678 lines
22 KiB
C
678 lines
22 KiB
C
|
/*
|
||
|
* Copyright 2018 Advanced Micro Devices, Inc.
|
||
|
*
|
||
|
* Permission is hereby granted, free of charge, to any person obtaining a
|
||
|
* copy of this software and associated documentation files (the "Software"),
|
||
|
* to deal in the Software without restriction, including without limitation
|
||
|
* the rights to use, copy, modify, merge, publish, distribute, sublicense,
|
||
|
* and/or sell copies of the Software, and to permit persons to whom the
|
||
|
* Software is furnished to do so, subject to the following conditions:
|
||
|
*
|
||
|
* The above copyright notice and this permission notice shall be included in
|
||
|
* all copies or substantial portions of the Software.
|
||
|
*
|
||
|
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
||
|
* IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
||
|
* FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL
|
||
|
* THE COPYRIGHT HOLDER(S) OR AUTHOR(S) BE LIABLE FOR ANY CLAIM, DAMAGES OR
|
||
|
* OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE,
|
||
|
* ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR
|
||
|
* OTHER DEALINGS IN THE SOFTWARE.
|
||
|
*
|
||
|
* Authors: AMD
|
||
|
*
|
||
|
*/
|
||
|
|
||
|
#include "hdcp.h"
|
||
|
|
||
|
enum mod_hdcp_status mod_hdcp_hdcp2_transition(struct mod_hdcp *hdcp,
|
||
|
struct mod_hdcp_event_context *event_ctx,
|
||
|
struct mod_hdcp_transition_input_hdcp2 *input,
|
||
|
struct mod_hdcp_output *output)
|
||
|
{
|
||
|
enum mod_hdcp_status status = MOD_HDCP_STATUS_SUCCESS;
|
||
|
struct mod_hdcp_connection *conn = &hdcp->connection;
|
||
|
struct mod_hdcp_link_adjustment *adjust = &hdcp->connection.link.adjust;
|
||
|
|
||
|
switch (current_state(hdcp)) {
|
||
|
case H2_A0_KNOWN_HDCP2_CAPABLE_RX:
|
||
|
if (input->hdcp2version_read != PASS ||
|
||
|
input->hdcp2_capable_check != PASS) {
|
||
|
adjust->hdcp2.disable = 1;
|
||
|
callback_in_ms(0, output);
|
||
|
set_state_id(hdcp, output, HDCP_INITIALIZED);
|
||
|
} else {
|
||
|
callback_in_ms(0, output);
|
||
|
set_state_id(hdcp, output, H2_A1_SEND_AKE_INIT);
|
||
|
}
|
||
|
break;
|
||
|
case H2_A1_SEND_AKE_INIT:
|
||
|
if (input->create_session != PASS ||
|
||
|
input->ake_init_prepare != PASS) {
|
||
|
/* out of sync with psp state */
|
||
|
adjust->hdcp2.disable = 1;
|
||
|
fail_and_restart_in_ms(0, &status, output);
|
||
|
break;
|
||
|
} else if (input->ake_init_write != PASS) {
|
||
|
fail_and_restart_in_ms(0, &status, output);
|
||
|
break;
|
||
|
}
|
||
|
set_watchdog_in_ms(hdcp, 100, output);
|
||
|
callback_in_ms(0, output);
|
||
|
set_state_id(hdcp, output, H2_A1_VALIDATE_AKE_CERT);
|
||
|
break;
|
||
|
case H2_A1_VALIDATE_AKE_CERT:
|
||
|
if (input->ake_cert_available != PASS) {
|
||
|
if (event_ctx->event ==
|
||
|
MOD_HDCP_EVENT_WATCHDOG_TIMEOUT) {
|
||
|
/* 1A-08: consider ake timeout a failure */
|
||
|
/* some hdmi receivers are not ready for HDCP
|
||
|
* immediately after video becomes active,
|
||
|
* delay 1s before retry on first HDCP message
|
||
|
* timeout.
|
||
|
*/
|
||
|
fail_and_restart_in_ms(1000, &status, output);
|
||
|
} else {
|
||
|
/* continue ake cert polling*/
|
||
|
callback_in_ms(10, output);
|
||
|
increment_stay_counter(hdcp);
|
||
|
}
|
||
|
break;
|
||
|
} else if (input->ake_cert_read != PASS ||
|
||
|
input->ake_cert_validation != PASS) {
|
||
|
/*
|
||
|
* 1A-09: consider invalid ake cert a failure
|
||
|
* 1A-10: consider receiver id listed in SRM a failure
|
||
|
*/
|
||
|
fail_and_restart_in_ms(0, &status, output);
|
||
|
break;
|
||
|
}
|
||
|
if (conn->is_km_stored &&
|
||
|
!adjust->hdcp2.force_no_stored_km) {
|
||
|
callback_in_ms(0, output);
|
||
|
set_state_id(hdcp, output, H2_A1_SEND_STORED_KM);
|
||
|
} else {
|
||
|
callback_in_ms(0, output);
|
||
|
set_state_id(hdcp, output, H2_A1_SEND_NO_STORED_KM);
|
||
|
}
|
||
|
break;
|
||
|
case H2_A1_SEND_NO_STORED_KM:
|
||
|
if (input->no_stored_km_write != PASS) {
|
||
|
fail_and_restart_in_ms(0, &status, output);
|
||
|
break;
|
||
|
}
|
||
|
if (adjust->hdcp2.increase_h_prime_timeout)
|
||
|
set_watchdog_in_ms(hdcp, 2000, output);
|
||
|
else
|
||
|
set_watchdog_in_ms(hdcp, 1000, output);
|
||
|
callback_in_ms(0, output);
|
||
|
set_state_id(hdcp, output, H2_A1_READ_H_PRIME);
|
||
|
break;
|
||
|
case H2_A1_READ_H_PRIME:
|
||
|
if (input->h_prime_available != PASS) {
|
||
|
if (event_ctx->event ==
|
||
|
MOD_HDCP_EVENT_WATCHDOG_TIMEOUT) {
|
||
|
/* 1A-11-3: consider h' timeout a failure */
|
||
|
fail_and_restart_in_ms(1000, &status, output);
|
||
|
} else {
|
||
|
/* continue h' polling */
|
||
|
callback_in_ms(100, output);
|
||
|
increment_stay_counter(hdcp);
|
||
|
}
|
||
|
break;
|
||
|
} else if (input->h_prime_read != PASS) {
|
||
|
fail_and_restart_in_ms(0, &status, output);
|
||
|
break;
|
||
|
}
|
||
|
set_watchdog_in_ms(hdcp, 200, output);
|
||
|
callback_in_ms(0, output);
|
||
|
set_state_id(hdcp, output, H2_A1_READ_PAIRING_INFO_AND_VALIDATE_H_PRIME);
|
||
|
break;
|
||
|
case H2_A1_READ_PAIRING_INFO_AND_VALIDATE_H_PRIME:
|
||
|
if (input->pairing_available != PASS) {
|
||
|
if (event_ctx->event ==
|
||
|
MOD_HDCP_EVENT_WATCHDOG_TIMEOUT) {
|
||
|
/* 1A-12: consider pairing info timeout
|
||
|
* a failure
|
||
|
*/
|
||
|
fail_and_restart_in_ms(0, &status, output);
|
||
|
} else {
|
||
|
/* continue pairing info polling */
|
||
|
callback_in_ms(20, output);
|
||
|
increment_stay_counter(hdcp);
|
||
|
}
|
||
|
break;
|
||
|
} else if (input->pairing_info_read != PASS ||
|
||
|
input->h_prime_validation != PASS) {
|
||
|
/* 1A-11-1: consider invalid h' a failure */
|
||
|
fail_and_restart_in_ms(0, &status, output);
|
||
|
break;
|
||
|
}
|
||
|
callback_in_ms(0, output);
|
||
|
set_state_id(hdcp, output, H2_A2_LOCALITY_CHECK);
|
||
|
break;
|
||
|
case H2_A1_SEND_STORED_KM:
|
||
|
if (input->stored_km_write != PASS) {
|
||
|
fail_and_restart_in_ms(0, &status, output);
|
||
|
break;
|
||
|
}
|
||
|
set_watchdog_in_ms(hdcp, 200, output);
|
||
|
callback_in_ms(0, output);
|
||
|
set_state_id(hdcp, output, H2_A1_VALIDATE_H_PRIME);
|
||
|
break;
|
||
|
case H2_A1_VALIDATE_H_PRIME:
|
||
|
if (input->h_prime_available != PASS) {
|
||
|
if (event_ctx->event ==
|
||
|
MOD_HDCP_EVENT_WATCHDOG_TIMEOUT) {
|
||
|
/* 1A-11-2: consider h' timeout a failure */
|
||
|
fail_and_restart_in_ms(1000, &status, output);
|
||
|
} else {
|
||
|
/* continue h' polling */
|
||
|
callback_in_ms(20, output);
|
||
|
increment_stay_counter(hdcp);
|
||
|
}
|
||
|
break;
|
||
|
} else if (input->h_prime_read != PASS) {
|
||
|
fail_and_restart_in_ms(0, &status, output);
|
||
|
break;
|
||
|
} else if (input->h_prime_validation != PASS) {
|
||
|
/* 1A-11-1: consider invalid h' a failure */
|
||
|
adjust->hdcp2.force_no_stored_km = 1;
|
||
|
fail_and_restart_in_ms(0, &status, output);
|
||
|
break;
|
||
|
}
|
||
|
callback_in_ms(0, output);
|
||
|
set_state_id(hdcp, output, H2_A2_LOCALITY_CHECK);
|
||
|
break;
|
||
|
case H2_A2_LOCALITY_CHECK:
|
||
|
if (hdcp->state.stay_count > 10 ||
|
||
|
input->lc_init_prepare != PASS ||
|
||
|
input->lc_init_write != PASS ||
|
||
|
input->l_prime_available_poll != PASS ||
|
||
|
input->l_prime_read != PASS) {
|
||
|
/*
|
||
|
* 1A-05: consider disconnection after LC init a failure
|
||
|
* 1A-13-1: consider invalid l' a failure
|
||
|
* 1A-13-2: consider l' timeout a failure
|
||
|
*/
|
||
|
fail_and_restart_in_ms(0, &status, output);
|
||
|
break;
|
||
|
} else if (input->l_prime_validation != PASS) {
|
||
|
callback_in_ms(0, output);
|
||
|
increment_stay_counter(hdcp);
|
||
|
break;
|
||
|
}
|
||
|
callback_in_ms(0, output);
|
||
|
set_state_id(hdcp, output, H2_A3_EXCHANGE_KS_AND_TEST_FOR_REPEATER);
|
||
|
break;
|
||
|
case H2_A3_EXCHANGE_KS_AND_TEST_FOR_REPEATER:
|
||
|
if (input->eks_prepare != PASS ||
|
||
|
input->eks_write != PASS) {
|
||
|
fail_and_restart_in_ms(0, &status, output);
|
||
|
break;
|
||
|
}
|
||
|
if (conn->is_repeater) {
|
||
|
set_watchdog_in_ms(hdcp, 3000, output);
|
||
|
callback_in_ms(0, output);
|
||
|
set_state_id(hdcp, output, H2_A6_WAIT_FOR_RX_ID_LIST);
|
||
|
} else {
|
||
|
/* some CTS equipment requires a delay GREATER than
|
||
|
* 200 ms, so delay 210 ms instead of 200 ms
|
||
|
*/
|
||
|
callback_in_ms(210, output);
|
||
|
set_state_id(hdcp, output, H2_ENABLE_ENCRYPTION);
|
||
|
}
|
||
|
break;
|
||
|
case H2_ENABLE_ENCRYPTION:
|
||
|
if (input->rxstatus_read != PASS ||
|
||
|
input->reauth_request_check != PASS) {
|
||
|
/*
|
||
|
* 1A-07: restart hdcp on REAUTH_REQ
|
||
|
* 1B-08: restart hdcp on REAUTH_REQ
|
||
|
*/
|
||
|
fail_and_restart_in_ms(0, &status, output);
|
||
|
break;
|
||
|
} else if (event_ctx->rx_id_list_ready && conn->is_repeater) {
|
||
|
callback_in_ms(0, output);
|
||
|
set_state_id(hdcp, output, H2_A78_VERIFY_RX_ID_LIST_AND_SEND_ACK);
|
||
|
break;
|
||
|
} else if (input->enable_encryption != PASS) {
|
||
|
fail_and_restart_in_ms(0, &status, output);
|
||
|
break;
|
||
|
}
|
||
|
callback_in_ms(0, output);
|
||
|
set_state_id(hdcp, output, H2_A5_AUTHENTICATED);
|
||
|
set_auth_complete(hdcp, output);
|
||
|
break;
|
||
|
case H2_A5_AUTHENTICATED:
|
||
|
if (input->rxstatus_read == FAIL ||
|
||
|
input->reauth_request_check == FAIL) {
|
||
|
fail_and_restart_in_ms(0, &status, output);
|
||
|
break;
|
||
|
} else if (event_ctx->rx_id_list_ready && conn->is_repeater) {
|
||
|
callback_in_ms(0, output);
|
||
|
set_state_id(hdcp, output, H2_A78_VERIFY_RX_ID_LIST_AND_SEND_ACK);
|
||
|
break;
|
||
|
}
|
||
|
callback_in_ms(500, output);
|
||
|
increment_stay_counter(hdcp);
|
||
|
break;
|
||
|
case H2_A6_WAIT_FOR_RX_ID_LIST:
|
||
|
if (input->rxstatus_read != PASS ||
|
||
|
input->reauth_request_check != PASS) {
|
||
|
fail_and_restart_in_ms(0, &status, output);
|
||
|
break;
|
||
|
} else if (!event_ctx->rx_id_list_ready) {
|
||
|
if (event_ctx->event == MOD_HDCP_EVENT_WATCHDOG_TIMEOUT) {
|
||
|
/* 1B-02: consider rx id list timeout a failure */
|
||
|
/* some CTS equipment's actual timeout
|
||
|
* measurement is slightly greater than 3000 ms.
|
||
|
* Delay 100 ms to ensure it is fully timeout
|
||
|
* before re-authentication.
|
||
|
*/
|
||
|
fail_and_restart_in_ms(100, &status, output);
|
||
|
} else {
|
||
|
callback_in_ms(300, output);
|
||
|
increment_stay_counter(hdcp);
|
||
|
}
|
||
|
break;
|
||
|
}
|
||
|
callback_in_ms(0, output);
|
||
|
set_state_id(hdcp, output, H2_A78_VERIFY_RX_ID_LIST_AND_SEND_ACK);
|
||
|
break;
|
||
|
case H2_A78_VERIFY_RX_ID_LIST_AND_SEND_ACK:
|
||
|
if (input->rxstatus_read != PASS ||
|
||
|
input->reauth_request_check != PASS ||
|
||
|
input->rx_id_list_read != PASS ||
|
||
|
input->device_count_check != PASS ||
|
||
|
input->rx_id_list_validation != PASS ||
|
||
|
input->repeater_auth_ack_write != PASS) {
|
||
|
/* 1B-03: consider invalid v' a failure
|
||
|
* 1B-04: consider MAX_DEVS_EXCEEDED a failure
|
||
|
* 1B-05: consider MAX_CASCADE_EXCEEDED a failure
|
||
|
* 1B-06: consider invalid seq_num_V a failure
|
||
|
* 1B-09: consider seq_num_V rollover a failure
|
||
|
*/
|
||
|
fail_and_restart_in_ms(0, &status, output);
|
||
|
break;
|
||
|
}
|
||
|
callback_in_ms(0, output);
|
||
|
set_state_id(hdcp, output, H2_A9_SEND_STREAM_MANAGEMENT);
|
||
|
break;
|
||
|
case H2_A9_SEND_STREAM_MANAGEMENT:
|
||
|
if (input->rxstatus_read != PASS ||
|
||
|
input->reauth_request_check != PASS) {
|
||
|
fail_and_restart_in_ms(0, &status, output);
|
||
|
break;
|
||
|
} else if (event_ctx->rx_id_list_ready && conn->is_repeater) {
|
||
|
callback_in_ms(0, output);
|
||
|
set_state_id(hdcp, output, H2_A78_VERIFY_RX_ID_LIST_AND_SEND_ACK);
|
||
|
break;
|
||
|
} else if (input->prepare_stream_manage != PASS ||
|
||
|
input->stream_manage_write != PASS) {
|
||
|
fail_and_restart_in_ms(0, &status, output);
|
||
|
break;
|
||
|
}
|
||
|
set_watchdog_in_ms(hdcp, 100, output);
|
||
|
callback_in_ms(0, output);
|
||
|
set_state_id(hdcp, output, H2_A9_VALIDATE_STREAM_READY);
|
||
|
break;
|
||
|
case H2_A9_VALIDATE_STREAM_READY:
|
||
|
if (input->rxstatus_read != PASS ||
|
||
|
input->reauth_request_check != PASS) {
|
||
|
fail_and_restart_in_ms(0, &status, output);
|
||
|
break;
|
||
|
} else if (event_ctx->rx_id_list_ready && conn->is_repeater) {
|
||
|
callback_in_ms(0, output);
|
||
|
set_state_id(hdcp, output, H2_A78_VERIFY_RX_ID_LIST_AND_SEND_ACK);
|
||
|
break;
|
||
|
} else if (input->stream_ready_available != PASS) {
|
||
|
if (event_ctx->event == MOD_HDCP_EVENT_WATCHDOG_TIMEOUT) {
|
||
|
/* 1B-10-2: restart content stream management on
|
||
|
* stream ready timeout
|
||
|
*/
|
||
|
hdcp->auth.count.stream_management_retry_count++;
|
||
|
callback_in_ms(0, output);
|
||
|
set_state_id(hdcp, output, H2_A9_SEND_STREAM_MANAGEMENT);
|
||
|
} else {
|
||
|
callback_in_ms(10, output);
|
||
|
increment_stay_counter(hdcp);
|
||
|
}
|
||
|
break;
|
||
|
} else if (input->stream_ready_read != PASS ||
|
||
|
input->stream_ready_validation != PASS) {
|
||
|
/*
|
||
|
* 1B-10-1: restart content stream management
|
||
|
* on invalid M'
|
||
|
*/
|
||
|
if (hdcp->auth.count.stream_management_retry_count > 10) {
|
||
|
fail_and_restart_in_ms(0, &status, output);
|
||
|
} else {
|
||
|
hdcp->auth.count.stream_management_retry_count++;
|
||
|
callback_in_ms(0, output);
|
||
|
set_state_id(hdcp, output, H2_A9_SEND_STREAM_MANAGEMENT);
|
||
|
}
|
||
|
break;
|
||
|
}
|
||
|
callback_in_ms(200, output);
|
||
|
set_state_id(hdcp, output, H2_ENABLE_ENCRYPTION);
|
||
|
break;
|
||
|
default:
|
||
|
status = MOD_HDCP_STATUS_INVALID_STATE;
|
||
|
fail_and_restart_in_ms(0, &status, output);
|
||
|
break;
|
||
|
}
|
||
|
|
||
|
return status;
|
||
|
}
|
||
|
|
||
|
enum mod_hdcp_status mod_hdcp_hdcp2_dp_transition(struct mod_hdcp *hdcp,
|
||
|
struct mod_hdcp_event_context *event_ctx,
|
||
|
struct mod_hdcp_transition_input_hdcp2 *input,
|
||
|
struct mod_hdcp_output *output)
|
||
|
{
|
||
|
enum mod_hdcp_status status = MOD_HDCP_STATUS_SUCCESS;
|
||
|
struct mod_hdcp_connection *conn = &hdcp->connection;
|
||
|
struct mod_hdcp_link_adjustment *adjust = &hdcp->connection.link.adjust;
|
||
|
|
||
|
switch (current_state(hdcp)) {
|
||
|
case D2_A0_DETERMINE_RX_HDCP_CAPABLE:
|
||
|
if (input->rx_caps_read_dp != PASS ||
|
||
|
input->hdcp2_capable_check != PASS) {
|
||
|
adjust->hdcp2.disable = 1;
|
||
|
callback_in_ms(0, output);
|
||
|
set_state_id(hdcp, output, HDCP_INITIALIZED);
|
||
|
} else {
|
||
|
callback_in_ms(0, output);
|
||
|
set_state_id(hdcp, output, D2_A1_SEND_AKE_INIT);
|
||
|
}
|
||
|
break;
|
||
|
case D2_A1_SEND_AKE_INIT:
|
||
|
if (input->create_session != PASS ||
|
||
|
input->ake_init_prepare != PASS) {
|
||
|
/* out of sync with psp state */
|
||
|
adjust->hdcp2.disable = 1;
|
||
|
fail_and_restart_in_ms(0, &status, output);
|
||
|
break;
|
||
|
} else if (input->ake_init_write != PASS) {
|
||
|
/* possibly display not ready */
|
||
|
fail_and_restart_in_ms(0, &status, output);
|
||
|
break;
|
||
|
}
|
||
|
callback_in_ms(100, output);
|
||
|
set_state_id(hdcp, output, D2_A1_VALIDATE_AKE_CERT);
|
||
|
break;
|
||
|
case D2_A1_VALIDATE_AKE_CERT:
|
||
|
if (input->ake_cert_read != PASS ||
|
||
|
input->ake_cert_validation != PASS) {
|
||
|
/*
|
||
|
* 1A-08: consider invalid ake cert a failure
|
||
|
* 1A-09: consider receiver id listed in SRM a failure
|
||
|
*/
|
||
|
fail_and_restart_in_ms(0, &status, output);
|
||
|
break;
|
||
|
}
|
||
|
if (conn->is_km_stored &&
|
||
|
!adjust->hdcp2.force_no_stored_km) {
|
||
|
callback_in_ms(0, output);
|
||
|
set_state_id(hdcp, output, D2_A1_SEND_STORED_KM);
|
||
|
} else {
|
||
|
callback_in_ms(0, output);
|
||
|
set_state_id(hdcp, output, D2_A1_SEND_NO_STORED_KM);
|
||
|
}
|
||
|
break;
|
||
|
case D2_A1_SEND_NO_STORED_KM:
|
||
|
if (input->no_stored_km_write != PASS) {
|
||
|
fail_and_restart_in_ms(0, &status, output);
|
||
|
break;
|
||
|
}
|
||
|
if (adjust->hdcp2.increase_h_prime_timeout)
|
||
|
set_watchdog_in_ms(hdcp, 2000, output);
|
||
|
else
|
||
|
set_watchdog_in_ms(hdcp, 1000, output);
|
||
|
set_state_id(hdcp, output, D2_A1_READ_H_PRIME);
|
||
|
break;
|
||
|
case D2_A1_READ_H_PRIME:
|
||
|
if (input->h_prime_available != PASS) {
|
||
|
if (event_ctx->event ==
|
||
|
MOD_HDCP_EVENT_WATCHDOG_TIMEOUT)
|
||
|
/* 1A-10-3: consider h' timeout a failure */
|
||
|
fail_and_restart_in_ms(1000, &status, output);
|
||
|
else
|
||
|
increment_stay_counter(hdcp);
|
||
|
break;
|
||
|
} else if (input->h_prime_read != PASS) {
|
||
|
fail_and_restart_in_ms(0, &status, output);
|
||
|
break;
|
||
|
}
|
||
|
set_watchdog_in_ms(hdcp, 200, output);
|
||
|
set_state_id(hdcp, output, D2_A1_READ_PAIRING_INFO_AND_VALIDATE_H_PRIME);
|
||
|
break;
|
||
|
case D2_A1_READ_PAIRING_INFO_AND_VALIDATE_H_PRIME:
|
||
|
if (input->pairing_available != PASS) {
|
||
|
if (event_ctx->event ==
|
||
|
MOD_HDCP_EVENT_WATCHDOG_TIMEOUT)
|
||
|
/*
|
||
|
* 1A-11: consider pairing info timeout
|
||
|
* a failure
|
||
|
*/
|
||
|
fail_and_restart_in_ms(0, &status, output);
|
||
|
else
|
||
|
increment_stay_counter(hdcp);
|
||
|
break;
|
||
|
} else if (input->pairing_info_read != PASS ||
|
||
|
input->h_prime_validation != PASS) {
|
||
|
/* 1A-10-1: consider invalid h' a failure */
|
||
|
fail_and_restart_in_ms(0, &status, output);
|
||
|
break;
|
||
|
}
|
||
|
callback_in_ms(0, output);
|
||
|
set_state_id(hdcp, output, D2_A2_LOCALITY_CHECK);
|
||
|
break;
|
||
|
case D2_A1_SEND_STORED_KM:
|
||
|
if (input->stored_km_write != PASS) {
|
||
|
fail_and_restart_in_ms(0, &status, output);
|
||
|
break;
|
||
|
}
|
||
|
set_watchdog_in_ms(hdcp, 200, output);
|
||
|
set_state_id(hdcp, output, D2_A1_VALIDATE_H_PRIME);
|
||
|
break;
|
||
|
case D2_A1_VALIDATE_H_PRIME:
|
||
|
if (input->h_prime_available != PASS) {
|
||
|
if (event_ctx->event ==
|
||
|
MOD_HDCP_EVENT_WATCHDOG_TIMEOUT)
|
||
|
/* 1A-10-2: consider h' timeout a failure */
|
||
|
fail_and_restart_in_ms(1000, &status, output);
|
||
|
else
|
||
|
increment_stay_counter(hdcp);
|
||
|
break;
|
||
|
} else if (input->h_prime_read != PASS) {
|
||
|
fail_and_restart_in_ms(0, &status, output);
|
||
|
break;
|
||
|
} else if (input->h_prime_validation != PASS) {
|
||
|
/* 1A-10-1: consider invalid h' a failure */
|
||
|
adjust->hdcp2.force_no_stored_km = 1;
|
||
|
fail_and_restart_in_ms(0, &status, output);
|
||
|
break;
|
||
|
}
|
||
|
callback_in_ms(0, output);
|
||
|
set_state_id(hdcp, output, D2_A2_LOCALITY_CHECK);
|
||
|
break;
|
||
|
case D2_A2_LOCALITY_CHECK:
|
||
|
if (hdcp->state.stay_count > 10 ||
|
||
|
input->lc_init_prepare != PASS ||
|
||
|
input->lc_init_write != PASS ||
|
||
|
input->l_prime_read != PASS) {
|
||
|
/* 1A-12: consider invalid l' a failure */
|
||
|
fail_and_restart_in_ms(0, &status, output);
|
||
|
break;
|
||
|
} else if (input->l_prime_validation != PASS) {
|
||
|
callback_in_ms(0, output);
|
||
|
increment_stay_counter(hdcp);
|
||
|
break;
|
||
|
}
|
||
|
callback_in_ms(0, output);
|
||
|
set_state_id(hdcp, output, D2_A34_EXCHANGE_KS_AND_TEST_FOR_REPEATER);
|
||
|
break;
|
||
|
case D2_A34_EXCHANGE_KS_AND_TEST_FOR_REPEATER:
|
||
|
if (input->eks_prepare != PASS ||
|
||
|
input->eks_write != PASS) {
|
||
|
fail_and_restart_in_ms(0, &status, output);
|
||
|
break;
|
||
|
}
|
||
|
if (conn->is_repeater) {
|
||
|
set_watchdog_in_ms(hdcp, 3000, output);
|
||
|
set_state_id(hdcp, output, D2_A6_WAIT_FOR_RX_ID_LIST);
|
||
|
} else {
|
||
|
callback_in_ms(1, output);
|
||
|
set_state_id(hdcp, output, D2_SEND_CONTENT_STREAM_TYPE);
|
||
|
}
|
||
|
break;
|
||
|
case D2_SEND_CONTENT_STREAM_TYPE:
|
||
|
if (input->rxstatus_read != PASS ||
|
||
|
input->reauth_request_check != PASS ||
|
||
|
input->link_integrity_check_dp != PASS ||
|
||
|
input->content_stream_type_write != PASS) {
|
||
|
fail_and_restart_in_ms(0, &status, output);
|
||
|
break;
|
||
|
}
|
||
|
callback_in_ms(210, output);
|
||
|
set_state_id(hdcp, output, D2_ENABLE_ENCRYPTION);
|
||
|
break;
|
||
|
case D2_ENABLE_ENCRYPTION:
|
||
|
if (input->rxstatus_read != PASS ||
|
||
|
input->reauth_request_check != PASS ||
|
||
|
input->link_integrity_check_dp != PASS) {
|
||
|
/*
|
||
|
* 1A-07: restart hdcp on REAUTH_REQ
|
||
|
* 1B-08: restart hdcp on REAUTH_REQ
|
||
|
*/
|
||
|
fail_and_restart_in_ms(0, &status, output);
|
||
|
break;
|
||
|
} else if (event_ctx->rx_id_list_ready && conn->is_repeater) {
|
||
|
callback_in_ms(0, output);
|
||
|
set_state_id(hdcp, output, D2_A78_VERIFY_RX_ID_LIST_AND_SEND_ACK);
|
||
|
break;
|
||
|
} else if (input->enable_encryption != PASS ||
|
||
|
(is_dp_mst_hdcp(hdcp) && input->stream_encryption_dp != PASS)) {
|
||
|
fail_and_restart_in_ms(0, &status, output);
|
||
|
break;
|
||
|
}
|
||
|
set_state_id(hdcp, output, D2_A5_AUTHENTICATED);
|
||
|
set_auth_complete(hdcp, output);
|
||
|
break;
|
||
|
case D2_A5_AUTHENTICATED:
|
||
|
if (input->rxstatus_read == FAIL ||
|
||
|
input->reauth_request_check == FAIL) {
|
||
|
fail_and_restart_in_ms(100, &status, output);
|
||
|
break;
|
||
|
} else if (input->link_integrity_check_dp == FAIL) {
|
||
|
if (hdcp->connection.hdcp2_retry_count >= 1)
|
||
|
adjust->hdcp2.force_type = MOD_HDCP_FORCE_TYPE_0;
|
||
|
fail_and_restart_in_ms(0, &status, output);
|
||
|
break;
|
||
|
} else if (event_ctx->rx_id_list_ready && conn->is_repeater) {
|
||
|
callback_in_ms(0, output);
|
||
|
set_state_id(hdcp, output, D2_A78_VERIFY_RX_ID_LIST_AND_SEND_ACK);
|
||
|
break;
|
||
|
}
|
||
|
increment_stay_counter(hdcp);
|
||
|
break;
|
||
|
case D2_A6_WAIT_FOR_RX_ID_LIST:
|
||
|
if (input->rxstatus_read != PASS ||
|
||
|
input->reauth_request_check != PASS ||
|
||
|
input->link_integrity_check_dp != PASS) {
|
||
|
fail_and_restart_in_ms(0, &status, output);
|
||
|
break;
|
||
|
} else if (!event_ctx->rx_id_list_ready) {
|
||
|
if (event_ctx->event == MOD_HDCP_EVENT_WATCHDOG_TIMEOUT)
|
||
|
/* 1B-02: consider rx id list timeout a failure */
|
||
|
fail_and_restart_in_ms(0, &status, output);
|
||
|
else
|
||
|
increment_stay_counter(hdcp);
|
||
|
break;
|
||
|
}
|
||
|
callback_in_ms(0, output);
|
||
|
set_state_id(hdcp, output, D2_A78_VERIFY_RX_ID_LIST_AND_SEND_ACK);
|
||
|
break;
|
||
|
case D2_A78_VERIFY_RX_ID_LIST_AND_SEND_ACK:
|
||
|
if (input->rxstatus_read != PASS ||
|
||
|
input->reauth_request_check != PASS ||
|
||
|
input->link_integrity_check_dp != PASS ||
|
||
|
input->rx_id_list_read != PASS ||
|
||
|
input->device_count_check != PASS ||
|
||
|
input->rx_id_list_validation != PASS ||
|
||
|
input->repeater_auth_ack_write != PASS) {
|
||
|
/*
|
||
|
* 1B-03: consider invalid v' a failure
|
||
|
* 1B-04: consider MAX_DEVS_EXCEEDED a failure
|
||
|
* 1B-05: consider MAX_CASCADE_EXCEEDED a failure
|
||
|
* 1B-06: consider invalid seq_num_V a failure
|
||
|
* 1B-09: consider seq_num_V rollover a failure
|
||
|
*/
|
||
|
fail_and_restart_in_ms(0, &status, output);
|
||
|
break;
|
||
|
}
|
||
|
callback_in_ms(0, output);
|
||
|
set_state_id(hdcp, output, D2_A9_SEND_STREAM_MANAGEMENT);
|
||
|
break;
|
||
|
case D2_A9_SEND_STREAM_MANAGEMENT:
|
||
|
if (input->rxstatus_read != PASS ||
|
||
|
input->reauth_request_check != PASS ||
|
||
|
input->link_integrity_check_dp != PASS) {
|
||
|
fail_and_restart_in_ms(0, &status, output);
|
||
|
break;
|
||
|
} else if (event_ctx->rx_id_list_ready) {
|
||
|
callback_in_ms(0, output);
|
||
|
set_state_id(hdcp, output, D2_A78_VERIFY_RX_ID_LIST_AND_SEND_ACK);
|
||
|
break;
|
||
|
} else if (input->prepare_stream_manage != PASS ||
|
||
|
input->stream_manage_write != PASS) {
|
||
|
if (event_ctx->event == MOD_HDCP_EVENT_CALLBACK)
|
||
|
fail_and_restart_in_ms(0, &status, output);
|
||
|
else
|
||
|
increment_stay_counter(hdcp);
|
||
|
break;
|
||
|
}
|
||
|
callback_in_ms(100, output);
|
||
|
set_state_id(hdcp, output, D2_A9_VALIDATE_STREAM_READY);
|
||
|
break;
|
||
|
case D2_A9_VALIDATE_STREAM_READY:
|
||
|
if (input->rxstatus_read != PASS ||
|
||
|
input->reauth_request_check != PASS ||
|
||
|
input->link_integrity_check_dp != PASS) {
|
||
|
fail_and_restart_in_ms(0, &status, output);
|
||
|
break;
|
||
|
} else if (event_ctx->rx_id_list_ready) {
|
||
|
callback_in_ms(0, output);
|
||
|
set_state_id(hdcp, output, D2_A78_VERIFY_RX_ID_LIST_AND_SEND_ACK);
|
||
|
break;
|
||
|
} else if (input->stream_ready_read != PASS ||
|
||
|
input->stream_ready_validation != PASS) {
|
||
|
/*
|
||
|
* 1B-10-1: restart content stream management
|
||
|
* on invalid M'
|
||
|
* 1B-10-2: consider stream ready timeout a failure
|
||
|
*/
|
||
|
if (hdcp->auth.count.stream_management_retry_count > 10) {
|
||
|
fail_and_restart_in_ms(0, &status, output);
|
||
|
} else if (event_ctx->event == MOD_HDCP_EVENT_CALLBACK) {
|
||
|
hdcp->auth.count.stream_management_retry_count++;
|
||
|
callback_in_ms(0, output);
|
||
|
set_state_id(hdcp, output, D2_A9_SEND_STREAM_MANAGEMENT);
|
||
|
} else {
|
||
|
increment_stay_counter(hdcp);
|
||
|
}
|
||
|
break;
|
||
|
}
|
||
|
callback_in_ms(200, output);
|
||
|
set_state_id(hdcp, output, D2_ENABLE_ENCRYPTION);
|
||
|
break;
|
||
|
default:
|
||
|
status = MOD_HDCP_STATUS_INVALID_STATE;
|
||
|
fail_and_restart_in_ms(0, &status, output);
|
||
|
break;
|
||
|
}
|
||
|
return status;
|
||
|
}
|