blob: f218041c46fca26fe37752ed87f8fe50a1655a25 [file] [log] [blame]
Jeff Tinkera53d6552017-01-20 00:31:46 -08001/*
2 * Copyright (C) 2017 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17//#define LOG_NDEBUG 0
18#define LOG_TAG "DrmHal"
Adam Stonefb679e32018-02-07 10:25:48 -080019#include <iomanip>
20
Jeff Tinkera53d6552017-01-20 00:31:46 -080021#include <utils/Log.h>
22
Robert Shih6152d7c2019-11-19 22:54:27 -080023#include <android/binder_manager.h>
Jeff Tinkera53d6552017-01-20 00:31:46 -080024
Robert Shih0f3a8a02019-11-14 15:43:39 -080025#include <aidl/android/media/BnResourceManagerClient.h>
Jeff Tinkerc8baaba2018-10-23 11:32:36 -070026#include <android/hardware/drm/1.2/types.h>
Peter Kalauskasca5642c2018-11-12 12:34:42 -080027#include <android/hidl/manager/1.2/IServiceManager.h>
Jeff Tinker593111f2017-05-25 16:00:21 -070028#include <hidl/ServiceManagement.h>
Adam Stonef0e618d2018-01-17 19:20:41 -080029#include <media/EventMetric.h>
Robert Shih82ea6be2019-11-07 17:47:23 -080030#include <media/MediaMetrics.h>
John W. Bruce33ecc4f2017-04-03 16:49:05 -070031#include <media/PluginMetricsReporting.h>
Jeff Tinkera53d6552017-01-20 00:31:46 -080032#include <media/drm/DrmAPI.h>
33#include <media/stagefright/foundation/ADebug.h>
34#include <media/stagefright/foundation/AString.h>
Adam Stone32494f52018-02-26 22:53:27 -080035#include <media/stagefright/foundation/base64.h>
Jeff Tinkera53d6552017-01-20 00:31:46 -080036#include <media/stagefright/foundation/hexdump.h>
37#include <media/stagefright/MediaErrors.h>
Jeff Tinker7d2c6e82018-02-16 16:14:59 -080038#include <mediadrm/DrmHal.h>
39#include <mediadrm/DrmSessionClientInterface.h>
40#include <mediadrm/DrmSessionManager.h>
Robert Shih93538812019-11-12 12:21:35 -080041#include <mediadrm/IDrmMetricsConsumer.h>
Robert Shihc0d1d0e2019-11-24 13:21:04 -080042#include <mediadrm/DrmUtils.h>
Jeff Tinkera53d6552017-01-20 00:31:46 -080043
Robert Shih61e1c762019-10-31 21:26:58 -070044#include <vector>
45
Jeff Tinker6d998b62017-12-18 14:37:43 -080046using drm::V1_0::KeyedVector;
Jeff Tinkerb8684f32018-12-12 08:41:31 -080047using drm::V1_0::KeyRequestType;
Jeff Tinker6d998b62017-12-18 14:37:43 -080048using drm::V1_0::KeyType;
49using drm::V1_0::KeyValue;
Jeff Tinker6d998b62017-12-18 14:37:43 -080050using drm::V1_0::SecureStop;
Jeff Tinker15177d72018-01-25 12:57:55 -080051using drm::V1_0::SecureStopId;
Jeff Tinker6d998b62017-12-18 14:37:43 -080052using drm::V1_0::Status;
Jeff Tinkerc8baaba2018-10-23 11:32:36 -070053using drm::V1_1::HdcpLevel;
54using drm::V1_1::SecureStopRelease;
55using drm::V1_1::SecurityLevel;
56using drm::V1_2::KeySetId;
Robert Shiha5033262019-05-06 14:15:12 -070057using drm::V1_2::KeyStatusType;
Adam Stone28f27c32018-02-05 15:07:48 -080058using ::android::hardware::drm::V1_1::DrmMetricGroup;
Jeff Tinkera53d6552017-01-20 00:31:46 -080059using ::android::hardware::hidl_array;
60using ::android::hardware::hidl_string;
61using ::android::hardware::hidl_vec;
62using ::android::hardware::Return;
63using ::android::hardware::Void;
Adam Stone637b7852018-01-30 12:09:36 -080064using ::android::os::PersistableBundle;
Jeff Tinkera53d6552017-01-20 00:31:46 -080065using ::android::sp;
66
Jeff Tinkerb8684f32018-12-12 08:41:31 -080067typedef drm::V1_1::KeyRequestType KeyRequestType_V1_1;
68typedef drm::V1_2::Status Status_V1_2;
Jeff Tinker44c2cc42019-01-14 10:24:18 -080069typedef drm::V1_2::HdcpLevel HdcpLevel_V1_2;
Jeff Tinkerb8684f32018-12-12 08:41:31 -080070
Adam Stonecea91ce2018-01-22 19:23:28 -080071namespace {
72
73// This constant corresponds to the PROPERTY_DEVICE_UNIQUE_ID constant
74// in the MediaDrm API.
75constexpr char kPropertyDeviceUniqueId[] = "deviceUniqueId";
Adam Stone32494f52018-02-26 22:53:27 -080076constexpr char kEqualsSign[] = "=";
Adam Stonecea91ce2018-01-22 19:23:28 -080077
Adam Stone32494f52018-02-26 22:53:27 -080078template<typename T>
79std::string toBase64StringNoPad(const T* data, size_t size) {
Adam Stone630092e2018-05-02 13:06:34 -070080 // Note that the base 64 conversion only works with arrays of single-byte
81 // values. If the source is empty or is not an array of single-byte values,
82 // return empty string.
83 if (size == 0 || sizeof(data[0]) != 1) {
Adam Stone32494f52018-02-26 22:53:27 -080084 return "";
85 }
Adam Stone32494f52018-02-26 22:53:27 -080086
87 android::AString outputString;
88 encodeBase64(data, size, &outputString);
89 // Remove trailing equals padding if it exists.
90 while (outputString.size() > 0 && outputString.endsWith(kEqualsSign)) {
91 outputString.erase(outputString.size() - 1, 1);
92 }
93
94 return std::string(outputString.c_str(), outputString.size());
Adam Stonecea91ce2018-01-22 19:23:28 -080095}
96
Adam Stone32494f52018-02-26 22:53:27 -080097} // anonymous namespace
98
Jeff Tinkera53d6552017-01-20 00:31:46 -080099namespace android {
100
Jeff Tinker6d998b62017-12-18 14:37:43 -0800101#define INIT_CHECK() {if (mInitCheck != OK) return mInitCheck;}
102
Jeff Tinkera53d6552017-01-20 00:31:46 -0800103static const Vector<uint8_t> toVector(const hidl_vec<uint8_t> &vec) {
104 Vector<uint8_t> vector;
105 vector.appendArray(vec.data(), vec.size());
106 return *const_cast<const Vector<uint8_t> *>(&vector);
107}
108
109static hidl_vec<uint8_t> toHidlVec(const Vector<uint8_t> &vector) {
110 hidl_vec<uint8_t> vec;
111 vec.setToExternal(const_cast<uint8_t *>(vector.array()), vector.size());
112 return vec;
113}
114
115static String8 toString8(const hidl_string &string) {
116 return String8(string.c_str());
117}
118
119static hidl_string toHidlString(const String8& string) {
120 return hidl_string(string.string());
121}
122
Jeff Tinker6d998b62017-12-18 14:37:43 -0800123static DrmPlugin::SecurityLevel toSecurityLevel(SecurityLevel level) {
124 switch(level) {
125 case SecurityLevel::SW_SECURE_CRYPTO:
126 return DrmPlugin::kSecurityLevelSwSecureCrypto;
127 case SecurityLevel::SW_SECURE_DECODE:
128 return DrmPlugin::kSecurityLevelSwSecureDecode;
129 case SecurityLevel::HW_SECURE_CRYPTO:
130 return DrmPlugin::kSecurityLevelHwSecureCrypto;
131 case SecurityLevel::HW_SECURE_DECODE:
132 return DrmPlugin::kSecurityLevelHwSecureDecode;
133 case SecurityLevel::HW_SECURE_ALL:
134 return DrmPlugin::kSecurityLevelHwSecureAll;
135 default:
136 return DrmPlugin::kSecurityLevelUnknown;
137 }
138}
139
Jeff Tinker99dbfa82019-01-17 17:27:06 -0800140static SecurityLevel toHidlSecurityLevel(DrmPlugin::SecurityLevel level) {
141 switch(level) {
142 case DrmPlugin::kSecurityLevelSwSecureCrypto:
143 return SecurityLevel::SW_SECURE_CRYPTO;
144 case DrmPlugin::kSecurityLevelSwSecureDecode:
145 return SecurityLevel::SW_SECURE_DECODE;
146 case DrmPlugin::kSecurityLevelHwSecureCrypto:
147 return SecurityLevel::HW_SECURE_CRYPTO;
148 case DrmPlugin::kSecurityLevelHwSecureDecode:
149 return SecurityLevel::HW_SECURE_DECODE;
150 case DrmPlugin::kSecurityLevelHwSecureAll:
151 return SecurityLevel::HW_SECURE_ALL;
152 default:
153 return SecurityLevel::UNKNOWN;
154 }
155}
156
Jeff Tinkerc8baaba2018-10-23 11:32:36 -0700157static DrmPlugin::OfflineLicenseState toOfflineLicenseState(
158 OfflineLicenseState licenseState) {
159 switch(licenseState) {
160 case OfflineLicenseState::USABLE:
161 return DrmPlugin::kOfflineLicenseStateUsable;
162 case OfflineLicenseState::INACTIVE:
Jeff Tinker9a95b0f2019-01-30 17:39:20 -0800163 return DrmPlugin::kOfflineLicenseStateReleased;
Jeff Tinkerc8baaba2018-10-23 11:32:36 -0700164 default:
165 return DrmPlugin::kOfflineLicenseStateUnknown;
166 }
167}
168
Jeff Tinker44c2cc42019-01-14 10:24:18 -0800169static DrmPlugin::HdcpLevel toHdcpLevel(HdcpLevel_V1_2 level) {
Jeff Tinker6d998b62017-12-18 14:37:43 -0800170 switch(level) {
Jeff Tinker44c2cc42019-01-14 10:24:18 -0800171 case HdcpLevel_V1_2::HDCP_NONE:
Jeff Tinker6d998b62017-12-18 14:37:43 -0800172 return DrmPlugin::kHdcpNone;
Jeff Tinker44c2cc42019-01-14 10:24:18 -0800173 case HdcpLevel_V1_2::HDCP_V1:
Jeff Tinker6d998b62017-12-18 14:37:43 -0800174 return DrmPlugin::kHdcpV1;
Jeff Tinker44c2cc42019-01-14 10:24:18 -0800175 case HdcpLevel_V1_2::HDCP_V2:
Jeff Tinker6d998b62017-12-18 14:37:43 -0800176 return DrmPlugin::kHdcpV2;
Jeff Tinker44c2cc42019-01-14 10:24:18 -0800177 case HdcpLevel_V1_2::HDCP_V2_1:
Jeff Tinker6d998b62017-12-18 14:37:43 -0800178 return DrmPlugin::kHdcpV2_1;
Jeff Tinker44c2cc42019-01-14 10:24:18 -0800179 case HdcpLevel_V1_2::HDCP_V2_2:
Jeff Tinker6d998b62017-12-18 14:37:43 -0800180 return DrmPlugin::kHdcpV2_2;
Jeff Tinker44c2cc42019-01-14 10:24:18 -0800181 case HdcpLevel_V1_2::HDCP_V2_3:
182 return DrmPlugin::kHdcpV2_3;
183 case HdcpLevel_V1_2::HDCP_NO_OUTPUT:
Jeff Tinker6d998b62017-12-18 14:37:43 -0800184 return DrmPlugin::kHdcpNoOutput;
185 default:
186 return DrmPlugin::kHdcpLevelUnknown;
187 }
188}
Jeff Tinkera53d6552017-01-20 00:31:46 -0800189static ::KeyedVector toHidlKeyedVector(const KeyedVector<String8, String8>&
190 keyedVector) {
191 std::vector<KeyValue> stdKeyedVector;
192 for (size_t i = 0; i < keyedVector.size(); i++) {
193 KeyValue keyValue;
194 keyValue.key = toHidlString(keyedVector.keyAt(i));
195 keyValue.value = toHidlString(keyedVector.valueAt(i));
196 stdKeyedVector.push_back(keyValue);
197 }
198 return ::KeyedVector(stdKeyedVector);
199}
200
201static KeyedVector<String8, String8> toKeyedVector(const ::KeyedVector&
202 hKeyedVector) {
203 KeyedVector<String8, String8> keyedVector;
204 for (size_t i = 0; i < hKeyedVector.size(); i++) {
205 keyedVector.add(toString8(hKeyedVector[i].key),
206 toString8(hKeyedVector[i].value));
207 }
208 return keyedVector;
209}
210
Jeff Tinkerabeb36a2017-02-17 09:42:46 -0800211static List<Vector<uint8_t>> toSecureStops(const hidl_vec<SecureStop>&
Jeff Tinkera53d6552017-01-20 00:31:46 -0800212 hSecureStops) {
Jeff Tinkerabeb36a2017-02-17 09:42:46 -0800213 List<Vector<uint8_t>> secureStops;
Jeff Tinkera53d6552017-01-20 00:31:46 -0800214 for (size_t i = 0; i < hSecureStops.size(); i++) {
215 secureStops.push_back(toVector(hSecureStops[i].opaqueData));
216 }
217 return secureStops;
218}
219
Jeff Tinker15177d72018-01-25 12:57:55 -0800220static List<Vector<uint8_t>> toSecureStopIds(const hidl_vec<SecureStopId>&
221 hSecureStopIds) {
222 List<Vector<uint8_t>> secureStopIds;
223 for (size_t i = 0; i < hSecureStopIds.size(); i++) {
224 secureStopIds.push_back(toVector(hSecureStopIds[i]));
225 }
226 return secureStopIds;
227}
228
Jeff Tinkerc8baaba2018-10-23 11:32:36 -0700229static List<Vector<uint8_t>> toKeySetIds(const hidl_vec<KeySetId>&
230 hKeySetIds) {
231 List<Vector<uint8_t>> keySetIds;
232 for (size_t i = 0; i < hKeySetIds.size(); i++) {
233 keySetIds.push_back(toVector(hKeySetIds[i]));
234 }
235 return keySetIds;
236}
237
Jeff Tinkera53d6552017-01-20 00:31:46 -0800238static status_t toStatusT(Status status) {
239 switch (status) {
240 case Status::OK:
241 return OK;
242 break;
243 case Status::ERROR_DRM_NO_LICENSE:
244 return ERROR_DRM_NO_LICENSE;
245 break;
246 case Status::ERROR_DRM_LICENSE_EXPIRED:
247 return ERROR_DRM_LICENSE_EXPIRED;
248 break;
249 case Status::ERROR_DRM_SESSION_NOT_OPENED:
250 return ERROR_DRM_SESSION_NOT_OPENED;
251 break;
252 case Status::ERROR_DRM_CANNOT_HANDLE:
253 return ERROR_DRM_CANNOT_HANDLE;
254 break;
255 case Status::ERROR_DRM_INVALID_STATE:
Jeff Tinkerb8684f32018-12-12 08:41:31 -0800256 return ERROR_DRM_INVALID_STATE;
Jeff Tinkera53d6552017-01-20 00:31:46 -0800257 break;
258 case Status::BAD_VALUE:
259 return BAD_VALUE;
260 break;
261 case Status::ERROR_DRM_NOT_PROVISIONED:
262 return ERROR_DRM_NOT_PROVISIONED;
263 break;
264 case Status::ERROR_DRM_RESOURCE_BUSY:
265 return ERROR_DRM_RESOURCE_BUSY;
266 break;
267 case Status::ERROR_DRM_DEVICE_REVOKED:
268 return ERROR_DRM_DEVICE_REVOKED;
269 break;
270 case Status::ERROR_DRM_UNKNOWN:
271 default:
272 return ERROR_DRM_UNKNOWN;
273 break;
274 }
275}
276
Jeff Tinkerb8684f32018-12-12 08:41:31 -0800277static status_t toStatusT_1_2(Status_V1_2 status) {
278 switch (status) {
279 case Status_V1_2::ERROR_DRM_RESOURCE_CONTENTION:
280 return ERROR_DRM_RESOURCE_CONTENTION;
281 case Status_V1_2::ERROR_DRM_FRAME_TOO_LARGE:
282 return ERROR_DRM_FRAME_TOO_LARGE;
283 case Status_V1_2::ERROR_DRM_INSUFFICIENT_SECURITY:
284 return ERROR_DRM_INSUFFICIENT_SECURITY;
285 default:
286 return toStatusT(static_cast<Status>(status));
287 }
288}
289
Jeff Tinkera53d6552017-01-20 00:31:46 -0800290Mutex DrmHal::mLock;
291
Robert Shih0f3a8a02019-11-14 15:43:39 -0800292struct DrmHal::DrmSessionClient : public aidl::android::media::BnResourceManagerClient {
Chong Zhang181e6952019-10-09 13:23:39 -0700293 explicit DrmSessionClient(DrmHal* drm, const Vector<uint8_t>& sessionId)
294 : mSessionId(sessionId),
295 mDrm(drm) {}
296
Robert Shih0f3a8a02019-11-14 15:43:39 -0800297 ::ndk::ScopedAStatus reclaimResource(bool* _aidl_return) override;
298 ::ndk::ScopedAStatus getName(::std::string* _aidl_return) override;
Chong Zhang181e6952019-10-09 13:23:39 -0700299
300 const Vector<uint8_t> mSessionId;
301
Chong Zhang181e6952019-10-09 13:23:39 -0700302 virtual ~DrmSessionClient();
303
304private:
305 wp<DrmHal> mDrm;
306
307 DISALLOW_EVIL_CONSTRUCTORS(DrmSessionClient);
308};
309
Robert Shih0f3a8a02019-11-14 15:43:39 -0800310::ndk::ScopedAStatus DrmHal::DrmSessionClient::reclaimResource(bool* _aidl_return) {
311 auto sessionId = mSessionId;
Robert Shihc3af31b2019-09-20 21:45:01 -0700312 sp<DrmHal> drm = mDrm.promote();
313 if (drm == NULL) {
Chong Zhang181e6952019-10-09 13:23:39 -0700314 *_aidl_return = true;
Robert Shih0f3a8a02019-11-14 15:43:39 -0800315 return ::ndk::ScopedAStatus::ok();
Jeff Tinkera53d6552017-01-20 00:31:46 -0800316 }
Robert Shih0f3a8a02019-11-14 15:43:39 -0800317 status_t err = drm->closeSession(sessionId);
Robert Shihc3af31b2019-09-20 21:45:01 -0700318 if (err != OK) {
Chong Zhang181e6952019-10-09 13:23:39 -0700319 *_aidl_return = false;
Robert Shih0f3a8a02019-11-14 15:43:39 -0800320 return ::ndk::ScopedAStatus::ok();
Robert Shihc3af31b2019-09-20 21:45:01 -0700321 }
322 drm->sendEvent(EventType::SESSION_RECLAIMED,
Robert Shih0f3a8a02019-11-14 15:43:39 -0800323 toHidlVec(sessionId), hidl_vec<uint8_t>());
Chong Zhang181e6952019-10-09 13:23:39 -0700324 *_aidl_return = true;
Robert Shih0f3a8a02019-11-14 15:43:39 -0800325 return ::ndk::ScopedAStatus::ok();
Robert Shihc3af31b2019-09-20 21:45:01 -0700326}
Jeff Tinkera53d6552017-01-20 00:31:46 -0800327
Robert Shih0f3a8a02019-11-14 15:43:39 -0800328::ndk::ScopedAStatus DrmHal::DrmSessionClient::getName(::std::string* _aidl_return) {
Robert Shihc3af31b2019-09-20 21:45:01 -0700329 String8 name;
330 sp<DrmHal> drm = mDrm.promote();
331 if (drm == NULL) {
332 name.append("<deleted>");
333 } else if (drm->getPropertyStringInternal(String8("vendor"), name) != OK
334 || name.isEmpty()) {
335 name.append("<Get vendor failed or is empty>");
336 }
337 name.append("[");
338 for (size_t i = 0; i < mSessionId.size(); ++i) {
339 name.appendFormat("%02x", mSessionId[i]);
340 }
341 name.append("]");
Chong Zhang181e6952019-10-09 13:23:39 -0700342 *_aidl_return = name;
Robert Shih0f3a8a02019-11-14 15:43:39 -0800343 return ::ndk::ScopedAStatus::ok();
Robert Shihc3af31b2019-09-20 21:45:01 -0700344}
Jeff Tinkera53d6552017-01-20 00:31:46 -0800345
Robert Shihc3af31b2019-09-20 21:45:01 -0700346DrmHal::DrmSessionClient::~DrmSessionClient() {
347 DrmSessionManager::Instance()->removeSession(mSessionId);
348}
Jeff Tinkera53d6552017-01-20 00:31:46 -0800349
350DrmHal::DrmHal()
Robert Shihc3af31b2019-09-20 21:45:01 -0700351 : mFactories(makeDrmFactories()),
Jeff Tinkerabeb36a2017-02-17 09:42:46 -0800352 mInitCheck((mFactories.size() == 0) ? ERROR_UNSUPPORTED : NO_INIT) {
Jeff Tinkera53d6552017-01-20 00:31:46 -0800353}
354
Jeff Tinker61332812017-05-15 16:53:10 -0700355void DrmHal::closeOpenSessions() {
Jeff Tinker7dfe28f2018-02-15 12:17:40 -0800356 Mutex::Autolock autoLock(mLock);
357 auto openSessions = mOpenSessions;
358 for (size_t i = 0; i < openSessions.size(); i++) {
359 mLock.unlock();
Robert Shihc3af31b2019-09-20 21:45:01 -0700360 closeSession(openSessions[i]->mSessionId);
Jeff Tinker7dfe28f2018-02-15 12:17:40 -0800361 mLock.lock();
Jeff Tinker61332812017-05-15 16:53:10 -0700362 }
363 mOpenSessions.clear();
364}
365
Jeff Tinkera53d6552017-01-20 00:31:46 -0800366DrmHal::~DrmHal() {
Jeff Tinkera53d6552017-01-20 00:31:46 -0800367}
368
Jeff Tinker7dfe28f2018-02-15 12:17:40 -0800369void DrmHal::cleanup() {
370 closeOpenSessions();
371
372 Mutex::Autolock autoLock(mLock);
373 reportPluginMetrics();
374 reportFrameworkMetrics();
375
376 setListener(NULL);
377 mInitCheck = NO_INIT;
Jeff Tinkerb8684f32018-12-12 08:41:31 -0800378 if (mPluginV1_2 != NULL) {
379 if (!mPluginV1_2->setListener(NULL).isOk()) {
380 mInitCheck = DEAD_OBJECT;
381 }
382 } else if (mPlugin != NULL) {
Jeff Tinker7dfe28f2018-02-15 12:17:40 -0800383 if (!mPlugin->setListener(NULL).isOk()) {
384 mInitCheck = DEAD_OBJECT;
385 }
386 }
387 mPlugin.clear();
388 mPluginV1_1.clear();
Jeff Tinkerc8baaba2018-10-23 11:32:36 -0700389 mPluginV1_2.clear();
Jeff Tinker7dfe28f2018-02-15 12:17:40 -0800390}
391
Robert Shihc0d1d0e2019-11-24 13:21:04 -0800392std::vector<sp<IDrmFactory>> DrmHal::makeDrmFactories() {
393 std::vector<sp<IDrmFactory>> factories(DrmUtils::MakeDrmFactories());
Jeff Tinkerabeb36a2017-02-17 09:42:46 -0800394 if (factories.size() == 0) {
395 // must be in passthrough mode, load the default passthrough service
Jeff Tinkere309b222017-04-05 08:01:28 -0700396 auto passthrough = IDrmFactory::getService();
Jeff Tinkerabeb36a2017-02-17 09:42:46 -0800397 if (passthrough != NULL) {
Jeff Tinkere307dc42018-02-11 19:53:54 +0000398 ALOGI("makeDrmFactories: using default passthrough drm instance");
Jeff Tinkerabeb36a2017-02-17 09:42:46 -0800399 factories.push_back(passthrough);
400 } else {
401 ALOGE("Failed to find any drm factories");
402 }
403 }
404 return factories;
Jeff Tinkera53d6552017-01-20 00:31:46 -0800405}
406
Jeff Tinkerabeb36a2017-02-17 09:42:46 -0800407sp<IDrmPlugin> DrmHal::makeDrmPlugin(const sp<IDrmFactory>& factory,
408 const uint8_t uuid[16], const String8& appPackageName) {
Adam Stone32494f52018-02-26 22:53:27 -0800409 mAppPackageName = appPackageName;
Adam Stonefb679e32018-02-07 10:25:48 -0800410 mMetrics.SetAppPackageName(appPackageName);
Robert Shih6152d7c2019-11-19 22:54:27 -0800411 mMetrics.SetAppUid(AIBinder_getCallingUid());
Jeff Tinkera53d6552017-01-20 00:31:46 -0800412
413 sp<IDrmPlugin> plugin;
Jeff Tinkerabeb36a2017-02-17 09:42:46 -0800414 Return<void> hResult = factory->createPlugin(uuid, appPackageName.string(),
Jeff Tinkera53d6552017-01-20 00:31:46 -0800415 [&](Status status, const sp<IDrmPlugin>& hPlugin) {
Jeff Tinkerabeb36a2017-02-17 09:42:46 -0800416 if (status != Status::OK) {
417 ALOGE("Failed to make drm plugin");
418 return;
419 }
420 plugin = hPlugin;
421 }
422 );
Jeff Tinkerf0e89b02017-08-07 15:58:41 -0700423
424 if (!hResult.isOk()) {
425 ALOGE("createPlugin remote call failed");
426 }
427
Jeff Tinkera53d6552017-01-20 00:31:46 -0800428 return plugin;
429}
430
431status_t DrmHal::initCheck() const {
432 return mInitCheck;
433}
434
435status_t DrmHal::setListener(const sp<IDrmClient>& listener)
436{
437 Mutex::Autolock lock(mEventLock);
Jeff Tinkera53d6552017-01-20 00:31:46 -0800438 mListener = listener;
439 return NO_ERROR;
440}
441
442Return<void> DrmHal::sendEvent(EventType hEventType,
443 const hidl_vec<uint8_t>& sessionId, const hidl_vec<uint8_t>& data) {
Adam Stonecea91ce2018-01-22 19:23:28 -0800444 mMetrics.mEventCounter.Increment(hEventType);
Jeff Tinkera53d6552017-01-20 00:31:46 -0800445
446 mEventLock.lock();
447 sp<IDrmClient> listener = mListener;
448 mEventLock.unlock();
449
450 if (listener != NULL) {
Jeff Tinkera53d6552017-01-20 00:31:46 -0800451 Mutex::Autolock lock(mNotifyLock);
452 DrmPlugin::EventType eventType;
453 switch(hEventType) {
454 case EventType::PROVISION_REQUIRED:
455 eventType = DrmPlugin::kDrmPluginEventProvisionRequired;
456 break;
457 case EventType::KEY_NEEDED:
458 eventType = DrmPlugin::kDrmPluginEventKeyNeeded;
459 break;
460 case EventType::KEY_EXPIRED:
461 eventType = DrmPlugin::kDrmPluginEventKeyExpired;
462 break;
463 case EventType::VENDOR_DEFINED:
464 eventType = DrmPlugin::kDrmPluginEventVendorDefined;
465 break;
Rahul Friasb86f4b32017-03-27 15:13:30 -0700466 case EventType::SESSION_RECLAIMED:
467 eventType = DrmPlugin::kDrmPluginEventSessionReclaimed;
468 break;
Jeff Tinkera53d6552017-01-20 00:31:46 -0800469 default:
470 return Void();
471 }
Robert Shih61e1c762019-10-31 21:26:58 -0700472 listener->sendEvent(eventType, sessionId, data);
Jeff Tinkera53d6552017-01-20 00:31:46 -0800473 }
474 return Void();
475}
476
477Return<void> DrmHal::sendExpirationUpdate(const hidl_vec<uint8_t>& sessionId,
478 int64_t expiryTimeInMS) {
479
480 mEventLock.lock();
481 sp<IDrmClient> listener = mListener;
482 mEventLock.unlock();
483
484 if (listener != NULL) {
Jeff Tinkera53d6552017-01-20 00:31:46 -0800485 Mutex::Autolock lock(mNotifyLock);
Robert Shih61e1c762019-10-31 21:26:58 -0700486 listener->sendExpirationUpdate(sessionId, expiryTimeInMS);
Jeff Tinkera53d6552017-01-20 00:31:46 -0800487 }
488 return Void();
489}
490
491Return<void> DrmHal::sendKeysChange(const hidl_vec<uint8_t>& sessionId,
Robert Shiha5033262019-05-06 14:15:12 -0700492 const hidl_vec<KeyStatus_V1_0>& keyStatusList_V1_0, bool hasNewUsableKey) {
493 std::vector<KeyStatus> keyStatusVec;
494 for (const auto &keyStatus_V1_0 : keyStatusList_V1_0) {
495 keyStatusVec.push_back({keyStatus_V1_0.keyId,
496 static_cast<KeyStatusType>(keyStatus_V1_0.type)});
497 }
498 hidl_vec<KeyStatus> keyStatusList_V1_2(keyStatusVec);
499 return sendKeysChange_1_2(sessionId, keyStatusList_V1_2, hasNewUsableKey);
500}
501
502Return<void> DrmHal::sendKeysChange_1_2(const hidl_vec<uint8_t>& sessionId,
Robert Shih61e1c762019-10-31 21:26:58 -0700503 const hidl_vec<KeyStatus>& hKeyStatusList, bool hasNewUsableKey) {
Jeff Tinkera53d6552017-01-20 00:31:46 -0800504
505 mEventLock.lock();
506 sp<IDrmClient> listener = mListener;
507 mEventLock.unlock();
508
509 if (listener != NULL) {
Robert Shih61e1c762019-10-31 21:26:58 -0700510 std::vector<DrmKeyStatus> keyStatusList;
511 size_t nKeys = hKeyStatusList.size();
Jeff Tinkera53d6552017-01-20 00:31:46 -0800512 for (size_t i = 0; i < nKeys; ++i) {
Robert Shih61e1c762019-10-31 21:26:58 -0700513 const KeyStatus &keyStatus = hKeyStatusList[i];
Jeff Tinkera53d6552017-01-20 00:31:46 -0800514 uint32_t type;
515 switch(keyStatus.type) {
516 case KeyStatusType::USABLE:
517 type = DrmPlugin::kKeyStatusType_Usable;
518 break;
519 case KeyStatusType::EXPIRED:
520 type = DrmPlugin::kKeyStatusType_Expired;
521 break;
522 case KeyStatusType::OUTPUTNOTALLOWED:
523 type = DrmPlugin::kKeyStatusType_OutputNotAllowed;
524 break;
525 case KeyStatusType::STATUSPENDING:
526 type = DrmPlugin::kKeyStatusType_StatusPending;
527 break;
Robert Shiha5033262019-05-06 14:15:12 -0700528 case KeyStatusType::USABLEINFUTURE:
529 type = DrmPlugin::kKeyStatusType_UsableInFuture;
530 break;
Jeff Tinkera53d6552017-01-20 00:31:46 -0800531 case KeyStatusType::INTERNALERROR:
532 default:
533 type = DrmPlugin::kKeyStatusType_InternalError;
534 break;
535 }
Robert Shih61e1c762019-10-31 21:26:58 -0700536 keyStatusList.push_back({type, keyStatus.keyId});
Adam Stonecea91ce2018-01-22 19:23:28 -0800537 mMetrics.mKeyStatusChangeCounter.Increment(keyStatus.type);
Jeff Tinkera53d6552017-01-20 00:31:46 -0800538 }
Jeff Tinkera53d6552017-01-20 00:31:46 -0800539
540 Mutex::Autolock lock(mNotifyLock);
Robert Shih61e1c762019-10-31 21:26:58 -0700541 listener->sendKeysChange(sessionId, keyStatusList, hasNewUsableKey);
Adam Stonecea91ce2018-01-22 19:23:28 -0800542 } else {
543 // There's no listener. But we still want to count the key change
544 // events.
Robert Shih61e1c762019-10-31 21:26:58 -0700545 size_t nKeys = hKeyStatusList.size();
Adam Stonecea91ce2018-01-22 19:23:28 -0800546 for (size_t i = 0; i < nKeys; i++) {
Robert Shih61e1c762019-10-31 21:26:58 -0700547 mMetrics.mKeyStatusChangeCounter.Increment(hKeyStatusList[i].type);
Adam Stonecea91ce2018-01-22 19:23:28 -0800548 }
Jeff Tinkera53d6552017-01-20 00:31:46 -0800549 }
Adam Stonecea91ce2018-01-22 19:23:28 -0800550
Jeff Tinkera53d6552017-01-20 00:31:46 -0800551 return Void();
552}
553
Jeff Tinkerb8684f32018-12-12 08:41:31 -0800554Return<void> DrmHal::sendSessionLostState(
555 const hidl_vec<uint8_t>& sessionId) {
556
557 mEventLock.lock();
558 sp<IDrmClient> listener = mListener;
559 mEventLock.unlock();
560
561 if (listener != NULL) {
Jeff Tinkerb8684f32018-12-12 08:41:31 -0800562 Mutex::Autolock lock(mNotifyLock);
Robert Shih61e1c762019-10-31 21:26:58 -0700563 listener->sendSessionLostState(sessionId);
Jeff Tinkerb8684f32018-12-12 08:41:31 -0800564 }
565 return Void();
566}
567
Jeff Tinkerdb3fa5f2019-01-25 22:56:56 -0800568status_t DrmHal::matchMimeTypeAndSecurityLevel(const sp<IDrmFactory> &factory,
569 const uint8_t uuid[16],
570 const String8 &mimeType,
571 DrmPlugin::SecurityLevel level,
572 bool *isSupported) {
573 *isSupported = false;
574
575 // handle default value cases
576 if (level == DrmPlugin::kSecurityLevelUnknown) {
577 if (mimeType == "") {
578 // isCryptoSchemeSupported(uuid)
579 *isSupported = true;
580 } else {
581 // isCryptoSchemeSupported(uuid, mimeType)
582 *isSupported = factory->isContentTypeSupported(mimeType.string());
583 }
584 return OK;
585 } else if (mimeType == "") {
586 return BAD_VALUE;
Jeff Tinker99dbfa82019-01-17 17:27:06 -0800587 }
588
Jeff Tinkerdb3fa5f2019-01-25 22:56:56 -0800589 sp<drm::V1_2::IDrmFactory> factoryV1_2 = drm::V1_2::IDrmFactory::castFrom(factory);
590 if (factoryV1_2 == NULL) {
591 return ERROR_UNSUPPORTED;
Jeff Tinker99dbfa82019-01-17 17:27:06 -0800592 } else {
Jeff Tinkerdb3fa5f2019-01-25 22:56:56 -0800593 *isSupported = factoryV1_2->isCryptoSchemeSupported_1_2(uuid,
594 mimeType.string(), toHidlSecurityLevel(level));
595 return OK;
Jeff Tinker99dbfa82019-01-17 17:27:06 -0800596 }
Jeff Tinker99dbfa82019-01-17 17:27:06 -0800597}
598
Jeff Tinkerdb3fa5f2019-01-25 22:56:56 -0800599status_t DrmHal::isCryptoSchemeSupported(const uint8_t uuid[16],
600 const String8 &mimeType,
601 DrmPlugin::SecurityLevel level,
602 bool *isSupported) {
Jeff Tinkera53d6552017-01-20 00:31:46 -0800603 Mutex::Autolock autoLock(mLock);
Jeff Tinkerdb3fa5f2019-01-25 22:56:56 -0800604 *isSupported = false;
605 for (ssize_t i = mFactories.size() - 1; i >= 0; i--) {
606 if (mFactories[i]->isCryptoSchemeSupported(uuid)) {
607 return matchMimeTypeAndSecurityLevel(mFactories[i],
608 uuid, mimeType, level, isSupported);
Jeff Tinkera53d6552017-01-20 00:31:46 -0800609 }
610 }
Jeff Tinkerdb3fa5f2019-01-25 22:56:56 -0800611 return OK;
Jeff Tinkera53d6552017-01-20 00:31:46 -0800612}
613
Edwin Wong68b3d9f2017-01-06 19:07:54 -0800614status_t DrmHal::createPlugin(const uint8_t uuid[16],
615 const String8& appPackageName) {
Jeff Tinkera53d6552017-01-20 00:31:46 -0800616 Mutex::Autolock autoLock(mLock);
617
Jeff Tinkerdb3fa5f2019-01-25 22:56:56 -0800618 for (ssize_t i = mFactories.size() - 1; i >= 0; i--) {
Jeff Tinkerabeb36a2017-02-17 09:42:46 -0800619 if (mFactories[i]->isCryptoSchemeSupported(uuid)) {
Peter Kalauskas7676a402018-12-27 11:04:16 -0800620 auto plugin = makeDrmPlugin(mFactories[i], uuid, appPackageName);
621 if (plugin != NULL) {
622 mPlugin = plugin;
Edwin Wong5641aa22018-01-30 17:52:21 -0800623 mPluginV1_1 = drm::V1_1::IDrmPlugin::castFrom(mPlugin);
Jeff Tinkerc8baaba2018-10-23 11:32:36 -0700624 mPluginV1_2 = drm::V1_2::IDrmPlugin::castFrom(mPlugin);
Peter Kalauskas7676a402018-12-27 11:04:16 -0800625 break;
Edwin Wong5641aa22018-01-30 17:52:21 -0800626 }
Jeff Tinkerabeb36a2017-02-17 09:42:46 -0800627 }
628 }
Jeff Tinkera53d6552017-01-20 00:31:46 -0800629
630 if (mPlugin == NULL) {
631 mInitCheck = ERROR_UNSUPPORTED;
632 } else {
Jeff Tinkerb8684f32018-12-12 08:41:31 -0800633 mInitCheck = OK;
634 if (mPluginV1_2 != NULL) {
635 if (!mPluginV1_2->setListener(this).isOk()) {
636 mInitCheck = DEAD_OBJECT;
637 }
638 } else if (!mPlugin->setListener(this).isOk()) {
Jeff Tinker319d5f42017-07-26 15:44:33 -0700639 mInitCheck = DEAD_OBJECT;
Jeff Tinkerb8684f32018-12-12 08:41:31 -0800640 }
641 if (mInitCheck != OK) {
642 mPlugin.clear();
643 mPluginV1_1.clear();
644 mPluginV1_2.clear();
Jeff Tinker319d5f42017-07-26 15:44:33 -0700645 }
Jeff Tinkera53d6552017-01-20 00:31:46 -0800646 }
647
Jeff Tinkerb8684f32018-12-12 08:41:31 -0800648
Jeff Tinkera53d6552017-01-20 00:31:46 -0800649 return mInitCheck;
650}
651
652status_t DrmHal::destroyPlugin() {
Jeff Tinker7dfe28f2018-02-15 12:17:40 -0800653 cleanup();
Jeff Tinkera53d6552017-01-20 00:31:46 -0800654 return OK;
655}
656
Jeff Tinker41d279a2018-02-11 19:52:08 +0000657status_t DrmHal::openSession(DrmPlugin::SecurityLevel level,
658 Vector<uint8_t> &sessionId) {
Jeff Tinkera53d6552017-01-20 00:31:46 -0800659 Mutex::Autolock autoLock(mLock);
Jeff Tinker6d998b62017-12-18 14:37:43 -0800660 INIT_CHECK();
Jeff Tinkera53d6552017-01-20 00:31:46 -0800661
Jeff Tinker99dbfa82019-01-17 17:27:06 -0800662 SecurityLevel hSecurityLevel = toHidlSecurityLevel(level);
Jeff Tinker41d279a2018-02-11 19:52:08 +0000663 bool setSecurityLevel = true;
Tobias Thierer5f5e43f2018-02-11 15:00:57 +0000664
Jeff Tinker99dbfa82019-01-17 17:27:06 -0800665 if (level == DrmPlugin::kSecurityLevelMax) {
Jeff Tinker41d279a2018-02-11 19:52:08 +0000666 setSecurityLevel = false;
Jeff Tinker99dbfa82019-01-17 17:27:06 -0800667 } else {
668 if (hSecurityLevel == SecurityLevel::UNKNOWN) {
669 return ERROR_DRM_CANNOT_HANDLE;
670 }
Jeff Tinker41d279a2018-02-11 19:52:08 +0000671 }
672
673 status_t err = UNKNOWN_ERROR;
Jeff Tinkera53d6552017-01-20 00:31:46 -0800674 bool retry = true;
675 do {
676 hidl_vec<uint8_t> hSessionId;
677
Jeff Tinker41d279a2018-02-11 19:52:08 +0000678 Return<void> hResult;
679 if (mPluginV1_1 == NULL || !setSecurityLevel) {
680 hResult = mPlugin->openSession(
681 [&](Status status,const hidl_vec<uint8_t>& id) {
682 if (status == Status::OK) {
683 sessionId = toVector(id);
684 }
685 err = toStatusT(status);
Jeff Tinkera53d6552017-01-20 00:31:46 -0800686 }
Jeff Tinker41d279a2018-02-11 19:52:08 +0000687 );
688 } else {
689 hResult = mPluginV1_1->openSession_1_1(hSecurityLevel,
690 [&](Status status, const hidl_vec<uint8_t>& id) {
691 if (status == Status::OK) {
692 sessionId = toVector(id);
693 }
694 err = toStatusT(status);
695 }
696 );
697 }
Jeff Tinkera53d6552017-01-20 00:31:46 -0800698
699 if (!hResult.isOk()) {
700 err = DEAD_OBJECT;
701 }
702
703 if (err == ERROR_DRM_RESOURCE_BUSY && retry) {
704 mLock.unlock();
705 // reclaimSession may call back to closeSession, since mLock is
706 // shared between Drm instances, we should unlock here to avoid
707 // deadlock.
Robert Shih6152d7c2019-11-19 22:54:27 -0800708 retry = DrmSessionManager::Instance()->reclaimSession(AIBinder_getCallingPid());
Jeff Tinkera53d6552017-01-20 00:31:46 -0800709 mLock.lock();
710 } else {
711 retry = false;
712 }
713 } while (retry);
714
715 if (err == OK) {
Steven Morelande0496a22020-02-13 13:13:52 -0800716 std::shared_ptr<DrmSessionClient> client =
717 ndk::SharedRefBase::make<DrmSessionClient>(this, sessionId);
Robert Shih6152d7c2019-11-19 22:54:27 -0800718 DrmSessionManager::Instance()->addSession(AIBinder_getCallingPid(),
Robert Shih0f3a8a02019-11-14 15:43:39 -0800719 std::static_pointer_cast<IResourceManagerClient>(client), sessionId);
720 mOpenSessions.push_back(client);
Adam Stone568b3c42018-01-31 12:57:16 -0800721 mMetrics.SetSessionStart(sessionId);
Jeff Tinkera53d6552017-01-20 00:31:46 -0800722 }
Adam Stoneaaf87dd2018-01-08 11:55:06 -0800723
Adam Stonef0e618d2018-01-17 19:20:41 -0800724 mMetrics.mOpenSessionCounter.Increment(err);
Jeff Tinkera53d6552017-01-20 00:31:46 -0800725 return err;
726}
727
728status_t DrmHal::closeSession(Vector<uint8_t> const &sessionId) {
729 Mutex::Autolock autoLock(mLock);
Jeff Tinker6d998b62017-12-18 14:37:43 -0800730 INIT_CHECK();
Jeff Tinkera53d6552017-01-20 00:31:46 -0800731
Jeff Tinker319d5f42017-07-26 15:44:33 -0700732 Return<Status> status = mPlugin->closeSession(toHidlVec(sessionId));
733 if (status.isOk()) {
734 if (status == Status::OK) {
735 DrmSessionManager::Instance()->removeSession(sessionId);
Robert Shih0f3a8a02019-11-14 15:43:39 -0800736 for (auto i = mOpenSessions.begin(); i != mOpenSessions.end(); i++) {
737 if (isEqualSessionId((*i)->mSessionId, sessionId)) {
738 mOpenSessions.erase(i);
Jeff Tinker319d5f42017-07-26 15:44:33 -0700739 break;
740 }
Jeff Tinker61332812017-05-15 16:53:10 -0700741 }
742 }
Adam Stonecea91ce2018-01-22 19:23:28 -0800743 status_t response = toStatusT(status);
Adam Stone568b3c42018-01-31 12:57:16 -0800744 mMetrics.SetSessionEnd(sessionId);
Adam Stonecea91ce2018-01-22 19:23:28 -0800745 mMetrics.mCloseSessionCounter.Increment(response);
746 return response;
Jeff Tinkera53d6552017-01-20 00:31:46 -0800747 }
Adam Stonecea91ce2018-01-22 19:23:28 -0800748 mMetrics.mCloseSessionCounter.Increment(DEAD_OBJECT);
Jeff Tinker319d5f42017-07-26 15:44:33 -0700749 return DEAD_OBJECT;
Jeff Tinkera53d6552017-01-20 00:31:46 -0800750}
751
Jeff Tinkerb8684f32018-12-12 08:41:31 -0800752static DrmPlugin::KeyRequestType toKeyRequestType(
753 KeyRequestType keyRequestType) {
754 switch (keyRequestType) {
755 case KeyRequestType::INITIAL:
756 return DrmPlugin::kKeyRequestType_Initial;
757 break;
758 case KeyRequestType::RENEWAL:
759 return DrmPlugin::kKeyRequestType_Renewal;
760 break;
761 case KeyRequestType::RELEASE:
762 return DrmPlugin::kKeyRequestType_Release;
763 break;
764 default:
765 return DrmPlugin::kKeyRequestType_Unknown;
766 break;
767 }
768}
769
770static DrmPlugin::KeyRequestType toKeyRequestType_1_1(
771 KeyRequestType_V1_1 keyRequestType) {
772 switch (keyRequestType) {
773 case KeyRequestType_V1_1::NONE:
774 return DrmPlugin::kKeyRequestType_None;
775 break;
776 case KeyRequestType_V1_1::UPDATE:
777 return DrmPlugin::kKeyRequestType_Update;
778 break;
779 default:
780 return toKeyRequestType(static_cast<KeyRequestType>(keyRequestType));
781 break;
782 }
783}
784
Jeff Tinkera53d6552017-01-20 00:31:46 -0800785status_t DrmHal::getKeyRequest(Vector<uint8_t> const &sessionId,
786 Vector<uint8_t> const &initData, String8 const &mimeType,
787 DrmPlugin::KeyType keyType, KeyedVector<String8,
788 String8> const &optionalParameters, Vector<uint8_t> &request,
789 String8 &defaultUrl, DrmPlugin::KeyRequestType *keyRequestType) {
790 Mutex::Autolock autoLock(mLock);
Jeff Tinker6d998b62017-12-18 14:37:43 -0800791 INIT_CHECK();
Adam Stonefb679e32018-02-07 10:25:48 -0800792 EventTimer<status_t> keyRequestTimer(&mMetrics.mGetKeyRequestTimeUs);
Jeff Tinkera53d6552017-01-20 00:31:46 -0800793
794 DrmSessionManager::Instance()->useSession(sessionId);
795
796 KeyType hKeyType;
797 if (keyType == DrmPlugin::kKeyType_Streaming) {
798 hKeyType = KeyType::STREAMING;
799 } else if (keyType == DrmPlugin::kKeyType_Offline) {
800 hKeyType = KeyType::OFFLINE;
801 } else if (keyType == DrmPlugin::kKeyType_Release) {
802 hKeyType = KeyType::RELEASE;
803 } else {
Adam Stonef0e618d2018-01-17 19:20:41 -0800804 keyRequestTimer.SetAttribute(BAD_VALUE);
Jeff Tinkera53d6552017-01-20 00:31:46 -0800805 return BAD_VALUE;
806 }
807
808 ::KeyedVector hOptionalParameters = toHidlKeyedVector(optionalParameters);
809
810 status_t err = UNKNOWN_ERROR;
Jeff Tinkerb8684f32018-12-12 08:41:31 -0800811 Return<void> hResult;
Jeff Tinkera53d6552017-01-20 00:31:46 -0800812
Jeff Tinkerb8684f32018-12-12 08:41:31 -0800813 if (mPluginV1_2 != NULL) {
814 hResult = mPluginV1_2->getKeyRequest_1_2(
815 toHidlVec(sessionId), toHidlVec(initData),
816 toHidlString(mimeType), hKeyType, hOptionalParameters,
817 [&](Status_V1_2 status, const hidl_vec<uint8_t>& hRequest,
818 KeyRequestType_V1_1 hKeyRequestType,
819 const hidl_string& hDefaultUrl) {
820 if (status == Status_V1_2::OK) {
821 request = toVector(hRequest);
822 defaultUrl = toString8(hDefaultUrl);
823 *keyRequestType = toKeyRequestType_1_1(hKeyRequestType);
824 }
825 err = toStatusT_1_2(status);
826 });
827 } else if (mPluginV1_1 != NULL) {
828 hResult = mPluginV1_1->getKeyRequest_1_1(
Rahul Frias59bc3fa2018-01-22 23:48:52 -0800829 toHidlVec(sessionId), toHidlVec(initData),
830 toHidlString(mimeType), hKeyType, hOptionalParameters,
831 [&](Status status, const hidl_vec<uint8_t>& hRequest,
Jeff Tinkerb8684f32018-12-12 08:41:31 -0800832 KeyRequestType_V1_1 hKeyRequestType,
833 const hidl_string& hDefaultUrl) {
834 if (status == Status::OK) {
835 request = toVector(hRequest);
836 defaultUrl = toString8(hDefaultUrl);
837 *keyRequestType = toKeyRequestType_1_1(hKeyRequestType);
Jeff Tinkera53d6552017-01-20 00:31:46 -0800838 }
839 err = toStatusT(status);
Jeff Tinkerb8684f32018-12-12 08:41:31 -0800840 });
841 } else {
842 hResult = mPlugin->getKeyRequest(
843 toHidlVec(sessionId), toHidlVec(initData),
844 toHidlString(mimeType), hKeyType, hOptionalParameters,
845 [&](Status status, const hidl_vec<uint8_t>& hRequest,
846 KeyRequestType hKeyRequestType,
847 const hidl_string& hDefaultUrl) {
848 if (status == Status::OK) {
849 request = toVector(hRequest);
850 defaultUrl = toString8(hDefaultUrl);
851 *keyRequestType = toKeyRequestType(hKeyRequestType);
852 }
853 err = toStatusT(status);
854 });
855 }
Jeff Tinkera53d6552017-01-20 00:31:46 -0800856
Adam Stonef0e618d2018-01-17 19:20:41 -0800857 err = hResult.isOk() ? err : DEAD_OBJECT;
858 keyRequestTimer.SetAttribute(err);
859 return err;
Jeff Tinkera53d6552017-01-20 00:31:46 -0800860}
861
862status_t DrmHal::provideKeyResponse(Vector<uint8_t> const &sessionId,
863 Vector<uint8_t> const &response, Vector<uint8_t> &keySetId) {
864 Mutex::Autolock autoLock(mLock);
Jeff Tinker6d998b62017-12-18 14:37:43 -0800865 INIT_CHECK();
George Burgess IVc42403d2019-10-18 09:54:32 -0700866 EventTimer<status_t> keyResponseTimer(&mMetrics.mProvideKeyResponseTimeUs);
Jeff Tinkera53d6552017-01-20 00:31:46 -0800867
868 DrmSessionManager::Instance()->useSession(sessionId);
869
870 status_t err = UNKNOWN_ERROR;
871
872 Return<void> hResult = mPlugin->provideKeyResponse(toHidlVec(sessionId),
873 toHidlVec(response),
874 [&](Status status, const hidl_vec<uint8_t>& hKeySetId) {
875 if (status == Status::OK) {
876 keySetId = toVector(hKeySetId);
877 }
878 err = toStatusT(status);
879 }
880 );
Adam Stonecea91ce2018-01-22 19:23:28 -0800881 err = hResult.isOk() ? err : DEAD_OBJECT;
882 keyResponseTimer.SetAttribute(err);
883 return err;
Jeff Tinkera53d6552017-01-20 00:31:46 -0800884}
885
886status_t DrmHal::removeKeys(Vector<uint8_t> const &keySetId) {
887 Mutex::Autolock autoLock(mLock);
Jeff Tinker6d998b62017-12-18 14:37:43 -0800888 INIT_CHECK();
Jeff Tinkera53d6552017-01-20 00:31:46 -0800889
Jeff Tinker58ad4752018-02-16 16:51:59 -0800890 Return<Status> status = mPlugin->removeKeys(toHidlVec(keySetId));
891 return status.isOk() ? toStatusT(status) : DEAD_OBJECT;
Jeff Tinkera53d6552017-01-20 00:31:46 -0800892}
893
894status_t DrmHal::restoreKeys(Vector<uint8_t> const &sessionId,
895 Vector<uint8_t> const &keySetId) {
896 Mutex::Autolock autoLock(mLock);
Jeff Tinker6d998b62017-12-18 14:37:43 -0800897 INIT_CHECK();
Jeff Tinkera53d6552017-01-20 00:31:46 -0800898
899 DrmSessionManager::Instance()->useSession(sessionId);
900
Jeff Tinker58ad4752018-02-16 16:51:59 -0800901 Return<Status> status = mPlugin->restoreKeys(toHidlVec(sessionId),
902 toHidlVec(keySetId));
903 return status.isOk() ? toStatusT(status) : DEAD_OBJECT;
Jeff Tinkera53d6552017-01-20 00:31:46 -0800904}
905
906status_t DrmHal::queryKeyStatus(Vector<uint8_t> const &sessionId,
907 KeyedVector<String8, String8> &infoMap) const {
908 Mutex::Autolock autoLock(mLock);
Jeff Tinker6d998b62017-12-18 14:37:43 -0800909 INIT_CHECK();
Jeff Tinkera53d6552017-01-20 00:31:46 -0800910
911 DrmSessionManager::Instance()->useSession(sessionId);
912
913 ::KeyedVector hInfoMap;
914
915 status_t err = UNKNOWN_ERROR;
916
917 Return<void> hResult = mPlugin->queryKeyStatus(toHidlVec(sessionId),
918 [&](Status status, const hidl_vec<KeyValue>& map) {
919 if (status == Status::OK) {
920 infoMap = toKeyedVector(map);
921 }
922 err = toStatusT(status);
923 }
924 );
925
926 return hResult.isOk() ? err : DEAD_OBJECT;
927}
928
929status_t DrmHal::getProvisionRequest(String8 const &certType,
930 String8 const &certAuthority, Vector<uint8_t> &request,
931 String8 &defaultUrl) {
932 Mutex::Autolock autoLock(mLock);
Jeff Tinker6d998b62017-12-18 14:37:43 -0800933 INIT_CHECK();
Jeff Tinkera53d6552017-01-20 00:31:46 -0800934
935 status_t err = UNKNOWN_ERROR;
Jeff Tinkerb8684f32018-12-12 08:41:31 -0800936 Return<void> hResult;
Jeff Tinkera53d6552017-01-20 00:31:46 -0800937
Jeff Tinkerb8684f32018-12-12 08:41:31 -0800938 if (mPluginV1_2 != NULL) {
939 Return<void> hResult = mPluginV1_2->getProvisionRequest_1_2(
940 toHidlString(certType), toHidlString(certAuthority),
941 [&](Status_V1_2 status, const hidl_vec<uint8_t>& hRequest,
942 const hidl_string& hDefaultUrl) {
943 if (status == Status_V1_2::OK) {
944 request = toVector(hRequest);
945 defaultUrl = toString8(hDefaultUrl);
946 }
947 err = toStatusT_1_2(status);
Jeff Tinkera53d6552017-01-20 00:31:46 -0800948 }
Jeff Tinkerb8684f32018-12-12 08:41:31 -0800949 );
950 } else {
951 Return<void> hResult = mPlugin->getProvisionRequest(
952 toHidlString(certType), toHidlString(certAuthority),
953 [&](Status status, const hidl_vec<uint8_t>& hRequest,
954 const hidl_string& hDefaultUrl) {
955 if (status == Status::OK) {
956 request = toVector(hRequest);
957 defaultUrl = toString8(hDefaultUrl);
958 }
959 err = toStatusT(status);
960 }
961 );
962 }
Jeff Tinkera53d6552017-01-20 00:31:46 -0800963
Adam Stonecea91ce2018-01-22 19:23:28 -0800964 err = hResult.isOk() ? err : DEAD_OBJECT;
965 mMetrics.mGetProvisionRequestCounter.Increment(err);
966 return err;
Jeff Tinkera53d6552017-01-20 00:31:46 -0800967}
968
969status_t DrmHal::provideProvisionResponse(Vector<uint8_t> const &response,
Edwin Wong68b3d9f2017-01-06 19:07:54 -0800970 Vector<uint8_t> &certificate, Vector<uint8_t> &wrappedKey) {
Jeff Tinkera53d6552017-01-20 00:31:46 -0800971 Mutex::Autolock autoLock(mLock);
Jeff Tinker6d998b62017-12-18 14:37:43 -0800972 INIT_CHECK();
Jeff Tinkera53d6552017-01-20 00:31:46 -0800973
974 status_t err = UNKNOWN_ERROR;
975
976 Return<void> hResult = mPlugin->provideProvisionResponse(toHidlVec(response),
977 [&](Status status, const hidl_vec<uint8_t>& hCertificate,
978 const hidl_vec<uint8_t>& hWrappedKey) {
979 if (status == Status::OK) {
980 certificate = toVector(hCertificate);
981 wrappedKey = toVector(hWrappedKey);
982 }
983 err = toStatusT(status);
984 }
985 );
986
Adam Stonecea91ce2018-01-22 19:23:28 -0800987 err = hResult.isOk() ? err : DEAD_OBJECT;
988 mMetrics.mProvideProvisionResponseCounter.Increment(err);
989 return err;
Jeff Tinkera53d6552017-01-20 00:31:46 -0800990}
991
Jeff Tinkerabeb36a2017-02-17 09:42:46 -0800992status_t DrmHal::getSecureStops(List<Vector<uint8_t>> &secureStops) {
Jeff Tinkera53d6552017-01-20 00:31:46 -0800993 Mutex::Autolock autoLock(mLock);
Jeff Tinker6d998b62017-12-18 14:37:43 -0800994 INIT_CHECK();
Jeff Tinkera53d6552017-01-20 00:31:46 -0800995
996 status_t err = UNKNOWN_ERROR;
997
998 Return<void> hResult = mPlugin->getSecureStops(
999 [&](Status status, const hidl_vec<SecureStop>& hSecureStops) {
1000 if (status == Status::OK) {
1001 secureStops = toSecureStops(hSecureStops);
1002 }
1003 err = toStatusT(status);
1004 }
1005 );
1006
1007 return hResult.isOk() ? err : DEAD_OBJECT;
1008}
1009
1010
Jeff Tinker15177d72018-01-25 12:57:55 -08001011status_t DrmHal::getSecureStopIds(List<Vector<uint8_t>> &secureStopIds) {
1012 Mutex::Autolock autoLock(mLock);
1013
1014 if (mInitCheck != OK) {
1015 return mInitCheck;
1016 }
1017
1018 if (mPluginV1_1 == NULL) {
1019 return ERROR_DRM_CANNOT_HANDLE;
1020 }
1021
1022 status_t err = UNKNOWN_ERROR;
1023
1024 Return<void> hResult = mPluginV1_1->getSecureStopIds(
1025 [&](Status status, const hidl_vec<SecureStopId>& hSecureStopIds) {
1026 if (status == Status::OK) {
1027 secureStopIds = toSecureStopIds(hSecureStopIds);
1028 }
1029 err = toStatusT(status);
1030 }
1031 );
1032
1033 return hResult.isOk() ? err : DEAD_OBJECT;
1034}
1035
1036
Jeff Tinkera53d6552017-01-20 00:31:46 -08001037status_t DrmHal::getSecureStop(Vector<uint8_t> const &ssid, Vector<uint8_t> &secureStop) {
1038 Mutex::Autolock autoLock(mLock);
Jeff Tinker6d998b62017-12-18 14:37:43 -08001039 INIT_CHECK();
Jeff Tinkera53d6552017-01-20 00:31:46 -08001040
1041 status_t err = UNKNOWN_ERROR;
1042
1043 Return<void> hResult = mPlugin->getSecureStop(toHidlVec(ssid),
1044 [&](Status status, const SecureStop& hSecureStop) {
1045 if (status == Status::OK) {
1046 secureStop = toVector(hSecureStop.opaqueData);
1047 }
1048 err = toStatusT(status);
1049 }
1050 );
1051
1052 return hResult.isOk() ? err : DEAD_OBJECT;
1053}
1054
1055status_t DrmHal::releaseSecureStops(Vector<uint8_t> const &ssRelease) {
1056 Mutex::Autolock autoLock(mLock);
Jeff Tinker6d998b62017-12-18 14:37:43 -08001057 INIT_CHECK();
Jeff Tinkera53d6552017-01-20 00:31:46 -08001058
Jeff Tinker58ad4752018-02-16 16:51:59 -08001059 Return<Status> status(Status::ERROR_DRM_UNKNOWN);
Jeff Tinker15177d72018-01-25 12:57:55 -08001060 if (mPluginV1_1 != NULL) {
1061 SecureStopRelease secureStopRelease;
1062 secureStopRelease.opaqueData = toHidlVec(ssRelease);
Jeff Tinker58ad4752018-02-16 16:51:59 -08001063 status = mPluginV1_1->releaseSecureStops(secureStopRelease);
1064 } else {
1065 status = mPlugin->releaseSecureStop(toHidlVec(ssRelease));
Jeff Tinker15177d72018-01-25 12:57:55 -08001066 }
Jeff Tinker58ad4752018-02-16 16:51:59 -08001067 return status.isOk() ? toStatusT(status) : DEAD_OBJECT;
Jeff Tinkera53d6552017-01-20 00:31:46 -08001068}
1069
Jeff Tinker15177d72018-01-25 12:57:55 -08001070status_t DrmHal::removeSecureStop(Vector<uint8_t> const &ssid) {
1071 Mutex::Autolock autoLock(mLock);
1072
1073 if (mInitCheck != OK) {
1074 return mInitCheck;
1075 }
1076
1077 if (mPluginV1_1 == NULL) {
1078 return ERROR_DRM_CANNOT_HANDLE;
1079 }
1080
Jeff Tinker58ad4752018-02-16 16:51:59 -08001081 Return<Status> status = mPluginV1_1->removeSecureStop(toHidlVec(ssid));
1082 return status.isOk() ? toStatusT(status) : DEAD_OBJECT;
Jeff Tinker15177d72018-01-25 12:57:55 -08001083}
1084
1085status_t DrmHal::removeAllSecureStops() {
Jeff Tinkera53d6552017-01-20 00:31:46 -08001086 Mutex::Autolock autoLock(mLock);
Jeff Tinker6d998b62017-12-18 14:37:43 -08001087 INIT_CHECK();
Jeff Tinkera53d6552017-01-20 00:31:46 -08001088
Jeff Tinker58ad4752018-02-16 16:51:59 -08001089 Return<Status> status(Status::ERROR_DRM_UNKNOWN);
Jeff Tinker15177d72018-01-25 12:57:55 -08001090 if (mPluginV1_1 != NULL) {
Jeff Tinker58ad4752018-02-16 16:51:59 -08001091 status = mPluginV1_1->removeAllSecureStops();
1092 } else {
1093 status = mPlugin->releaseAllSecureStops();
Jeff Tinker15177d72018-01-25 12:57:55 -08001094 }
Jeff Tinker58ad4752018-02-16 16:51:59 -08001095 return status.isOk() ? toStatusT(status) : DEAD_OBJECT;
Jeff Tinkera53d6552017-01-20 00:31:46 -08001096}
1097
Jeff Tinker6d998b62017-12-18 14:37:43 -08001098status_t DrmHal::getHdcpLevels(DrmPlugin::HdcpLevel *connected,
1099 DrmPlugin::HdcpLevel *max) const {
1100 Mutex::Autolock autoLock(mLock);
1101 INIT_CHECK();
1102
1103 if (connected == NULL || max == NULL) {
1104 return BAD_VALUE;
1105 }
1106 status_t err = UNKNOWN_ERROR;
1107
Jeff Tinker6d998b62017-12-18 14:37:43 -08001108 *connected = DrmPlugin::kHdcpLevelUnknown;
1109 *max = DrmPlugin::kHdcpLevelUnknown;
1110
Jeff Tinker44c2cc42019-01-14 10:24:18 -08001111 Return<void> hResult;
1112 if (mPluginV1_2 != NULL) {
1113 hResult = mPluginV1_2->getHdcpLevels_1_2(
1114 [&](Status_V1_2 status, const HdcpLevel_V1_2& hConnected, const HdcpLevel_V1_2& hMax) {
1115 if (status == Status_V1_2::OK) {
1116 *connected = toHdcpLevel(hConnected);
1117 *max = toHdcpLevel(hMax);
1118 }
1119 err = toStatusT_1_2(status);
1120 });
1121 } else if (mPluginV1_1 != NULL) {
1122 hResult = mPluginV1_1->getHdcpLevels(
1123 [&](Status status, const HdcpLevel& hConnected, const HdcpLevel& hMax) {
1124 if (status == Status::OK) {
1125 *connected = toHdcpLevel(static_cast<HdcpLevel_V1_2>(hConnected));
1126 *max = toHdcpLevel(static_cast<HdcpLevel_V1_2>(hMax));
1127 }
1128 err = toStatusT(status);
1129 });
1130 } else {
1131 return ERROR_DRM_CANNOT_HANDLE;
1132 }
Jeff Tinker6d998b62017-12-18 14:37:43 -08001133
1134 return hResult.isOk() ? err : DEAD_OBJECT;
1135}
1136
1137status_t DrmHal::getNumberOfSessions(uint32_t *open, uint32_t *max) const {
1138 Mutex::Autolock autoLock(mLock);
1139 INIT_CHECK();
1140
1141 if (open == NULL || max == NULL) {
1142 return BAD_VALUE;
1143 }
1144 status_t err = UNKNOWN_ERROR;
1145
1146 *open = 0;
1147 *max = 0;
1148
1149 if (mPluginV1_1 == NULL) {
1150 return ERROR_DRM_CANNOT_HANDLE;
1151 }
1152
1153 Return<void> hResult = mPluginV1_1->getNumberOfSessions(
1154 [&](Status status, uint32_t hOpen, uint32_t hMax) {
1155 if (status == Status::OK) {
1156 *open = hOpen;
1157 *max = hMax;
1158 }
1159 err = toStatusT(status);
1160 }
1161 );
1162
1163 return hResult.isOk() ? err : DEAD_OBJECT;
1164}
1165
1166status_t DrmHal::getSecurityLevel(Vector<uint8_t> const &sessionId,
1167 DrmPlugin::SecurityLevel *level) const {
1168 Mutex::Autolock autoLock(mLock);
1169 INIT_CHECK();
1170
1171 if (level == NULL) {
1172 return BAD_VALUE;
1173 }
1174 status_t err = UNKNOWN_ERROR;
1175
1176 if (mPluginV1_1 == NULL) {
1177 return ERROR_DRM_CANNOT_HANDLE;
1178 }
1179
1180 *level = DrmPlugin::kSecurityLevelUnknown;
1181
1182 Return<void> hResult = mPluginV1_1->getSecurityLevel(toHidlVec(sessionId),
1183 [&](Status status, SecurityLevel hLevel) {
1184 if (status == Status::OK) {
1185 *level = toSecurityLevel(hLevel);
1186 }
1187 err = toStatusT(status);
1188 }
1189 );
1190
1191 return hResult.isOk() ? err : DEAD_OBJECT;
1192}
1193
Jeff Tinkerc8baaba2018-10-23 11:32:36 -07001194status_t DrmHal::getOfflineLicenseKeySetIds(List<Vector<uint8_t>> &keySetIds) const {
1195 Mutex::Autolock autoLock(mLock);
1196
1197 if (mInitCheck != OK) {
1198 return mInitCheck;
1199 }
1200
1201 if (mPluginV1_2 == NULL) {
Jeff Tinkerdb3fa5f2019-01-25 22:56:56 -08001202 return ERROR_UNSUPPORTED;
Jeff Tinkerc8baaba2018-10-23 11:32:36 -07001203 }
1204
1205 status_t err = UNKNOWN_ERROR;
1206
1207 Return<void> hResult = mPluginV1_2->getOfflineLicenseKeySetIds(
1208 [&](Status status, const hidl_vec<KeySetId>& hKeySetIds) {
1209 if (status == Status::OK) {
1210 keySetIds = toKeySetIds(hKeySetIds);
1211 }
1212 err = toStatusT(status);
1213 }
1214 );
1215
1216 return hResult.isOk() ? err : DEAD_OBJECT;
1217}
1218
1219status_t DrmHal::removeOfflineLicense(Vector<uint8_t> const &keySetId) {
1220 Mutex::Autolock autoLock(mLock);
1221
1222 if (mInitCheck != OK) {
1223 return mInitCheck;
1224 }
1225
1226 if (mPluginV1_2 == NULL) {
Jeff Tinkerdb3fa5f2019-01-25 22:56:56 -08001227 return ERROR_UNSUPPORTED;
Jeff Tinkerc8baaba2018-10-23 11:32:36 -07001228 }
1229
1230 Return<Status> status = mPluginV1_2->removeOfflineLicense(toHidlVec(keySetId));
1231 return status.isOk() ? toStatusT(status) : DEAD_OBJECT;
1232}
1233
1234status_t DrmHal::getOfflineLicenseState(Vector<uint8_t> const &keySetId,
1235 DrmPlugin::OfflineLicenseState *licenseState) const {
1236 Mutex::Autolock autoLock(mLock);
1237
1238 if (mInitCheck != OK) {
1239 return mInitCheck;
1240 }
1241
1242 if (mPluginV1_2 == NULL) {
Jeff Tinkerdb3fa5f2019-01-25 22:56:56 -08001243 return ERROR_UNSUPPORTED;
Jeff Tinkerc8baaba2018-10-23 11:32:36 -07001244 }
1245 *licenseState = DrmPlugin::kOfflineLicenseStateUnknown;
1246
1247 status_t err = UNKNOWN_ERROR;
1248
1249 Return<void> hResult = mPluginV1_2->getOfflineLicenseState(toHidlVec(keySetId),
1250 [&](Status status, OfflineLicenseState hLicenseState) {
1251 if (status == Status::OK) {
1252 *licenseState = toOfflineLicenseState(hLicenseState);
1253 }
1254 err = toStatusT(status);
1255 }
1256 );
1257
1258 return hResult.isOk() ? err : DEAD_OBJECT;
1259}
1260
Jeff Tinkera53d6552017-01-20 00:31:46 -08001261status_t DrmHal::getPropertyString(String8 const &name, String8 &value ) const {
1262 Mutex::Autolock autoLock(mLock);
John W. Bruce33ecc4f2017-04-03 16:49:05 -07001263 return getPropertyStringInternal(name, value);
1264}
1265
1266status_t DrmHal::getPropertyStringInternal(String8 const &name, String8 &value) const {
1267 // This function is internal to the class and should only be called while
1268 // mLock is already held.
Jeff Tinker6d998b62017-12-18 14:37:43 -08001269 INIT_CHECK();
Jeff Tinkera53d6552017-01-20 00:31:46 -08001270
1271 status_t err = UNKNOWN_ERROR;
1272
1273 Return<void> hResult = mPlugin->getPropertyString(toHidlString(name),
1274 [&](Status status, const hidl_string& hValue) {
1275 if (status == Status::OK) {
1276 value = toString8(hValue);
1277 }
1278 err = toStatusT(status);
1279 }
1280 );
1281
1282 return hResult.isOk() ? err : DEAD_OBJECT;
1283}
1284
1285status_t DrmHal::getPropertyByteArray(String8 const &name, Vector<uint8_t> &value ) const {
1286 Mutex::Autolock autoLock(mLock);
John W. Bruce33ecc4f2017-04-03 16:49:05 -07001287 return getPropertyByteArrayInternal(name, value);
1288}
1289
1290status_t DrmHal::getPropertyByteArrayInternal(String8 const &name, Vector<uint8_t> &value ) const {
1291 // This function is internal to the class and should only be called while
1292 // mLock is already held.
Jeff Tinker6d998b62017-12-18 14:37:43 -08001293 INIT_CHECK();
Jeff Tinkera53d6552017-01-20 00:31:46 -08001294
1295 status_t err = UNKNOWN_ERROR;
1296
1297 Return<void> hResult = mPlugin->getPropertyByteArray(toHidlString(name),
1298 [&](Status status, const hidl_vec<uint8_t>& hValue) {
1299 if (status == Status::OK) {
1300 value = toVector(hValue);
1301 }
1302 err = toStatusT(status);
1303 }
1304 );
1305
Adam Stonecea91ce2018-01-22 19:23:28 -08001306 err = hResult.isOk() ? err : DEAD_OBJECT;
1307 if (name == kPropertyDeviceUniqueId) {
1308 mMetrics.mGetDeviceUniqueIdCounter.Increment(err);
1309 }
1310 return err;
Jeff Tinkera53d6552017-01-20 00:31:46 -08001311}
1312
1313status_t DrmHal::setPropertyString(String8 const &name, String8 const &value ) const {
1314 Mutex::Autolock autoLock(mLock);
Jeff Tinker6d998b62017-12-18 14:37:43 -08001315 INIT_CHECK();
Jeff Tinkera53d6552017-01-20 00:31:46 -08001316
Jeff Tinker58ad4752018-02-16 16:51:59 -08001317 Return<Status> status = mPlugin->setPropertyString(toHidlString(name),
Jeff Tinkera53d6552017-01-20 00:31:46 -08001318 toHidlString(value));
Jeff Tinker58ad4752018-02-16 16:51:59 -08001319 return status.isOk() ? toStatusT(status) : DEAD_OBJECT;
Jeff Tinkera53d6552017-01-20 00:31:46 -08001320}
1321
1322status_t DrmHal::setPropertyByteArray(String8 const &name,
1323 Vector<uint8_t> const &value ) const {
1324 Mutex::Autolock autoLock(mLock);
Jeff Tinker6d998b62017-12-18 14:37:43 -08001325 INIT_CHECK();
Jeff Tinkera53d6552017-01-20 00:31:46 -08001326
Jeff Tinker58ad4752018-02-16 16:51:59 -08001327 Return<Status> status = mPlugin->setPropertyByteArray(toHidlString(name),
Jeff Tinkera53d6552017-01-20 00:31:46 -08001328 toHidlVec(value));
Jeff Tinker58ad4752018-02-16 16:51:59 -08001329 return status.isOk() ? toStatusT(status) : DEAD_OBJECT;
Jeff Tinkera53d6552017-01-20 00:31:46 -08001330}
1331
Robert Shih93538812019-11-12 12:21:35 -08001332status_t DrmHal::getMetrics(const sp<IDrmMetricsConsumer> &consumer) {
1333 if (consumer == nullptr) {
Adam Stone28f27c32018-02-05 15:07:48 -08001334 return UNEXPECTED_NULL;
1335 }
Robert Shih93538812019-11-12 12:21:35 -08001336 consumer->consumeFrameworkMetrics(mMetrics);
Adam Stone28f27c32018-02-05 15:07:48 -08001337
1338 // Append vendor metrics if they are supported.
1339 if (mPluginV1_1 != NULL) {
1340 String8 vendor;
1341 String8 description;
1342 if (getPropertyStringInternal(String8("vendor"), vendor) != OK
1343 || vendor.isEmpty()) {
1344 ALOGE("Get vendor failed or is empty");
1345 vendor = "NONE";
1346 }
1347 if (getPropertyStringInternal(String8("description"), description) != OK
1348 || description.isEmpty()) {
1349 ALOGE("Get description failed or is empty.");
1350 description = "NONE";
1351 }
1352 vendor += ".";
1353 vendor += description;
1354
1355 hidl_vec<DrmMetricGroup> pluginMetrics;
1356 status_t err = UNKNOWN_ERROR;
1357
1358 Return<void> status = mPluginV1_1->getMetrics(
1359 [&](Status status, hidl_vec<DrmMetricGroup> pluginMetrics) {
1360 if (status != Status::OK) {
1361 ALOGV("Error getting plugin metrics: %d", status);
1362 } else {
Robert Shih93538812019-11-12 12:21:35 -08001363 consumer->consumeHidlMetrics(vendor, pluginMetrics);
Adam Stone28f27c32018-02-05 15:07:48 -08001364 }
1365 err = toStatusT(status);
1366 });
1367 return status.isOk() ? err : DEAD_OBJECT;
Adam Stonef0e618d2018-01-17 19:20:41 -08001368 }
1369
Adam Stoneab394d12017-12-22 12:34:20 -08001370 return OK;
1371}
Jeff Tinkera53d6552017-01-20 00:31:46 -08001372
1373status_t DrmHal::setCipherAlgorithm(Vector<uint8_t> const &sessionId,
1374 String8 const &algorithm) {
1375 Mutex::Autolock autoLock(mLock);
Jeff Tinker6d998b62017-12-18 14:37:43 -08001376 INIT_CHECK();
Jeff Tinkera53d6552017-01-20 00:31:46 -08001377
1378 DrmSessionManager::Instance()->useSession(sessionId);
1379
Jeff Tinkere6412942018-04-30 17:35:16 -07001380 Return<Status> status = mPlugin->setCipherAlgorithm(toHidlVec(sessionId),
Jeff Tinkera53d6552017-01-20 00:31:46 -08001381 toHidlString(algorithm));
Jeff Tinkere6412942018-04-30 17:35:16 -07001382 return status.isOk() ? toStatusT(status) : DEAD_OBJECT;
Jeff Tinkera53d6552017-01-20 00:31:46 -08001383}
1384
1385status_t DrmHal::setMacAlgorithm(Vector<uint8_t> const &sessionId,
1386 String8 const &algorithm) {
1387 Mutex::Autolock autoLock(mLock);
Jeff Tinker6d998b62017-12-18 14:37:43 -08001388 INIT_CHECK();
Jeff Tinkera53d6552017-01-20 00:31:46 -08001389
1390 DrmSessionManager::Instance()->useSession(sessionId);
1391
Jeff Tinkere6412942018-04-30 17:35:16 -07001392 Return<Status> status = mPlugin->setMacAlgorithm(toHidlVec(sessionId),
Jeff Tinkera53d6552017-01-20 00:31:46 -08001393 toHidlString(algorithm));
Jeff Tinkere6412942018-04-30 17:35:16 -07001394 return status.isOk() ? toStatusT(status) : DEAD_OBJECT;
Jeff Tinkera53d6552017-01-20 00:31:46 -08001395}
1396
1397status_t DrmHal::encrypt(Vector<uint8_t> const &sessionId,
Edwin Wong68b3d9f2017-01-06 19:07:54 -08001398 Vector<uint8_t> const &keyId, Vector<uint8_t> const &input,
1399 Vector<uint8_t> const &iv, Vector<uint8_t> &output) {
Jeff Tinkera53d6552017-01-20 00:31:46 -08001400 Mutex::Autolock autoLock(mLock);
Jeff Tinker6d998b62017-12-18 14:37:43 -08001401 INIT_CHECK();
Jeff Tinkera53d6552017-01-20 00:31:46 -08001402
1403 DrmSessionManager::Instance()->useSession(sessionId);
1404
1405 status_t err = UNKNOWN_ERROR;
1406
1407 Return<void> hResult = mPlugin->encrypt(toHidlVec(sessionId),
1408 toHidlVec(keyId), toHidlVec(input), toHidlVec(iv),
1409 [&](Status status, const hidl_vec<uint8_t>& hOutput) {
1410 if (status == Status::OK) {
1411 output = toVector(hOutput);
1412 }
1413 err = toStatusT(status);
1414 }
1415 );
1416
1417 return hResult.isOk() ? err : DEAD_OBJECT;
1418}
1419
1420status_t DrmHal::decrypt(Vector<uint8_t> const &sessionId,
Edwin Wong68b3d9f2017-01-06 19:07:54 -08001421 Vector<uint8_t> const &keyId, Vector<uint8_t> const &input,
1422 Vector<uint8_t> const &iv, Vector<uint8_t> &output) {
Jeff Tinkera53d6552017-01-20 00:31:46 -08001423 Mutex::Autolock autoLock(mLock);
Jeff Tinker6d998b62017-12-18 14:37:43 -08001424 INIT_CHECK();
Jeff Tinkera53d6552017-01-20 00:31:46 -08001425
1426 DrmSessionManager::Instance()->useSession(sessionId);
1427
1428 status_t err = UNKNOWN_ERROR;
1429
1430 Return<void> hResult = mPlugin->decrypt(toHidlVec(sessionId),
1431 toHidlVec(keyId), toHidlVec(input), toHidlVec(iv),
1432 [&](Status status, const hidl_vec<uint8_t>& hOutput) {
1433 if (status == Status::OK) {
1434 output = toVector(hOutput);
1435 }
1436 err = toStatusT(status);
1437 }
1438 );
1439
1440 return hResult.isOk() ? err : DEAD_OBJECT;
1441}
1442
1443status_t DrmHal::sign(Vector<uint8_t> const &sessionId,
Edwin Wong68b3d9f2017-01-06 19:07:54 -08001444 Vector<uint8_t> const &keyId, Vector<uint8_t> const &message,
1445 Vector<uint8_t> &signature) {
Jeff Tinkera53d6552017-01-20 00:31:46 -08001446 Mutex::Autolock autoLock(mLock);
Jeff Tinker6d998b62017-12-18 14:37:43 -08001447 INIT_CHECK();
Jeff Tinkera53d6552017-01-20 00:31:46 -08001448
1449 DrmSessionManager::Instance()->useSession(sessionId);
1450
1451 status_t err = UNKNOWN_ERROR;
1452
1453 Return<void> hResult = mPlugin->sign(toHidlVec(sessionId),
1454 toHidlVec(keyId), toHidlVec(message),
1455 [&](Status status, const hidl_vec<uint8_t>& hSignature) {
1456 if (status == Status::OK) {
1457 signature = toVector(hSignature);
1458 }
1459 err = toStatusT(status);
1460 }
1461 );
1462
1463 return hResult.isOk() ? err : DEAD_OBJECT;
1464}
1465
1466status_t DrmHal::verify(Vector<uint8_t> const &sessionId,
Edwin Wong68b3d9f2017-01-06 19:07:54 -08001467 Vector<uint8_t> const &keyId, Vector<uint8_t> const &message,
1468 Vector<uint8_t> const &signature, bool &match) {
Jeff Tinkera53d6552017-01-20 00:31:46 -08001469 Mutex::Autolock autoLock(mLock);
Jeff Tinker6d998b62017-12-18 14:37:43 -08001470 INIT_CHECK();
Jeff Tinkera53d6552017-01-20 00:31:46 -08001471
1472 DrmSessionManager::Instance()->useSession(sessionId);
1473
1474 status_t err = UNKNOWN_ERROR;
1475
1476 Return<void> hResult = mPlugin->verify(toHidlVec(sessionId),toHidlVec(keyId),
1477 toHidlVec(message), toHidlVec(signature),
1478 [&](Status status, bool hMatch) {
1479 if (status == Status::OK) {
1480 match = hMatch;
1481 } else {
1482 match = false;
1483 }
1484 err = toStatusT(status);
1485 }
1486 );
1487
1488 return hResult.isOk() ? err : DEAD_OBJECT;
1489}
1490
1491status_t DrmHal::signRSA(Vector<uint8_t> const &sessionId,
Edwin Wong68b3d9f2017-01-06 19:07:54 -08001492 String8 const &algorithm, Vector<uint8_t> const &message,
1493 Vector<uint8_t> const &wrappedKey, Vector<uint8_t> &signature) {
Jeff Tinkera53d6552017-01-20 00:31:46 -08001494 Mutex::Autolock autoLock(mLock);
Jeff Tinker6d998b62017-12-18 14:37:43 -08001495 INIT_CHECK();
Jeff Tinkera53d6552017-01-20 00:31:46 -08001496
Jeff Tinkera53d6552017-01-20 00:31:46 -08001497 DrmSessionManager::Instance()->useSession(sessionId);
1498
1499 status_t err = UNKNOWN_ERROR;
1500
1501 Return<void> hResult = mPlugin->signRSA(toHidlVec(sessionId),
1502 toHidlString(algorithm), toHidlVec(message), toHidlVec(wrappedKey),
1503 [&](Status status, const hidl_vec<uint8_t>& hSignature) {
1504 if (status == Status::OK) {
1505 signature = toVector(hSignature);
1506 }
1507 err = toStatusT(status);
1508 }
1509 );
1510
1511 return hResult.isOk() ? err : DEAD_OBJECT;
1512}
1513
Adam Stonefb679e32018-02-07 10:25:48 -08001514void DrmHal::reportFrameworkMetrics() const
1515{
Robert Shih82ea6be2019-11-07 17:47:23 -08001516 mediametrics_handle_t item(mediametrics_create("mediadrm"));
1517 mediametrics_setUid(item, mMetrics.GetAppUid());
Adam Stonefb679e32018-02-07 10:25:48 -08001518 String8 vendor;
1519 String8 description;
1520 status_t result = getPropertyStringInternal(String8("vendor"), vendor);
1521 if (result != OK) {
Jeff Tinker987ac702018-02-15 17:02:22 -08001522 ALOGE("Failed to get vendor from drm plugin: %d", result);
Adam Stonefb679e32018-02-07 10:25:48 -08001523 } else {
Robert Shih82ea6be2019-11-07 17:47:23 -08001524 mediametrics_setCString(item, "vendor", vendor.c_str());
Adam Stonefb679e32018-02-07 10:25:48 -08001525 }
1526 result = getPropertyStringInternal(String8("description"), description);
1527 if (result != OK) {
Jeff Tinker987ac702018-02-15 17:02:22 -08001528 ALOGE("Failed to get description from drm plugin: %d", result);
Adam Stonefb679e32018-02-07 10:25:48 -08001529 } else {
Robert Shih82ea6be2019-11-07 17:47:23 -08001530 mediametrics_setCString(item, "description", description.c_str());
Adam Stonefb679e32018-02-07 10:25:48 -08001531 }
Adam Stoneab394d12017-12-22 12:34:20 -08001532
Adam Stonefb679e32018-02-07 10:25:48 -08001533 std::string serializedMetrics;
1534 result = mMetrics.GetSerializedMetrics(&serializedMetrics);
1535 if (result != OK) {
Jeff Tinker987ac702018-02-15 17:02:22 -08001536 ALOGE("Failed to serialize framework metrics: %d", result);
Adam Stonefb679e32018-02-07 10:25:48 -08001537 }
Adam Stone32494f52018-02-26 22:53:27 -08001538 std::string b64EncodedMetrics = toBase64StringNoPad(serializedMetrics.data(),
1539 serializedMetrics.size());
1540 if (!b64EncodedMetrics.empty()) {
Robert Shih82ea6be2019-11-07 17:47:23 -08001541 mediametrics_setCString(item, "serialized_metrics", b64EncodedMetrics.c_str());
Adam Stonefb679e32018-02-07 10:25:48 -08001542 }
Robert Shih82ea6be2019-11-07 17:47:23 -08001543 if (!mediametrics_selfRecord(item)) {
Jeff Tinker987ac702018-02-15 17:02:22 -08001544 ALOGE("Failed to self record framework metrics");
Adam Stonefb679e32018-02-07 10:25:48 -08001545 }
Robert Shih82ea6be2019-11-07 17:47:23 -08001546 mediametrics_delete(item);
Adam Stonefb679e32018-02-07 10:25:48 -08001547}
1548
1549void DrmHal::reportPluginMetrics() const
John W. Bruce33ecc4f2017-04-03 16:49:05 -07001550{
Adam Stone32494f52018-02-26 22:53:27 -08001551 Vector<uint8_t> metricsVector;
John W. Bruce33ecc4f2017-04-03 16:49:05 -07001552 String8 vendor;
1553 String8 description;
1554 if (getPropertyStringInternal(String8("vendor"), vendor) == OK &&
1555 getPropertyStringInternal(String8("description"), description) == OK &&
Adam Stone32494f52018-02-26 22:53:27 -08001556 getPropertyByteArrayInternal(String8("metrics"), metricsVector) == OK) {
1557 std::string metricsString = toBase64StringNoPad(metricsVector.array(),
1558 metricsVector.size());
1559 status_t res = android::reportDrmPluginMetrics(metricsString, vendor,
Robert Shih82ea6be2019-11-07 17:47:23 -08001560 description, mMetrics.GetAppUid());
John W. Bruce33ecc4f2017-04-03 16:49:05 -07001561 if (res != OK) {
Jeff Tinker987ac702018-02-15 17:02:22 -08001562 ALOGE("Metrics were retrieved but could not be reported: %d", res);
John W. Bruce33ecc4f2017-04-03 16:49:05 -07001563 }
1564 }
1565}
1566
Jeff Tinkera53d6552017-01-20 00:31:46 -08001567} // namespace android