| 1 | /*************************************************************************** |
|---|
| 2 | * (c)2008-2010 Broadcom Corporation |
|---|
| 3 | * |
|---|
| 4 | * This program is the proprietary software of Broadcom Corporation and/or its licensors, |
|---|
| 5 | * and may only be used, duplicated, modified or distributed pursuant to the terms and |
|---|
| 6 | * conditions of a separate, written license agreement executed between you and Broadcom |
|---|
| 7 | * (an "Authorized License"). Except as set forth in an Authorized License, Broadcom grants |
|---|
| 8 | * no license (express or implied), right to use, or waiver of any kind with respect to the |
|---|
| 9 | * Software, and Broadcom expressly reserves all rights in and to the Software and all |
|---|
| 10 | * intellectual property rights therein. IF YOU HAVE NO AUTHORIZED LICENSE, THEN YOU |
|---|
| 11 | * HAVE NO RIGHT TO USE THIS SOFTWARE IN ANY WAY, AND SHOULD IMMEDIATELY |
|---|
| 12 | * NOTIFY BROADCOM AND DISCONTINUE ALL USE OF THE SOFTWARE. |
|---|
| 13 | * |
|---|
| 14 | * Except as expressly set forth in the Authorized License, |
|---|
| 15 | * |
|---|
| 16 | * 1. This program, including its structure, sequence and organization, constitutes the valuable trade |
|---|
| 17 | * secrets of Broadcom, and you shall use all reasonable efforts to protect the confidentiality thereof, |
|---|
| 18 | * and to use this information only in connection with your use of Broadcom integrated circuit products. |
|---|
| 19 | * |
|---|
| 20 | * 2. TO THE MAXIMUM EXTENT PERMITTED BY LAW, THE SOFTWARE IS PROVIDED "AS IS" |
|---|
| 21 | * AND WITH ALL FAULTS AND BROADCOM MAKES NO PROMISES, REPRESENTATIONS OR |
|---|
| 22 | * WARRANTIES, EITHER EXPRESS, IMPLIED, STATUTORY, OR OTHERWISE, WITH RESPECT TO |
|---|
| 23 | * THE SOFTWARE. BROADCOM SPECIFICALLY DISCLAIMS ANY AND ALL IMPLIED WARRANTIES |
|---|
| 24 | * OF TITLE, MERCHANTABILITY, NONINFRINGEMENT, FITNESS FOR A PARTICULAR PURPOSE, |
|---|
| 25 | * LACK OF VIRUSES, ACCURACY OR COMPLETENESS, QUIET ENJOYMENT, QUIET POSSESSION |
|---|
| 26 | * OR CORRESPONDENCE TO DESCRIPTION. YOU ASSUME THE ENTIRE RISK ARISING OUT OF |
|---|
| 27 | * USE OR PERFORMANCE OF THE SOFTWARE. |
|---|
| 28 | * |
|---|
| 29 | * 3. TO THE MAXIMUM EXTENT PERMITTED BY LAW, IN NO EVENT SHALL BROADCOM OR ITS |
|---|
| 30 | * LICENSORS BE LIABLE FOR (i) CONSEQUENTIAL, INCIDENTAL, SPECIAL, INDIRECT, OR |
|---|
| 31 | * EXEMPLARY DAMAGES WHATSOEVER ARISING OUT OF OR IN ANY WAY RELATING TO YOUR |
|---|
| 32 | * USE OF OR INABILITY TO USE THE SOFTWARE EVEN IF BROADCOM HAS BEEN ADVISED OF |
|---|
| 33 | * THE POSSIBILITY OF SUCH DAMAGES; OR (ii) ANY AMOUNT IN EXCESS OF THE AMOUNT |
|---|
| 34 | * ACTUALLY PAID FOR THE SOFTWARE ITSELF OR U.S. $1, WHICHEVER IS GREATER. THESE |
|---|
| 35 | * LIMITATIONS SHALL APPLY NOTWITHSTANDING ANY FAILURE OF ESSENTIAL PURPOSE OF |
|---|
| 36 | * ANY LIMITED REMEDY. |
|---|
| 37 | * |
|---|
| 38 | * $brcm_Workfile: decrypto.h $ |
|---|
| 39 | * $brcm_Revision: 2 $ |
|---|
| 40 | * $brcm_Date: 7/22/10 11:02a $ |
|---|
| 41 | * |
|---|
| 42 | * Module Description: |
|---|
| 43 | * |
|---|
| 44 | * Revision History: |
|---|
| 45 | * |
|---|
| 46 | * $brcm_Log: /nexus/lib/dtcp_ip/include/decrypto.h $ |
|---|
| 47 | * |
|---|
| 48 | * 2 7/22/10 11:02a leisun |
|---|
| 49 | * SW7420-561: fix production key handling for 7420 |
|---|
| 50 | * |
|---|
| 51 | ***************************************************************************/ |
|---|
| 52 | |
|---|
| 53 | /** |
|---|
| 54 | * @brief Defines the private structure for Netflix DRM module. |
|---|
| 55 | */ |
|---|
| 56 | |
|---|
| 57 | /*************************************************************************** |
|---|
| 58 | * Copyright (c) 2008, Broadcom Corporation |
|---|
| 59 | * All Rights Reserved |
|---|
| 60 | * Confidential Property of Broadcom Corporation |
|---|
| 61 | * |
|---|
| 62 | * THIS SOFTWARE MAY ONLY BE USED SUBJECT TO AN EXECUTED SOFTWARE LICENSE |
|---|
| 63 | * AGREEMENT BETWEEN THE USER AND BROADCOM. YOU HAVE NO RIGHT TO USE OR |
|---|
| 64 | * (c)2008-2010 Broadcom Corporation |
|---|
| 65 | * |
|---|
| 66 | * This program is the proprietary software of Broadcom Corporation and/or its licensors, |
|---|
| 67 | * and may only be used, duplicated, modified or distributed pursuant to the terms and |
|---|
| 68 | * conditions of a separate, written license agreement executed between you and Broadcom |
|---|
| 69 | * (an "Authorized License"). Except as set forth in an Authorized License, Broadcom grants |
|---|
| 70 | * no license (express or implied), right to use, or waiver of any kind with respect to the |
|---|
| 71 | * Software, and Broadcom expressly reserves all rights in and to the Software and all |
|---|
| 72 | * intellectual property rights therein. IF YOU HAVE NO AUTHORIZED LICENSE, THEN YOU |
|---|
| 73 | * HAVE NO RIGHT TO USE THIS SOFTWARE IN ANY WAY, AND SHOULD IMMEDIATELY |
|---|
| 74 | * NOTIFY BROADCOM AND DISCONTINUE ALL USE OF THE SOFTWARE. |
|---|
| 75 | * |
|---|
| 76 | * Except as expressly set forth in the Authorized License, |
|---|
| 77 | * |
|---|
| 78 | * 1. This program, including its structure, sequence and organization, constitutes the valuable trade |
|---|
| 79 | * secrets of Broadcom, and you shall use all reasonable efforts to protect the confidentiality thereof, |
|---|
| 80 | * and to use this information only in connection with your use of Broadcom integrated circuit products. |
|---|
| 81 | * |
|---|
| 82 | * 2. TO THE MAXIMUM EXTENT PERMITTED BY LAW, THE SOFTWARE IS PROVIDED "AS IS" |
|---|
| 83 | * AND WITH ALL FAULTS AND BROADCOM MAKES NO PROMISES, REPRESENTATIONS OR |
|---|
| 84 | * WARRANTIES, EITHER EXPRESS, IMPLIED, STATUTORY, OR OTHERWISE, WITH RESPECT TO |
|---|
| 85 | * THE SOFTWARE. BROADCOM SPECIFICALLY DISCLAIMS ANY AND ALL IMPLIED WARRANTIES |
|---|
| 86 | * OF TITLE, MERCHANTABILITY, NONINFRINGEMENT, FITNESS FOR A PARTICULAR PURPOSE, |
|---|
| 87 | * LACK OF VIRUSES, ACCURACY OR COMPLETENESS, QUIET ENJOYMENT, QUIET POSSESSION |
|---|
| 88 | * OR CORRESPONDENCE TO DESCRIPTION. YOU ASSUME THE ENTIRE RISK ARISING OUT OF |
|---|
| 89 | * USE OR PERFORMANCE OF THE SOFTWARE. |
|---|
| 90 | * |
|---|
| 91 | * 3. TO THE MAXIMUM EXTENT PERMITTED BY LAW, IN NO EVENT SHALL BROADCOM OR ITS |
|---|
| 92 | * LICENSORS BE LIABLE FOR (i) CONSEQUENTIAL, INCIDENTAL, SPECIAL, INDIRECT, OR |
|---|
| 93 | * EXEMPLARY DAMAGES WHATSOEVER ARISING OUT OF OR IN ANY WAY RELATING TO YOUR |
|---|
| 94 | * USE OF OR INABILITY TO USE THE SOFTWARE EVEN IF BROADCOM HAS BEEN ADVISED OF |
|---|
| 95 | * THE POSSIBILITY OF SUCH DAMAGES; OR (ii) ANY AMOUNT IN EXCESS OF THE AMOUNT |
|---|
| 96 | * ACTUALLY PAID FOR THE SOFTWARE ITSELF OR U.S. $1, WHICHEVER IS GREATER. THESE |
|---|
| 97 | * LIMITATIONS SHALL APPLY NOTWITHSTANDING ANY FAILURE OF ESSENTIAL PURPOSE OF |
|---|
| 98 | * ANY LIMITED REMEDY. |
|---|
| 99 | * |
|---|
| 100 | * $brcm_Workfile: decrypto.h $ |
|---|
| 101 | * $brcm_Revision: 2 $ |
|---|
| 102 | * $brcm_Date: 7/22/10 11:02a $ |
|---|
| 103 | * |
|---|
| 104 | * Module Description: |
|---|
| 105 | * |
|---|
| 106 | * Revision History: |
|---|
| 107 | * |
|---|
| 108 | * $brcm_Log: /nexus/lib/dtcp_ip/include/decrypto.h $ |
|---|
| 109 | * |
|---|
| 110 | * 2 7/22/10 11:02a leisun |
|---|
| 111 | * SW7420-561: fix production key handling for 7420 |
|---|
| 112 | * |
|---|
| 113 | ***************************************************************************/ |
|---|
| 114 | |
|---|
| 115 | /** |
|---|
| 116 | * @brief Defines the private structure for Netflix DRM module. |
|---|
| 117 | */ |
|---|
| 118 | |
|---|
| 119 | #ifndef _DRM_NETFLIX_H_ |
|---|
| 120 | #define _DRM_NETFLIX_H_ |
|---|
| 121 | |
|---|
| 122 | #ifdef __cplusplus |
|---|
| 123 | extern "C" { |
|---|
| 124 | #endif |
|---|
| 125 | |
|---|
| 126 | #if (BCHP_CHIP == 7408) |
|---|
| 127 | static const uint8_t CUSTOMER_KEY_SELECT = (0x00); |
|---|
| 128 | static const uint8_t FLASH_KEY_KEY_VAR_LOW = (0x7F); |
|---|
| 129 | static const uint8_t FLASH_KEY_KEY_VAR_HIGH = (0x7F); |
|---|
| 130 | /* |
|---|
| 131 | // 128-bit proc_inx_data in big-endian format, set this paramter if using Customer Key Select |
|---|
| 132 | */ |
|---|
| 133 | static const uint8_t FLASH_PROC_IN1_DATA[] = {0xa1, 0x7d, 0xdc, 0xab, 0xb2, 0x3b, 0x6d, 0xf4, 0x1c, 0xa9, 0x36, 0x98, 0x84, 0x5b, 0x97, 0x19}; |
|---|
| 134 | static const uint8_t FLASH_PROC_IN2_DATA[] = {0xEC, 0x9B, 0xF2, 0x86, 0xD9, 0x25, 0x52, 0xB7, 0x11, 0x49, 0x87, 0xF0, 0xAE, 0xC3, 0xF2, 0x43}; |
|---|
| 135 | |
|---|
| 136 | #else |
|---|
| 137 | static const uint8_t CUSTOMER_KEY_SELECT = (0x00); |
|---|
| 138 | static const uint8_t FLASH_KEY_KEY_VAR_LOW = (0x38); |
|---|
| 139 | static const uint8_t FLASH_KEY_KEY_VAR_HIGH = (0x27); |
|---|
| 140 | /* |
|---|
| 141 | // 128-bit proc_inx_data in big-endian format, set this paramter if using Customer Key Select |
|---|
| 142 | */ |
|---|
| 143 | static const uint8_t FLASH_PROC_IN1_DATA[] = {0xa1, 0x7d, 0xdc, 0xab, 0xb2, 0x3b, 0x6d, 0xf4, 0x1c, 0xa9, 0x36, 0x98, 0x84, 0x5b, 0x97, 0x19}; |
|---|
| 144 | static const uint8_t FLASH_PROC_IN2_DATA[] = {0x22, 0x65, 0x14, 0x43, 0xca, 0xf7, 0xfa, 0xd8, 0x04, 0x64, 0x2c, 0x5a, 0x52, 0x91, 0xe1, 0x11}; |
|---|
| 145 | |
|---|
| 146 | #endif |
|---|
| 147 | |
|---|
| 148 | void Initialize_KeySlot(void); |
|---|
| 149 | void Finalize_KeySlot(void); |
|---|
| 150 | NEXUS_Error keyladder_crypto(uint8_t *pBuf, uint32_t size); |
|---|
| 151 | |
|---|
| 152 | |
|---|
| 153 | #ifdef __cplusplus |
|---|
| 154 | } |
|---|
| 155 | #endif |
|---|
| 156 | |
|---|
| 157 | #endif |
|---|