blob: 2db360765b1ea566b1bd3b0b588724698dcacc91 [file] [log] [blame]
Jeff Tinkerb075caa2016-12-06 23:15:20 -08001/*
2 * Copyright (C) 2016 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
Jeff Tinker972a3e32017-01-23 14:02:50 -080016#define LOG_TAG "android.hardware.drm@1.0-impl"
Jeff Tinkerb075caa2016-12-06 23:15:20 -080017
18#include "CryptoPlugin.h"
19#include "TypeConvert.h"
20
Jeff Tinkerb075caa2016-12-06 23:15:20 -080021#include <android/hidl/memory/1.0/IMemory.h>
Jeff Tinkerf21cdaf2017-01-18 11:49:27 -080022#include <hidlmemory/mapping.h>
Steven Moreland3eb7df72017-04-06 12:15:23 -070023#include <log/log.h>
Jeff Tinkerf21cdaf2017-01-18 11:49:27 -080024#include <media/stagefright/foundation/AString.h>
Jeff Tinkerb075caa2016-12-06 23:15:20 -080025
Jeff Tinkerf21cdaf2017-01-18 11:49:27 -080026using android::hardware::hidl_memory;
Jeff Tinkerb075caa2016-12-06 23:15:20 -080027using android::hidl::memory::V1_0::IMemory;
28
Jeff Tinkerb075caa2016-12-06 23:15:20 -080029namespace android {
30namespace hardware {
31namespace drm {
Jeff Tinkerb075caa2016-12-06 23:15:20 -080032namespace V1_0 {
33namespace implementation {
34
Jeff Tinkerda002fe2017-01-19 14:41:11 -080035 // Methods from ::android::hardware::drm::V1_0::ICryptoPlugin follow
Jeff Tinkerb075caa2016-12-06 23:15:20 -080036 Return<bool> CryptoPlugin::requiresSecureDecoderComponent(
37 const hidl_string& mime) {
Scott Randolph89978802017-04-03 14:06:19 -070038 return mLegacyPlugin->requiresSecureDecoderComponent(mime.c_str());
Jeff Tinkerb075caa2016-12-06 23:15:20 -080039 }
40
41 Return<void> CryptoPlugin::notifyResolution(uint32_t width,
42 uint32_t height) {
43 mLegacyPlugin->notifyResolution(width, height);
44 return Void();
45 }
46
47 Return<Status> CryptoPlugin::setMediaDrmSession(
48 const hidl_vec<uint8_t>& sessionId) {
49 return toStatus(mLegacyPlugin->setMediaDrmSession(toVector(sessionId)));
50 }
51
Jeff Tinker0b3f41e2017-02-16 12:20:30 -080052 Return<void> CryptoPlugin::setSharedBufferBase(const hidl_memory& base,
53 uint32_t bufferId) {
Edwin Wong3b8a9ed2017-07-17 09:53:31 -070054 sp<IMemory> hidlMemory = mapMemory(base);
Edwin Wong3b8a9ed2017-07-17 09:53:31 -070055
56 // allow mapMemory to return nullptr
57 mSharedBufferMap[bufferId] = hidlMemory;
Jeff Tinkerf21cdaf2017-01-18 11:49:27 -080058 return Void();
59 }
60
Jeff Tinkerb075caa2016-12-06 23:15:20 -080061 Return<void> CryptoPlugin::decrypt(bool secure,
62 const hidl_array<uint8_t, 16>& keyId,
63 const hidl_array<uint8_t, 16>& iv, Mode mode,
64 const Pattern& pattern, const hidl_vec<SubSample>& subSamples,
Jeff Tinkerda002fe2017-01-19 14:41:11 -080065 const SharedBuffer& source, uint64_t offset,
Jeff Tinker6fdbe862017-01-11 19:45:23 -080066 const DestinationBuffer& destination,
Jeff Tinkerb075caa2016-12-06 23:15:20 -080067 decrypt_cb _hidl_cb) {
68
Jeff Tinker0b3f41e2017-02-16 12:20:30 -080069 if (mSharedBufferMap.find(source.bufferId) == mSharedBufferMap.end()) {
70 _hidl_cb(Status::ERROR_DRM_CANNOT_HANDLE, 0, "source decrypt buffer base not set");
Jeff Tinkerdc8e2d02017-01-23 14:24:12 -080071 return Void();
72 }
73
Jeff Tinker0b3f41e2017-02-16 12:20:30 -080074 if (destination.type == BufferType::SHARED_MEMORY) {
75 const SharedBuffer& dest = destination.nonsecureMemory;
76 if (mSharedBufferMap.find(dest.bufferId) == mSharedBufferMap.end()) {
77 _hidl_cb(Status::ERROR_DRM_CANNOT_HANDLE, 0, "destination decrypt buffer base not set");
78 return Void();
79 }
80 }
81
Jeff Tinkerb075caa2016-12-06 23:15:20 -080082 android::CryptoPlugin::Mode legacyMode;
83 switch(mode) {
84 case Mode::UNENCRYPTED:
85 legacyMode = android::CryptoPlugin::kMode_Unencrypted;
86 break;
87 case Mode::AES_CTR:
88 legacyMode = android::CryptoPlugin::kMode_AES_CTR;
89 break;
90 case Mode::AES_CBC_CTS:
91 legacyMode = android::CryptoPlugin::kMode_AES_WV;
92 break;
93 case Mode::AES_CBC:
94 legacyMode = android::CryptoPlugin::kMode_AES_CBC;
95 break;
96 }
97 android::CryptoPlugin::Pattern legacyPattern;
98 legacyPattern.mEncryptBlocks = pattern.encryptBlocks;
99 legacyPattern.mSkipBlocks = pattern.skipBlocks;
100
Jeff Tinker5fee1822018-01-05 11:18:00 -0800101 std::unique_ptr<android::CryptoPlugin::SubSample[]> legacySubSamples =
102 std::make_unique<android::CryptoPlugin::SubSample[]>(subSamples.size());
Jeff Tinkerb075caa2016-12-06 23:15:20 -0800103
Robert Shih1e188832019-09-11 14:10:14 -0700104 size_t destSize = 0;
Jeff Tinkerb075caa2016-12-06 23:15:20 -0800105 for (size_t i = 0; i < subSamples.size(); i++) {
Robert Shih1e188832019-09-11 14:10:14 -0700106 uint32_t numBytesOfClearData = subSamples[i].numBytesOfClearData;
107 legacySubSamples[i].mNumBytesOfClearData = numBytesOfClearData;
108 uint32_t numBytesOfEncryptedData = subSamples[i].numBytesOfEncryptedData;
109 legacySubSamples[i].mNumBytesOfEncryptedData = numBytesOfEncryptedData;
110 if (__builtin_add_overflow(destSize, numBytesOfClearData, &destSize)) {
111 _hidl_cb(Status::BAD_VALUE, 0, "subsample clear size overflow");
112 return Void();
113 }
114 if (__builtin_add_overflow(destSize, numBytesOfEncryptedData, &destSize)) {
115 _hidl_cb(Status::BAD_VALUE, 0, "subsample encrypted size overflow");
116 return Void();
117 }
Jeff Tinkerb075caa2016-12-06 23:15:20 -0800118 }
119
120 AString detailMessage;
Jeff Tinker0b3f41e2017-02-16 12:20:30 -0800121 sp<IMemory> sourceBase = mSharedBufferMap[source.bufferId];
Edwin Wong3b8a9ed2017-07-17 09:53:31 -0700122 if (sourceBase == nullptr) {
123 _hidl_cb(Status::ERROR_DRM_CANNOT_HANDLE, 0, "source is a nullptr");
124 return Void();
125 }
Jeff Tinkerb075caa2016-12-06 23:15:20 -0800126
Jeff Tinker0b3f41e2017-02-16 12:20:30 -0800127 if (source.offset + offset + source.size > sourceBase->getSize()) {
Jeff Tinkerf21cdaf2017-01-18 11:49:27 -0800128 _hidl_cb(Status::ERROR_DRM_CANNOT_HANDLE, 0, "invalid buffer size");
129 return Void();
130 }
Jeff Tinker6fdbe862017-01-11 19:45:23 -0800131
Jeff Tinkerf21cdaf2017-01-18 11:49:27 -0800132 uint8_t *base = static_cast<uint8_t *>
Jeff Tinker0b3f41e2017-02-16 12:20:30 -0800133 (static_cast<void *>(sourceBase->getPointer()));
Jeff Tinkerf21cdaf2017-01-18 11:49:27 -0800134 void *srcPtr = static_cast<void *>(base + source.offset + offset);
Jeff Tinker6fdbe862017-01-11 19:45:23 -0800135
Jeff Tinker6fdbe862017-01-11 19:45:23 -0800136 void *destPtr = NULL;
Jeff Tinkerb075caa2016-12-06 23:15:20 -0800137 if (destination.type == BufferType::SHARED_MEMORY) {
Jeff Tinkerf21cdaf2017-01-18 11:49:27 -0800138 const SharedBuffer& destBuffer = destination.nonsecureMemory;
Jeff Tinker0b3f41e2017-02-16 12:20:30 -0800139 sp<IMemory> destBase = mSharedBufferMap[destBuffer.bufferId];
Edwin Wong3b8a9ed2017-07-17 09:53:31 -0700140 if (destBase == nullptr) {
141 _hidl_cb(Status::ERROR_DRM_CANNOT_HANDLE, 0, "destination is a nullptr");
142 return Void();
143 }
144
Jeff Tinker0b3f41e2017-02-16 12:20:30 -0800145 if (destBuffer.offset + destBuffer.size > destBase->getSize()) {
Jeff Tinkerf21cdaf2017-01-18 11:49:27 -0800146 _hidl_cb(Status::ERROR_DRM_CANNOT_HANDLE, 0, "invalid buffer size");
147 return Void();
148 }
Robert Shih1e188832019-09-11 14:10:14 -0700149
150 if (destSize > destBuffer.size) {
151 _hidl_cb(Status::BAD_VALUE, 0, "subsample sum too large");
152 return Void();
153 }
154
Robert Shihd79abbb2019-11-17 23:54:21 -0800155 base = static_cast<uint8_t *>(static_cast<void *>(destBase->getPointer()));
Jeff Tinkerf21cdaf2017-01-18 11:49:27 -0800156 destPtr = static_cast<void *>(base + destination.nonsecureMemory.offset);
Jeff Tinkerb075caa2016-12-06 23:15:20 -0800157 } else if (destination.type == BufferType::NATIVE_HANDLE) {
Robert Shih1e188832019-09-11 14:10:14 -0700158 if (!secure) {
159 _hidl_cb(Status::BAD_VALUE, 0, "native handle destination must be secure");
160 return Void();
161 }
Jeff Tinkerb075caa2016-12-06 23:15:20 -0800162 native_handle_t *handle = const_cast<native_handle_t *>(
163 destination.secureMemory.getNativeHandle());
164 destPtr = static_cast<void *>(handle);
Robert Shih1e188832019-09-11 14:10:14 -0700165 } else {
166 _hidl_cb(Status::BAD_VALUE, 0, "invalid destination type");
167 return Void();
Jeff Tinkerb075caa2016-12-06 23:15:20 -0800168 }
169 ssize_t result = mLegacyPlugin->decrypt(secure, keyId.data(), iv.data(),
Jeff Tinker5fee1822018-01-05 11:18:00 -0800170 legacyMode, legacyPattern, srcPtr, legacySubSamples.get(),
Jeff Tinker6fdbe862017-01-11 19:45:23 -0800171 subSamples.size(), destPtr, &detailMessage);
Jeff Tinkerb075caa2016-12-06 23:15:20 -0800172
Jeff Tinkerb075caa2016-12-06 23:15:20 -0800173 uint32_t status;
174 uint32_t bytesWritten;
175
176 if (result >= 0) {
177 status = android::OK;
178 bytesWritten = result;
179 } else {
Rahul Friasabd4e112017-02-27 19:17:30 -0800180 status = result;
Jeff Tinkerb075caa2016-12-06 23:15:20 -0800181 bytesWritten = 0;
182 }
183
Jeff Tinker01f0a5a2017-01-12 09:22:18 -0800184 _hidl_cb(toStatus(status), bytesWritten, detailMessage.c_str());
Jeff Tinkerb075caa2016-12-06 23:15:20 -0800185 return Void();
186 }
187
188} // namespace implementation
189} // namespace V1_0
Jeff Tinkerb075caa2016-12-06 23:15:20 -0800190} // namespace drm
191} // namespace hardware
192} // namespace android