xref: /OK3568_Linux_fs/u-boot/include/write_keybox.h (revision 4882a59341e53eb6f0b4789bf948001014eff981)
1*4882a593Smuzhiyun /* SPDX-License-Identifier: GPL-2.0 */
2*4882a593Smuzhiyun /*
3*4882a593Smuzhiyun  * Copyright (c) 2019 Fuzhou Rockchip Electronics Co., Ltd
4*4882a593Smuzhiyun  */
5*4882a593Smuzhiyun 
6*4882a593Smuzhiyun #ifndef WRITE_KEYBOX_H_
7*4882a593Smuzhiyun #define	WRITE_KEYBOX_H_
8*4882a593Smuzhiyun 
9*4882a593Smuzhiyun #include <common.h>
10*4882a593Smuzhiyun #include <optee_include/tee_client_api.h>
11*4882a593Smuzhiyun 
12*4882a593Smuzhiyun #if defined CONFIG_ANDROID_WRITE_KEYBOX && defined CONFIG_ANDROID_KEYMASTER_CA
13*4882a593Smuzhiyun /*
14*4882a593Smuzhiyun  * write_keybox_to_secure_storage
15*4882a593Smuzhiyun  *
16*4882a593Smuzhiyun  * @received_data:	the data received from usb
17*4882a593Smuzhiyun  * @len:		size of received_data
18*4882a593Smuzhiyun  *
19*4882a593Smuzhiyun  * @return a negative number in case of error, or 0 on success.
20*4882a593Smuzhiyun  */
21*4882a593Smuzhiyun uint32_t write_keybox_to_secure_storage(uint8_t *received_data, uint32_t len);
22*4882a593Smuzhiyun 
23*4882a593Smuzhiyun /*
24*4882a593Smuzhiyun  * write_to_secure_storage
25*4882a593Smuzhiyun  *
26*4882a593Smuzhiyun  * @is_use_rpmb:	0, write data to security patition
27*4882a593Smuzhiyun  *			1, write data to rpmb
28*4882a593Smuzhiyun  * @filename:		the file name of data written to secure storage
29*4882a593Smuzhiyun  * @filename_size:	size of filename
30*4882a593Smuzhiyun  * @data:		the data want to write to secure storage
31*4882a593Smuzhiyun  * @data_size:		size of data
32*4882a593Smuzhiyun  *
33*4882a593Smuzhiyun  * @return a nonzero number in case of error, or 0 on success.
34*4882a593Smuzhiyun  */
35*4882a593Smuzhiyun TEEC_Result write_to_security_storage(uint8_t is_use_rpmb,
36*4882a593Smuzhiyun 				      uint8_t *filename,
37*4882a593Smuzhiyun 				      uint32_t filename_size,
38*4882a593Smuzhiyun 				      uint8_t *data,
39*4882a593Smuzhiyun 				      uint32_t data_size);
40*4882a593Smuzhiyun /*
41*4882a593Smuzhiyun  * read_raw_data_from_secure_storege
42*4882a593Smuzhiyun  *
43*4882a593Smuzhiyun  * @raw_data:	the data read from secure storage
44*4882a593Smuzhiyun  * @data_size:	size of raw data
45*4882a593Smuzhiyun  *
46*4882a593Smuzhiyun  * @return size of raw_data in case of success, or 0 on fail
47*4882a593Smuzhiyun  */
48*4882a593Smuzhiyun uint32_t read_raw_data_from_secure_storage(uint8_t *received_data,
49*4882a593Smuzhiyun 					   uint32_t len);
50*4882a593Smuzhiyun char *new_strstr(const char *s1, const char *s2, uint32_t l1);
51*4882a593Smuzhiyun #else
write_keybox_to_secure_storage(uint8_t * raw_data,uint32_t data_size)52*4882a593Smuzhiyun inline uint32_t write_keybox_to_secure_storage(uint8_t *raw_data,
53*4882a593Smuzhiyun 					       uint32_t data_size)
54*4882a593Smuzhiyun {
55*4882a593Smuzhiyun 	return -EPERM;
56*4882a593Smuzhiyun }
57*4882a593Smuzhiyun 
read_raw_data_from_secure_storage(uint8_t * received_data,uint32_t len)58*4882a593Smuzhiyun inline uint32_t read_raw_data_from_secure_storage(uint8_t *received_data,
59*4882a593Smuzhiyun 						  uint32_t len)
60*4882a593Smuzhiyun {
61*4882a593Smuzhiyun 	return -EPERM;
62*4882a593Smuzhiyun }
63*4882a593Smuzhiyun #endif
64*4882a593Smuzhiyun #endif
65