[Feature]Upload Modem source code

Change-Id: Id4294f30faced84d3e6fd6d5e61e1111bf287a37
diff --git a/mcu/service/sst/include/SST_secure.h b/mcu/service/sst/include/SST_secure.h
new file mode 100644
index 0000000..4d3ba1b
--- /dev/null
+++ b/mcu/service/sst/include/SST_secure.h
@@ -0,0 +1,505 @@
+/*****************************************************************************
+*  Copyright Statement:
+*  --------------------
+*  This software is protected by Copyright and the information contained
+*  herein is confidential. The software may not be copied and the information
+*  contained herein may not be used or disclosed except with the written
+*  permission of MediaTek Inc. (C) 2005
+*
+*  BY OPENING THIS FILE, BUYER HEREBY UNEQUIVOCALLY ACKNOWLEDGES AND AGREES
+*  THAT THE SOFTWARE/FIRMWARE AND ITS DOCUMENTATIONS ("MEDIATEK SOFTWARE")
+*  RECEIVED FROM MEDIATEK AND/OR ITS REPRESENTATIVES ARE PROVIDED TO BUYER ON
+*  AN "AS-IS" BASIS ONLY. MEDIATEK EXPRESSLY DISCLAIMS ANY AND ALL WARRANTIES,
+*  EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF
+*  MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NONINFRINGEMENT.
+*  NEITHER DOES MEDIATEK PROVIDE ANY WARRANTY WHATSOEVER WITH RESPECT TO THE
+*  SOFTWARE OF ANY THIRD PARTY WHICH MAY BE USED BY, INCORPORATED IN, OR
+*  SUPPLIED WITH THE MEDIATEK SOFTWARE, AND BUYER AGREES TO LOOK ONLY TO SUCH
+*  THIRD PARTY FOR ANY WARRANTY CLAIM RELATING THERETO. MEDIATEK SHALL ALSO
+*  NOT BE RESPONSIBLE FOR ANY MEDIATEK SOFTWARE RELEASES MADE TO BUYER'S
+*  SPECIFICATION OR TO CONFORM TO A PARTICULAR STANDARD OR OPEN FORUM.
+*
+*  BUYER'S SOLE AND EXCLUSIVE REMEDY AND MEDIATEK'S ENTIRE AND CUMULATIVE
+*  LIABILITY WITH RESPECT TO THE MEDIATEK SOFTWARE RELEASED HEREUNDER WILL BE,
+*  AT MEDIATEK'S OPTION, TO REVISE OR REPLACE THE MEDIATEK SOFTWARE AT ISSUE,
+*  OR REFUND ANY SOFTWARE LICENSE FEES OR SERVICE CHARGE PAID BY BUYER TO
+*  MEDIATEK FOR SUCH MEDIATEK SOFTWARE AT ISSUE.
+*
+*  THE TRANSACTION CONTEMPLATED HEREUNDER SHALL BE CONSTRUED IN ACCORDANCE
+*  WITH THE LAWS OF THE STATE OF CALIFORNIA, USA, EXCLUDING ITS CONFLICT OF
+*  LAWS PRINCIPLES.  ANY DISPUTES, CONTROVERSIES OR CLAIMS ARISING THEREOF AND
+*  RELATED THERETO SHALL BE SETTLED BY ARBITRATION IN SAN FRANCISCO, CA, UNDER
+*  THE RULES OF THE INTERNATIONAL CHAMBER OF COMMERCE (ICC).
+*
+*****************************************************************************/
+
+/*****************************************************************************
+ *
+ * Filename:
+ * ---------
+ *   SST_secure.h
+ *
+ * Project:
+ * --------
+ *   Maui_Software
+ *
+ * Description:
+ * ------------
+ *   This is header file for SST_secure.c
+ *
+ * Author:
+ * -------
+ * -------
+ *
+ *============================================================================
+ *             HISTORY
+ * Below this line, this part is controlled by PVCS VM. DO NOT MODIFY!!
+ *------------------------------------------------------------------------------
+ * removed!
+ * removed!
+ * removed!
+ *
+ * removed!
+ * removed!
+ * removed!
+ *
+ * removed!
+ * removed!
+ * removed!
+ *
+ * removed!
+ * removed!
+ * removed!
+ *
+ * removed!
+ * removed!
+ * removed!
+ *
+ * removed!
+ * removed!
+ * removed!
+ *
+ * removed!
+ * removed!
+ * removed!
+ *
+ * removed!
+ * removed!
+ * removed!
+ *
+ * removed!
+ * removed!
+ * removed!
+ * removed!
+ *
+ * removed!
+ * removed!
+ * removed!
+ * removed!
+ *
+ * removed!
+ * removed!
+ * removed!
+ *
+ * removed!
+ * removed!
+ * removed!
+ *
+ * removed!
+ * removed!
+ * removed!
+ *
+ * removed!
+ * removed!
+ * removed!
+ *
+ * removed!
+ * removed!
+ * removed!
+ *
+ * removed!
+ * removed!
+ * removed!
+ *
+ * removed!
+ * removed!
+ * removed!
+ *
+ * removed!
+ * removed!
+ * removed!
+ *
+ * removed!
+ * removed!
+ * removed!
+ *
+ * removed!
+ * removed!
+ * removed!
+ *
+ * removed!
+ * removed!
+ * removed!
+ *
+ * removed!
+ * removed!
+ * removed!
+ *
+ * removed!
+ * removed!
+ *
+ * removed!
+ * removed!
+ *
+ * removed!
+ * removed!
+ *
+ * removed!
+ * removed!
+ * removed!
+ *
+ * removed!
+ * removed!
+ * removed!
+ *
+ * removed!
+ * removed!
+ * removed!
+ *
+ * removed!
+ * removed!
+ * removed!
+ *
+ * removed!
+ * removed!
+ * removed!
+ *
+ * removed!
+ * removed!
+ *
+ * removed!
+ * removed!
+ * removed!
+ *
+ * removed!
+ * removed!
+ * removed!
+ *
+ * removed!
+ * removed!
+ * removed!
+ *
+ * removed!
+ * removed!
+ * removed!
+ *
+ * removed!
+ * removed!
+ * removed!
+ *
+ * removed!
+ * removed!
+ * removed!
+ *
+ * removed!
+ * removed!
+ * removed!
+ *
+ * removed!
+ * removed!
+ * removed!
+ * removed!
+ *
+ * removed!
+ * removed!
+ * removed!
+ *
+ * removed!
+ * removed!
+ * removed!
+ *
+ * removed!
+ * removed!
+ * removed!
+ *
+ * removed!
+ * removed!
+ * removed!
+ *
+ * removed!
+ * removed!
+ *
+ * removed!
+ * removed!
+ * removed!
+ * removed!
+ * removed!
+ * removed!
+ *
+ * removed!
+ * removed!
+ * removed!
+ *
+ * removed!
+ * removed!
+ * removed!
+ *
+ * removed!
+ * removed!
+ * removed!
+ *
+ * removed!
+ * removed!
+ * removed!
+ *
+ * removed!
+ * removed!
+ * removed!
+ *
+ * removed!
+ * removed!
+ * removed!
+ *
+ * removed!
+ * removed!
+ * removed!
+ *
+ * removed!
+ * removed!
+ * removed!
+ *
+ * removed!
+ * removed!
+ * removed!
+ *
+ * removed!
+ * removed!
+ * removed!
+ *
+ * removed!
+ * removed!
+ * removed!
+ *
+ * removed!
+ * removed!
+ * removed!
+ *
+ * removed!
+ * removed!
+ * removed!
+ *
+ * removed!
+ * removed!
+ * removed!
+ *
+ * removed!
+ * removed!
+ * removed!
+ *
+ * removed!
+ * removed!
+ * removed!
+ *
+ * removed!
+ * removed!
+ * removed!
+ *
+ * removed!
+ * removed!
+ * removed!
+ *
+ * removed!
+ * removed!
+ * removed!
+ *
+ * removed!
+ * removed!
+ * removed!
+ *
+ *------------------------------------------------------------------------------
+ * Upper this line, this part is controlled by PVCS VM. DO NOT MODIFY!!
+ *============================================================================
+ ****************************************************************************/
+
+
+#ifndef __SST_SECURE_H__
+#define __SST_SECURE_H__
+
+/*******************************************************************************
+ * Included header files
+ *******************************************************************************/
+
+#include "kal_general_types.h"
+#include "nvram_data_items.h"
+#include "l4_nvram_def.h"
+
+#include "sst_interface.h"
+#include "kal_public_defs.h"
+#include "reg_base.h"
+
+/*************************************************************************
+ * External global data declaration
+ *************************************************************************/
+
+/*************************************************************************
+ * External Function Declaration
+ *************************************************************************/
+
+/*************************************************************************
+ * Type definitions
+ *************************************************************************/
+ 
+/* max size of NVRAM secret key in bytes*/
+#define NVRAM_KEY_GEN_AES_LEN                        32
+#define NVRAM_KEY_GEN_MAX_KEY_LEN                    256
+
+/* Error types of get NVRAM key*/
+#define GET_NVRAM_KEY_ERROR_NONE                      0
+#define GET_NVRAM_KEY_ERROR_KEY_BUFFER_INVALID       -1  // input buffer pointer is NULL
+#define GET_NVRAM_KEY_ERROR_KEY_SEED_BUFFER_INVALID  -2  // input seed buffer pointer is NULL
+#define GET_NVRAM_KEY_ERROR_KEY_LEN_EXCEED_MAX       -3  // input len exceed NVRAM_KEY_MAX_LEN
+#define GET_NVRAM_KEY_ERROR_KEY_SEED_LEN_NOT_MATCH   -4
+
+
+#define PROTECTED_LID_ERROR_NONE                      0x0
+#define PROTECTED_LID_ERROR_SECURE_NOT_ALLOWED        0x1000
+#define PROTECTED_LID_ERROR_NORMAL_R_FORBID           0x1001
+#define PROTECTED_LID_ERROR_NORMAL_W_FORBID           0x1002
+
+/* NVRAM AES en/decrypt related */
+#define NVRAM_AES_KEY_LEN_128BIT					16
+#define NVRAM_AES_KEY_LEN_192BIT					24
+#define NVRAM_AES_KEY_LEN_256BIT					32
+
+#define NVRAM_AES_ERROR_NONE						0
+#define NVRAM_AES_ERROR_KEY_LEN_ERROR				-1
+#define NVRAM_AES_ERROR_DATA_LEN_NOT_ALIGN			-2
+#define NVRAM_AES_ERROR_DATA_LEN_ERROR				-3
+#define NVRAM_AES_ERROR_BUF_PTR_ERROR				-4
+
+//AP efuse offset definition
+#if defined(MT6885) || defined(MT6873) || defined(MT6853) || defined(MT6833) || defined(MT6893)
+#define	OFFSET_EFUSE_C_CTRL0 0x4C4
+#define	OFFSET_EFUSE_C_CTRL1 0x4C8
+#define	OFFSET_EFUSE_C_DAT0  0x510
+#define	OFFSET_EFUSE_C_DAT1  0x514
+#define	OFFSET_EFUSE_C_DAT2  0x518
+#define	OFFSET_EFUSE_C_DAT3  0x51C
+#define	OFFSET_EFUSE_C_DAT4  0x520
+#define	OFFSET_EFUSE_C_DAT5  0x524	
+#elif defined(CHIP10992)
+#define	OFFSET_EFUSE_C_CTRL0 0x4C4
+#define	OFFSET_EFUSE_C_CTRL1 0x4C8
+#define	OFFSET_EFUSE_C_DAT0  0x510
+#define	OFFSET_EFUSE_C_DAT1  0x514
+#define	OFFSET_EFUSE_C_DAT2  0x518
+#define	OFFSET_EFUSE_C_DAT3  0x51C
+#define	OFFSET_EFUSE_C_DAT4  0x520
+#define	OFFSET_EFUSE_C_DAT5  0x524	
+#define	OFFSET_EFUSE_C_DAT6  0x528	
+#define	OFFSET_EFUSE_C_DAT7  0x52C
+#else
+#define	OFFSET_EFUSE_C_CTRL0 0x0
+#define	OFFSET_EFUSE_C_CTRL1 0x0
+#define	OFFSET_EFUSE_C_DAT0  0x0
+#define	OFFSET_EFUSE_C_DAT1  0x0
+#define	OFFSET_EFUSE_C_DAT2  0x0
+#define	OFFSET_EFUSE_C_DAT3  0x0
+#define	OFFSET_EFUSE_C_DAT4  0x0
+#define	OFFSET_EFUSE_C_DAT5  0x0	
+#endif
+
+#define OFFSET_EFUSE_AP_SBC_EN 0x60
+#define OFFSET_BIT_AP_SBC_EN 0x2
+#define BASE_AP_EFUSE_ADDR   EFUSE_base
+
+//AP efuse offset array
+extern kal_uint32 ap_efuse_offset_arr[];
+ 
+#if defined(__SV5_ENABLED__) || defined(__SV5X_ENABLED__)
+#if defined(__SMART_PHONE_MODEM__) && defined(__X_BOOTING__)
+#define SECURE_RO_SIZE_OVERHEAD 0	//SEC_RO has no GFH for external phone
+#else
+#define SECURE_RO_SIZE_OVERHEAD 404 
+#endif /*defined(__SMART_PHONE_MODEM__) && defined(__X_BOOTING__)*/
+#else
+#define SECURE_RO_SIZE_OVERHEAD  0
+#endif
+
+
+// AP HRID location
+#if defined(MT6763) || defined(MT6739) || defined(MT6295M) || defined(MT3967) || defined(MT6297) || defined(MT6779) || defined(MT6885) || defined(MT6873) || defined(MERCURY) || defined(MT6853) || defined(MT6833) || defined(MT6893) || defined(CHIP10992)
+#define EFUSE_HRID0                         ((volatile unsigned *)(g_SST_EFUSE_base+0x0140))
+#define EFUSE_HRID1                         ((volatile unsigned *)(g_SST_EFUSE_base+0x0144))
+#define EFUSE_HRID2                         ((volatile unsigned *)(g_SST_EFUSE_base+0x0148))
+#define EFUSE_HRID3                         ((volatile unsigned *)(g_SST_EFUSE_base+0x014C))
+#define SIZE_HRID                           (16)
+#else
+
+#error "Not Supported Chips"
+
+#endif
+
+/* AP/MD gen common AES key, bit enum */
+typedef enum{
+	AES_128 = 0,
+	AES_256	= 1,
+}AES_MODE;
+
+#define HW_AES_ENCRYPT	1
+#define HW_AES_DECRYPT	0
+/*************************************************************************
+ * Export API of SSS and SST
+ *************************************************************************/
+extern kal_bool   SST_Is_Secure_BB(void);
+
+
+
+extern void SST_Secure_Algo (kal_uint8 Direction, kal_uint32 ContentAddr,
+                             kal_uint32 ContentLen, kal_uint8 *CustomSeed,
+                             kal_uint8 *ResText);
+
+extern void SST_Secure_Algo_With_Level (kal_uint8 Direction, kal_uint32 ContentAddr,
+                        kal_uint32 ContentLen, kal_uint8 *CustomSeed, kal_uint32 Level,
+                        kal_uint8 *ResText);
+
+extern kal_bool SST_Get_NVRAM_Key(kal_uint32 *p_key, kal_uint32 *p_addr, kal_uint32 *p_len);
+   
+extern void SSS_Init_Share_Crypto_Drv(void * cb_ts_record, void * cb_ts_info, kal_uint32 init_tbl);
+
+extern void SSS_Init_Crypto_Drv(void * cb_ts_record, void * cb_ts_info);
+
+/*****************************************************************************
+ * FUNCTION
+ *  SST_NVRAM_Data_Access_Check
+ * DESCRIPTION
+ *  This function is to check the access to sensive or secure NVRAM data item.
+ *  It is for internal used for NVRAM and security.
+ * PARAMETERS
+ *  LID:                               [IN]    NVRAM LID
+ *  rw:                                 [IN]    read or write access : 0 => read, 1 => write
+ *  is_secure_data_access:   [IN]    Secure or normal access : 0 => normal, 1 => secure
+ * RETURNS
+ *  unsigned 32 bits
+ * RETURN VALUES
+ *  0 :  check pass
+ *  otherwise :  check failed, please must not allowed to read nvram if checking failed
+ *****************************************************************************/
+extern kal_uint32 SST_NVRAM_Data_Access_Check(nvram_lid_enum LID, kal_int32 rw, kal_bool is_secure_data_access, void * reserved_ptr);
+
+extern kal_int32 SST_Get_HRID(kal_uint32 * pRId, kal_uint32 check_buf_size);
+
+extern kal_int32 SST_Get_NVRAM_SW_Key(void * pNVKey, kal_uint32 nNVKeySize, void * pKeySeed, kal_uint32 nKeySeedSize);
+
+// SST "S"pecific "S"ecure "F"eature Initialiation
+extern void SST_SSF_Init(void);
+
+// SST "S"pecific "S"ecure "F"eature De-init
+extern void SST_SSF_Deinit(void);
+
+kal_int32 nvram_AES_cipher_encrypt(unsigned char const *_key, unsigned int key_len, unsigned char *src_buf, unsigned char *dst_buf, unsigned int data_len);
+
+kal_int32 nvram_AES_cipher_decrypt(unsigned char const *_key, unsigned int key_len, unsigned char *src_buf, unsigned char *dst_buf, unsigned int data_len);
+
+
+#endif //__SST_SECURE_H__