blob: e6d4e8447b2737cce057753b50d2201c13c04563 [file] [log] [blame]
Jeff Tinkerb075caa2016-12-06 23:15:20 -08001/*
2 * Copyright (C) 2016 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
Jeff Tinker972a3e32017-01-23 14:02:50 -080016#define LOG_TAG "android.hardware.drm@1.0-impl"
Jeff Tinkerb075caa2016-12-06 23:15:20 -080017
18#include "CryptoPlugin.h"
19#include "TypeConvert.h"
20
Jeff Tinkerb075caa2016-12-06 23:15:20 -080021#include <android/hidl/memory/1.0/IMemory.h>
Jeff Tinkerf21cdaf2017-01-18 11:49:27 -080022#include <hidlmemory/mapping.h>
Steven Moreland3eb7df72017-04-06 12:15:23 -070023#include <log/log.h>
Jeff Tinkerf21cdaf2017-01-18 11:49:27 -080024#include <media/stagefright/foundation/AString.h>
Jeff Tinkerb075caa2016-12-06 23:15:20 -080025
Jeff Tinkerf21cdaf2017-01-18 11:49:27 -080026using android::hardware::hidl_memory;
Jeff Tinkerb075caa2016-12-06 23:15:20 -080027using android::hidl::memory::V1_0::IMemory;
28
Jeff Tinkerb075caa2016-12-06 23:15:20 -080029namespace android {
30namespace hardware {
31namespace drm {
Jeff Tinkerb075caa2016-12-06 23:15:20 -080032namespace V1_0 {
33namespace implementation {
34
Jeff Tinkerda002fe2017-01-19 14:41:11 -080035 // Methods from ::android::hardware::drm::V1_0::ICryptoPlugin follow
Jeff Tinkerb075caa2016-12-06 23:15:20 -080036 Return<bool> CryptoPlugin::requiresSecureDecoderComponent(
37 const hidl_string& mime) {
Scott Randolph89978802017-04-03 14:06:19 -070038 return mLegacyPlugin->requiresSecureDecoderComponent(mime.c_str());
Jeff Tinkerb075caa2016-12-06 23:15:20 -080039 }
40
41 Return<void> CryptoPlugin::notifyResolution(uint32_t width,
42 uint32_t height) {
43 mLegacyPlugin->notifyResolution(width, height);
44 return Void();
45 }
46
47 Return<Status> CryptoPlugin::setMediaDrmSession(
48 const hidl_vec<uint8_t>& sessionId) {
49 return toStatus(mLegacyPlugin->setMediaDrmSession(toVector(sessionId)));
50 }
51
Jeff Tinker0b3f41e2017-02-16 12:20:30 -080052 Return<void> CryptoPlugin::setSharedBufferBase(const hidl_memory& base,
53 uint32_t bufferId) {
Edwin Wong3b8a9ed2017-07-17 09:53:31 -070054 sp<IMemory> hidlMemory = mapMemory(base);
Edwin Wong3b8a9ed2017-07-17 09:53:31 -070055
56 // allow mapMemory to return nullptr
57 mSharedBufferMap[bufferId] = hidlMemory;
Jeff Tinkerf21cdaf2017-01-18 11:49:27 -080058 return Void();
59 }
60
Jeff Tinkerb075caa2016-12-06 23:15:20 -080061 Return<void> CryptoPlugin::decrypt(bool secure,
62 const hidl_array<uint8_t, 16>& keyId,
63 const hidl_array<uint8_t, 16>& iv, Mode mode,
64 const Pattern& pattern, const hidl_vec<SubSample>& subSamples,
Jeff Tinkerda002fe2017-01-19 14:41:11 -080065 const SharedBuffer& source, uint64_t offset,
Jeff Tinker6fdbe862017-01-11 19:45:23 -080066 const DestinationBuffer& destination,
Jeff Tinkerb075caa2016-12-06 23:15:20 -080067 decrypt_cb _hidl_cb) {
68
Jeff Tinker0b3f41e2017-02-16 12:20:30 -080069 if (mSharedBufferMap.find(source.bufferId) == mSharedBufferMap.end()) {
70 _hidl_cb(Status::ERROR_DRM_CANNOT_HANDLE, 0, "source decrypt buffer base not set");
Jeff Tinkerdc8e2d02017-01-23 14:24:12 -080071 return Void();
72 }
73
Jeff Tinker0b3f41e2017-02-16 12:20:30 -080074 if (destination.type == BufferType::SHARED_MEMORY) {
75 const SharedBuffer& dest = destination.nonsecureMemory;
76 if (mSharedBufferMap.find(dest.bufferId) == mSharedBufferMap.end()) {
77 _hidl_cb(Status::ERROR_DRM_CANNOT_HANDLE, 0, "destination decrypt buffer base not set");
78 return Void();
79 }
80 }
81
Jeff Tinkerb075caa2016-12-06 23:15:20 -080082 android::CryptoPlugin::Mode legacyMode;
83 switch(mode) {
84 case Mode::UNENCRYPTED:
85 legacyMode = android::CryptoPlugin::kMode_Unencrypted;
86 break;
87 case Mode::AES_CTR:
88 legacyMode = android::CryptoPlugin::kMode_AES_CTR;
89 break;
90 case Mode::AES_CBC_CTS:
91 legacyMode = android::CryptoPlugin::kMode_AES_WV;
92 break;
93 case Mode::AES_CBC:
94 legacyMode = android::CryptoPlugin::kMode_AES_CBC;
95 break;
96 }
97 android::CryptoPlugin::Pattern legacyPattern;
98 legacyPattern.mEncryptBlocks = pattern.encryptBlocks;
99 legacyPattern.mSkipBlocks = pattern.skipBlocks;
100
Jeff Tinker5fee1822018-01-05 11:18:00 -0800101 std::unique_ptr<android::CryptoPlugin::SubSample[]> legacySubSamples =
102 std::make_unique<android::CryptoPlugin::SubSample[]>(subSamples.size());
Jeff Tinkerb075caa2016-12-06 23:15:20 -0800103
Robert Shih1e188832019-09-11 14:10:14 -0700104 size_t destSize = 0;
Jeff Tinkerb075caa2016-12-06 23:15:20 -0800105 for (size_t i = 0; i < subSamples.size(); i++) {
Robert Shih1e188832019-09-11 14:10:14 -0700106 uint32_t numBytesOfClearData = subSamples[i].numBytesOfClearData;
107 legacySubSamples[i].mNumBytesOfClearData = numBytesOfClearData;
108 uint32_t numBytesOfEncryptedData = subSamples[i].numBytesOfEncryptedData;
109 legacySubSamples[i].mNumBytesOfEncryptedData = numBytesOfEncryptedData;
110 if (__builtin_add_overflow(destSize, numBytesOfClearData, &destSize)) {
111 _hidl_cb(Status::BAD_VALUE, 0, "subsample clear size overflow");
112 return Void();
113 }
114 if (__builtin_add_overflow(destSize, numBytesOfEncryptedData, &destSize)) {
115 _hidl_cb(Status::BAD_VALUE, 0, "subsample encrypted size overflow");
116 return Void();
117 }
Jeff Tinkerb075caa2016-12-06 23:15:20 -0800118 }
119
120 AString detailMessage;
Jeff Tinker0b3f41e2017-02-16 12:20:30 -0800121 sp<IMemory> sourceBase = mSharedBufferMap[source.bufferId];
Edwin Wong3b8a9ed2017-07-17 09:53:31 -0700122 if (sourceBase == nullptr) {
123 _hidl_cb(Status::ERROR_DRM_CANNOT_HANDLE, 0, "source is a nullptr");
124 return Void();
125 }
Jeff Tinkerb075caa2016-12-06 23:15:20 -0800126
Edwin Wongc14f2622021-01-26 20:29:25 -0800127 size_t totalSize = 0;
128 if (__builtin_add_overflow(source.offset, offset, &totalSize) ||
129 __builtin_add_overflow(totalSize, source.size, &totalSize) ||
130 totalSize > sourceBase->getSize()) {
131 android_errorWriteLog(0x534e4554, "176496160");
Jeff Tinkerf21cdaf2017-01-18 11:49:27 -0800132 _hidl_cb(Status::ERROR_DRM_CANNOT_HANDLE, 0, "invalid buffer size");
133 return Void();
134 }
Jeff Tinker6fdbe862017-01-11 19:45:23 -0800135
Jeff Tinkerf21cdaf2017-01-18 11:49:27 -0800136 uint8_t *base = static_cast<uint8_t *>
Jeff Tinker0b3f41e2017-02-16 12:20:30 -0800137 (static_cast<void *>(sourceBase->getPointer()));
Jeff Tinkerf21cdaf2017-01-18 11:49:27 -0800138 void *srcPtr = static_cast<void *>(base + source.offset + offset);
Jeff Tinker6fdbe862017-01-11 19:45:23 -0800139
Jeff Tinker6fdbe862017-01-11 19:45:23 -0800140 void *destPtr = NULL;
Jeff Tinkerb075caa2016-12-06 23:15:20 -0800141 if (destination.type == BufferType::SHARED_MEMORY) {
Jeff Tinkerf21cdaf2017-01-18 11:49:27 -0800142 const SharedBuffer& destBuffer = destination.nonsecureMemory;
Jeff Tinker0b3f41e2017-02-16 12:20:30 -0800143 sp<IMemory> destBase = mSharedBufferMap[destBuffer.bufferId];
Edwin Wong3b8a9ed2017-07-17 09:53:31 -0700144 if (destBase == nullptr) {
145 _hidl_cb(Status::ERROR_DRM_CANNOT_HANDLE, 0, "destination is a nullptr");
146 return Void();
147 }
148
Jeff Tinker0b3f41e2017-02-16 12:20:30 -0800149 if (destBuffer.offset + destBuffer.size > destBase->getSize()) {
Jeff Tinkerf21cdaf2017-01-18 11:49:27 -0800150 _hidl_cb(Status::ERROR_DRM_CANNOT_HANDLE, 0, "invalid buffer size");
151 return Void();
152 }
Robert Shih1e188832019-09-11 14:10:14 -0700153
154 if (destSize > destBuffer.size) {
155 _hidl_cb(Status::BAD_VALUE, 0, "subsample sum too large");
156 return Void();
157 }
158
Robert Shihd79abbb2019-11-17 23:54:21 -0800159 base = static_cast<uint8_t *>(static_cast<void *>(destBase->getPointer()));
Jeff Tinkerf21cdaf2017-01-18 11:49:27 -0800160 destPtr = static_cast<void *>(base + destination.nonsecureMemory.offset);
Jeff Tinkerb075caa2016-12-06 23:15:20 -0800161 } else if (destination.type == BufferType::NATIVE_HANDLE) {
Robert Shih1e188832019-09-11 14:10:14 -0700162 if (!secure) {
163 _hidl_cb(Status::BAD_VALUE, 0, "native handle destination must be secure");
164 return Void();
165 }
Jeff Tinkerb075caa2016-12-06 23:15:20 -0800166 native_handle_t *handle = const_cast<native_handle_t *>(
167 destination.secureMemory.getNativeHandle());
168 destPtr = static_cast<void *>(handle);
Robert Shih1e188832019-09-11 14:10:14 -0700169 } else {
170 _hidl_cb(Status::BAD_VALUE, 0, "invalid destination type");
171 return Void();
Jeff Tinkerb075caa2016-12-06 23:15:20 -0800172 }
173 ssize_t result = mLegacyPlugin->decrypt(secure, keyId.data(), iv.data(),
Jeff Tinker5fee1822018-01-05 11:18:00 -0800174 legacyMode, legacyPattern, srcPtr, legacySubSamples.get(),
Jeff Tinker6fdbe862017-01-11 19:45:23 -0800175 subSamples.size(), destPtr, &detailMessage);
Jeff Tinkerb075caa2016-12-06 23:15:20 -0800176
Jeff Tinkerb075caa2016-12-06 23:15:20 -0800177 uint32_t status;
178 uint32_t bytesWritten;
179
180 if (result >= 0) {
181 status = android::OK;
182 bytesWritten = result;
183 } else {
Rahul Friasabd4e112017-02-27 19:17:30 -0800184 status = result;
Jeff Tinkerb075caa2016-12-06 23:15:20 -0800185 bytesWritten = 0;
186 }
187
Jeff Tinker01f0a5a2017-01-12 09:22:18 -0800188 _hidl_cb(toStatus(status), bytesWritten, detailMessage.c_str());
Jeff Tinkerb075caa2016-12-06 23:15:20 -0800189 return Void();
190 }
191
192} // namespace implementation
193} // namespace V1_0
Jeff Tinkerb075caa2016-12-06 23:15:20 -0800194} // namespace drm
195} // namespace hardware
196} // namespace android