay_counter(hdcp);
|
||||
}
|
||||
break;
|
||||
} else if (input->ake_cert_read != PASS ||
|
||||
input->ake_cert_validation != PASS) {
|
||||
/*
|
||||
* 1A-09: consider invalid ake cert a failure
|
||||
* 1A-10: consider receiver id listed in SRM a failure
|
||||
*/
|
||||
fail_and_restart_in_ms(0, &status, output);
|
||||
break;
|
||||
}
|
||||
if (conn->is_km_stored &&
|
||||
!adjust->hdcp2.force_no_stored_km) {
|
||||
callback_in_ms(0, output);
|
||||
set_state_id(hdcp, output, H2_A1_SEND_STORED_KM);
|
||||
} else {
|
||||
callback_in_ms(0, output);
|
||||
set_state_id(hdcp, output, H2_A1_SEND_NO_STORED_KM);
|
||||
}
|
||||
break;
|
||||
case H2_A1_SEND_NO_STORED_KM:
|
||||
if (input->no_stored_km_write != PASS) {
|
||||
fail_and_restart_in_ms(0, &status, output);
|
||||
break;
|
||||
}
|
||||
if (adjust->hdcp2.increase_h_prime_timeout)
|
||||
set_watchdog_in_ms(hdcp, 2000, output);
|
||||
else
|
||||
set_watchdog_in_ms(hdcp, 1000, output);
|
||||
callback_in_ms(0, output);
|
||||
set_state_id(hdcp, output, H2_A1_READ_H_PRIME);
|
||||
break;
|
||||
case H2_A1_READ_H_PRIME:
|
||||
if (input->h_prime_available != PASS) {
|
||||
if (event_ctx->event ==
|
||||
MOD_HDCP_EVENT_WATCHDOG_TIMEOUT) {
|
||||
/* 1A-11-3: consider h' timeout a failure */
|
||||
fail_and_restart_in_ms(0, &status, output);
|
||||
} else {
|
||||
/* continue h' polling */
|
||||
callback_in_ms(100, output);
|
||||
increment_stay_counter(hdcp);
|
||||
}
|
||||
break;
|
||||
} else if (input->h_prime_read != PASS) {
|
||||
fail_and_restart_in_ms(0, &status, output);
|
||||
break;
|
||||
}
|
||||
set_watchdog_in_ms(hdcp, 200, output);
|
||||
callback_in_ms(0, output);
|
||||
set_state_id(hdcp, output, H2_A1_READ_PAIRING_INFO_AND_VALIDATE_H_PRIME);
|
||||
break;
|
||||
case H2_A1_READ_PAIRING_INFO_AND_VALIDATE_H_PRIME:
|
||||
if (input->pairing_available != PASS) {
|
||||
if (event_ctx->event ==
|
||||
MOD_HDCP_EVENT_WATCHDOG_TIMEOUT) {
|
||||
/* 1A-12: consider pairing info timeout
|
||||
* a failure
|
||||
*/
|
||||
fail_and_restart_in_ms(0, &status, output);
|
||||
} else {
|
||||
/* continue pairing info polling */
|
||||
callback_in_ms(20, output);
|
||||
increment_stay_counter(hdcp);
|
||||
}
|
||||
break;
|
||||
} else if (input->pairing_info_read != PASS ||
|
||||
input->h_prime_validation != PASS) {
|
||||
/* 1A-11-1: consider invalid h' a failure */
|
||||
fail_and_restart_in_ms(0, &status, output);
|
||||
break;
|
||||
}
|
||||
callback_in_ms(0, output);
|
||||
set_state_id(hdcp, output, H2_A2_LOCALITY_CHECK);
|
||||
break;
|
||||
case H2_A1_SEND_STORED_KM:
|
||||
if (input->stored_km_write != PASS) {
|
||||
fail_and_restart_in_ms(0, &status, output);
|
||||
break;
|
||||
}
|
||||
set_watchdog_in_ms(hdcp, 200, output);
|
||||
callback_in_ms(0, output);
|
||||
set_state_id(hdcp, output, H2_A1_VALIDATE_H_PRIME);
|
||||
break;
|
||||
case H2_A1_VALIDATE_H_PRIME:
|
||||
if (input->h_prime_available != PASS) {
|
||||
if (event_ctx->event ==
|
||||
MOD_HDCP_EVENT_WATCHDOG_TIMEOUT) {
|
||||
/* 1A-11-2: consider h' timeout a failure */
|
||||
fail_and_restart_in_ms(0, &status, output);
|
||||
} else {
|
||||
/* continue h' polling */
|
||||
callback_in_ms(20, output);
|
||||
increment_stay_counter(hdcp);
|
||||
}
|
||||
break;
|
||||
} else if (input->h_prime_read != PASS) {
|
||||
fail_and_restart_in_ms(0, &status, output);
|
||||
break;
|
||||
} else if (input->h_prime_validation != PASS) {
|
||||
/* 1A-11-1: consider invalid h' a failure */
|
||||
adjust->hdcp2.force_no_stored_km = 1;
|
||||
fail_and_restart_in_ms(0, &status, output);
|
||||
break;
|
||||
}
|
||||
callback_in_ms(0, output);
|
||||
set_state_id(hdcp, output, H2_A2_LOCALITY_CHECK);
|
||||
break;
|
||||
case H2_A2_LOCALITY_CHECK:
|
||||
if (hdcp->state.stay_count > 10 ||
|
||||
input->lc_init_prepare != PASS ||
|
||||
input->lc_init_write != PASS ||
|
||||
input->l_prime_available_poll != PASS ||
|
||||
input->l_prime_read != PASS) {
|
||||
/*
|
||||
* 1A-05: consider disconnection after LC init a failure
|
||||
* 1A-13-1: consider invalid l' a failure
|
||||
* 1A-13-2: consider l' timeout a failure
|
||||
*/
|
||||
fail_and_restart_in_ms(0, &status, output);
|
||||
break;
|
||||
} else if (input->l_prime_validation != PASS) {
|
||||
callback_in_ms(0, output);
|
||||
increment_stay_counter(hdcp);
|
||||
break;
|
||||
}
|
||||
callback_in_ms(0, output);
|
||||
set_state_id(hdcp, output, H2_A3_EXCHANGE_KS_AND_TEST_FOR_REPEATER);
|
||||
break;
|
||||
case H2_A3_EXCHANGE_KS_AND_TEST_FOR_REPEATER:
|
||||
if (input->eks_prepare != PASS ||
|
||||
input->eks_write != PASS) {
|
||||
fail_and_restart_in_ms(0, &status, output);
|
||||
break;
|
||||
}
|
||||
if (conn->is_repeater) {
|
||||
set_watchdog_in_ms(hdcp, 3000, output);
|
||||
callback_in_ms(0, output);
|
||||
set_state_id(hdcp, output, H2_A6_WAIT_FOR_RX_ID_LIST);
|
||||
} else {
|
||||
/* some CTS equipment requires a delay GREATER than
|
||||
* 200 ms, so delay 210 ms instead of 200 ms
|
||||
*/
|
||||
callback_in_ms(210, output);
|
||||
set_state_id(hdcp, output, H2_ENABLE_ENCRYPTION);
|
||||
}
|
||||
break;
|
||||
case H2_ENABLE_ENCRYPTION:
|
||||
if (input->rxstatus_read != PASS ||
|
||||
input->reauth_request_check != PASS) {
|
||||
/*
|
||||
* 1A-07: restart hdcp on REAUTH_REQ
|
||||
* 1B-08: restart hdcp on REAUTH_REQ
|
||||
*/
|
||||
fail_and_restart_in_ms(0, &status, output);
|
||||
break;
|
||||
} else if (event_ctx->rx_id_list_ready && conn->is_repeater) {
|
||||
callback_in_ms(0, output);
|
||||
set_state_id(hdcp, output, H2_A78_VERIFY_RX_ID_LIST_AND_SEND_ACK);
|
||||
break;
|
||||
} else if (input->enable_encryption != PASS) {
|
||||
fail_and_restart_in_ms(0, &status, output);
|
||||
break;
|
||||
}
|
||||
callback_in_ms(0, output);
|
||||
set_state_id(hdcp, output, H2_A5_AUTHENTICATED);
|
||||
HDCP_FULL_DDC_TRACE(hdcp);
|
||||
break;
|
||||
case H2_A5_AUTHENTICATED:
|
||||
if (input->rxstatus_read != PASS ||
|
||||
input->reauth_request_check != PASS) {
|
||||
fail_and_restart_in_ms(0, &status, output);
|
||||
break;
|
||||
} else if (event_ctx->rx_id_list_ready && conn->is_repeater) {
|
||||
callback_in_ms(0, output);
|
||||
set_state_id(hdcp, output, H2_A78_VERIFY_RX_ID_LIST_AND_SEND_ACK);
|
||||
break;
|
||||
}
|
||||
callback_in_ms(500, output);
|
||||
increment_stay_counter(hdcp);
|
||||
break;
|
||||
case H2_A6_WAIT_FOR_RX_ID_LIST:
|
||||
if (input->rxstatus_read != PASS ||
|
||||
input->reauth_request_check != PASS) {
|
||||
fail_and_restart_in_ms(0, &status, output);
|
||||
break;
|
||||
} else if (!event_ctx->rx_id_list_ready) {
|
||||
if (event_ctx->event == MOD_HDCP_EVENT_WATCHDOG_TIMEOUT) {
|
||||
/* 1B-02: consider rx id list timeout a failure */
|
||||
/* some CTS equipment's actual timeout
|
||||
* measurement is slightly greater than 3000 ms.
|
||||
* Delay 100 ms to ensure it is fully timeout
|
||||
* before re-authentication.
|
||||
*/
|
||||
fail_and_restart_in_ms(100, &status, output);
|
||||
} else {
|
||||
callback_in_ms(300, output);
|
||||
increment_stay_counter(hdcp);
|
||||
}
|
||||
break;
|
||||
}
|
||||
callback_in_ms(0, output);
|
||||
set_state_id(hdcp, output, H2_A78_VERIFY_RX_ID_LIST_AND_SEND_ACK);
|
||||
break;
|
||||
case H2_A78_VERIFY_RX_ID_LIST_AND_SEND_ACK:
|
||||
if (input->rxstatus_read != PASS ||
|
||||
input->reauth_request_check != PASS ||
|
||||
input->rx_id_list_read != PASS ||
|
||||
input->device_count_check != PASS ||
|
||||
input->rx_id_list_validation != PASS ||
|
||||
input->repeater_auth_ack_write != PASS) {
|
||||
/* 1B-03: consider invalid v' a failure
|
||||
* 1B-04: consider MAX_DEVS_EXCEEDED a failure
|
||||
* 1B-05: consider MAX_CASCADE_EXCEEDED a failure
|
||||
* 1B-06: consider invalid seq_num_V a failure
|
||||
* 1B-09: consider seq_num_V rollover a failure
|
||||
*/
|
||||
fail_and_restart_in_ms(0, &status, output);
|
||||
break;
|
||||
}
|
||||
callback_in_ms(0, output);
|
||||
set_state_id(hdcp, output, H2_A9_SEND_STREAM_MANAGEMENT);
|
||||
break;
|
||||
case H2_A9_SEND_STREAM_MANAGEMENT:
|
||||
if (input->rxstatus_read != PASS ||
|
||||
input->reauth_request_check != PASS) {
|
||||
fail_and_restart_in_ms(0, &status, output);
|
||||
break;
|
||||
} else if (event_ctx->rx_id_list_ready && conn->is_repeater) {
|
||||
callback_in_ms(0, output);
|
||||
set_state_id(hdcp, output, H2_A78_VERIFY_RX_ID_LIST_AND_SEND_ACK);
|
||||
break;
|
||||
} else if (input->prepare_stream_manage != PASS ||
|
||||
input->stream_manage_write != PASS) {
|
||||
fail_and_restart_in_ms(0, &status, output);
|
||||
break;
|
||||
}
|
||||
set_watchdog_in_ms(hdcp, 100, output);
|
||||
callback_in_ms(0, output);
|
||||
set_state_id(hdcp, output, H2_A9_VALIDATE_STREAM_READY);
|
||||
break;
|
||||
case H2_A9_VALIDATE_STREAM_READY:
|
||||
if (input->rxstatus_read != PASS ||
|
||||
input->reauth_request_check != PASS) {
|
||||
fail_and_restart_in_ms(0, &status, output);
|
||||
break;
|
||||
} else if (event_ctx->rx_id_list_ready && conn->is_repeater) {
|
||||
callback_in_ms(0, output);
|
||||
set_state_id(hdcp, output, H2_A78_VERIFY_RX_ID_LIST_AND_SEND_ACK);
|
||||
break;
|
||||
} else if (input->stream_ready_available != PASS) {
|
||||
if (event_ctx->event == MOD_HDCP_EVENT_WATCHDOG_TIMEOUT) {
|
||||
/* 1B-10-2: restart content stream management on
|
||||
* stream ready timeout
|
||||
*/
|
||||
hdcp->auth.count.stream_management_retry_count++;
|
||||
callback_in_ms(0, output);
|
||||
set_state_id(hdcp, output, H2_A9_SEND_STREAM_MANAGEMENT);
|
||||
} else {
|
||||
callback_in_ms(10, output);
|
||||
increment_stay_counter(hdcp);
|
||||
}
|
||||
break;
|
||||
} else if (input->stream_ready_read != PASS ||
|
||||
input->stream_ready_validation != PASS) {
|
||||
/*
|
||||
* 1B-10-1: restart content stream management
|
||||
* on invalid M'
|
||||
*/
|
||||
if (hdcp->auth.count.stream_management_retry_count > 10) {
|
||||
fail_and_restart_in_ms(0, &status, output);
|
||||
} else {
|
||||
hdcp->auth.count.stream_management_retry_count++;
|
||||
callback_in_ms(0, output);
|
||||
set_state_id(hdcp, output, H2_A9_SEND_STREAM_MANAGEMENT);
|
||||
}
|
||||
break;
|
||||
}
|
||||
callback_in_ms(200, output);
|
||||
set_state_id(hdcp, output, H2_ENABLE_ENCRYPTION);
|
||||
break;
|
||||
default:
|
||||
status = MOD_HDCP_STATUS_INVALID_STATE;
|
||||
fail_and_restart_in_ms(0, &status, output);
|
||||
break;
|
||||
}
|
||||
|
||||
return status;
|
||||
}
|
||||
|
||||
enum mod_hdcp_status mod_hdcp_hdcp2_dp_transition(struct mod_hdcp *hdcp,
|
||||
struct mod_hdcp_event_context *event_ctx,
|
||||
struct mod_hdcp_transition_input_hdcp2 *input,
|
||||
struct mod_hdcp_output *output)
|
||||
{
|
||||
enum mod_hdcp_status status = MOD_HDCP_STATUS_SUCCESS;
|
||||
struct mod_hdcp_connection *conn = &hdcp->connection;
|
||||
struct mod_hdcp_link_adjustment *adjust = &hdcp->connection.link.adjust;
|
||||
|
||||
switch (current_state(hdcp)) {
|
||||
case D2_A0_DETERMINE_RX_HDCP_CAPABLE:
|
||||
if (input->rx_caps_read_dp != PASS ||
|
||||
input->hdcp2_capable_check != PASS) {
|
||||
adjust->hdcp2.disable = 1;
|
||||
callback_in_ms(0, output);
|
||||
set_state_id(hdcp, output, HDCP_INITIALIZED);
|
||||
} else {
|
||||
callback_in_ms(0, output);
|
||||
set_state_id(hdcp, output, D2_A1_SEND_AKE_INIT);
|
||||
}
|
||||
break;
|
||||
case D2_A1_SEND_AKE_INIT:
|
||||
if (input->add_topology != PASS ||
|
||||
input->create_session != PASS ||
|
||||
input->ake_init_prepare != PASS) {
|
||||
/* out of sync with psp state */
|
||||
adjust->hdcp2.disable = 1;
|
||||
fail_and_restart_in_ms(0, &status, output);
|
||||
break;
|
||||
} else if (input->ake_init_write != PASS) {
|
||||
/* possibly display not ready */
|
||||
fail_and_restart_in_ms(0, &status, output);
|
||||
break;
|
||||
}
|
||||
callback_in_ms(100, output);
|
||||
set_state_id(hdcp, output, D2_A1_VALIDATE_AKE_CERT);
|
||||
break;
|
||||
case D2_A1_VALIDATE_AKE_CERT:
|
||||
if (input->ake_cert_read != PASS ||
|
||||
input->ake_cert_validation != PASS) {
|
||||
/*
|
||||
* 1A-08: consider invalid ake cert a failure
|
||||
* 1A-09: consider receiver id listed in SRM a failure
|
||||
*/
|
||||
fail_and_restart_in_ms(0, &status, output);
|
||||
break;
|
||||
}
|
||||
if (conn->is_km_stored &&
|
||||
!adjust->hdcp2.force_no_stored_km) {
|
||||
callback_in_ms(0, output);
|
||||
set_state_id(hdcp, output, D2_A1_SEND_STORED_KM);
|
||||
} else {
|
||||
callback_in_ms(0, output);
|
||||
set_state_id(hdcp, output, D2_A1_SEND_NO_STORED_KM);
|
||||
}
|
||||
break;
|
||||
case D2_A1_SEND_NO_STORED_KM:
|
||||
if (input->no_stored_km_write != PASS) {
|
||||
fail_and_restart_in_ms(0, &status, output);
|
||||
break;
|
||||
}
|
||||
if (adjust->hdcp2.increase_h_prime_timeout)
|
||||
set_watchdog_in_ms(hdcp, 2000, output);
|
||||
else
|
||||
set_watchdog_in_ms(hdcp, 1000, output);
|
||||
set_state_id(hdcp, output, D2_A1_READ_H_PRIME);
|
||||
break;
|
||||
case D2_A1_READ_H_PRIME:
|
||||
if (input->h_prime_available != PASS) {
|
||||
if (event_ctx->event ==
|
||||
MOD_HDCP_EVENT_WATCHDOG_TIMEOUT)
|
||||
/* 1A-10-3: consider h' timeout a failure */
|
||||
fail_and_restart_in_ms(0, &status, output);
|
||||
else
|
||||
increment_stay_counter(hdcp);
|
||||
break;
|
||||
} else if (input->h_prime_read != PASS) {
|
||||
fail_and_restart_in_ms(0, &status, output);
|
||||
break;
|
||||
}
|
||||
set_watchdog_in_ms(hdcp, 200, output);
|
||||
set_state_id(hdcp, output, D2_A1_READ_PAIRING_INFO_AND_VALIDATE_H_PRIME);
|
||||
break;
|
||||
case D2_A1_READ_PAIRING_INFO_AND_VALIDATE_H_PRIME:
|
||||
if (input->pairing_available != PASS) {
|
||||
if (event_ctx->event ==
|
||||
MOD_HDCP_EVENT_WATCHDOG_TIMEOUT)
|
||||
/*
|
||||
* 1A-11: consider pairing info timeout
|
||||
* a failure
|
||||
*/
|
||||
fail_and_restart_in_ms(0, &status, output);
|
||||
else
|
||||
increment_stay_counter(hdcp);
|
||||
break;
|
||||
} else if (input->pairing_info_read != PASS ||
|
||||
input->h_prime_validation != PASS) {
|
||||
/* 1A-10-1: consider invalid h' a failure */
|
||||
fail_and_restart_in_ms(0, &status, output);
|
||||
break;
|
||||
}
|
||||
callback_in_ms(0, output);
|
||||
set_state_id(hdcp, output, D2_A2_LOCALITY_CHECK);
|
||||
break;
|
||||
case D2_A1_SEND_STORED_KM:
|
||||
if (input->stored_km_write != PASS) {
|
||||
fail_and_restart_in_ms(0, &status, output);
|
||||
break;
|
||||
}
|
||||
set_watchdog_in_ms(hdcp, 200, output);
|
||||
set_state_id(hdcp, output, D2_A1_VALIDATE_H_PRIME);
|
||||
break;
|
||||
case D2_A1_VALIDATE_H_PRIME:
|
||||
if (input->h_prime_available != PASS) {
|
||||
if (event_ctx->event ==
|
||||
MOD_HDCP_EVENT_WATCHDOG_TIMEOUT)
|
||||
/* 1A-10-2: consider h' timeout a failure */
|
||||
fail_and_restart_in_ms(0, &status, output);
|
||||
else
|
||||
increment_stay_counter(hdcp);
|
||||
break;
|
||||
} else if (input->h_prime_read != PASS) {
|
||||
fail_and_restart_in_ms(0, &status, output);
|
||||
break;
|
||||
} else if (input->h_prime_validation != PASS) {
|
||||
/* 1A-10-1: consider invalid h' a failure */
|
||||
adjust->hdcp2.force_no_stored_km = 1;
|
||||
fail_and_restart_in_ms(0, &status, output);
|
||||
break;
|
||||
}
|
||||
callback_in_ms(0, output);
|
||||
set_state_id(hdcp, output, D2_A2_LOCALITY_CHECK);
|
||||
break;
|
||||
case D2_A2_LOCALITY_CHECK:
|
||||
if (hdcp->state.stay_count > 10 ||
|
||||
input->lc_init_prepare != PASS ||
|
||||
input->lc_init_write != PASS ||
|
||||
input->l_prime_read != PASS) {
|
||||
/* 1A-12: consider invalid l' a failure */
|
||||
fail_and_restart_in_ms(0, &status, output);
|
||||
break;
|
||||
} else if (input->l_prime_validation != PASS) {
|
||||
callback_in_ms(0, output);
|
||||
increment_stay_counter(hdcp);
|
||||
break;
|
||||
}
|
||||
callback_in_ms(0, output);
|
||||
set_state_id(hdcp, output, D2_A34_EXCHANGE_KS_AND_TEST_FOR_REPEATER);
|
||||
break;
|
||||
case D2_A34_EXCHANGE_KS_AND_TEST_FOR_REPEATER:
|
||||
if (input->eks_prepare != PASS ||
|
||||
input->eks_write != PASS) {
|
||||
fail_and_restart_in_ms(0, &status, output);
|
||||
break;
|
||||
}
|
||||
if (conn->is_repeater) {
|
||||
set_watchdog_in_ms(hdcp, 3000, output);
|
||||
set_state_id(hdcp, output, D2_A6_WAIT_FOR_RX_ID_LIST);
|
||||
} else {
|
||||
callback_in_ms(0, output);
|
||||
set_state_id(hdcp, output, D2_SEND_CONTENT_STREAM_TYPE);
|
||||
}
|
||||
break;
|
||||
case D2_SEND_CONTENT_STREAM_TYPE:
|
||||
if (input->rxstatus_read != PASS ||
|
||||
input->reauth_request_check != PASS ||
|
||||
input->link_integrity_check_dp != PASS ||
|
||||
input->content_stream_type_write != PASS) {
|
||||
fail_and_restart_in_ms(0, &status, output);
|
||||
break;
|
||||
}
|
||||
callback_in_ms(210, output);
|
||||
set_state_id(hdcp, output, D2_ENABLE_ENCRYPTION);
|
||||
break;
|
||||
case D2_ENABLE_ENCRYPTION:
|
||||
if (input->rxstatus_read != PASS ||
|
||||
input->reauth_request_check != PASS ||
|
||||
input->link_integrity_check_dp != PASS) {
|
||||
/*
|
||||
* 1A-07: restart hdcp on REAUTH_REQ
|
||||
* 1B-08: restart hdcp on REAUTH_REQ
|
||||
*/
|
||||
fail_and_restart_in_ms(0, &status, output);
|
||||
break;
|
||||
} else if (event_ctx->rx_id_list_ready && conn->is_repeater) {
|
||||
callback_in_ms(0, output);
|
||||
set_state_id(hdcp, output, D2_A78_VERIFY_RX_ID_LIST_AND_SEND_ACK);
|
||||
break;
|
||||
} else if (input->enable_encryption != PASS ||
|
||||
(is_dp_mst_hdcp(hdcp) && input->stream_encryption_dp != PASS)) {
|
||||
fail_and_restart_in_ms(0, &status, output);
|
||||
break;
|
||||
}
|
||||
set_state_id(hdcp, output, D2_A5_AUTHENTICATED);
|
||||
HDCP_FULL_DDC_TRACE(hdcp);
|
||||
break;
|
||||
case D2_A5_AUTHENTICATED:
|
||||
if (input->rxstatus_read != PASS ||
|
||||
input->reauth_request_check != PASS) {
|
||||
fail_and_restart_in_ms(0, &status, output);
|
||||
break;
|
||||
} else if (input->link_integrity_check_dp != PASS) {
|
||||
if (hdcp->connection.hdcp2_retry_count >= 1)
|
||||
adjust->hdcp2.disable_type1 = 1;
|
||||
fail_and_restart_in_ms(0, &status, output);
|
||||
break;
|
||||
} else if (event_ctx->rx_id_list_ready && conn->is_repeater) {
|
||||
callback_in_ms(0, output);
|
||||
set_state_id(hdcp, output, D2_A78_VERIFY_RX_ID_LIST_AND_SEND_ACK);
|
||||
break;
|
||||
}
|
||||
increment_stay_counter(hdcp);
|
||||
break;
|
||||
case D2_A6_WAIT_FOR_RX_ID_LIST:
|
||||
if (input->rxstatus_read != PASS ||
|
||||
input->reauth_request_check != PASS ||
|
||||
input->link_integrity_check_dp != PASS) {
|
||||
fail_and_restart_in_ms(0, &status, output);
|
||||
break;
|
||||
} else if (!event_ctx->rx_id_list_ready) {
|
||||
if (event_ctx->event == MOD_HDCP_EVENT_WATCHDOG_TIMEOUT)
|
||||
/* 1B-02: consider rx id list timeout a failure */
|
||||
fail_and_restart_in_ms(0, &status, output);
|
||||
else
|
||||
increment_stay_counter(hdcp);
|
||||
break;
|
||||
}
|
||||
callback_in_ms(0, output);
|
||||
set_state_id(hdcp, output, D2_A78_VERIFY_RX_ID_LIST_AND_SEND_ACK);
|
||||
break;
|
||||
case D2_A78_VERIFY_RX_ID_LIST_AND_SEND_ACK:
|
||||
if (input->rxstatus_read != PASS ||
|
||||
input->reauth_request_check != PASS ||
|
||||
input->link_integrity_check_dp != PASS ||
|
||||
input->rx_id_list_read != PASS ||
|
||||
input->device_count_check != PASS ||
|
||||
input->rx_id_list_validation != PASS ||
|
||||
input->repeater_auth_ack_write != PASS) {
|
||||
/*
|
||||
* 1B-03: consider invalid v' a failure
|
||||
* 1B-04: consider MAX_DEVS_EXCEEDED a failure
|
||||
* 1B-05: consider MAX_CASCADE_EXCEEDED a failure
|
||||
* 1B-06: consider invalid seq_num_V a failure
|
||||
* 1B-09: consider seq_num_V rollover a failure
|
||||
*/
|
||||
fail_and_restart_in_ms(0, &status, output);
|
||||
break;
|
||||
}
|
||||
callback_in_ms(0, output);
|
||||
set_state_id(hdcp, output, D2_A9_SEND_STREAM_MANAGEMENT);
|
||||
break;
|
||||
case D2_A9_SEND_STREAM_MANAGEMENT:
|
||||
if (input->rxstatus_read != PASS ||
|
||||
input->reauth_request_check != PASS ||
|
||||
input->link_integrity_check_dp != PASS) {
|
||||
fail_and_restart_in_ms(0, &status, output);
|
||||
break;
|
||||
} else if (event_ctx->rx_id_list_ready) {
|
||||
callback_in_ms(0, output);
|
||||
set_state_id(hdcp, output, D2_A78_VERIFY_RX_ID_LIST_AND_SEND_ACK);
|
||||
break;
|
||||
} else if (input->prepare_stream_manage != PASS ||
|
||||
input->stream_manage_write != PASS) {
|
||||
fail_and_restart_in_ms(0, &status, output);
|
||||
break;
|
||||
}
|
||||
callback_in_ms(100, output);
|
||||
set_state_id(hdcp, output, D2_A9_VALIDATE_STREAM_READY);
|
||||
break;
|
||||
case D2_A9_VALIDATE_STREAM_READY:
|
||||
if (input->rxstatus_read != PASS ||
|
||||
input->reauth_request_check != PASS ||
|
||||
input->link_integrity_check_dp != PASS) {
|
||||
fail_and_restart_in_ms(0, &status, output);
|
||||
break;
|
||||
} else if (event_ctx->rx_id_list_ready) {
|
||||
callback_in_ms(0, output);
|
||||
set_state_id(hdcp, output, D2_A78_VERIFY_RX_ID_LIST_AND_SEND_ACK);
|
||||
break;
|
||||
} else if (input->stream_ready_read != PASS ||
|
||||
input->stream_ready_validation != PASS) {
|
||||
/*
|
||||
* 1B-10-1: restart content stream management
|
||||
* on invalid M'
|
||||
* 1B-10-2: consider stream ready timeout a failure
|
||||
*/
|
||||
if (hdcp->auth.count.stream_management_retry_count > 10) {
|
||||
fail_and_restart_in_ms(0, &status, output);
|
||||
} else {
|
||||
hdcp->auth.count.stream_management_retry_count++;
|
||||
callback_in_ms(0, output);
|
||||
set_state_id(hdcp, output, D2_A9_SEND_STREAM_MANAGEMENT);
|
||||
}
|
||||
break;
|
||||
}
|
||||
callback_in_ms(200, output);
|
||||
set_state_id(hdcp, output, D2_ENABLE_ENCRYPTION);
|
||||
break;
|
||||
default:
|
||||
status = MOD_HDCP_STATUS_INVALID_STATE;
|
||||
fail_and_restart_in_ms(0, &status, output);
|
||||
break;
|
||||
}
|
||||
return status;
|
||||
}
|
|
@ -77,6 +77,7 @@ enum mod_hdcp_status {
|
|||
MOD_HDCP_STATUS_HDCP2_H_PRIME_PENDING,
|
||||
MOD_HDCP_STATUS_HDCP2_PAIRING_INFO_PENDING,
|
||||
MOD_HDCP_STATUS_HDCP2_VALIDATE_AKE_CERT_FAILURE,
|
||||
MOD_HDCP_STATUS_HDCP2_AKE_CERT_REVOKED,
|
||||
MOD_HDCP_STATUS_HDCP2_VALIDATE_H_PRIME_FAILURE,
|
||||
MOD_HDCP_STATUS_HDCP2_VALIDATE_PAIRING_INFO_FAILURE,
|
||||
MOD_HDCP_STATUS_HDCP2_PREP_LC_INIT_FAILURE,
|
||||
|
@ -86,6 +87,7 @@ enum mod_hdcp_status {
|
|||
MOD_HDCP_STATUS_HDCP2_ENABLE_ENCRYPTION_FAILURE,
|
||||
MOD_HDCP_STATUS_HDCP2_RX_ID_LIST_NOT_READY,
|
||||
MOD_HDCP_STATUS_HDCP2_VALIDATE_RX_ID_LIST_FAILURE,
|
||||
MOD_HDCP_STATUS_HDCP2_RX_ID_LIST_REVOKED,
|
||||
MOD_HDCP_STATUS_HDCP2_ENABLE_STREAM_ENCRYPTION,
|
||||
MOD_HDCP_STATUS_HDCP2_STREAM_READY_PENDING,
|
||||
MOD_HDCP_STATUS_HDCP2_VALIDATE_STREAM_READY_FAILURE,
|
||||
|
|
Loading…
Reference in New Issue