blob: d62ccd6be1cf72721752104ccdfffa28a327a5e0 [file] [log] [blame]
Jeff Tinkera53d6552017-01-20 00:31:46 -08001/*
2 * Copyright (C) 2017 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17//#define LOG_NDEBUG 0
18#define LOG_TAG "CryptoHal"
19#include <utils/Log.h>
Jeff Tinkera53d6552017-01-20 00:31:46 -080020
21#include <android/hardware/drm/1.0/types.h>
Jeff Tinkerabeb36a2017-02-17 09:42:46 -080022#include <android/hidl/manager/1.0/IServiceManager.h>
Jeff Tinkera53d6552017-01-20 00:31:46 -080023
24#include <binder/IMemory.h>
Jeff Tinker7d2c6e82018-02-16 16:14:59 -080025#include <hidlmemory/FrameworkUtils.h>
Jeff Tinkera53d6552017-01-20 00:31:46 -080026#include <media/hardware/CryptoAPI.h>
27#include <media/stagefright/foundation/ADebug.h>
28#include <media/stagefright/foundation/AString.h>
29#include <media/stagefright/foundation/hexdump.h>
30#include <media/stagefright/MediaErrors.h>
Jeff Tinker7d2c6e82018-02-16 16:14:59 -080031#include <mediadrm/CryptoHal.h>
32
Jeff Tinkerb8684f32018-12-12 08:41:31 -080033using drm::V1_0::BufferType;
34using drm::V1_0::DestinationBuffer;
35using drm::V1_0::ICryptoFactory;
36using drm::V1_0::ICryptoPlugin;
37using drm::V1_0::Mode;
38using drm::V1_0::Pattern;
39using drm::V1_0::SharedBuffer;
40using drm::V1_0::Status;
41using drm::V1_0::SubSample;
Jeff Tinkera53d6552017-01-20 00:31:46 -080042
Jeff Tinkera53d6552017-01-20 00:31:46 -080043using ::android::hardware::hidl_array;
44using ::android::hardware::hidl_handle;
45using ::android::hardware::hidl_memory;
46using ::android::hardware::hidl_string;
47using ::android::hardware::hidl_vec;
48using ::android::hardware::Return;
49using ::android::hardware::Void;
Jeff Tinkerabeb36a2017-02-17 09:42:46 -080050using ::android::hidl::manager::V1_0::IServiceManager;
Jeff Tinkera53d6552017-01-20 00:31:46 -080051using ::android::sp;
52
Jeff Tinkerb8684f32018-12-12 08:41:31 -080053typedef drm::V1_2::Status Status_V1_2;
Jeff Tinkera53d6552017-01-20 00:31:46 -080054
55namespace android {
56
57static status_t toStatusT(Status status) {
58 switch (status) {
59 case Status::OK:
60 return OK;
61 case Status::ERROR_DRM_NO_LICENSE:
62 return ERROR_DRM_NO_LICENSE;
63 case Status::ERROR_DRM_LICENSE_EXPIRED:
64 return ERROR_DRM_LICENSE_EXPIRED;
65 case Status::ERROR_DRM_RESOURCE_BUSY:
66 return ERROR_DRM_RESOURCE_BUSY;
67 case Status::ERROR_DRM_INSUFFICIENT_OUTPUT_PROTECTION:
68 return ERROR_DRM_INSUFFICIENT_OUTPUT_PROTECTION;
69 case Status::ERROR_DRM_SESSION_NOT_OPENED:
70 return ERROR_DRM_SESSION_NOT_OPENED;
71 case Status::ERROR_DRM_CANNOT_HANDLE:
72 return ERROR_DRM_CANNOT_HANDLE;
Jeff Tinkerd0cb8312017-03-15 11:17:00 -070073 case Status::ERROR_DRM_DECRYPT:
74 return ERROR_DRM_DECRYPT;
Jeff Tinkera53d6552017-01-20 00:31:46 -080075 default:
76 return UNKNOWN_ERROR;
77 }
78}
79
Jeff Tinkerb8684f32018-12-12 08:41:31 -080080static status_t toStatusT_1_2(Status_V1_2 status) {
81 switch (status) {
82 case Status_V1_2::ERROR_DRM_SESSION_LOST_STATE:
83 return ERROR_DRM_SESSION_LOST_STATE;;
84 case Status_V1_2::ERROR_DRM_FRAME_TOO_LARGE:
85 return ERROR_DRM_FRAME_TOO_LARGE;
86 case Status_V1_2::ERROR_DRM_INSUFFICIENT_SECURITY:
87 return ERROR_DRM_INSUFFICIENT_SECURITY;
88 default:
89 return toStatusT(static_cast<Status>(status));
90 }
91}
Jeff Tinkera53d6552017-01-20 00:31:46 -080092
93static hidl_vec<uint8_t> toHidlVec(const Vector<uint8_t> &vector) {
94 hidl_vec<uint8_t> vec;
95 vec.setToExternal(const_cast<uint8_t *>(vector.array()), vector.size());
96 return vec;
97}
98
99static hidl_vec<uint8_t> toHidlVec(const void *ptr, size_t size) {
100 hidl_vec<uint8_t> vec;
101 vec.resize(size);
102 memcpy(vec.data(), ptr, size);
103 return vec;
104}
105
106static hidl_array<uint8_t, 16> toHidlArray16(const uint8_t *ptr) {
107 if (!ptr) {
108 return hidl_array<uint8_t, 16>();
109 }
110 return hidl_array<uint8_t, 16>(ptr);
111}
112
113
Jeff Tinkera53d6552017-01-20 00:31:46 -0800114static String8 toString8(hidl_string hString) {
115 return String8(hString.c_str());
116}
117
118
119CryptoHal::CryptoHal()
Jeff Tinkerabeb36a2017-02-17 09:42:46 -0800120 : mFactories(makeCryptoFactories()),
121 mInitCheck((mFactories.size() == 0) ? ERROR_UNSUPPORTED : NO_INIT),
Chong Zhang6dcab2b2017-03-28 14:18:27 -0700122 mNextBufferId(0),
123 mHeapSeqNum(0) {
Jeff Tinkera53d6552017-01-20 00:31:46 -0800124}
125
126CryptoHal::~CryptoHal() {
127}
128
Jeff Tinkerabeb36a2017-02-17 09:42:46 -0800129Vector<sp<ICryptoFactory>> CryptoHal::makeCryptoFactories() {
130 Vector<sp<ICryptoFactory>> factories;
Jeff Tinkera53d6552017-01-20 00:31:46 -0800131
Jeff Tinker6a4921a2017-03-09 23:26:01 -0800132 auto manager = ::IServiceManager::getService();
Jeff Tinkerabeb36a2017-02-17 09:42:46 -0800133 if (manager != NULL) {
Jeff Tinkere307dc42018-02-11 19:53:54 +0000134 manager->listByInterface(drm::V1_0::ICryptoFactory::descriptor,
Jeff Tinkerabeb36a2017-02-17 09:42:46 -0800135 [&factories](const hidl_vec<hidl_string> &registered) {
136 for (const auto &instance : registered) {
Jeff Tinkere307dc42018-02-11 19:53:54 +0000137 auto factory = drm::V1_0::ICryptoFactory::getService(instance);
Jeff Tinkerabeb36a2017-02-17 09:42:46 -0800138 if (factory != NULL) {
Jeff Tinkere307dc42018-02-11 19:53:54 +0000139 ALOGD("found drm@1.0 ICryptoFactory %s", instance.c_str());
Jeff Tinkerabeb36a2017-02-17 09:42:46 -0800140 factories.push_back(factory);
Jeff Tinkere307dc42018-02-11 19:53:54 +0000141 }
142 }
143 }
144 );
145 manager->listByInterface(drm::V1_1::ICryptoFactory::descriptor,
146 [&factories](const hidl_vec<hidl_string> &registered) {
147 for (const auto &instance : registered) {
148 auto factory = drm::V1_1::ICryptoFactory::getService(instance);
149 if (factory != NULL) {
150 ALOGD("found drm@1.1 ICryptoFactory %s", instance.c_str());
151 factories.push_back(factory);
Jeff Tinkerabeb36a2017-02-17 09:42:46 -0800152 }
153 }
154 }
155 );
Jeff Tinkera53d6552017-01-20 00:31:46 -0800156 }
Jeff Tinkerabeb36a2017-02-17 09:42:46 -0800157
158 if (factories.size() == 0) {
159 // must be in passthrough mode, load the default passthrough service
Jeff Tinkere309b222017-04-05 08:01:28 -0700160 auto passthrough = ICryptoFactory::getService();
Jeff Tinkerabeb36a2017-02-17 09:42:46 -0800161 if (passthrough != NULL) {
Jeff Tinkere307dc42018-02-11 19:53:54 +0000162 ALOGI("makeCryptoFactories: using default passthrough crypto instance");
Jeff Tinkerabeb36a2017-02-17 09:42:46 -0800163 factories.push_back(passthrough);
164 } else {
165 ALOGE("Failed to find any crypto factories");
166 }
167 }
168 return factories;
Jeff Tinkera53d6552017-01-20 00:31:46 -0800169}
170
Jeff Tinkerabeb36a2017-02-17 09:42:46 -0800171sp<ICryptoPlugin> CryptoHal::makeCryptoPlugin(const sp<ICryptoFactory>& factory,
172 const uint8_t uuid[16], const void *initData, size_t initDataSize) {
Jeff Tinkera53d6552017-01-20 00:31:46 -0800173
174 sp<ICryptoPlugin> plugin;
Jeff Tinkerabeb36a2017-02-17 09:42:46 -0800175 Return<void> hResult = factory->createPlugin(toHidlArray16(uuid),
Jeff Tinkera53d6552017-01-20 00:31:46 -0800176 toHidlVec(initData, initDataSize),
177 [&](Status status, const sp<ICryptoPlugin>& hPlugin) {
178 if (status != Status::OK) {
179 ALOGE("Failed to make crypto plugin");
180 return;
181 }
182 plugin = hPlugin;
183 }
184 );
185 return plugin;
186}
187
188
189status_t CryptoHal::initCheck() const {
190 return mInitCheck;
191}
192
193
194bool CryptoHal::isCryptoSchemeSupported(const uint8_t uuid[16]) {
195 Mutex::Autolock autoLock(mLock);
Jeff Tinkerabeb36a2017-02-17 09:42:46 -0800196
197 for (size_t i = 0; i < mFactories.size(); i++) {
198 if (mFactories[i]->isCryptoSchemeSupported(uuid)) {
199 return true;
200 }
Jeff Tinkera53d6552017-01-20 00:31:46 -0800201 }
202 return false;
203}
204
Jeff Tinkerabeb36a2017-02-17 09:42:46 -0800205status_t CryptoHal::createPlugin(const uint8_t uuid[16], const void *data,
206 size_t size) {
Jeff Tinkera53d6552017-01-20 00:31:46 -0800207 Mutex::Autolock autoLock(mLock);
208
Jeff Tinkerabeb36a2017-02-17 09:42:46 -0800209 for (size_t i = 0; i < mFactories.size(); i++) {
210 if (mFactories[i]->isCryptoSchemeSupported(uuid)) {
211 mPlugin = makeCryptoPlugin(mFactories[i], uuid, data, size);
Jeff Tinkerb8684f32018-12-12 08:41:31 -0800212 if (mPlugin != NULL) {
213 mPluginV1_2 = drm::V1_2::ICryptoPlugin::castFrom(mPlugin);
214 }
Jeff Tinkerabeb36a2017-02-17 09:42:46 -0800215 }
216 }
Jeff Tinkera53d6552017-01-20 00:31:46 -0800217
218 if (mPlugin == NULL) {
219 mInitCheck = ERROR_UNSUPPORTED;
220 } else {
221 mInitCheck = OK;
222 }
223
224 return mInitCheck;
225}
226
227status_t CryptoHal::destroyPlugin() {
228 Mutex::Autolock autoLock(mLock);
229
230 if (mInitCheck != OK) {
231 return mInitCheck;
232 }
233
234 mPlugin.clear();
Jeff Tinkerb8684f32018-12-12 08:41:31 -0800235 mPluginV1_2.clear();
Jeff Tinkera53d6552017-01-20 00:31:46 -0800236 return OK;
237}
238
239bool CryptoHal::requiresSecureDecoderComponent(const char *mime) const {
240 Mutex::Autolock autoLock(mLock);
241
242 if (mInitCheck != OK) {
Jeff Tinkercca23772018-05-07 11:41:56 -0700243 return false;
Jeff Tinkera53d6552017-01-20 00:31:46 -0800244 }
245
Jeff Tinkercca23772018-05-07 11:41:56 -0700246 Return<bool> hResult = mPlugin->requiresSecureDecoderComponent(hidl_string(mime));
247 if (!hResult.isOk()) {
248 return false;
249 }
250 return hResult;
Jeff Tinkera53d6552017-01-20 00:31:46 -0800251}
252
253
254/**
255 * If the heap base isn't set, get the heap base from the IMemory
256 * and send it to the HAL so it can map a remote heap of the same
257 * size. Once the heap base is established, shared memory buffers
258 * are sent by providing an offset into the heap and a buffer size.
259 */
Chong Zhang6dcab2b2017-03-28 14:18:27 -0700260int32_t CryptoHal::setHeapBase(const sp<IMemoryHeap>& heap) {
Steven Moreland65366062017-10-05 11:34:01 -0700261 using ::android::hardware::fromHeap;
262 using ::android::hardware::HidlMemory;
263
Chong Zhang6dcab2b2017-03-28 14:18:27 -0700264 if (heap == NULL) {
265 ALOGE("setHeapBase(): heap is NULL");
266 return -1;
267 }
Chong Zhang6dcab2b2017-03-28 14:18:27 -0700268
269 Mutex::Autolock autoLock(mLock);
270
271 int32_t seqNum = mHeapSeqNum++;
Steven Moreland65366062017-10-05 11:34:01 -0700272 sp<HidlMemory> hidlMemory = fromHeap(heap);
Jeff Tinkerb1f8c802018-04-19 16:23:21 -0700273 mHeapBases.add(seqNum, HeapBase(mNextBufferId, heap->getSize()));
Steven Moreland65366062017-10-05 11:34:01 -0700274 Return<void> hResult = mPlugin->setSharedBufferBase(*hidlMemory, mNextBufferId++);
Jeff Tinker3cb53162017-02-16 12:06:32 -0800275 ALOGE_IF(!hResult.isOk(), "setSharedBufferBase(): remote call failed");
Chong Zhang6dcab2b2017-03-28 14:18:27 -0700276 return seqNum;
Jeff Tinker3cb53162017-02-16 12:06:32 -0800277}
278
Chong Zhang6dcab2b2017-03-28 14:18:27 -0700279void CryptoHal::clearHeapBase(int32_t seqNum) {
280 Mutex::Autolock autoLock(mLock);
281
Jeff Tinker0db0fa12018-05-22 16:55:57 -0700282 /*
283 * Clear the remote shared memory mapping by setting the shared
284 * buffer base to a null hidl_memory.
285 *
286 * TODO: Add a releaseSharedBuffer method in a future DRM HAL
287 * API version to make this explicit.
288 */
Jeff Tinker20795c72018-05-30 18:20:09 -0700289 ssize_t index = mHeapBases.indexOfKey(seqNum);
290 if (index >= 0) {
291 if (mPlugin != NULL) {
292 uint32_t bufferId = mHeapBases[index].getBufferId();
293 Return<void> hResult = mPlugin->setSharedBufferBase(hidl_memory(), bufferId);
294 ALOGE_IF(!hResult.isOk(), "setSharedBufferBase(): remote call failed");
295 }
296 mHeapBases.removeItem(seqNum);
297 }
Chong Zhangd07c9272017-03-28 11:02:06 -0700298}
299
Chong Zhang6dcab2b2017-03-28 14:18:27 -0700300status_t CryptoHal::toSharedBuffer(const sp<IMemory>& memory, int32_t seqNum, ::SharedBuffer* buffer) {
Jeff Tinker3cb53162017-02-16 12:06:32 -0800301 ssize_t offset;
302 size_t size;
303
Jeff Tinker33f03632019-05-03 15:10:56 -0700304 if (memory == NULL || buffer == NULL) {
Jeff Tinker3cb53162017-02-16 12:06:32 -0800305 return UNEXPECTED_NULL;
306 }
307
308 sp<IMemoryHeap> heap = memory->getMemory(&offset, &size);
309 if (heap == NULL) {
310 return UNEXPECTED_NULL;
311 }
312
Jeff Tinkerb1f8c802018-04-19 16:23:21 -0700313 // memory must be in one of the heaps that have been set
314 if (mHeapBases.indexOfKey(seqNum) < 0) {
315 return UNKNOWN_ERROR;
316 }
Jeff Tinker3cb53162017-02-16 12:06:32 -0800317
Jeff Tinkerb1f8c802018-04-19 16:23:21 -0700318 // heap must be the same size as the one that was set in setHeapBase
319 if (mHeapBases.valueFor(seqNum).getSize() != heap->getSize()) {
320 android_errorWriteLog(0x534e4554, "76221123");
321 return UNKNOWN_ERROR;
322 }
323
324 // memory must be within the address space of the heap
325 if (memory->pointer() != static_cast<uint8_t *>(heap->getBase()) + memory->offset() ||
326 heap->getSize() < memory->offset() + memory->size() ||
327 SIZE_MAX - memory->offset() < memory->size()) {
328 android_errorWriteLog(0x534e4554, "76221123");
329 return UNKNOWN_ERROR;
330 }
331
332 buffer->bufferId = mHeapBases.valueFor(seqNum).getBufferId();
Jeff Tinker3cb53162017-02-16 12:06:32 -0800333 buffer->offset = offset >= 0 ? offset : 0;
334 buffer->size = size;
Jeff Tinkera53d6552017-01-20 00:31:46 -0800335 return OK;
336}
337
338ssize_t CryptoHal::decrypt(const uint8_t keyId[16], const uint8_t iv[16],
339 CryptoPlugin::Mode mode, const CryptoPlugin::Pattern &pattern,
Chong Zhang6dcab2b2017-03-28 14:18:27 -0700340 const ICrypto::SourceBuffer &source, size_t offset,
Jeff Tinkera53d6552017-01-20 00:31:46 -0800341 const CryptoPlugin::SubSample *subSamples, size_t numSubSamples,
342 const ICrypto::DestinationBuffer &destination, AString *errorDetailMsg) {
343 Mutex::Autolock autoLock(mLock);
344
345 if (mInitCheck != OK) {
346 return mInitCheck;
347 }
348
Jeff Tinkera53d6552017-01-20 00:31:46 -0800349 Mode hMode;
350 switch(mode) {
351 case CryptoPlugin::kMode_Unencrypted:
352 hMode = Mode::UNENCRYPTED ;
353 break;
354 case CryptoPlugin::kMode_AES_CTR:
355 hMode = Mode::AES_CTR;
356 break;
357 case CryptoPlugin::kMode_AES_WV:
358 hMode = Mode::AES_CBC_CTS;
359 break;
360 case CryptoPlugin::kMode_AES_CBC:
361 hMode = Mode::AES_CBC;
362 break;
363 default:
364 return UNKNOWN_ERROR;
365 }
366
367 Pattern hPattern;
368 hPattern.encryptBlocks = pattern.mEncryptBlocks;
369 hPattern.skipBlocks = pattern.mSkipBlocks;
370
371 std::vector<SubSample> stdSubSamples;
372 for (size_t i = 0; i < numSubSamples; i++) {
373 SubSample subSample;
374 subSample.numBytesOfClearData = subSamples[i].mNumBytesOfClearData;
375 subSample.numBytesOfEncryptedData = subSamples[i].mNumBytesOfEncryptedData;
376 stdSubSamples.push_back(subSample);
377 }
378 auto hSubSamples = hidl_vec<SubSample>(stdSubSamples);
379
Chong Zhang6dcab2b2017-03-28 14:18:27 -0700380 int32_t heapSeqNum = source.mHeapSeqNum;
Jeff Tinkera53d6552017-01-20 00:31:46 -0800381 bool secure;
382 ::DestinationBuffer hDestination;
383 if (destination.mType == kDestinationTypeSharedMemory) {
384 hDestination.type = BufferType::SHARED_MEMORY;
Chong Zhang6dcab2b2017-03-28 14:18:27 -0700385 status_t status = toSharedBuffer(destination.mSharedMemory, heapSeqNum,
Jeff Tinker3cb53162017-02-16 12:06:32 -0800386 &hDestination.nonsecureMemory);
387 if (status != OK) {
388 return status;
389 }
Jeff Tinkera53d6552017-01-20 00:31:46 -0800390 secure = false;
Jeff Tinker24420472018-01-11 17:46:16 -0800391 } else if (destination.mType == kDestinationTypeNativeHandle) {
Jeff Tinkera53d6552017-01-20 00:31:46 -0800392 hDestination.type = BufferType::NATIVE_HANDLE;
393 hDestination.secureMemory = hidl_handle(destination.mHandle);
394 secure = true;
Jeff Tinker24420472018-01-11 17:46:16 -0800395 } else {
396 android_errorWriteLog(0x534e4554, "70526702");
397 return UNKNOWN_ERROR;
Jeff Tinkera53d6552017-01-20 00:31:46 -0800398 }
399
Jeff Tinker3cb53162017-02-16 12:06:32 -0800400 ::SharedBuffer hSource;
Chong Zhang6dcab2b2017-03-28 14:18:27 -0700401 status_t status = toSharedBuffer(source.mSharedMemory, heapSeqNum, &hSource);
Jeff Tinker3cb53162017-02-16 12:06:32 -0800402 if (status != OK) {
403 return status;
404 }
Jeff Tinkera53d6552017-01-20 00:31:46 -0800405
406 status_t err = UNKNOWN_ERROR;
407 uint32_t bytesWritten = 0;
408
Jeff Tinkerb8684f32018-12-12 08:41:31 -0800409 Return<void> hResult;
Jeff Tinkera53d6552017-01-20 00:31:46 -0800410
Jeff Tinkerb8684f32018-12-12 08:41:31 -0800411 if (mPluginV1_2 != NULL) {
412 hResult = mPluginV1_2->decrypt_1_2(secure, toHidlArray16(keyId), toHidlArray16(iv),
413 hMode, hPattern, hSubSamples, hSource, offset, hDestination,
414 [&](Status_V1_2 status, uint32_t hBytesWritten, hidl_string hDetailedError) {
415 if (status == Status_V1_2::OK) {
416 bytesWritten = hBytesWritten;
417 *errorDetailMsg = toString8(hDetailedError);
418 }
419 err = toStatusT_1_2(status);
420 }
421 );
422 } else {
423 hResult = mPlugin->decrypt(secure, toHidlArray16(keyId), toHidlArray16(iv),
424 hMode, hPattern, hSubSamples, hSource, offset, hDestination,
425 [&](Status status, uint32_t hBytesWritten, hidl_string hDetailedError) {
426 if (status == Status::OK) {
427 bytesWritten = hBytesWritten;
428 *errorDetailMsg = toString8(hDetailedError);
429 }
430 err = toStatusT(status);
431 }
432 );
Jeff Tinkera53d6552017-01-20 00:31:46 -0800433 }
434
Jeff Tinkerb8684f32018-12-12 08:41:31 -0800435 err = hResult.isOk() ? err : DEAD_OBJECT;
Jeff Tinkera53d6552017-01-20 00:31:46 -0800436 if (err == OK) {
437 return bytesWritten;
438 }
439 return err;
440}
441
442void CryptoHal::notifyResolution(uint32_t width, uint32_t height) {
443 Mutex::Autolock autoLock(mLock);
444
445 if (mInitCheck != OK) {
446 return;
447 }
448
449 mPlugin->notifyResolution(width, height);
450}
451
452status_t CryptoHal::setMediaDrmSession(const Vector<uint8_t> &sessionId) {
453 Mutex::Autolock autoLock(mLock);
454
455 if (mInitCheck != OK) {
456 return mInitCheck;
457 }
458
459 return toStatusT(mPlugin->setMediaDrmSession(toHidlVec(sessionId)));
460}
461
462} // namespace android