Commit Graph

4 Commits

Author SHA1 Message Date
jianshu
52e69646a2 ice_driver: Fix the ice keyslot conflict
FDE only use one ice keyslot on gen3, the remains used by FBE. For
the ufs crypto layer, it needs to support FBE and FDE request concurrently.

Test cases:
1. LV host FDE OTA and basic test validated pass
2. LA container FBE OTA and basic test validated pass.

Change-Id: Ic0c6e0f9d39d351c1095f531f1fa8bd2a8e614b7
Signed-off-by: jianshu <quic_jianshu@quicinc.com>
2023-12-19 19:11:18 +08:00
Yuvaraj Ranganathan
ebcbdbbed4 msm-5.15: Pass the storage type to crypto driver
UFS/EMMC crypto driver pass the appropriate storage type to
the underlying common, hwkm and tz driver which then set the
storage type to make the SCM call to TZ.

Test:
Validated the FBE v2, FBE v1 on both UFS and EMMC targets.

Change-Id: I0e5dcd678cff9ea5dfd70956684e809a37839372
Signed-off-by: Yuvaraj Ranganathan <quic_yrangana@quicinc.com>
2023-12-12 09:22:58 +05:30
Gaurav Kashyap
cc2d83cc8e ufs: crypto: check reset flag instead of state
Currently we check the UFS state before programming keys.
Ideas is that key programming to ICE should allow to continue
only when in operational or suspend/resume state.

To achieve this, it is better to have a reset_in_progress flag
that is set and unset only when needed than checking the UFS state
as some innocuous states might be missed.

Change-Id: I79f36737c0637d51fe26db196b8f9a8a70b9b802
Signed-off-by: Gaurav Kashyap <quic_gaurkash@quicinc.com>
2022-10-27 10:11:30 -07:00
Gaurav Kashyap
bf1c6a8486 scsi: ufs: add support for data encryption
Add support in UFS to exercise data encryption using
wrapped keys.

Change-Id: I2239658e75bd4a54d8a6386badf97de21fe2bbef
Signed-off-by: Gaurav Kashyap <quic_gaurkash@quicinc.com>
2022-02-22 20:55:47 -08:00