1 // SPDX-License-Identifier: GPL-2.0-only 2 /* 3 * Secure Element driver for STMicroelectronics NFC NCI chip 4 * 5 * Copyright (C) 2014-2015 STMicroelectronics SAS. All rights reserved. 6 */ 7 8 #include <linux/module.h> 9 #include <linux/nfc.h> 10 #include <linux/delay.h> 11 #include <net/nfc/nci.h> 12 #include <net/nfc/nci_core.h> 13 14 #include "st-nci.h" 15 16 struct st_nci_pipe_info { 17 u8 pipe_state; 18 u8 src_host_id; 19 u8 src_gate_id; 20 u8 dst_host_id; 21 u8 dst_gate_id; 22 } __packed; 23 24 /* Hosts */ 25 #define ST_NCI_HOST_CONTROLLER_ID 0x00 26 #define ST_NCI_TERMINAL_HOST_ID 0x01 27 #define ST_NCI_UICC_HOST_ID 0x02 28 #define ST_NCI_ESE_HOST_ID 0xc0 29 30 /* Gates */ 31 #define ST_NCI_APDU_READER_GATE 0xf0 32 #define ST_NCI_CONNECTIVITY_GATE 0x41 33 34 /* Pipes */ 35 #define ST_NCI_DEVICE_MGNT_PIPE 0x02 36 37 /* Connectivity pipe only */ 38 #define ST_NCI_SE_COUNT_PIPE_UICC 0x01 39 /* Connectivity + APDU Reader pipe */ 40 #define ST_NCI_SE_COUNT_PIPE_EMBEDDED 0x02 41 42 #define ST_NCI_SE_TO_HOT_PLUG 1000 /* msecs */ 43 #define ST_NCI_SE_TO_PIPES 2000 44 45 #define ST_NCI_EVT_HOT_PLUG_IS_INHIBITED(x) (x->data[0] & 0x80) 46 47 #define NCI_HCI_APDU_PARAM_ATR 0x01 48 #define NCI_HCI_ADMIN_PARAM_SESSION_IDENTITY 0x01 49 #define NCI_HCI_ADMIN_PARAM_WHITELIST 0x03 50 #define NCI_HCI_ADMIN_PARAM_HOST_LIST 0x04 51 52 #define ST_NCI_EVT_SE_HARD_RESET 0x20 53 #define ST_NCI_EVT_TRANSMIT_DATA 0x10 54 #define ST_NCI_EVT_WTX_REQUEST 0x11 55 #define ST_NCI_EVT_SE_SOFT_RESET 0x11 56 #define ST_NCI_EVT_SE_END_OF_APDU_TRANSFER 0x21 57 #define ST_NCI_EVT_HOT_PLUG 0x03 58 59 #define ST_NCI_SE_MODE_OFF 0x00 60 #define ST_NCI_SE_MODE_ON 0x01 61 62 #define ST_NCI_EVT_CONNECTIVITY 0x10 63 #define ST_NCI_EVT_TRANSACTION 0x12 64 65 #define ST_NCI_DM_GETINFO 0x13 66 #define ST_NCI_DM_GETINFO_PIPE_LIST 0x02 67 #define ST_NCI_DM_GETINFO_PIPE_INFO 0x01 68 #define ST_NCI_DM_PIPE_CREATED 0x02 69 #define ST_NCI_DM_PIPE_OPEN 0x04 70 #define ST_NCI_DM_RF_ACTIVE 0x80 71 #define ST_NCI_DM_DISCONNECT 0x30 72 73 #define ST_NCI_DM_IS_PIPE_OPEN(p) \ 74 ((p & 0x0f) == (ST_NCI_DM_PIPE_CREATED | ST_NCI_DM_PIPE_OPEN)) 75 76 #define ST_NCI_ATR_DEFAULT_BWI 0x04 77 78 /* 79 * WT = 2^BWI/10[s], convert into msecs and add a secure 80 * room by increasing by 2 this timeout 81 */ 82 #define ST_NCI_BWI_TO_TIMEOUT(x) ((1 << x) * 200) 83 #define ST_NCI_ATR_GET_Y_FROM_TD(x) (x >> 4) 84 85 /* If TA is present bit 0 is set */ 86 #define ST_NCI_ATR_TA_PRESENT(x) (x & 0x01) 87 /* If TB is present bit 1 is set */ 88 #define ST_NCI_ATR_TB_PRESENT(x) (x & 0x02) 89 90 #define ST_NCI_NUM_DEVICES 256 91 92 static DECLARE_BITMAP(dev_mask, ST_NCI_NUM_DEVICES); 93 94 /* Here are the mandatory pipe for st_nci */ 95 static struct nci_hci_gate st_nci_gates[] = { 96 {NCI_HCI_ADMIN_GATE, NCI_HCI_ADMIN_PIPE, 97 ST_NCI_HOST_CONTROLLER_ID}, 98 {NCI_HCI_LINK_MGMT_GATE, NCI_HCI_LINK_MGMT_PIPE, 99 ST_NCI_HOST_CONTROLLER_ID}, 100 {ST_NCI_DEVICE_MGNT_GATE, ST_NCI_DEVICE_MGNT_PIPE, 101 ST_NCI_HOST_CONTROLLER_ID}, 102 103 {NCI_HCI_IDENTITY_MGMT_GATE, NCI_HCI_INVALID_PIPE, 104 ST_NCI_HOST_CONTROLLER_ID}, 105 106 /* Secure element pipes are created by secure element host */ 107 {ST_NCI_CONNECTIVITY_GATE, NCI_HCI_DO_NOT_OPEN_PIPE, 108 ST_NCI_HOST_CONTROLLER_ID}, 109 {ST_NCI_APDU_READER_GATE, NCI_HCI_DO_NOT_OPEN_PIPE, 110 ST_NCI_HOST_CONTROLLER_ID}, 111 }; 112 113 static u8 st_nci_se_get_bwi(struct nci_dev *ndev) 114 { 115 int i; 116 u8 td; 117 struct st_nci_info *info = nci_get_drvdata(ndev); 118 119 /* Bits 8 to 5 of the first TB for T=1 encode BWI from zero to nine */ 120 for (i = 1; i < ST_NCI_ESE_MAX_LENGTH; i++) { 121 td = ST_NCI_ATR_GET_Y_FROM_TD(info->se_info.atr[i]); 122 if (ST_NCI_ATR_TA_PRESENT(td)) 123 i++; 124 if (ST_NCI_ATR_TB_PRESENT(td)) { 125 i++; 126 return info->se_info.atr[i] >> 4; 127 } 128 } 129 return ST_NCI_ATR_DEFAULT_BWI; 130 } 131 132 static void st_nci_se_get_atr(struct nci_dev *ndev) 133 { 134 struct st_nci_info *info = nci_get_drvdata(ndev); 135 int r; 136 struct sk_buff *skb; 137 138 r = nci_hci_get_param(ndev, ST_NCI_APDU_READER_GATE, 139 NCI_HCI_APDU_PARAM_ATR, &skb); 140 if (r < 0) 141 return; 142 143 if (skb->len <= ST_NCI_ESE_MAX_LENGTH) { 144 memcpy(info->se_info.atr, skb->data, skb->len); 145 146 info->se_info.wt_timeout = 147 ST_NCI_BWI_TO_TIMEOUT(st_nci_se_get_bwi(ndev)); 148 } 149 kfree_skb(skb); 150 } 151 152 int st_nci_hci_load_session(struct nci_dev *ndev) 153 { 154 int i, j, r; 155 struct sk_buff *skb_pipe_list, *skb_pipe_info; 156 struct st_nci_pipe_info *dm_pipe_info; 157 u8 pipe_list[] = { ST_NCI_DM_GETINFO_PIPE_LIST, 158 ST_NCI_TERMINAL_HOST_ID}; 159 u8 pipe_info[] = { ST_NCI_DM_GETINFO_PIPE_INFO, 160 ST_NCI_TERMINAL_HOST_ID, 0}; 161 162 /* On ST_NCI device pipes number are dynamics 163 * If pipes are already created, hci_dev_up will fail. 164 * Doing a clear all pipe is a bad idea because: 165 * - It does useless EEPROM cycling 166 * - It might cause issue for secure elements support 167 * (such as removing connectivity or APDU reader pipe) 168 * A better approach on ST_NCI is to: 169 * - get a pipe list for each host. 170 * (eg: ST_NCI_HOST_CONTROLLER_ID for now). 171 * (TODO Later on UICC HOST and eSE HOST) 172 * - get pipe information 173 * - match retrieved pipe list in st_nci_gates 174 * ST_NCI_DEVICE_MGNT_GATE is a proprietary gate 175 * with ST_NCI_DEVICE_MGNT_PIPE. 176 * Pipe can be closed and need to be open. 177 */ 178 r = nci_hci_connect_gate(ndev, ST_NCI_HOST_CONTROLLER_ID, 179 ST_NCI_DEVICE_MGNT_GATE, 180 ST_NCI_DEVICE_MGNT_PIPE); 181 if (r < 0) 182 return r; 183 184 /* Get pipe list */ 185 r = nci_hci_send_cmd(ndev, ST_NCI_DEVICE_MGNT_GATE, 186 ST_NCI_DM_GETINFO, pipe_list, sizeof(pipe_list), 187 &skb_pipe_list); 188 if (r < 0) 189 return r; 190 191 /* Complete the existing gate_pipe table */ 192 for (i = 0; i < skb_pipe_list->len; i++) { 193 pipe_info[2] = skb_pipe_list->data[i]; 194 r = nci_hci_send_cmd(ndev, ST_NCI_DEVICE_MGNT_GATE, 195 ST_NCI_DM_GETINFO, pipe_info, 196 sizeof(pipe_info), &skb_pipe_info); 197 198 if (r) 199 continue; 200 201 /* 202 * Match pipe ID and gate ID 203 * Output format from ST21NFC_DM_GETINFO is: 204 * - pipe state (1byte) 205 * - source hid (1byte) 206 * - source gid (1byte) 207 * - destination hid (1byte) 208 * - destination gid (1byte) 209 */ 210 dm_pipe_info = (struct st_nci_pipe_info *)skb_pipe_info->data; 211 if (dm_pipe_info->dst_gate_id == ST_NCI_APDU_READER_GATE && 212 dm_pipe_info->src_host_id == ST_NCI_UICC_HOST_ID) { 213 pr_err("Unexpected apdu_reader pipe on host %x\n", 214 dm_pipe_info->src_host_id); 215 kfree_skb(skb_pipe_info); 216 continue; 217 } 218 219 for (j = 3; (j < ARRAY_SIZE(st_nci_gates)) && 220 (st_nci_gates[j].gate != dm_pipe_info->dst_gate_id); j++) 221 ; 222 223 if (j < ARRAY_SIZE(st_nci_gates) && 224 st_nci_gates[j].gate == dm_pipe_info->dst_gate_id && 225 ST_NCI_DM_IS_PIPE_OPEN(dm_pipe_info->pipe_state)) { 226 ndev->hci_dev->init_data.gates[j].pipe = pipe_info[2]; 227 228 ndev->hci_dev->gate2pipe[st_nci_gates[j].gate] = 229 pipe_info[2]; 230 ndev->hci_dev->pipes[pipe_info[2]].gate = 231 st_nci_gates[j].gate; 232 ndev->hci_dev->pipes[pipe_info[2]].host = 233 dm_pipe_info->src_host_id; 234 } 235 kfree_skb(skb_pipe_info); 236 } 237 238 /* 239 * 3 gates have a well known pipe ID. Only NCI_HCI_LINK_MGMT_GATE 240 * is not yet open at this stage. 241 */ 242 r = nci_hci_connect_gate(ndev, ST_NCI_HOST_CONTROLLER_ID, 243 NCI_HCI_LINK_MGMT_GATE, 244 NCI_HCI_LINK_MGMT_PIPE); 245 246 kfree_skb(skb_pipe_list); 247 return r; 248 } 249 EXPORT_SYMBOL_GPL(st_nci_hci_load_session); 250 251 static void st_nci_hci_admin_event_received(struct nci_dev *ndev, 252 u8 event, struct sk_buff *skb) 253 { 254 struct st_nci_info *info = nci_get_drvdata(ndev); 255 256 switch (event) { 257 case ST_NCI_EVT_HOT_PLUG: 258 if (info->se_info.se_active) { 259 if (!ST_NCI_EVT_HOT_PLUG_IS_INHIBITED(skb)) { 260 del_timer_sync(&info->se_info.se_active_timer); 261 info->se_info.se_active = false; 262 complete(&info->se_info.req_completion); 263 } else { 264 mod_timer(&info->se_info.se_active_timer, 265 jiffies + 266 msecs_to_jiffies(ST_NCI_SE_TO_PIPES)); 267 } 268 } 269 break; 270 default: 271 nfc_err(&ndev->nfc_dev->dev, "Unexpected event on admin gate\n"); 272 } 273 } 274 275 static int st_nci_hci_apdu_reader_event_received(struct nci_dev *ndev, 276 u8 event, 277 struct sk_buff *skb) 278 { 279 int r = 0; 280 struct st_nci_info *info = nci_get_drvdata(ndev); 281 282 pr_debug("apdu reader gate event: %x\n", event); 283 284 switch (event) { 285 case ST_NCI_EVT_TRANSMIT_DATA: 286 del_timer_sync(&info->se_info.bwi_timer); 287 info->se_info.bwi_active = false; 288 info->se_info.cb(info->se_info.cb_context, 289 skb->data, skb->len, 0); 290 break; 291 case ST_NCI_EVT_WTX_REQUEST: 292 mod_timer(&info->se_info.bwi_timer, jiffies + 293 msecs_to_jiffies(info->se_info.wt_timeout)); 294 break; 295 default: 296 nfc_err(&ndev->nfc_dev->dev, "Unexpected event on apdu reader gate\n"); 297 return 1; 298 } 299 300 kfree_skb(skb); 301 return r; 302 } 303 304 /* 305 * Returns: 306 * <= 0: driver handled the event, skb consumed 307 * 1: driver does not handle the event, please do standard processing 308 */ 309 static int st_nci_hci_connectivity_event_received(struct nci_dev *ndev, 310 u8 host, u8 event, 311 struct sk_buff *skb) 312 { 313 int r = 0; 314 struct device *dev = &ndev->nfc_dev->dev; 315 struct nfc_evt_transaction *transaction; 316 317 pr_debug("connectivity gate event: %x\n", event); 318 319 switch (event) { 320 case ST_NCI_EVT_CONNECTIVITY: 321 r = nfc_se_connectivity(ndev->nfc_dev, host); 322 break; 323 case ST_NCI_EVT_TRANSACTION: 324 /* According to specification etsi 102 622 325 * 11.2.2.4 EVT_TRANSACTION Table 52 326 * Description Tag Length 327 * AID 81 5 to 16 328 * PARAMETERS 82 0 to 255 329 */ 330 if (skb->len < NFC_MIN_AID_LENGTH + 2 && 331 skb->data[0] != NFC_EVT_TRANSACTION_AID_TAG) 332 return -EPROTO; 333 334 transaction = (struct nfc_evt_transaction *)devm_kzalloc(dev, 335 skb->len - 2, GFP_KERNEL); 336 337 transaction->aid_len = skb->data[1]; 338 memcpy(transaction->aid, &skb->data[2], transaction->aid_len); 339 340 /* Check next byte is PARAMETERS tag (82) */ 341 if (skb->data[transaction->aid_len + 2] != 342 NFC_EVT_TRANSACTION_PARAMS_TAG) 343 return -EPROTO; 344 345 transaction->params_len = skb->data[transaction->aid_len + 3]; 346 memcpy(transaction->params, skb->data + 347 transaction->aid_len + 4, transaction->params_len); 348 349 r = nfc_se_transaction(ndev->nfc_dev, host, transaction); 350 break; 351 default: 352 nfc_err(&ndev->nfc_dev->dev, "Unexpected event on connectivity gate\n"); 353 return 1; 354 } 355 kfree_skb(skb); 356 return r; 357 } 358 359 void st_nci_hci_event_received(struct nci_dev *ndev, u8 pipe, 360 u8 event, struct sk_buff *skb) 361 { 362 u8 gate = ndev->hci_dev->pipes[pipe].gate; 363 u8 host = ndev->hci_dev->pipes[pipe].host; 364 365 switch (gate) { 366 case NCI_HCI_ADMIN_GATE: 367 st_nci_hci_admin_event_received(ndev, event, skb); 368 break; 369 case ST_NCI_APDU_READER_GATE: 370 st_nci_hci_apdu_reader_event_received(ndev, event, skb); 371 break; 372 case ST_NCI_CONNECTIVITY_GATE: 373 st_nci_hci_connectivity_event_received(ndev, host, event, skb); 374 break; 375 } 376 } 377 EXPORT_SYMBOL_GPL(st_nci_hci_event_received); 378 379 void st_nci_hci_cmd_received(struct nci_dev *ndev, u8 pipe, u8 cmd, 380 struct sk_buff *skb) 381 { 382 struct st_nci_info *info = nci_get_drvdata(ndev); 383 u8 gate = ndev->hci_dev->pipes[pipe].gate; 384 385 pr_debug("cmd: %x\n", cmd); 386 387 switch (cmd) { 388 case NCI_HCI_ANY_OPEN_PIPE: 389 if (gate != ST_NCI_APDU_READER_GATE && 390 ndev->hci_dev->pipes[pipe].host != ST_NCI_UICC_HOST_ID) 391 ndev->hci_dev->count_pipes++; 392 393 if (ndev->hci_dev->count_pipes == 394 ndev->hci_dev->expected_pipes) { 395 del_timer_sync(&info->se_info.se_active_timer); 396 info->se_info.se_active = false; 397 ndev->hci_dev->count_pipes = 0; 398 complete(&info->se_info.req_completion); 399 } 400 break; 401 } 402 } 403 EXPORT_SYMBOL_GPL(st_nci_hci_cmd_received); 404 405 static int st_nci_control_se(struct nci_dev *ndev, u8 se_idx, 406 u8 state) 407 { 408 struct st_nci_info *info = nci_get_drvdata(ndev); 409 int r, i; 410 struct sk_buff *sk_host_list; 411 u8 host_id; 412 413 switch (se_idx) { 414 case ST_NCI_UICC_HOST_ID: 415 ndev->hci_dev->count_pipes = 0; 416 ndev->hci_dev->expected_pipes = ST_NCI_SE_COUNT_PIPE_UICC; 417 break; 418 case ST_NCI_ESE_HOST_ID: 419 ndev->hci_dev->count_pipes = 0; 420 ndev->hci_dev->expected_pipes = ST_NCI_SE_COUNT_PIPE_EMBEDDED; 421 break; 422 default: 423 return -EINVAL; 424 } 425 426 /* 427 * Wait for an EVT_HOT_PLUG in order to 428 * retrieve a relevant host list. 429 */ 430 reinit_completion(&info->se_info.req_completion); 431 r = nci_nfcee_mode_set(ndev, se_idx, state); 432 if (r != NCI_STATUS_OK) 433 return r; 434 435 mod_timer(&info->se_info.se_active_timer, jiffies + 436 msecs_to_jiffies(ST_NCI_SE_TO_HOT_PLUG)); 437 info->se_info.se_active = true; 438 439 /* Ignore return value and check in any case the host_list */ 440 wait_for_completion_interruptible(&info->se_info.req_completion); 441 442 /* There might be some "collision" after receiving a HOT_PLUG event 443 * This may cause the CLF to not answer to the next hci command. 444 * There is no possible synchronization to prevent this. 445 * Adding a small delay is the only way to solve the issue. 446 */ 447 if (info->se_info.se_status->is_ese_present && 448 info->se_info.se_status->is_uicc_present) 449 usleep_range(15000, 20000); 450 451 r = nci_hci_get_param(ndev, NCI_HCI_ADMIN_GATE, 452 NCI_HCI_ADMIN_PARAM_HOST_LIST, &sk_host_list); 453 if (r != NCI_HCI_ANY_OK) 454 return r; 455 456 for (i = 0; i < sk_host_list->len && 457 sk_host_list->data[i] != se_idx; i++) 458 ; 459 host_id = sk_host_list->data[i]; 460 kfree_skb(sk_host_list); 461 if (state == ST_NCI_SE_MODE_ON && host_id == se_idx) 462 return se_idx; 463 else if (state == ST_NCI_SE_MODE_OFF && host_id != se_idx) 464 return se_idx; 465 466 return -1; 467 } 468 469 int st_nci_disable_se(struct nci_dev *ndev, u32 se_idx) 470 { 471 int r; 472 473 pr_debug("st_nci_disable_se\n"); 474 475 /* 476 * According to upper layer, se_idx == NFC_SE_UICC when 477 * info->se_info.se_status->is_uicc_enable is true should never happen 478 * Same for eSE. 479 */ 480 r = st_nci_control_se(ndev, se_idx, ST_NCI_SE_MODE_OFF); 481 if (r < 0) { 482 /* Do best effort to release SWP */ 483 if (se_idx == NFC_SE_EMBEDDED) { 484 r = nci_hci_send_event(ndev, ST_NCI_APDU_READER_GATE, 485 ST_NCI_EVT_SE_END_OF_APDU_TRANSFER, 486 NULL, 0); 487 } 488 return r; 489 } 490 491 return 0; 492 } 493 EXPORT_SYMBOL_GPL(st_nci_disable_se); 494 495 int st_nci_enable_se(struct nci_dev *ndev, u32 se_idx) 496 { 497 int r; 498 499 pr_debug("st_nci_enable_se\n"); 500 501 /* 502 * According to upper layer, se_idx == NFC_SE_UICC when 503 * info->se_info.se_status->is_uicc_enable is true should never happen. 504 * Same for eSE. 505 */ 506 r = st_nci_control_se(ndev, se_idx, ST_NCI_SE_MODE_ON); 507 if (r == ST_NCI_ESE_HOST_ID) { 508 st_nci_se_get_atr(ndev); 509 r = nci_hci_send_event(ndev, ST_NCI_APDU_READER_GATE, 510 ST_NCI_EVT_SE_SOFT_RESET, NULL, 0); 511 } 512 513 if (r < 0) { 514 /* 515 * The activation procedure failed, the secure element 516 * is not connected. Remove from the list. 517 */ 518 nfc_remove_se(ndev->nfc_dev, se_idx); 519 return r; 520 } 521 522 return 0; 523 } 524 EXPORT_SYMBOL_GPL(st_nci_enable_se); 525 526 static int st_nci_hci_network_init(struct nci_dev *ndev) 527 { 528 struct st_nci_info *info = nci_get_drvdata(ndev); 529 struct core_conn_create_dest_spec_params *dest_params; 530 struct dest_spec_params spec_params; 531 struct nci_conn_info *conn_info; 532 int r, dev_num; 533 534 dest_params = 535 kzalloc(sizeof(struct core_conn_create_dest_spec_params) + 536 sizeof(struct dest_spec_params), GFP_KERNEL); 537 if (dest_params == NULL) { 538 r = -ENOMEM; 539 goto exit; 540 } 541 542 dest_params->type = NCI_DESTINATION_SPECIFIC_PARAM_NFCEE_TYPE; 543 dest_params->length = sizeof(struct dest_spec_params); 544 spec_params.id = ndev->hci_dev->nfcee_id; 545 spec_params.protocol = NCI_NFCEE_INTERFACE_HCI_ACCESS; 546 memcpy(dest_params->value, &spec_params, 547 sizeof(struct dest_spec_params)); 548 r = nci_core_conn_create(ndev, NCI_DESTINATION_NFCEE, 1, 549 sizeof(struct core_conn_create_dest_spec_params) + 550 sizeof(struct dest_spec_params), 551 dest_params); 552 if (r != NCI_STATUS_OK) 553 goto free_dest_params; 554 555 conn_info = ndev->hci_dev->conn_info; 556 if (!conn_info) 557 goto free_dest_params; 558 559 ndev->hci_dev->init_data.gate_count = ARRAY_SIZE(st_nci_gates); 560 memcpy(ndev->hci_dev->init_data.gates, st_nci_gates, 561 sizeof(st_nci_gates)); 562 563 /* 564 * Session id must include the driver name + i2c bus addr 565 * persistent info to discriminate 2 identical chips 566 */ 567 dev_num = find_first_zero_bit(dev_mask, ST_NCI_NUM_DEVICES); 568 if (dev_num >= ST_NCI_NUM_DEVICES) { 569 r = -ENODEV; 570 goto free_dest_params; 571 } 572 573 scnprintf(ndev->hci_dev->init_data.session_id, 574 sizeof(ndev->hci_dev->init_data.session_id), 575 "%s%2x", "ST21BH", dev_num); 576 577 r = nci_hci_dev_session_init(ndev); 578 if (r != NCI_HCI_ANY_OK) 579 goto free_dest_params; 580 581 /* 582 * In factory mode, we prevent secure elements activation 583 * by disabling nfcee on the current HCI connection id. 584 * HCI will be used here only for proprietary commands. 585 */ 586 if (test_bit(ST_NCI_FACTORY_MODE, &info->flags)) 587 r = nci_nfcee_mode_set(ndev, 588 ndev->hci_dev->conn_info->dest_params->id, 589 NCI_NFCEE_DISABLE); 590 else 591 r = nci_nfcee_mode_set(ndev, 592 ndev->hci_dev->conn_info->dest_params->id, 593 NCI_NFCEE_ENABLE); 594 595 free_dest_params: 596 kfree(dest_params); 597 598 exit: 599 return r; 600 } 601 602 int st_nci_discover_se(struct nci_dev *ndev) 603 { 604 u8 white_list[2]; 605 int r, wl_size = 0; 606 int se_count = 0; 607 struct st_nci_info *info = nci_get_drvdata(ndev); 608 609 pr_debug("st_nci_discover_se\n"); 610 611 r = st_nci_hci_network_init(ndev); 612 if (r != 0) 613 return r; 614 615 if (test_bit(ST_NCI_FACTORY_MODE, &info->flags)) 616 return 0; 617 618 if (info->se_info.se_status->is_uicc_present) 619 white_list[wl_size++] = ST_NCI_UICC_HOST_ID; 620 if (info->se_info.se_status->is_ese_present) 621 white_list[wl_size++] = ST_NCI_ESE_HOST_ID; 622 623 if (wl_size) { 624 r = nci_hci_set_param(ndev, NCI_HCI_ADMIN_GATE, 625 NCI_HCI_ADMIN_PARAM_WHITELIST, 626 white_list, wl_size); 627 if (r != NCI_HCI_ANY_OK) 628 return r; 629 } 630 631 if (info->se_info.se_status->is_uicc_present) { 632 nfc_add_se(ndev->nfc_dev, ST_NCI_UICC_HOST_ID, NFC_SE_UICC); 633 se_count++; 634 } 635 636 if (info->se_info.se_status->is_ese_present) { 637 nfc_add_se(ndev->nfc_dev, ST_NCI_ESE_HOST_ID, NFC_SE_EMBEDDED); 638 se_count++; 639 } 640 641 return !se_count; 642 } 643 EXPORT_SYMBOL_GPL(st_nci_discover_se); 644 645 int st_nci_se_io(struct nci_dev *ndev, u32 se_idx, 646 u8 *apdu, size_t apdu_length, 647 se_io_cb_t cb, void *cb_context) 648 { 649 struct st_nci_info *info = nci_get_drvdata(ndev); 650 651 pr_debug("\n"); 652 653 switch (se_idx) { 654 case ST_NCI_ESE_HOST_ID: 655 info->se_info.cb = cb; 656 info->se_info.cb_context = cb_context; 657 mod_timer(&info->se_info.bwi_timer, jiffies + 658 msecs_to_jiffies(info->se_info.wt_timeout)); 659 info->se_info.bwi_active = true; 660 return nci_hci_send_event(ndev, ST_NCI_APDU_READER_GATE, 661 ST_NCI_EVT_TRANSMIT_DATA, apdu, 662 apdu_length); 663 default: 664 return -ENODEV; 665 } 666 } 667 EXPORT_SYMBOL(st_nci_se_io); 668 669 static void st_nci_se_wt_timeout(struct timer_list *t) 670 { 671 /* 672 * No answer from the secure element 673 * within the defined timeout. 674 * Let's send a reset request as recovery procedure. 675 * According to the situation, we first try to send a software reset 676 * to the secure element. If the next command is still not 677 * answering in time, we send to the CLF a secure element hardware 678 * reset request. 679 */ 680 /* hardware reset managed through VCC_UICC_OUT power supply */ 681 u8 param = 0x01; 682 struct st_nci_info *info = from_timer(info, t, se_info.bwi_timer); 683 684 pr_debug("\n"); 685 686 info->se_info.bwi_active = false; 687 688 if (!info->se_info.xch_error) { 689 info->se_info.xch_error = true; 690 nci_hci_send_event(info->ndlc->ndev, ST_NCI_APDU_READER_GATE, 691 ST_NCI_EVT_SE_SOFT_RESET, NULL, 0); 692 } else { 693 info->se_info.xch_error = false; 694 nci_hci_send_event(info->ndlc->ndev, ST_NCI_DEVICE_MGNT_GATE, 695 ST_NCI_EVT_SE_HARD_RESET, ¶m, 1); 696 } 697 info->se_info.cb(info->se_info.cb_context, NULL, 0, -ETIME); 698 } 699 700 static void st_nci_se_activation_timeout(struct timer_list *t) 701 { 702 struct st_nci_info *info = from_timer(info, t, 703 se_info.se_active_timer); 704 705 pr_debug("\n"); 706 707 info->se_info.se_active = false; 708 709 complete(&info->se_info.req_completion); 710 } 711 712 int st_nci_se_init(struct nci_dev *ndev, struct st_nci_se_status *se_status) 713 { 714 struct st_nci_info *info = nci_get_drvdata(ndev); 715 716 init_completion(&info->se_info.req_completion); 717 /* initialize timers */ 718 timer_setup(&info->se_info.bwi_timer, st_nci_se_wt_timeout, 0); 719 info->se_info.bwi_active = false; 720 721 timer_setup(&info->se_info.se_active_timer, 722 st_nci_se_activation_timeout, 0); 723 info->se_info.se_active = false; 724 725 info->se_info.xch_error = false; 726 727 info->se_info.wt_timeout = 728 ST_NCI_BWI_TO_TIMEOUT(ST_NCI_ATR_DEFAULT_BWI); 729 730 info->se_info.se_status = se_status; 731 732 return 0; 733 } 734 EXPORT_SYMBOL(st_nci_se_init); 735 736 void st_nci_se_deinit(struct nci_dev *ndev) 737 { 738 struct st_nci_info *info = nci_get_drvdata(ndev); 739 740 if (info->se_info.bwi_active) 741 del_timer_sync(&info->se_info.bwi_timer); 742 if (info->se_info.se_active) 743 del_timer_sync(&info->se_info.se_active_timer); 744 745 info->se_info.se_active = false; 746 info->se_info.bwi_active = false; 747 } 748 EXPORT_SYMBOL(st_nci_se_deinit); 749 750