cryptfs_hw: Support devices use metadata as key

* This fixes FDE devices which uses metadata partition as encryption key.
Errors:
> Logcat:
E Cryptfs_hw: Error::ioctl call to create encryption key for usage 1 failed with ret = -1, errno = 14
> Dmesg:
scm_call failed: func id 0x72000504, ret: -2, syscall returns: 0xfffffffffffffffc, 0x0, 0x0
QSEECOM: __qseecom_set_clear_ce_key: scm call to set QSEOS_PIPE_ENC key failed : -22
QSEECOM: qseecom_wipe_key: Failed to wipe key: pipe 2, ce 0: -14
QSEECOM: qseecom_ioctl: failed to wipe encryption key: -14

Test: Boot griffin with encrypted data
Signed-off-by: Erfan Abdi <erfangplus@gmail.com>
Change-Id: Id7a6474fe7fe46e0d4e4ebb3b24e1ba940971df4
Signed-off-by: Josh Fox (XlxFoXxlX) <joshfox87@gmail.com>
diff --git a/Android.bp b/Android.bp
index 169b2cd..12d07e6 100644
--- a/Android.bp
+++ b/Android.bp
@@ -24,6 +24,9 @@
             should_skip_waiting_for_qsee: {
                 cflags: ["-DWAIT_FOR_QSEE"],
             },
+            uses_metadata_as_fde_key: {
+                cflags: ["-DUSE_METADATA_FOR_KEY"],
+            },
         },
     },
 
diff --git a/cryptfs_hw.c b/cryptfs_hw.c
index fbbd536..3b5ac6c 100644
--- a/cryptfs_hw.c
+++ b/cryptfs_hw.c
@@ -81,7 +81,9 @@
 
 #define CRYPTFS_HW_ALGO_MODE_AES_XTS 			0x3
 
+#ifndef USE_METADATA_FOR_KEY
 #define METADATA_PARTITION_NAME "/dev/block/bootdevice/by-name/metadata"
+#endif
 
 enum cryptfs_hw_key_management_usage_type {
 	CRYPTFS_HW_KM_USAGE_DISK_ENCRYPTION		= 0x01,
@@ -460,6 +462,7 @@
   char prop_storage[PATH_MAX];
   int storage_type = 0;
 
+#ifndef USE_METADATA_FOR_KEY
   /*
    * Since HW FDE is a compile time flag (due to QSSI requirements),
    * this API conflicts with Metadata encryption even when ICE is
@@ -471,6 +474,7 @@
     SLOGI("Metadata partition, returning false");
     return 0;
   }
+#endif
 
   if (property_get("ro.boot.bootdevice", prop_storage, "")) {
     if (strstr(prop_storage, "ufs")) {