cryptfs_hw: Support devices use metadata as key
* This fixes FDE devices which uses metadata partition as encryption key.
Errors:
> Logcat:
E Cryptfs_hw: Error::ioctl call to create encryption key for usage 1 failed with ret = -1, errno = 14
> Dmesg:
scm_call failed: func id 0x72000504, ret: -2, syscall returns: 0xfffffffffffffffc, 0x0, 0x0
QSEECOM: __qseecom_set_clear_ce_key: scm call to set QSEOS_PIPE_ENC key failed : -22
QSEECOM: qseecom_wipe_key: Failed to wipe key: pipe 2, ce 0: -14
QSEECOM: qseecom_ioctl: failed to wipe encryption key: -14
Test: Boot griffin with encrypted data
Signed-off-by: Erfan Abdi <erfangplus@gmail.com>
Change-Id: Id7a6474fe7fe46e0d4e4ebb3b24e1ba940971df4
Signed-off-by: Josh Fox (XlxFoXxlX) <joshfox87@gmail.com>
diff --git a/Android.bp b/Android.bp
index 169b2cd..12d07e6 100644
--- a/Android.bp
+++ b/Android.bp
@@ -24,6 +24,9 @@
should_skip_waiting_for_qsee: {
cflags: ["-DWAIT_FOR_QSEE"],
},
+ uses_metadata_as_fde_key: {
+ cflags: ["-DUSE_METADATA_FOR_KEY"],
+ },
},
},
diff --git a/cryptfs_hw.c b/cryptfs_hw.c
index fbbd536..3b5ac6c 100644
--- a/cryptfs_hw.c
+++ b/cryptfs_hw.c
@@ -81,7 +81,9 @@
#define CRYPTFS_HW_ALGO_MODE_AES_XTS 0x3
+#ifndef USE_METADATA_FOR_KEY
#define METADATA_PARTITION_NAME "/dev/block/bootdevice/by-name/metadata"
+#endif
enum cryptfs_hw_key_management_usage_type {
CRYPTFS_HW_KM_USAGE_DISK_ENCRYPTION = 0x01,
@@ -460,6 +462,7 @@
char prop_storage[PATH_MAX];
int storage_type = 0;
+#ifndef USE_METADATA_FOR_KEY
/*
* Since HW FDE is a compile time flag (due to QSSI requirements),
* this API conflicts with Metadata encryption even when ICE is
@@ -471,6 +474,7 @@
SLOGI("Metadata partition, returning false");
return 0;
}
+#endif
if (property_get("ro.boot.bootdevice", prop_storage, "")) {
if (strstr(prop_storage, "ufs")) {