Jeff Tinker | b075caa | 2016-12-06 23:15:20 -0800 | [diff] [blame] | 1 | /* |
| 2 | * Copyright (C) 2016 The Android Open Source Project |
| 3 | * |
| 4 | * Licensed under the Apache License, Version 2.0 (the "License"); |
| 5 | * you may not use this file except in compliance with the License. |
| 6 | * You may obtain a copy of the License at |
| 7 | * |
| 8 | * http://www.apache.org/licenses/LICENSE-2.0 |
| 9 | * |
| 10 | * Unless required by applicable law or agreed to in writing, software |
| 11 | * distributed under the License is distributed on an "AS IS" BASIS, |
| 12 | * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| 13 | * See the License for the specific language governing permissions and |
| 14 | * limitations under the License. |
| 15 | */ |
Jeff Tinker | 972a3e3 | 2017-01-23 14:02:50 -0800 | [diff] [blame] | 16 | #define LOG_TAG "android.hardware.drm@1.0-impl" |
Jeff Tinker | b075caa | 2016-12-06 23:15:20 -0800 | [diff] [blame] | 17 | |
| 18 | #include "CryptoPlugin.h" |
| 19 | #include "TypeConvert.h" |
| 20 | |
Jeff Tinker | b075caa | 2016-12-06 23:15:20 -0800 | [diff] [blame] | 21 | #include <android/hidl/memory/1.0/IMemory.h> |
Jeff Tinker | f21cdaf | 2017-01-18 11:49:27 -0800 | [diff] [blame] | 22 | #include <hidlmemory/mapping.h> |
Steven Moreland | 3eb7df7 | 2017-04-06 12:15:23 -0700 | [diff] [blame] | 23 | #include <log/log.h> |
Jeff Tinker | f21cdaf | 2017-01-18 11:49:27 -0800 | [diff] [blame] | 24 | #include <media/stagefright/foundation/AString.h> |
Jeff Tinker | b075caa | 2016-12-06 23:15:20 -0800 | [diff] [blame] | 25 | |
Jeff Tinker | f21cdaf | 2017-01-18 11:49:27 -0800 | [diff] [blame] | 26 | using android::hardware::hidl_memory; |
Jeff Tinker | b075caa | 2016-12-06 23:15:20 -0800 | [diff] [blame] | 27 | using android::hidl::memory::V1_0::IMemory; |
| 28 | |
Jeff Tinker | b075caa | 2016-12-06 23:15:20 -0800 | [diff] [blame] | 29 | namespace android { |
| 30 | namespace hardware { |
| 31 | namespace drm { |
Jeff Tinker | b075caa | 2016-12-06 23:15:20 -0800 | [diff] [blame] | 32 | namespace V1_0 { |
| 33 | namespace implementation { |
| 34 | |
Jeff Tinker | da002fe | 2017-01-19 14:41:11 -0800 | [diff] [blame] | 35 | // Methods from ::android::hardware::drm::V1_0::ICryptoPlugin follow |
Jeff Tinker | b075caa | 2016-12-06 23:15:20 -0800 | [diff] [blame] | 36 | Return<bool> CryptoPlugin::requiresSecureDecoderComponent( |
| 37 | const hidl_string& mime) { |
Scott Randolph | 8997880 | 2017-04-03 14:06:19 -0700 | [diff] [blame] | 38 | return mLegacyPlugin->requiresSecureDecoderComponent(mime.c_str()); |
Jeff Tinker | b075caa | 2016-12-06 23:15:20 -0800 | [diff] [blame] | 39 | } |
| 40 | |
| 41 | Return<void> CryptoPlugin::notifyResolution(uint32_t width, |
| 42 | uint32_t height) { |
| 43 | mLegacyPlugin->notifyResolution(width, height); |
| 44 | return Void(); |
| 45 | } |
| 46 | |
| 47 | Return<Status> CryptoPlugin::setMediaDrmSession( |
| 48 | const hidl_vec<uint8_t>& sessionId) { |
| 49 | return toStatus(mLegacyPlugin->setMediaDrmSession(toVector(sessionId))); |
| 50 | } |
| 51 | |
Jeff Tinker | 0b3f41e | 2017-02-16 12:20:30 -0800 | [diff] [blame] | 52 | Return<void> CryptoPlugin::setSharedBufferBase(const hidl_memory& base, |
| 53 | uint32_t bufferId) { |
Edwin Wong | 3b8a9ed | 2017-07-17 09:53:31 -0700 | [diff] [blame] | 54 | sp<IMemory> hidlMemory = mapMemory(base); |
Edwin Wong | 3b8a9ed | 2017-07-17 09:53:31 -0700 | [diff] [blame] | 55 | |
Edwin Wong | 989975e | 2021-03-08 18:46:42 -0800 | [diff] [blame] | 56 | std::lock_guard<std::mutex> shared_buffer_lock(mSharedBufferLock); |
| 57 | |
Edwin Wong | 3b8a9ed | 2017-07-17 09:53:31 -0700 | [diff] [blame] | 58 | // allow mapMemory to return nullptr |
| 59 | mSharedBufferMap[bufferId] = hidlMemory; |
Jeff Tinker | f21cdaf | 2017-01-18 11:49:27 -0800 | [diff] [blame] | 60 | return Void(); |
| 61 | } |
| 62 | |
Jeff Tinker | b075caa | 2016-12-06 23:15:20 -0800 | [diff] [blame] | 63 | Return<void> CryptoPlugin::decrypt(bool secure, |
| 64 | const hidl_array<uint8_t, 16>& keyId, |
| 65 | const hidl_array<uint8_t, 16>& iv, Mode mode, |
| 66 | const Pattern& pattern, const hidl_vec<SubSample>& subSamples, |
Jeff Tinker | da002fe | 2017-01-19 14:41:11 -0800 | [diff] [blame] | 67 | const SharedBuffer& source, uint64_t offset, |
Jeff Tinker | 6fdbe86 | 2017-01-11 19:45:23 -0800 | [diff] [blame] | 68 | const DestinationBuffer& destination, |
Jeff Tinker | b075caa | 2016-12-06 23:15:20 -0800 | [diff] [blame] | 69 | decrypt_cb _hidl_cb) { |
Edwin Wong | 989975e | 2021-03-08 18:46:42 -0800 | [diff] [blame] | 70 | std::unique_lock<std::mutex> shared_buffer_lock(mSharedBufferLock); |
Jeff Tinker | 0b3f41e | 2017-02-16 12:20:30 -0800 | [diff] [blame] | 71 | if (mSharedBufferMap.find(source.bufferId) == mSharedBufferMap.end()) { |
| 72 | _hidl_cb(Status::ERROR_DRM_CANNOT_HANDLE, 0, "source decrypt buffer base not set"); |
Jeff Tinker | dc8e2d0 | 2017-01-23 14:24:12 -0800 | [diff] [blame] | 73 | return Void(); |
| 74 | } |
| 75 | |
Jeff Tinker | 0b3f41e | 2017-02-16 12:20:30 -0800 | [diff] [blame] | 76 | if (destination.type == BufferType::SHARED_MEMORY) { |
| 77 | const SharedBuffer& dest = destination.nonsecureMemory; |
| 78 | if (mSharedBufferMap.find(dest.bufferId) == mSharedBufferMap.end()) { |
| 79 | _hidl_cb(Status::ERROR_DRM_CANNOT_HANDLE, 0, "destination decrypt buffer base not set"); |
| 80 | return Void(); |
| 81 | } |
| 82 | } |
| 83 | |
Edwin Wong | e55db24 | 2021-02-02 22:28:41 -0800 | [diff] [blame] | 84 | android::CryptoPlugin::Mode legacyMode = android::CryptoPlugin::kMode_Unencrypted; |
Jeff Tinker | b075caa | 2016-12-06 23:15:20 -0800 | [diff] [blame] | 85 | switch(mode) { |
| 86 | case Mode::UNENCRYPTED: |
| 87 | legacyMode = android::CryptoPlugin::kMode_Unencrypted; |
| 88 | break; |
| 89 | case Mode::AES_CTR: |
| 90 | legacyMode = android::CryptoPlugin::kMode_AES_CTR; |
| 91 | break; |
| 92 | case Mode::AES_CBC_CTS: |
| 93 | legacyMode = android::CryptoPlugin::kMode_AES_WV; |
| 94 | break; |
| 95 | case Mode::AES_CBC: |
| 96 | legacyMode = android::CryptoPlugin::kMode_AES_CBC; |
| 97 | break; |
| 98 | } |
| 99 | android::CryptoPlugin::Pattern legacyPattern; |
| 100 | legacyPattern.mEncryptBlocks = pattern.encryptBlocks; |
| 101 | legacyPattern.mSkipBlocks = pattern.skipBlocks; |
| 102 | |
Jeff Tinker | 5fee182 | 2018-01-05 11:18:00 -0800 | [diff] [blame] | 103 | std::unique_ptr<android::CryptoPlugin::SubSample[]> legacySubSamples = |
| 104 | std::make_unique<android::CryptoPlugin::SubSample[]>(subSamples.size()); |
Jeff Tinker | b075caa | 2016-12-06 23:15:20 -0800 | [diff] [blame] | 105 | |
Robert Shih | 1e18883 | 2019-09-11 14:10:14 -0700 | [diff] [blame] | 106 | size_t destSize = 0; |
Jeff Tinker | b075caa | 2016-12-06 23:15:20 -0800 | [diff] [blame] | 107 | for (size_t i = 0; i < subSamples.size(); i++) { |
Robert Shih | 1e18883 | 2019-09-11 14:10:14 -0700 | [diff] [blame] | 108 | uint32_t numBytesOfClearData = subSamples[i].numBytesOfClearData; |
| 109 | legacySubSamples[i].mNumBytesOfClearData = numBytesOfClearData; |
| 110 | uint32_t numBytesOfEncryptedData = subSamples[i].numBytesOfEncryptedData; |
| 111 | legacySubSamples[i].mNumBytesOfEncryptedData = numBytesOfEncryptedData; |
| 112 | if (__builtin_add_overflow(destSize, numBytesOfClearData, &destSize)) { |
| 113 | _hidl_cb(Status::BAD_VALUE, 0, "subsample clear size overflow"); |
| 114 | return Void(); |
| 115 | } |
| 116 | if (__builtin_add_overflow(destSize, numBytesOfEncryptedData, &destSize)) { |
| 117 | _hidl_cb(Status::BAD_VALUE, 0, "subsample encrypted size overflow"); |
| 118 | return Void(); |
| 119 | } |
Jeff Tinker | b075caa | 2016-12-06 23:15:20 -0800 | [diff] [blame] | 120 | } |
| 121 | |
| 122 | AString detailMessage; |
Jeff Tinker | 0b3f41e | 2017-02-16 12:20:30 -0800 | [diff] [blame] | 123 | sp<IMemory> sourceBase = mSharedBufferMap[source.bufferId]; |
Edwin Wong | 3b8a9ed | 2017-07-17 09:53:31 -0700 | [diff] [blame] | 124 | if (sourceBase == nullptr) { |
| 125 | _hidl_cb(Status::ERROR_DRM_CANNOT_HANDLE, 0, "source is a nullptr"); |
| 126 | return Void(); |
| 127 | } |
Jeff Tinker | b075caa | 2016-12-06 23:15:20 -0800 | [diff] [blame] | 128 | |
Edwin Wong | c14f262 | 2021-01-26 20:29:25 -0800 | [diff] [blame] | 129 | size_t totalSize = 0; |
| 130 | if (__builtin_add_overflow(source.offset, offset, &totalSize) || |
| 131 | __builtin_add_overflow(totalSize, source.size, &totalSize) || |
| 132 | totalSize > sourceBase->getSize()) { |
| 133 | android_errorWriteLog(0x534e4554, "176496160"); |
Jeff Tinker | f21cdaf | 2017-01-18 11:49:27 -0800 | [diff] [blame] | 134 | _hidl_cb(Status::ERROR_DRM_CANNOT_HANDLE, 0, "invalid buffer size"); |
| 135 | return Void(); |
| 136 | } |
Jeff Tinker | 6fdbe86 | 2017-01-11 19:45:23 -0800 | [diff] [blame] | 137 | |
Jeff Tinker | f21cdaf | 2017-01-18 11:49:27 -0800 | [diff] [blame] | 138 | uint8_t *base = static_cast<uint8_t *> |
Jeff Tinker | 0b3f41e | 2017-02-16 12:20:30 -0800 | [diff] [blame] | 139 | (static_cast<void *>(sourceBase->getPointer())); |
Jeff Tinker | f21cdaf | 2017-01-18 11:49:27 -0800 | [diff] [blame] | 140 | void *srcPtr = static_cast<void *>(base + source.offset + offset); |
Jeff Tinker | 6fdbe86 | 2017-01-11 19:45:23 -0800 | [diff] [blame] | 141 | |
Jeff Tinker | 6fdbe86 | 2017-01-11 19:45:23 -0800 | [diff] [blame] | 142 | void *destPtr = NULL; |
Jeff Tinker | b075caa | 2016-12-06 23:15:20 -0800 | [diff] [blame] | 143 | if (destination.type == BufferType::SHARED_MEMORY) { |
Jeff Tinker | f21cdaf | 2017-01-18 11:49:27 -0800 | [diff] [blame] | 144 | const SharedBuffer& destBuffer = destination.nonsecureMemory; |
Jeff Tinker | 0b3f41e | 2017-02-16 12:20:30 -0800 | [diff] [blame] | 145 | sp<IMemory> destBase = mSharedBufferMap[destBuffer.bufferId]; |
Edwin Wong | 3b8a9ed | 2017-07-17 09:53:31 -0700 | [diff] [blame] | 146 | if (destBase == nullptr) { |
| 147 | _hidl_cb(Status::ERROR_DRM_CANNOT_HANDLE, 0, "destination is a nullptr"); |
| 148 | return Void(); |
| 149 | } |
| 150 | |
Edwin Wong | e55db24 | 2021-02-02 22:28:41 -0800 | [diff] [blame] | 151 | size_t totalSize = 0; |
| 152 | if (__builtin_add_overflow(destBuffer.offset, destBuffer.size, &totalSize) || |
| 153 | totalSize > destBase->getSize()) { |
| 154 | android_errorWriteLog(0x534e4554, "176496353"); |
Jeff Tinker | f21cdaf | 2017-01-18 11:49:27 -0800 | [diff] [blame] | 155 | _hidl_cb(Status::ERROR_DRM_CANNOT_HANDLE, 0, "invalid buffer size"); |
| 156 | return Void(); |
| 157 | } |
Robert Shih | 1e18883 | 2019-09-11 14:10:14 -0700 | [diff] [blame] | 158 | |
| 159 | if (destSize > destBuffer.size) { |
| 160 | _hidl_cb(Status::BAD_VALUE, 0, "subsample sum too large"); |
| 161 | return Void(); |
| 162 | } |
| 163 | |
Robert Shih | d79abbb | 2019-11-17 23:54:21 -0800 | [diff] [blame] | 164 | base = static_cast<uint8_t *>(static_cast<void *>(destBase->getPointer())); |
Edwin Wong | e55db24 | 2021-02-02 22:28:41 -0800 | [diff] [blame] | 165 | destPtr = static_cast<void*>(base + destination.nonsecureMemory.offset); |
Jeff Tinker | b075caa | 2016-12-06 23:15:20 -0800 | [diff] [blame] | 166 | } else if (destination.type == BufferType::NATIVE_HANDLE) { |
Robert Shih | 1e18883 | 2019-09-11 14:10:14 -0700 | [diff] [blame] | 167 | if (!secure) { |
| 168 | _hidl_cb(Status::BAD_VALUE, 0, "native handle destination must be secure"); |
| 169 | return Void(); |
| 170 | } |
Jeff Tinker | b075caa | 2016-12-06 23:15:20 -0800 | [diff] [blame] | 171 | native_handle_t *handle = const_cast<native_handle_t *>( |
| 172 | destination.secureMemory.getNativeHandle()); |
| 173 | destPtr = static_cast<void *>(handle); |
Robert Shih | 1e18883 | 2019-09-11 14:10:14 -0700 | [diff] [blame] | 174 | } else { |
| 175 | _hidl_cb(Status::BAD_VALUE, 0, "invalid destination type"); |
| 176 | return Void(); |
Jeff Tinker | b075caa | 2016-12-06 23:15:20 -0800 | [diff] [blame] | 177 | } |
Edwin Wong | 989975e | 2021-03-08 18:46:42 -0800 | [diff] [blame] | 178 | |
| 179 | // release mSharedBufferLock |
| 180 | shared_buffer_lock.unlock(); |
| 181 | |
Jeff Tinker | b075caa | 2016-12-06 23:15:20 -0800 | [diff] [blame] | 182 | ssize_t result = mLegacyPlugin->decrypt(secure, keyId.data(), iv.data(), |
Jeff Tinker | 5fee182 | 2018-01-05 11:18:00 -0800 | [diff] [blame] | 183 | legacyMode, legacyPattern, srcPtr, legacySubSamples.get(), |
Jeff Tinker | 6fdbe86 | 2017-01-11 19:45:23 -0800 | [diff] [blame] | 184 | subSamples.size(), destPtr, &detailMessage); |
Jeff Tinker | b075caa | 2016-12-06 23:15:20 -0800 | [diff] [blame] | 185 | |
Jeff Tinker | b075caa | 2016-12-06 23:15:20 -0800 | [diff] [blame] | 186 | uint32_t status; |
| 187 | uint32_t bytesWritten; |
| 188 | |
| 189 | if (result >= 0) { |
| 190 | status = android::OK; |
| 191 | bytesWritten = result; |
| 192 | } else { |
Rahul Frias | abd4e11 | 2017-02-27 19:17:30 -0800 | [diff] [blame] | 193 | status = result; |
Jeff Tinker | b075caa | 2016-12-06 23:15:20 -0800 | [diff] [blame] | 194 | bytesWritten = 0; |
| 195 | } |
| 196 | |
Jeff Tinker | 01f0a5a | 2017-01-12 09:22:18 -0800 | [diff] [blame] | 197 | _hidl_cb(toStatus(status), bytesWritten, detailMessage.c_str()); |
Jeff Tinker | b075caa | 2016-12-06 23:15:20 -0800 | [diff] [blame] | 198 | return Void(); |
| 199 | } |
| 200 | |
| 201 | } // namespace implementation |
| 202 | } // namespace V1_0 |
Jeff Tinker | b075caa | 2016-12-06 23:15:20 -0800 | [diff] [blame] | 203 | } // namespace drm |
| 204 | } // namespace hardware |
| 205 | } // namespace android |