1 /*
2  * Copyright 2019 Advanced Micro Devices, Inc.
3  *
4  * Permission is hereby granted, free of charge, to any person obtaining a
5  * copy of this software and associated documentation files (the "Software"),
6  * to deal in the Software without restriction, including without limitation
7  * the rights to use, copy, modify, merge, publish, distribute, sublicense,
8  * and/or sell copies of the Software, and to permit persons to whom the
9  * Software is furnished to do so, subject to the following conditions:
10  *
11  * The above copyright notice and this permission notice shall be included in
12  * all copies or substantial portions of the Software.
13  *
14  * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
15  * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
16  * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.  IN NO EVENT SHALL
17  * THE COPYRIGHT HOLDER(S) OR AUTHOR(S) BE LIABLE FOR ANY CLAIM, DAMAGES OR
18  * OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE,
19  * ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR
20  * OTHER DEALINGS IN THE SOFTWARE.
21  *
22  * Authors: AMD
23  *
24  */
25 
26 #include "hdcp.h"
27 
mod_hdcp_hdcp1_transition(struct mod_hdcp * hdcp,struct mod_hdcp_event_context * event_ctx,struct mod_hdcp_transition_input_hdcp1 * input,struct mod_hdcp_output * output)28 enum mod_hdcp_status mod_hdcp_hdcp1_transition(struct mod_hdcp *hdcp,
29 		struct mod_hdcp_event_context *event_ctx,
30 		struct mod_hdcp_transition_input_hdcp1 *input,
31 		struct mod_hdcp_output *output)
32 {
33 	enum mod_hdcp_status status = MOD_HDCP_STATUS_SUCCESS;
34 	struct mod_hdcp_connection *conn = &hdcp->connection;
35 	struct mod_hdcp_link_adjustment *adjust = &hdcp->connection.link.adjust;
36 
37 	switch (current_state(hdcp)) {
38 	case H1_A0_WAIT_FOR_ACTIVE_RX:
39 		if (input->bksv_read != PASS || input->bcaps_read != PASS) {
40 			/* 1A-04: repeatedly attempts on port access failure */
41 			callback_in_ms(500, output);
42 			increment_stay_counter(hdcp);
43 			break;
44 		}
45 		callback_in_ms(0, output);
46 		set_state_id(hdcp, output, H1_A1_EXCHANGE_KSVS);
47 		break;
48 	case H1_A1_EXCHANGE_KSVS:
49 		if (input->create_session != PASS) {
50 			/* out of sync with psp state */
51 			adjust->hdcp1.disable = 1;
52 			fail_and_restart_in_ms(0, &status, output);
53 			break;
54 		} else if (input->an_write != PASS ||
55 				input->aksv_write != PASS ||
56 				input->bksv_read != PASS ||
57 				input->bksv_validation != PASS ||
58 				input->ainfo_write == FAIL) {
59 			/* 1A-05: consider invalid bksv a failure */
60 			fail_and_restart_in_ms(0, &status, output);
61 			break;
62 		}
63 		callback_in_ms(300, output);
64 		set_state_id(hdcp, output,
65 			H1_A2_COMPUTATIONS_A3_VALIDATE_RX_A6_TEST_FOR_REPEATER);
66 		break;
67 	case H1_A2_COMPUTATIONS_A3_VALIDATE_RX_A6_TEST_FOR_REPEATER:
68 		if (input->bcaps_read != PASS ||
69 				input->r0p_read != PASS) {
70 			fail_and_restart_in_ms(0, &status, output);
71 			break;
72 		} else if (input->rx_validation != PASS) {
73 			/* 1A-06: consider invalid r0' a failure */
74 			/* 1A-08: consider bksv listed in SRM a failure */
75 			/*
76 			 * some slow RX will fail rx validation when it is
77 			 * not ready. give it more time to react before retry.
78 			 */
79 			fail_and_restart_in_ms(1000, &status, output);
80 			break;
81 		} else if (!conn->is_repeater && input->encryption != PASS) {
82 			fail_and_restart_in_ms(0, &status, output);
83 			break;
84 		}
85 		if (conn->is_repeater) {
86 			callback_in_ms(0, output);
87 			set_watchdog_in_ms(hdcp, 5000, output);
88 			set_state_id(hdcp, output, H1_A8_WAIT_FOR_READY);
89 		} else {
90 			callback_in_ms(0, output);
91 			set_state_id(hdcp, output, H1_A45_AUTHENTICATED);
92 			set_auth_complete(hdcp, output);
93 		}
94 		break;
95 	case H1_A45_AUTHENTICATED:
96 		if (input->link_maintenance == FAIL) {
97 			/* 1A-07: consider invalid ri' a failure */
98 			/* 1A-07a: consider read ri' not returned a failure */
99 			fail_and_restart_in_ms(0, &status, output);
100 			break;
101 		}
102 		callback_in_ms(500, output);
103 		increment_stay_counter(hdcp);
104 		break;
105 	case H1_A8_WAIT_FOR_READY:
106 		if (input->ready_check != PASS) {
107 			if (event_ctx->event ==
108 					MOD_HDCP_EVENT_WATCHDOG_TIMEOUT) {
109 				/* 1B-03: fail hdcp on ksv list READY timeout */
110 				/* prevent black screen in next attempt */
111 				adjust->hdcp1.postpone_encryption = 1;
112 				fail_and_restart_in_ms(0, &status, output);
113 			} else {
114 				/* continue ksv list READY polling*/
115 				callback_in_ms(500, output);
116 				increment_stay_counter(hdcp);
117 			}
118 			break;
119 		}
120 		callback_in_ms(0, output);
121 		set_state_id(hdcp, output, H1_A9_READ_KSV_LIST);
122 		break;
123 	case H1_A9_READ_KSV_LIST:
124 		if (input->bstatus_read != PASS ||
125 				input->max_cascade_check != PASS ||
126 				input->max_devs_check != PASS ||
127 				input->device_count_check != PASS ||
128 				input->ksvlist_read != PASS ||
129 				input->vp_read != PASS ||
130 				input->ksvlist_vp_validation != PASS ||
131 				input->encryption != PASS) {
132 			/* 1B-06: consider MAX_CASCADE_EXCEEDED a failure */
133 			/* 1B-05: consider MAX_DEVS_EXCEEDED a failure */
134 			/* 1B-04: consider invalid v' a failure */
135 			fail_and_restart_in_ms(0, &status, output);
136 			break;
137 		}
138 		callback_in_ms(0, output);
139 		set_state_id(hdcp, output, H1_A45_AUTHENTICATED);
140 		set_auth_complete(hdcp, output);
141 		break;
142 	default:
143 		status = MOD_HDCP_STATUS_INVALID_STATE;
144 		fail_and_restart_in_ms(0, &status, output);
145 		break;
146 	}
147 
148 	return status;
149 }
150 
mod_hdcp_hdcp1_dp_transition(struct mod_hdcp * hdcp,struct mod_hdcp_event_context * event_ctx,struct mod_hdcp_transition_input_hdcp1 * input,struct mod_hdcp_output * output)151 enum mod_hdcp_status mod_hdcp_hdcp1_dp_transition(struct mod_hdcp *hdcp,
152 		struct mod_hdcp_event_context *event_ctx,
153 		struct mod_hdcp_transition_input_hdcp1 *input,
154 		struct mod_hdcp_output *output)
155 {
156 	enum mod_hdcp_status status = MOD_HDCP_STATUS_SUCCESS;
157 	struct mod_hdcp_connection *conn = &hdcp->connection;
158 	struct mod_hdcp_link_adjustment *adjust = &hdcp->connection.link.adjust;
159 
160 	switch (current_state(hdcp)) {
161 	case D1_A0_DETERMINE_RX_HDCP_CAPABLE:
162 		if (input->bcaps_read != PASS) {
163 			/* 1A-04: no authentication on bcaps read failure */
164 			fail_and_restart_in_ms(0, &status, output);
165 			break;
166 		} else if (input->hdcp_capable_dp != PASS) {
167 			adjust->hdcp1.disable = 1;
168 			fail_and_restart_in_ms(0, &status, output);
169 			break;
170 		}
171 		callback_in_ms(0, output);
172 		set_state_id(hdcp, output, D1_A1_EXCHANGE_KSVS);
173 		break;
174 	case D1_A1_EXCHANGE_KSVS:
175 		if (input->create_session != PASS) {
176 			/* out of sync with psp state */
177 			adjust->hdcp1.disable = 1;
178 			fail_and_restart_in_ms(0, &status, output);
179 			break;
180 		} else if (input->an_write != PASS ||
181 				input->aksv_write != PASS ||
182 				input->bksv_read != PASS ||
183 				input->bksv_validation != PASS ||
184 				input->ainfo_write == FAIL) {
185 			/* 1A-05: consider invalid bksv a failure */
186 			fail_and_restart_in_ms(0, &status, output);
187 			break;
188 		}
189 		set_watchdog_in_ms(hdcp, 100, output);
190 		set_state_id(hdcp, output, D1_A23_WAIT_FOR_R0_PRIME);
191 		break;
192 	case D1_A23_WAIT_FOR_R0_PRIME:
193 		if (input->bstatus_read != PASS) {
194 			fail_and_restart_in_ms(0, &status, output);
195 			break;
196 		} else if (input->r0p_available_dp != PASS) {
197 			if (event_ctx->event == MOD_HDCP_EVENT_WATCHDOG_TIMEOUT)
198 				fail_and_restart_in_ms(0, &status, output);
199 			else
200 				increment_stay_counter(hdcp);
201 			break;
202 		}
203 		callback_in_ms(0, output);
204 		set_state_id(hdcp, output, D1_A2_COMPUTATIONS_A3_VALIDATE_RX_A5_TEST_FOR_REPEATER);
205 		break;
206 	case D1_A2_COMPUTATIONS_A3_VALIDATE_RX_A5_TEST_FOR_REPEATER:
207 		if (input->r0p_read != PASS) {
208 			fail_and_restart_in_ms(0, &status, output);
209 			break;
210 		} else if (input->rx_validation != PASS) {
211 			if (hdcp->state.stay_count < 2 &&
212 					!hdcp->connection.is_hdcp1_revoked) {
213 				/* allow 2 additional retries */
214 				callback_in_ms(0, output);
215 				increment_stay_counter(hdcp);
216 			} else {
217 				/*
218 				 * 1A-06: consider invalid r0' a failure
219 				 * after 3 attempts.
220 				 * 1A-08: consider bksv listed in SRM a failure
221 				 */
222 				/*
223 				 * some slow RX will fail rx validation when it is
224 				 * not ready. give it more time to react before retry.
225 				 */
226 				fail_and_restart_in_ms(1000, &status, output);
227 			}
228 			break;
229 		} else if ((!conn->is_repeater && input->encryption != PASS) ||
230 				(!conn->is_repeater && is_dp_mst_hdcp(hdcp) && input->stream_encryption_dp != PASS)) {
231 			fail_and_restart_in_ms(0, &status, output);
232 			break;
233 		} else if (conn->hdcp1_retry_count < conn->link.adjust.hdcp1.min_auth_retries_wa) {
234 			fail_and_restart_in_ms(200, &status, output);
235 			break;
236 		}
237 		if (conn->is_repeater) {
238 			set_watchdog_in_ms(hdcp, 5000, output);
239 			set_state_id(hdcp, output, D1_A6_WAIT_FOR_READY);
240 		} else {
241 			set_state_id(hdcp, output, D1_A4_AUTHENTICATED);
242 			set_auth_complete(hdcp, output);
243 		}
244 		break;
245 	case D1_A4_AUTHENTICATED:
246 		if (input->link_integrity_check == FAIL ||
247 				input->reauth_request_check == FAIL) {
248 			/* 1A-07: restart hdcp on a link integrity failure */
249 			fail_and_restart_in_ms(0, &status, output);
250 			break;
251 		}
252 		break;
253 	case D1_A6_WAIT_FOR_READY:
254 		if (input->link_integrity_check == FAIL ||
255 				input->reauth_request_check == FAIL) {
256 			fail_and_restart_in_ms(0, &status, output);
257 			break;
258 		} else if (input->ready_check != PASS) {
259 			if (event_ctx->event ==
260 					MOD_HDCP_EVENT_WATCHDOG_TIMEOUT) {
261 				/* 1B-04: fail hdcp on ksv list READY timeout */
262 				/* prevent black screen in next attempt */
263 				adjust->hdcp1.postpone_encryption = 1;
264 				fail_and_restart_in_ms(0, &status, output);
265 			} else {
266 				increment_stay_counter(hdcp);
267 			}
268 			break;
269 		}
270 		callback_in_ms(0, output);
271 		set_state_id(hdcp, output, D1_A7_READ_KSV_LIST);
272 		break;
273 	case D1_A7_READ_KSV_LIST:
274 		if (input->binfo_read_dp != PASS ||
275 				input->max_cascade_check != PASS ||
276 				input->max_devs_check != PASS) {
277 			/* 1B-06: consider MAX_DEVS_EXCEEDED a failure */
278 			/* 1B-07: consider MAX_CASCADE_EXCEEDED a failure */
279 			fail_and_restart_in_ms(0, &status, output);
280 			break;
281 		} else if (input->device_count_check != PASS) {
282 			/*
283 			 * some slow dongle doesn't update
284 			 * device count as soon as downstream is connected.
285 			 * give it more time to react.
286 			 */
287 			adjust->hdcp1.postpone_encryption = 1;
288 			fail_and_restart_in_ms(1000, &status, output);
289 			break;
290 		} else if (input->ksvlist_read != PASS ||
291 				input->vp_read != PASS) {
292 			fail_and_restart_in_ms(0, &status, output);
293 			break;
294 		} else if (input->ksvlist_vp_validation != PASS) {
295 			if (hdcp->state.stay_count < 2 &&
296 					!hdcp->connection.is_hdcp1_revoked) {
297 				/* allow 2 additional retries */
298 				callback_in_ms(0, output);
299 				increment_stay_counter(hdcp);
300 			} else {
301 				/*
302 				 * 1B-05: consider invalid v' a failure
303 				 * after 3 attempts.
304 				 */
305 				fail_and_restart_in_ms(0, &status, output);
306 			}
307 			break;
308 		} else if (input->encryption != PASS ||
309 				(is_dp_mst_hdcp(hdcp) && input->stream_encryption_dp != PASS)) {
310 			fail_and_restart_in_ms(0, &status, output);
311 			break;
312 		}
313 		set_state_id(hdcp, output, D1_A4_AUTHENTICATED);
314 		set_auth_complete(hdcp, output);
315 		break;
316 	default:
317 		fail_and_restart_in_ms(0, &status, output);
318 		break;
319 	}
320 
321 	return status;
322 }
323