blob: 14b3acfc7f117868215babefd636a4a92f2c6965 [file] [log] [blame]
Robert Shih5904a722022-01-14 12:43:22 -08001/*
2 * Copyright (C) 2021 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17#define LOG_TAG "drm_hal_test"
18
19#include <gtest/gtest.h>
20#include <log/log.h>
21#include <openssl/aes.h>
22
23#include <memory>
24#include <vector>
25
26#include "drm_hal_common.h"
27
28using ::aidl::android::hardware::drm::EventType;
29using ::aidl::android::hardware::drm::HdcpLevels;
30using ::aidl::android::hardware::drm::KeyRequest;
31using ::aidl::android::hardware::drm::HdcpLevel;
32using ::aidl::android::hardware::drm::IDrmPluginListener;
33using ::aidl::android::hardware::drm::KeyRequestType;
34using ::aidl::android::hardware::drm::KeySetId;
35using ::aidl::android::hardware::drm::KeyStatus;
36using ::aidl::android::hardware::drm::KeyStatusType;
37using ::aidl::android::hardware::drm::KeyType;
38using ::aidl::android::hardware::drm::Mode;
39using ::aidl::android::hardware::drm::OfflineLicenseState;
40using ::aidl::android::hardware::drm::Pattern;
41using ::aidl::android::hardware::drm::SecurityLevel;
42using ::aidl::android::hardware::drm::Status;
43using ::aidl::android::hardware::drm::SubSample;
44using ::aidl::android::hardware::drm::Uuid;
45
46using ::aidl::android::hardware::drm::vts::DrmErr;
47using ::aidl::android::hardware::drm::vts::DrmHalClearkeyTest;
48using ::aidl::android::hardware::drm::vts::DrmHalPluginListener;
49using ::aidl::android::hardware::drm::vts::DrmHalTest;
50using ::aidl::android::hardware::drm::vts::ListenerArgs;
51using ::aidl::android::hardware::drm::vts::kCallbackKeysChange;
52using ::aidl::android::hardware::drm::vts::kCallbackLostState;
53
54using std::string;
55using std::vector;
56
57static const char* const kVideoMp4 = "video/mp4";
58static const char* const kBadMime = "video/unknown";
59static const char* const kDrmErrorTestKey = "drmErrorTest";
60static const char* const kDrmErrorInvalidState = "invalidState";
61static const char* const kDrmErrorResourceContention = "resourceContention";
62static constexpr SecurityLevel kSwSecureCrypto = SecurityLevel::SW_SECURE_CRYPTO;
63static constexpr SecurityLevel kHwSecureAll = SecurityLevel::HW_SECURE_ALL;
64
65/**
66 * Ensure drm factory supports module UUID Scheme
67 */
68TEST_P(DrmHalTest, VendorUuidSupported) {
Robert Shih2389ce22022-02-09 14:14:25 -080069 bool result = isCryptoSchemeSupported(getAidlUUID(), kSwSecureCrypto, kVideoMp4);
70 ALOGI("kVideoMp4 = %s res %d", kVideoMp4, result);
Robert Shih5904a722022-01-14 12:43:22 -080071 EXPECT_TRUE(result);
72}
73
74/**
75 * Ensure drm factory doesn't support an invalid scheme UUID
76 */
77TEST_P(DrmHalTest, InvalidPluginNotSupported) {
78 const vector<uint8_t> kInvalidUUID = {0x10, 0x20, 0x30, 0x40, 0x50, 0x60, 0x70, 0x80,
79 0x10, 0x20, 0x30, 0x40, 0x50, 0x60, 0x70, 0x80};
Robert Shih2389ce22022-02-09 14:14:25 -080080 auto result = isCryptoSchemeSupported(toAidlUuid(kInvalidUUID), kSwSecureCrypto, kVideoMp4);
Robert Shih5904a722022-01-14 12:43:22 -080081 EXPECT_FALSE(result);
82}
83
84/**
85 * Ensure drm factory doesn't support an empty UUID
86 */
87TEST_P(DrmHalTest, EmptyPluginUUIDNotSupported) {
88 vector<uint8_t> emptyUUID(16);
89 memset(emptyUUID.data(), 0, 16);
Robert Shih2389ce22022-02-09 14:14:25 -080090 auto result = isCryptoSchemeSupported(toAidlUuid(emptyUUID), kSwSecureCrypto, kVideoMp4);
Robert Shih5904a722022-01-14 12:43:22 -080091 EXPECT_FALSE(result);
92}
93
94/**
95 * Ensure drm factory doesn't support an invalid mime type
96 */
97TEST_P(DrmHalTest, BadMimeNotSupported) {
Robert Shih2389ce22022-02-09 14:14:25 -080098 auto result = isCryptoSchemeSupported(getAidlUUID(), kSwSecureCrypto, kBadMime);
Robert Shih5904a722022-01-14 12:43:22 -080099 EXPECT_FALSE(result);
100}
101
102/**
Robert Shih12030272022-02-14 16:08:06 -0800103 * getSupportedCryptoSchemes confidence check
104 */
105TEST_P(DrmHalTest, SupportedCryptoSchemes) {
106 aidl::android::hardware::drm::CryptoSchemes schemes{};
107 auto result = drmFactory->getSupportedCryptoSchemes(&schemes);
108 EXPECT_FALSE(schemes.uuids.empty());
109 for(auto ct : schemes.mimeTypes) {
110 EXPECT_LE(ct.minLevel, ct.maxLevel);
111 }
112 EXPECT_OK(result);
113}
114
115/**
Robert Shih5904a722022-01-14 12:43:22 -0800116 * DrmPlugin tests
117 */
118
119/**
120 * Test that a DRM plugin can handle provisioning. While
121 * it is not required that a DRM scheme require provisioning,
122 * it should at least return appropriate status values. If
123 * a provisioning request is returned, it is passed to the
124 * vendor module which should provide a provisioning response
125 * that is delivered back to the HAL.
126 */
127TEST_P(DrmHalTest, DoProvisioning) {
128 for (auto level : {kHwSecureAll, kSwSecureCrypto}) {
129 Status err = Status::OK;
130 auto sid = openSession(level, &err);
131 if (err == Status::OK) {
132 closeSession(sid);
133 } else if (err == Status::ERROR_DRM_CANNOT_HANDLE) {
134 continue;
135 } else {
136 EXPECT_EQ(Status::ERROR_DRM_NOT_PROVISIONED, err);
137 provision();
138 }
139 }
140}
141
142/**
143 * A get key request should fail if no sessionId is provided
144 */
145TEST_P(DrmHalTest, GetKeyRequestNoSession) {
146 SessionId invalidSessionId;
147 vector<uint8_t> initData;
148 KeyedVector optionalParameters;
149 KeyRequest result;
150 auto ret = drmPlugin->getKeyRequest(invalidSessionId, initData, kVideoMp4, KeyType::STREAMING,
151 optionalParameters, &result);
152 EXPECT_TXN(ret);
153 EXPECT_EQ(Status::BAD_VALUE, DrmErr(ret));
154}
155
156/**
157 * Test that the plugin returns the documented error for the
158 * case of attempting to generate a key request using an
159 * invalid mime type
160 */
161TEST_P(DrmHalTest, GetKeyRequestBadMime) {
162 auto sessionId = openSession();
163 vector<uint8_t> initData;
164 KeyedVector optionalParameters;
165 KeyRequest result;
166 auto ret = drmPlugin->getKeyRequest(sessionId, initData, kBadMime, KeyType::STREAMING,
167 optionalParameters, &result);
168 EXPECT_EQ(EX_SERVICE_SPECIFIC, ret.getExceptionCode());
169 closeSession(sessionId);
170}
171
172/**
173 * Test drm plugin offline key support
174 */
175TEST_P(DrmHalTest, OfflineLicenseTest) {
176 auto sessionId = openSession();
177 vector<uint8_t> keySetId = loadKeys(sessionId, KeyType::OFFLINE);
178 closeSession(sessionId);
179
180 vector<KeySetId> result;
181 auto ret = drmPlugin->getOfflineLicenseKeySetIds(&result);
182 EXPECT_OK(ret);
183 bool found = false;
184 for (KeySetId keySetId2 : result) {
185 if (keySetId == keySetId2.keySetId) {
186 found = true;
187 break;
188 }
189 }
190 EXPECT_TRUE(found) << "keySetId not found";
191
192 ret = drmPlugin->removeOfflineLicense({keySetId});
193 EXPECT_OK(ret);
194
195 ret = drmPlugin->getOfflineLicenseKeySetIds(&result);
196 EXPECT_OK(ret);
197 for (KeySetId keySetId2 : result) {
198 EXPECT_NE(keySetId, keySetId2.keySetId);
199 }
200
201 ret = drmPlugin->removeOfflineLicense({keySetId});
202 EXPECT_TXN(ret);
203 EXPECT_EQ(Status::BAD_VALUE, DrmErr(ret));
204}
205
206/**
207 * Test drm plugin offline key state
208 */
209TEST_P(DrmHalTest, OfflineLicenseStateTest) {
210 auto sessionId = openSession();
211 DrmHalVTSVendorModule_V1::ContentConfiguration content = getContent(KeyType::OFFLINE);
212 vector<uint8_t> keySetId = loadKeys(sessionId, content, KeyType::OFFLINE);
213 closeSession(sessionId);
214
215 OfflineLicenseState result{};
216 auto ret = drmPlugin->getOfflineLicenseState({keySetId}, &result);
217 EXPECT_OK(ret);
218 EXPECT_EQ(OfflineLicenseState::USABLE, result);
219
220 vector<uint8_t> keyRequest = getKeyRequest(keySetId, content, KeyType::RELEASE);
221 ret = drmPlugin->getOfflineLicenseState({keySetId}, &result);
222 EXPECT_OK(ret);
223 EXPECT_EQ(OfflineLicenseState::INACTIVE, result);
224
225 /**
226 * Get key response from vendor module
227 */
228 vector<uint8_t> keyResponse = vendorModule->handleKeyRequest(keyRequest, content.serverUrl);
229 EXPECT_GT(keyResponse.size(), 0u);
230
231 result = OfflineLicenseState::UNKNOWN;
232 provideKeyResponse(keySetId, keyResponse);
233 ret = drmPlugin->getOfflineLicenseState({keySetId}, &result);
234 EXPECT_TXN(ret);
235 EXPECT_EQ(Status::BAD_VALUE, DrmErr(ret));
236 EXPECT_EQ(OfflineLicenseState::UNKNOWN, result);
237}
238
239/**
240 * Negative offline license test. Remove empty keySetId
241 */
242TEST_P(DrmHalTest, RemoveEmptyKeySetId) {
243 KeySetId emptyKeySetId;
244 auto ret = drmPlugin->removeOfflineLicense(emptyKeySetId);
245 EXPECT_TXN(ret);
246 EXPECT_EQ(Status::BAD_VALUE, DrmErr(ret));
247}
248
249/**
250 * Negative offline license test. Get empty keySetId state
251 */
252TEST_P(DrmHalTest, GetEmptyKeySetIdState) {
253 KeySetId emptyKeySetId;
254 OfflineLicenseState result;
255 auto ret = drmPlugin->getOfflineLicenseState(emptyKeySetId, &result);
256 EXPECT_TXN(ret);
257 EXPECT_EQ(Status::BAD_VALUE, DrmErr(ret));
258 EXPECT_EQ(OfflineLicenseState::UNKNOWN, result);
259}
260
261/**
262 * Test that the plugin returns valid connected and max HDCP levels
263 */
264TEST_P(DrmHalTest, GetHdcpLevels) {
265 HdcpLevels result;
266 auto ret = drmPlugin->getHdcpLevels(&result);
267 EXPECT_OK(ret);
268 EXPECT_GE(result.connectedLevel, HdcpLevel::HDCP_NONE);
269 EXPECT_LE(result.maxLevel, HdcpLevel::HDCP_V2_3);
270}
271
272/**
273 * CryptoPlugin Decrypt tests
274 */
275
276/**
277 * Positive decrypt test. "Decrypt" a single clear segment
278 */
279TEST_P(DrmHalTest, ClearSegmentTest) {
280 for (const auto& config : contentConfigurations) {
281 for (const auto& key : config.keys) {
282 const size_t kSegmentSize = 1024;
283 vector<uint8_t> iv(AES_BLOCK_SIZE, 0);
284 const Pattern noPattern = {0, 0};
285 const vector<SubSample> subSamples = {
286 {.numBytesOfClearData = kSegmentSize, .numBytesOfEncryptedData = 0}};
287 auto sessionId = openSession();
288 loadKeys(sessionId, config);
289
290 auto ret = cryptoPlugin->setMediaDrmSession(sessionId);
291 EXPECT_OK(ret);
292
293 uint32_t byteCount =
294 decrypt(Mode::UNENCRYPTED, key.isSecure, toStdArray(key.keyId), &iv[0],
295 subSamples, noPattern, key.clearContentKey, Status::OK);
296 EXPECT_EQ(kSegmentSize, byteCount);
297
298 closeSession(sessionId);
299 }
300 }
301}
302
303/**
304 * Positive decrypt test. Decrypt a single segment using aes_ctr.
305 * Verify data matches.
306 */
307TEST_P(DrmHalTest, EncryptedAesCtrSegmentTest) {
308 for (const auto& config : contentConfigurations) {
309 for (const auto& key : config.keys) {
310 const size_t kSegmentSize = 1024;
311 vector<uint8_t> iv(AES_BLOCK_SIZE, 0);
312 const Pattern noPattern = {0, 0};
313 const vector<SubSample> subSamples = {
314 {.numBytesOfClearData = kSegmentSize, .numBytesOfEncryptedData = 0}};
315 auto sessionId = openSession();
316 loadKeys(sessionId, config);
317
318 auto ret = cryptoPlugin->setMediaDrmSession(sessionId);
319 EXPECT_OK(ret);
320
321 uint32_t byteCount = decrypt(Mode::AES_CTR, key.isSecure, toStdArray(key.keyId), &iv[0],
322 subSamples, noPattern, key.clearContentKey, Status::OK);
323 EXPECT_EQ(kSegmentSize, byteCount);
324
325 closeSession(sessionId);
326 }
327 }
328}
329
330/**
331 * Negative decrypt test. Decrypted frame too large to fit in output buffer
332 */
333TEST_P(DrmHalTest, ErrorFrameTooLarge) {
334 for (const auto& config : contentConfigurations) {
335 for (const auto& key : config.keys) {
336 const size_t kSegmentSize = 1024;
337 vector<uint8_t> iv(AES_BLOCK_SIZE, 0);
338 const Pattern noPattern = {0, 0};
339 const vector<SubSample> subSamples = {
340 {.numBytesOfClearData = kSegmentSize, .numBytesOfEncryptedData = 0}};
341 auto sessionId = openSession();
342 loadKeys(sessionId, config);
343
344 auto ret = cryptoPlugin->setMediaDrmSession(sessionId);
345 EXPECT_OK(ret);
346
347 decrypt(Mode::UNENCRYPTED, key.isSecure, toStdArray(key.keyId), &iv[0], subSamples,
348 noPattern, key.clearContentKey, Status::ERROR_DRM_FRAME_TOO_LARGE);
349
350 closeSession(sessionId);
351 }
352 }
353}
354
355/**
356 * Negative decrypt test. Decrypt without loading keys.
357 */
358TEST_P(DrmHalTest, EncryptedAesCtrSegmentTestNoKeys) {
359 for (const auto& config : contentConfigurations) {
360 for (const auto& key : config.keys) {
361 vector<uint8_t> iv(AES_BLOCK_SIZE, 0);
362 const Pattern noPattern = {0, 0};
363 const vector<SubSample> subSamples = {
364 {.numBytesOfClearData = 256, .numBytesOfEncryptedData = 256}};
365 auto sessionId = openSession();
366
367 auto ret = cryptoPlugin->setMediaDrmSession(sessionId);
368 EXPECT_OK(ret);
369
370 uint32_t byteCount =
371 decrypt(Mode::AES_CTR, key.isSecure, toStdArray(key.keyId), &iv[0], subSamples,
372 noPattern, key.clearContentKey, Status::ERROR_DRM_NO_LICENSE);
373 EXPECT_EQ(0u, byteCount);
374
375 closeSession(sessionId);
376 }
377 }
378}
379
380/**
381 * Ensure clearkey drm factory doesn't support security level higher than supported
382 */
383TEST_P(DrmHalClearkeyTest, BadLevelNotSupported) {
Robert Shih2389ce22022-02-09 14:14:25 -0800384 auto result = isCryptoSchemeSupported(getAidlUUID(), kHwSecureAll, kVideoMp4);
Robert Shih5904a722022-01-14 12:43:22 -0800385 EXPECT_FALSE(result);
386}
387
388/**
389 * Test resource contention during attempt to generate key request
390 */
391TEST_P(DrmHalClearkeyTest, GetKeyRequestResourceContention) {
392 auto ret = drmPlugin->setPropertyString(kDrmErrorTestKey, kDrmErrorResourceContention);
393 EXPECT_OK(ret);
394
395 auto sessionId = openSession();
396 vector<uint8_t> initData;
397 KeyedVector optionalParameters;
398 KeyRequest result;
399 ret = drmPlugin->getKeyRequest(sessionId, initData, kVideoMp4, KeyType::STREAMING,
400 optionalParameters, &result);
401 EXPECT_TXN(ret);
402 EXPECT_EQ(Status::ERROR_DRM_RESOURCE_CONTENTION, DrmErr(ret));
403
404 ret = drmPlugin->closeSession(sessionId);
405 EXPECT_TXN(ret);
406 EXPECT_NE(Status::OK, DrmErr(ret));
407}
408
409/**
410 * Test clearkey plugin offline key with mock error
411 */
412TEST_P(DrmHalClearkeyTest, OfflineLicenseInvalidState) {
413 auto sessionId = openSession();
414 vector<uint8_t> keySetId = loadKeys(sessionId, KeyType::OFFLINE);
415 auto ret = drmPlugin->setPropertyString(kDrmErrorTestKey, kDrmErrorInvalidState);
416 EXPECT_OK(ret);
417
418 // everything should start failing
419 const Status kInvalidState = Status::ERROR_DRM_INVALID_STATE;
420 vector<KeySetId> result;
421 ret = drmPlugin->getOfflineLicenseKeySetIds(&result);
422 EXPECT_TXN(ret);
423 EXPECT_EQ(kInvalidState, DrmErr(ret));
424 EXPECT_EQ(0u, result.size());
425
426 OfflineLicenseState state = OfflineLicenseState::UNKNOWN;
427 ret = drmPlugin->getOfflineLicenseState({keySetId}, &state);
428 EXPECT_TXN(ret);
429 EXPECT_EQ(kInvalidState, DrmErr(ret));
430 EXPECT_EQ(OfflineLicenseState::UNKNOWN, state);
431
432 ret = drmPlugin->removeOfflineLicense({keySetId});
433 EXPECT_TXN(ret);
434 EXPECT_EQ(kInvalidState, DrmErr(ret));
435 closeSession(sessionId);
436}
437
438/**
439 * Test listener is triggered on key response
440 */
441TEST_P(DrmHalClearkeyTest, ListenerCallbacks) {
442 auto listener = ndk::SharedRefBase::make<DrmHalPluginListener>();
443 auto res = drmPlugin->setListener(listener);
444 EXPECT_OK(res);
445
446 auto sessionId = openSession();
447 loadKeys(sessionId, KeyType::STREAMING);
448 closeSession(sessionId);
449
450 auto args = listener->getEventArgs();
451 EXPECT_EQ(EventType::VENDOR_DEFINED, args.eventType);
452 EXPECT_EQ(sessionId, args.data);
453 EXPECT_EQ(sessionId, args.sessionId);
454
455 args = listener->getExpirationUpdateArgs();
456 EXPECT_EQ(sessionId, args.sessionId);
457 EXPECT_EQ(100, args.expiryTimeInMS);
458
459 args = listener->getKeysChangeArgs();
460 const vector<KeyStatus> keyStatusList = {
461 {{0xa, 0xb, 0xc}, KeyStatusType::USABLE},
462 {{0xd, 0xe, 0xf}, KeyStatusType::EXPIRED},
Robert Shih2389ce22022-02-09 14:14:25 -0800463 {{0x0, 0x1, 0x2}, KeyStatusType::USABLE_IN_FUTURE},
Robert Shih5904a722022-01-14 12:43:22 -0800464 };
465 EXPECT_EQ(sessionId, args.sessionId);
466 EXPECT_EQ(keyStatusList, args.keyStatusList);
467 EXPECT_TRUE(args.hasNewUsableKey);
468}
469
470/**
471 * Test SessionLostState is triggered on error
472 */
473TEST_P(DrmHalClearkeyTest, SessionLostState) {
474 auto listener = ndk::SharedRefBase::make<DrmHalPluginListener>();
475 auto res = drmPlugin->setListener(listener);
476 EXPECT_OK(res);
477
478 res = drmPlugin->setPropertyString(kDrmErrorTestKey, kDrmErrorInvalidState);
479 EXPECT_OK(res);
480
481 auto sessionId = openSession();
482 auto ret = drmPlugin->closeSession(sessionId);
483
484 auto args = listener->getSessionLostStateArgs();
485 EXPECT_EQ(sessionId, args.sessionId);
486}
487
488/**
489 * Negative decrypt test. Decrypt with invalid key.
490 */
491TEST_P(DrmHalClearkeyTest, DecryptWithEmptyKey) {
492 vector<uint8_t> iv(AES_BLOCK_SIZE, 0);
493 const Pattern noPattern = {0, 0};
494 const uint32_t kClearBytes = 512;
495 const uint32_t kEncryptedBytes = 512;
496 const vector<SubSample> subSamples = {
497 {.numBytesOfClearData = kClearBytes, .numBytesOfEncryptedData = kEncryptedBytes}};
498
499 // base 64 encoded JSON response string, must not contain padding character '='
500 const string emptyKeyResponse =
501 "{\"keys\":["
502 "{"
503 "\"kty\":\"oct\""
504 "\"alg\":\"A128KW2\""
505 "\"k\":\"SGVsbG8gRnJpZW5kIQ\""
506 "\"kid\":\"Y2xlYXJrZXlrZXlpZDAyAy\""
507 "}"
508 "{"
509 "\"kty\":\"oct\","
510 "\"alg\":\"A128KW2\""
511 "\"kid\":\"Y2xlYXJrZXlrZXlpZDAzAy\"," // empty key follows
512 "\"k\":\"R\""
513 "}]"
514 "}";
515 const size_t kEmptyKeyResponseSize = emptyKeyResponse.size();
516
517 vector<uint8_t> invalidResponse;
518 invalidResponse.resize(kEmptyKeyResponseSize);
519 memcpy(invalidResponse.data(), emptyKeyResponse.c_str(), kEmptyKeyResponseSize);
520 decryptWithInvalidKeys(invalidResponse, iv, noPattern, subSamples);
521}
522
523/**
524 * Negative decrypt test. Decrypt with a key exceeds AES_BLOCK_SIZE.
525 */
526TEST_P(DrmHalClearkeyTest, DecryptWithKeyTooLong) {
527 vector<uint8_t> iv(AES_BLOCK_SIZE, 0);
528 const Pattern noPattern = {0, 0};
529 const uint32_t kClearBytes = 512;
530 const uint32_t kEncryptedBytes = 512;
531 const vector<SubSample> subSamples = {
532 {.numBytesOfClearData = kClearBytes, .numBytesOfEncryptedData = kEncryptedBytes}};
533
534 // base 64 encoded JSON response string, must not contain padding character '='
535 const string keyTooLongResponse =
536 "{\"keys\":["
537 "{"
538 "\"kty\":\"oct\","
539 "\"alg\":\"A128KW2\""
540 "\"kid\":\"Y2xlYXJrZXlrZXlpZDAzAy\"," // key too long
541 "\"k\":\"V2lubmllIHRoZSBwb29oIVdpbm5pZSB0aGUgcG9vaCE=\""
542 "}]"
543 "}";
544 const size_t kKeyTooLongResponseSize = keyTooLongResponse.size();
545
546 vector<uint8_t> invalidResponse;
547 invalidResponse.resize(kKeyTooLongResponseSize);
548 memcpy(invalidResponse.data(), keyTooLongResponse.c_str(), kKeyTooLongResponseSize);
549 decryptWithInvalidKeys(invalidResponse, iv, noPattern, subSamples);
550}