blob: 5b32a049df1cab840713234a0948138f3c6a1610 [file] [log] [blame]
Jeff Tinkera53d6552017-01-20 00:31:46 -08001/*
2 * Copyright (C) 2017 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17//#define LOG_NDEBUG 0
18#define LOG_TAG "DrmHal"
Adam Stonefb679e32018-02-07 10:25:48 -080019#include <iomanip>
20
Jeff Tinkera53d6552017-01-20 00:31:46 -080021#include <utils/Log.h>
22
Robert Shih6152d7c2019-11-19 22:54:27 -080023#include <android/binder_manager.h>
Jeff Tinkera53d6552017-01-20 00:31:46 -080024
Robert Shih0f3a8a02019-11-14 15:43:39 -080025#include <aidl/android/media/BnResourceManagerClient.h>
Jeff Tinkerc8baaba2018-10-23 11:32:36 -070026#include <android/hardware/drm/1.2/types.h>
Peter Kalauskasca5642c2018-11-12 12:34:42 -080027#include <android/hidl/manager/1.2/IServiceManager.h>
Jeff Tinker593111f2017-05-25 16:00:21 -070028#include <hidl/ServiceManagement.h>
Adam Stonef0e618d2018-01-17 19:20:41 -080029#include <media/EventMetric.h>
Robert Shih82ea6be2019-11-07 17:47:23 -080030#include <media/MediaMetrics.h>
John W. Bruce33ecc4f2017-04-03 16:49:05 -070031#include <media/PluginMetricsReporting.h>
Jeff Tinkera53d6552017-01-20 00:31:46 -080032#include <media/drm/DrmAPI.h>
33#include <media/stagefright/foundation/ADebug.h>
34#include <media/stagefright/foundation/AString.h>
Adam Stone32494f52018-02-26 22:53:27 -080035#include <media/stagefright/foundation/base64.h>
Jeff Tinkera53d6552017-01-20 00:31:46 -080036#include <media/stagefright/foundation/hexdump.h>
37#include <media/stagefright/MediaErrors.h>
Jeff Tinker7d2c6e82018-02-16 16:14:59 -080038#include <mediadrm/DrmHal.h>
39#include <mediadrm/DrmSessionClientInterface.h>
40#include <mediadrm/DrmSessionManager.h>
Robert Shih93538812019-11-12 12:21:35 -080041#include <mediadrm/IDrmMetricsConsumer.h>
Robert Shihc0d1d0e2019-11-24 13:21:04 -080042#include <mediadrm/DrmUtils.h>
Jeff Tinkera53d6552017-01-20 00:31:46 -080043
Robert Shih61e1c762019-10-31 21:26:58 -070044#include <vector>
45
Jeff Tinker6d998b62017-12-18 14:37:43 -080046using drm::V1_0::KeyedVector;
Jeff Tinkerb8684f32018-12-12 08:41:31 -080047using drm::V1_0::KeyRequestType;
Jeff Tinker6d998b62017-12-18 14:37:43 -080048using drm::V1_0::KeyType;
49using drm::V1_0::KeyValue;
Jeff Tinker6d998b62017-12-18 14:37:43 -080050using drm::V1_0::SecureStop;
Jeff Tinker15177d72018-01-25 12:57:55 -080051using drm::V1_0::SecureStopId;
Jeff Tinker6d998b62017-12-18 14:37:43 -080052using drm::V1_0::Status;
Jeff Tinkerc8baaba2018-10-23 11:32:36 -070053using drm::V1_1::HdcpLevel;
54using drm::V1_1::SecureStopRelease;
55using drm::V1_1::SecurityLevel;
56using drm::V1_2::KeySetId;
Robert Shiha5033262019-05-06 14:15:12 -070057using drm::V1_2::KeyStatusType;
Adam Stone28f27c32018-02-05 15:07:48 -080058using ::android::hardware::drm::V1_1::DrmMetricGroup;
Jeff Tinkera53d6552017-01-20 00:31:46 -080059using ::android::hardware::hidl_array;
60using ::android::hardware::hidl_string;
61using ::android::hardware::hidl_vec;
62using ::android::hardware::Return;
63using ::android::hardware::Void;
Adam Stone637b7852018-01-30 12:09:36 -080064using ::android::os::PersistableBundle;
Jeff Tinkera53d6552017-01-20 00:31:46 -080065using ::android::sp;
66
Jeff Tinkerb8684f32018-12-12 08:41:31 -080067typedef drm::V1_1::KeyRequestType KeyRequestType_V1_1;
68typedef drm::V1_2::Status Status_V1_2;
Jeff Tinker44c2cc42019-01-14 10:24:18 -080069typedef drm::V1_2::HdcpLevel HdcpLevel_V1_2;
Jeff Tinkerb8684f32018-12-12 08:41:31 -080070
Adam Stonecea91ce2018-01-22 19:23:28 -080071namespace {
72
73// This constant corresponds to the PROPERTY_DEVICE_UNIQUE_ID constant
74// in the MediaDrm API.
75constexpr char kPropertyDeviceUniqueId[] = "deviceUniqueId";
Adam Stone32494f52018-02-26 22:53:27 -080076constexpr char kEqualsSign[] = "=";
Adam Stonecea91ce2018-01-22 19:23:28 -080077
Adam Stone32494f52018-02-26 22:53:27 -080078template<typename T>
79std::string toBase64StringNoPad(const T* data, size_t size) {
Adam Stone630092e2018-05-02 13:06:34 -070080 // Note that the base 64 conversion only works with arrays of single-byte
81 // values. If the source is empty or is not an array of single-byte values,
82 // return empty string.
83 if (size == 0 || sizeof(data[0]) != 1) {
Adam Stone32494f52018-02-26 22:53:27 -080084 return "";
85 }
Adam Stone32494f52018-02-26 22:53:27 -080086
87 android::AString outputString;
88 encodeBase64(data, size, &outputString);
89 // Remove trailing equals padding if it exists.
90 while (outputString.size() > 0 && outputString.endsWith(kEqualsSign)) {
91 outputString.erase(outputString.size() - 1, 1);
92 }
93
94 return std::string(outputString.c_str(), outputString.size());
Adam Stonecea91ce2018-01-22 19:23:28 -080095}
96
Adam Stone32494f52018-02-26 22:53:27 -080097} // anonymous namespace
98
Jeff Tinkera53d6552017-01-20 00:31:46 -080099namespace android {
100
Jeff Tinker6d998b62017-12-18 14:37:43 -0800101#define INIT_CHECK() {if (mInitCheck != OK) return mInitCheck;}
102
Jeff Tinkera53d6552017-01-20 00:31:46 -0800103static const Vector<uint8_t> toVector(const hidl_vec<uint8_t> &vec) {
104 Vector<uint8_t> vector;
105 vector.appendArray(vec.data(), vec.size());
106 return *const_cast<const Vector<uint8_t> *>(&vector);
107}
108
109static hidl_vec<uint8_t> toHidlVec(const Vector<uint8_t> &vector) {
110 hidl_vec<uint8_t> vec;
111 vec.setToExternal(const_cast<uint8_t *>(vector.array()), vector.size());
112 return vec;
113}
114
115static String8 toString8(const hidl_string &string) {
116 return String8(string.c_str());
117}
118
119static hidl_string toHidlString(const String8& string) {
120 return hidl_string(string.string());
121}
122
Jeff Tinker6d998b62017-12-18 14:37:43 -0800123static DrmPlugin::SecurityLevel toSecurityLevel(SecurityLevel level) {
124 switch(level) {
125 case SecurityLevel::SW_SECURE_CRYPTO:
126 return DrmPlugin::kSecurityLevelSwSecureCrypto;
127 case SecurityLevel::SW_SECURE_DECODE:
128 return DrmPlugin::kSecurityLevelSwSecureDecode;
129 case SecurityLevel::HW_SECURE_CRYPTO:
130 return DrmPlugin::kSecurityLevelHwSecureCrypto;
131 case SecurityLevel::HW_SECURE_DECODE:
132 return DrmPlugin::kSecurityLevelHwSecureDecode;
133 case SecurityLevel::HW_SECURE_ALL:
134 return DrmPlugin::kSecurityLevelHwSecureAll;
135 default:
136 return DrmPlugin::kSecurityLevelUnknown;
137 }
138}
139
Jeff Tinker99dbfa82019-01-17 17:27:06 -0800140static SecurityLevel toHidlSecurityLevel(DrmPlugin::SecurityLevel level) {
141 switch(level) {
142 case DrmPlugin::kSecurityLevelSwSecureCrypto:
143 return SecurityLevel::SW_SECURE_CRYPTO;
144 case DrmPlugin::kSecurityLevelSwSecureDecode:
145 return SecurityLevel::SW_SECURE_DECODE;
146 case DrmPlugin::kSecurityLevelHwSecureCrypto:
147 return SecurityLevel::HW_SECURE_CRYPTO;
148 case DrmPlugin::kSecurityLevelHwSecureDecode:
149 return SecurityLevel::HW_SECURE_DECODE;
150 case DrmPlugin::kSecurityLevelHwSecureAll:
151 return SecurityLevel::HW_SECURE_ALL;
152 default:
153 return SecurityLevel::UNKNOWN;
154 }
155}
156
Jeff Tinkerc8baaba2018-10-23 11:32:36 -0700157static DrmPlugin::OfflineLicenseState toOfflineLicenseState(
158 OfflineLicenseState licenseState) {
159 switch(licenseState) {
160 case OfflineLicenseState::USABLE:
161 return DrmPlugin::kOfflineLicenseStateUsable;
162 case OfflineLicenseState::INACTIVE:
Jeff Tinker9a95b0f2019-01-30 17:39:20 -0800163 return DrmPlugin::kOfflineLicenseStateReleased;
Jeff Tinkerc8baaba2018-10-23 11:32:36 -0700164 default:
165 return DrmPlugin::kOfflineLicenseStateUnknown;
166 }
167}
168
Jeff Tinker44c2cc42019-01-14 10:24:18 -0800169static DrmPlugin::HdcpLevel toHdcpLevel(HdcpLevel_V1_2 level) {
Jeff Tinker6d998b62017-12-18 14:37:43 -0800170 switch(level) {
Jeff Tinker44c2cc42019-01-14 10:24:18 -0800171 case HdcpLevel_V1_2::HDCP_NONE:
Jeff Tinker6d998b62017-12-18 14:37:43 -0800172 return DrmPlugin::kHdcpNone;
Jeff Tinker44c2cc42019-01-14 10:24:18 -0800173 case HdcpLevel_V1_2::HDCP_V1:
Jeff Tinker6d998b62017-12-18 14:37:43 -0800174 return DrmPlugin::kHdcpV1;
Jeff Tinker44c2cc42019-01-14 10:24:18 -0800175 case HdcpLevel_V1_2::HDCP_V2:
Jeff Tinker6d998b62017-12-18 14:37:43 -0800176 return DrmPlugin::kHdcpV2;
Jeff Tinker44c2cc42019-01-14 10:24:18 -0800177 case HdcpLevel_V1_2::HDCP_V2_1:
Jeff Tinker6d998b62017-12-18 14:37:43 -0800178 return DrmPlugin::kHdcpV2_1;
Jeff Tinker44c2cc42019-01-14 10:24:18 -0800179 case HdcpLevel_V1_2::HDCP_V2_2:
Jeff Tinker6d998b62017-12-18 14:37:43 -0800180 return DrmPlugin::kHdcpV2_2;
Jeff Tinker44c2cc42019-01-14 10:24:18 -0800181 case HdcpLevel_V1_2::HDCP_V2_3:
182 return DrmPlugin::kHdcpV2_3;
183 case HdcpLevel_V1_2::HDCP_NO_OUTPUT:
Jeff Tinker6d998b62017-12-18 14:37:43 -0800184 return DrmPlugin::kHdcpNoOutput;
185 default:
186 return DrmPlugin::kHdcpLevelUnknown;
187 }
188}
Jeff Tinkera53d6552017-01-20 00:31:46 -0800189static ::KeyedVector toHidlKeyedVector(const KeyedVector<String8, String8>&
190 keyedVector) {
191 std::vector<KeyValue> stdKeyedVector;
192 for (size_t i = 0; i < keyedVector.size(); i++) {
193 KeyValue keyValue;
194 keyValue.key = toHidlString(keyedVector.keyAt(i));
195 keyValue.value = toHidlString(keyedVector.valueAt(i));
196 stdKeyedVector.push_back(keyValue);
197 }
198 return ::KeyedVector(stdKeyedVector);
199}
200
201static KeyedVector<String8, String8> toKeyedVector(const ::KeyedVector&
202 hKeyedVector) {
203 KeyedVector<String8, String8> keyedVector;
204 for (size_t i = 0; i < hKeyedVector.size(); i++) {
205 keyedVector.add(toString8(hKeyedVector[i].key),
206 toString8(hKeyedVector[i].value));
207 }
208 return keyedVector;
209}
210
Jeff Tinkerabeb36a2017-02-17 09:42:46 -0800211static List<Vector<uint8_t>> toSecureStops(const hidl_vec<SecureStop>&
Jeff Tinkera53d6552017-01-20 00:31:46 -0800212 hSecureStops) {
Jeff Tinkerabeb36a2017-02-17 09:42:46 -0800213 List<Vector<uint8_t>> secureStops;
Jeff Tinkera53d6552017-01-20 00:31:46 -0800214 for (size_t i = 0; i < hSecureStops.size(); i++) {
215 secureStops.push_back(toVector(hSecureStops[i].opaqueData));
216 }
217 return secureStops;
218}
219
Jeff Tinker15177d72018-01-25 12:57:55 -0800220static List<Vector<uint8_t>> toSecureStopIds(const hidl_vec<SecureStopId>&
221 hSecureStopIds) {
222 List<Vector<uint8_t>> secureStopIds;
223 for (size_t i = 0; i < hSecureStopIds.size(); i++) {
224 secureStopIds.push_back(toVector(hSecureStopIds[i]));
225 }
226 return secureStopIds;
227}
228
Jeff Tinkerc8baaba2018-10-23 11:32:36 -0700229static List<Vector<uint8_t>> toKeySetIds(const hidl_vec<KeySetId>&
230 hKeySetIds) {
231 List<Vector<uint8_t>> keySetIds;
232 for (size_t i = 0; i < hKeySetIds.size(); i++) {
233 keySetIds.push_back(toVector(hKeySetIds[i]));
234 }
235 return keySetIds;
236}
237
Jeff Tinkera53d6552017-01-20 00:31:46 -0800238static status_t toStatusT(Status status) {
239 switch (status) {
240 case Status::OK:
241 return OK;
242 break;
243 case Status::ERROR_DRM_NO_LICENSE:
244 return ERROR_DRM_NO_LICENSE;
245 break;
246 case Status::ERROR_DRM_LICENSE_EXPIRED:
247 return ERROR_DRM_LICENSE_EXPIRED;
248 break;
249 case Status::ERROR_DRM_SESSION_NOT_OPENED:
250 return ERROR_DRM_SESSION_NOT_OPENED;
251 break;
252 case Status::ERROR_DRM_CANNOT_HANDLE:
253 return ERROR_DRM_CANNOT_HANDLE;
254 break;
255 case Status::ERROR_DRM_INVALID_STATE:
Jeff Tinkerb8684f32018-12-12 08:41:31 -0800256 return ERROR_DRM_INVALID_STATE;
Jeff Tinkera53d6552017-01-20 00:31:46 -0800257 break;
258 case Status::BAD_VALUE:
259 return BAD_VALUE;
260 break;
261 case Status::ERROR_DRM_NOT_PROVISIONED:
262 return ERROR_DRM_NOT_PROVISIONED;
263 break;
264 case Status::ERROR_DRM_RESOURCE_BUSY:
265 return ERROR_DRM_RESOURCE_BUSY;
266 break;
267 case Status::ERROR_DRM_DEVICE_REVOKED:
268 return ERROR_DRM_DEVICE_REVOKED;
269 break;
270 case Status::ERROR_DRM_UNKNOWN:
271 default:
272 return ERROR_DRM_UNKNOWN;
273 break;
274 }
275}
276
Jeff Tinkerb8684f32018-12-12 08:41:31 -0800277static status_t toStatusT_1_2(Status_V1_2 status) {
278 switch (status) {
279 case Status_V1_2::ERROR_DRM_RESOURCE_CONTENTION:
280 return ERROR_DRM_RESOURCE_CONTENTION;
281 case Status_V1_2::ERROR_DRM_FRAME_TOO_LARGE:
282 return ERROR_DRM_FRAME_TOO_LARGE;
283 case Status_V1_2::ERROR_DRM_INSUFFICIENT_SECURITY:
284 return ERROR_DRM_INSUFFICIENT_SECURITY;
285 default:
286 return toStatusT(static_cast<Status>(status));
287 }
288}
289
Jeff Tinkera53d6552017-01-20 00:31:46 -0800290Mutex DrmHal::mLock;
291
Robert Shih0f3a8a02019-11-14 15:43:39 -0800292struct DrmHal::DrmSessionClient : public aidl::android::media::BnResourceManagerClient {
Chong Zhang181e6952019-10-09 13:23:39 -0700293 explicit DrmSessionClient(DrmHal* drm, const Vector<uint8_t>& sessionId)
294 : mSessionId(sessionId),
295 mDrm(drm) {}
296
Robert Shih0f3a8a02019-11-14 15:43:39 -0800297 ::ndk::ScopedAStatus reclaimResource(bool* _aidl_return) override;
298 ::ndk::ScopedAStatus getName(::std::string* _aidl_return) override;
Chong Zhang181e6952019-10-09 13:23:39 -0700299
300 const Vector<uint8_t> mSessionId;
301
Chong Zhang181e6952019-10-09 13:23:39 -0700302 virtual ~DrmSessionClient();
303
304private:
305 wp<DrmHal> mDrm;
306
307 DISALLOW_EVIL_CONSTRUCTORS(DrmSessionClient);
308};
309
Robert Shih0f3a8a02019-11-14 15:43:39 -0800310::ndk::ScopedAStatus DrmHal::DrmSessionClient::reclaimResource(bool* _aidl_return) {
311 auto sessionId = mSessionId;
Robert Shihc3af31b2019-09-20 21:45:01 -0700312 sp<DrmHal> drm = mDrm.promote();
313 if (drm == NULL) {
Chong Zhang181e6952019-10-09 13:23:39 -0700314 *_aidl_return = true;
Robert Shih0f3a8a02019-11-14 15:43:39 -0800315 return ::ndk::ScopedAStatus::ok();
Jeff Tinkera53d6552017-01-20 00:31:46 -0800316 }
Robert Shih0f3a8a02019-11-14 15:43:39 -0800317 status_t err = drm->closeSession(sessionId);
Robert Shihc3af31b2019-09-20 21:45:01 -0700318 if (err != OK) {
Chong Zhang181e6952019-10-09 13:23:39 -0700319 *_aidl_return = false;
Robert Shih0f3a8a02019-11-14 15:43:39 -0800320 return ::ndk::ScopedAStatus::ok();
Robert Shihc3af31b2019-09-20 21:45:01 -0700321 }
322 drm->sendEvent(EventType::SESSION_RECLAIMED,
Robert Shih0f3a8a02019-11-14 15:43:39 -0800323 toHidlVec(sessionId), hidl_vec<uint8_t>());
Chong Zhang181e6952019-10-09 13:23:39 -0700324 *_aidl_return = true;
Robert Shih0f3a8a02019-11-14 15:43:39 -0800325 return ::ndk::ScopedAStatus::ok();
Robert Shihc3af31b2019-09-20 21:45:01 -0700326}
Jeff Tinkera53d6552017-01-20 00:31:46 -0800327
Robert Shih0f3a8a02019-11-14 15:43:39 -0800328::ndk::ScopedAStatus DrmHal::DrmSessionClient::getName(::std::string* _aidl_return) {
Robert Shihc3af31b2019-09-20 21:45:01 -0700329 String8 name;
330 sp<DrmHal> drm = mDrm.promote();
331 if (drm == NULL) {
332 name.append("<deleted>");
333 } else if (drm->getPropertyStringInternal(String8("vendor"), name) != OK
334 || name.isEmpty()) {
335 name.append("<Get vendor failed or is empty>");
336 }
337 name.append("[");
338 for (size_t i = 0; i < mSessionId.size(); ++i) {
339 name.appendFormat("%02x", mSessionId[i]);
340 }
341 name.append("]");
Chong Zhang181e6952019-10-09 13:23:39 -0700342 *_aidl_return = name;
Robert Shih0f3a8a02019-11-14 15:43:39 -0800343 return ::ndk::ScopedAStatus::ok();
Robert Shihc3af31b2019-09-20 21:45:01 -0700344}
Jeff Tinkera53d6552017-01-20 00:31:46 -0800345
Robert Shihc3af31b2019-09-20 21:45:01 -0700346DrmHal::DrmSessionClient::~DrmSessionClient() {
347 DrmSessionManager::Instance()->removeSession(mSessionId);
348}
Jeff Tinkera53d6552017-01-20 00:31:46 -0800349
350DrmHal::DrmHal()
Robert Shihc3af31b2019-09-20 21:45:01 -0700351 : mFactories(makeDrmFactories()),
Jeff Tinkerabeb36a2017-02-17 09:42:46 -0800352 mInitCheck((mFactories.size() == 0) ? ERROR_UNSUPPORTED : NO_INIT) {
Jeff Tinkera53d6552017-01-20 00:31:46 -0800353}
354
Jeff Tinker61332812017-05-15 16:53:10 -0700355void DrmHal::closeOpenSessions() {
Jeff Tinker7dfe28f2018-02-15 12:17:40 -0800356 Mutex::Autolock autoLock(mLock);
357 auto openSessions = mOpenSessions;
358 for (size_t i = 0; i < openSessions.size(); i++) {
359 mLock.unlock();
Robert Shihc3af31b2019-09-20 21:45:01 -0700360 closeSession(openSessions[i]->mSessionId);
Jeff Tinker7dfe28f2018-02-15 12:17:40 -0800361 mLock.lock();
Jeff Tinker61332812017-05-15 16:53:10 -0700362 }
363 mOpenSessions.clear();
364}
365
Jeff Tinkera53d6552017-01-20 00:31:46 -0800366DrmHal::~DrmHal() {
Jeff Tinkera53d6552017-01-20 00:31:46 -0800367}
368
Jeff Tinker7dfe28f2018-02-15 12:17:40 -0800369void DrmHal::cleanup() {
370 closeOpenSessions();
371
372 Mutex::Autolock autoLock(mLock);
373 reportPluginMetrics();
374 reportFrameworkMetrics();
375
376 setListener(NULL);
377 mInitCheck = NO_INIT;
Jeff Tinkerb8684f32018-12-12 08:41:31 -0800378 if (mPluginV1_2 != NULL) {
379 if (!mPluginV1_2->setListener(NULL).isOk()) {
380 mInitCheck = DEAD_OBJECT;
381 }
382 } else if (mPlugin != NULL) {
Jeff Tinker7dfe28f2018-02-15 12:17:40 -0800383 if (!mPlugin->setListener(NULL).isOk()) {
384 mInitCheck = DEAD_OBJECT;
385 }
386 }
387 mPlugin.clear();
388 mPluginV1_1.clear();
Jeff Tinkerc8baaba2018-10-23 11:32:36 -0700389 mPluginV1_2.clear();
Jeff Tinker7dfe28f2018-02-15 12:17:40 -0800390}
391
Robert Shihc0d1d0e2019-11-24 13:21:04 -0800392std::vector<sp<IDrmFactory>> DrmHal::makeDrmFactories() {
393 std::vector<sp<IDrmFactory>> factories(DrmUtils::MakeDrmFactories());
Jeff Tinkerabeb36a2017-02-17 09:42:46 -0800394 if (factories.size() == 0) {
395 // must be in passthrough mode, load the default passthrough service
Jeff Tinkere309b222017-04-05 08:01:28 -0700396 auto passthrough = IDrmFactory::getService();
Jeff Tinkerabeb36a2017-02-17 09:42:46 -0800397 if (passthrough != NULL) {
Jeff Tinkere307dc42018-02-11 19:53:54 +0000398 ALOGI("makeDrmFactories: using default passthrough drm instance");
Jeff Tinkerabeb36a2017-02-17 09:42:46 -0800399 factories.push_back(passthrough);
400 } else {
401 ALOGE("Failed to find any drm factories");
402 }
403 }
404 return factories;
Jeff Tinkera53d6552017-01-20 00:31:46 -0800405}
406
Jeff Tinkerabeb36a2017-02-17 09:42:46 -0800407sp<IDrmPlugin> DrmHal::makeDrmPlugin(const sp<IDrmFactory>& factory,
408 const uint8_t uuid[16], const String8& appPackageName) {
Adam Stone32494f52018-02-26 22:53:27 -0800409 mAppPackageName = appPackageName;
Adam Stonefb679e32018-02-07 10:25:48 -0800410 mMetrics.SetAppPackageName(appPackageName);
Robert Shih6152d7c2019-11-19 22:54:27 -0800411 mMetrics.SetAppUid(AIBinder_getCallingUid());
Jeff Tinkera53d6552017-01-20 00:31:46 -0800412
413 sp<IDrmPlugin> plugin;
Jeff Tinkerabeb36a2017-02-17 09:42:46 -0800414 Return<void> hResult = factory->createPlugin(uuid, appPackageName.string(),
Jeff Tinkera53d6552017-01-20 00:31:46 -0800415 [&](Status status, const sp<IDrmPlugin>& hPlugin) {
Jeff Tinkerabeb36a2017-02-17 09:42:46 -0800416 if (status != Status::OK) {
417 ALOGE("Failed to make drm plugin");
418 return;
419 }
420 plugin = hPlugin;
421 }
422 );
Jeff Tinkerf0e89b02017-08-07 15:58:41 -0700423
424 if (!hResult.isOk()) {
425 ALOGE("createPlugin remote call failed");
426 }
427
Jeff Tinkera53d6552017-01-20 00:31:46 -0800428 return plugin;
429}
430
431status_t DrmHal::initCheck() const {
432 return mInitCheck;
433}
434
435status_t DrmHal::setListener(const sp<IDrmClient>& listener)
436{
437 Mutex::Autolock lock(mEventLock);
Jeff Tinkera53d6552017-01-20 00:31:46 -0800438 mListener = listener;
439 return NO_ERROR;
440}
441
442Return<void> DrmHal::sendEvent(EventType hEventType,
443 const hidl_vec<uint8_t>& sessionId, const hidl_vec<uint8_t>& data) {
Adam Stonecea91ce2018-01-22 19:23:28 -0800444 mMetrics.mEventCounter.Increment(hEventType);
Jeff Tinkera53d6552017-01-20 00:31:46 -0800445
446 mEventLock.lock();
447 sp<IDrmClient> listener = mListener;
448 mEventLock.unlock();
449
450 if (listener != NULL) {
Jeff Tinkera53d6552017-01-20 00:31:46 -0800451 Mutex::Autolock lock(mNotifyLock);
452 DrmPlugin::EventType eventType;
453 switch(hEventType) {
454 case EventType::PROVISION_REQUIRED:
455 eventType = DrmPlugin::kDrmPluginEventProvisionRequired;
456 break;
457 case EventType::KEY_NEEDED:
458 eventType = DrmPlugin::kDrmPluginEventKeyNeeded;
459 break;
460 case EventType::KEY_EXPIRED:
461 eventType = DrmPlugin::kDrmPluginEventKeyExpired;
462 break;
463 case EventType::VENDOR_DEFINED:
464 eventType = DrmPlugin::kDrmPluginEventVendorDefined;
465 break;
Rahul Friasb86f4b32017-03-27 15:13:30 -0700466 case EventType::SESSION_RECLAIMED:
467 eventType = DrmPlugin::kDrmPluginEventSessionReclaimed;
468 break;
Jeff Tinkera53d6552017-01-20 00:31:46 -0800469 default:
470 return Void();
471 }
Robert Shih61e1c762019-10-31 21:26:58 -0700472 listener->sendEvent(eventType, sessionId, data);
Jeff Tinkera53d6552017-01-20 00:31:46 -0800473 }
474 return Void();
475}
476
477Return<void> DrmHal::sendExpirationUpdate(const hidl_vec<uint8_t>& sessionId,
478 int64_t expiryTimeInMS) {
479
480 mEventLock.lock();
481 sp<IDrmClient> listener = mListener;
482 mEventLock.unlock();
483
484 if (listener != NULL) {
Jeff Tinkera53d6552017-01-20 00:31:46 -0800485 Mutex::Autolock lock(mNotifyLock);
Robert Shih61e1c762019-10-31 21:26:58 -0700486 listener->sendExpirationUpdate(sessionId, expiryTimeInMS);
Jeff Tinkera53d6552017-01-20 00:31:46 -0800487 }
488 return Void();
489}
490
491Return<void> DrmHal::sendKeysChange(const hidl_vec<uint8_t>& sessionId,
Robert Shiha5033262019-05-06 14:15:12 -0700492 const hidl_vec<KeyStatus_V1_0>& keyStatusList_V1_0, bool hasNewUsableKey) {
493 std::vector<KeyStatus> keyStatusVec;
494 for (const auto &keyStatus_V1_0 : keyStatusList_V1_0) {
495 keyStatusVec.push_back({keyStatus_V1_0.keyId,
496 static_cast<KeyStatusType>(keyStatus_V1_0.type)});
497 }
498 hidl_vec<KeyStatus> keyStatusList_V1_2(keyStatusVec);
499 return sendKeysChange_1_2(sessionId, keyStatusList_V1_2, hasNewUsableKey);
500}
501
502Return<void> DrmHal::sendKeysChange_1_2(const hidl_vec<uint8_t>& sessionId,
Robert Shih61e1c762019-10-31 21:26:58 -0700503 const hidl_vec<KeyStatus>& hKeyStatusList, bool hasNewUsableKey) {
Jeff Tinkera53d6552017-01-20 00:31:46 -0800504
505 mEventLock.lock();
506 sp<IDrmClient> listener = mListener;
507 mEventLock.unlock();
508
509 if (listener != NULL) {
Robert Shih61e1c762019-10-31 21:26:58 -0700510 std::vector<DrmKeyStatus> keyStatusList;
511 size_t nKeys = hKeyStatusList.size();
Jeff Tinkera53d6552017-01-20 00:31:46 -0800512 for (size_t i = 0; i < nKeys; ++i) {
Robert Shih61e1c762019-10-31 21:26:58 -0700513 const KeyStatus &keyStatus = hKeyStatusList[i];
Jeff Tinkera53d6552017-01-20 00:31:46 -0800514 uint32_t type;
515 switch(keyStatus.type) {
516 case KeyStatusType::USABLE:
517 type = DrmPlugin::kKeyStatusType_Usable;
518 break;
519 case KeyStatusType::EXPIRED:
520 type = DrmPlugin::kKeyStatusType_Expired;
521 break;
522 case KeyStatusType::OUTPUTNOTALLOWED:
523 type = DrmPlugin::kKeyStatusType_OutputNotAllowed;
524 break;
525 case KeyStatusType::STATUSPENDING:
526 type = DrmPlugin::kKeyStatusType_StatusPending;
527 break;
Robert Shiha5033262019-05-06 14:15:12 -0700528 case KeyStatusType::USABLEINFUTURE:
529 type = DrmPlugin::kKeyStatusType_UsableInFuture;
530 break;
Jeff Tinkera53d6552017-01-20 00:31:46 -0800531 case KeyStatusType::INTERNALERROR:
532 default:
533 type = DrmPlugin::kKeyStatusType_InternalError;
534 break;
535 }
Robert Shih61e1c762019-10-31 21:26:58 -0700536 keyStatusList.push_back({type, keyStatus.keyId});
Adam Stonecea91ce2018-01-22 19:23:28 -0800537 mMetrics.mKeyStatusChangeCounter.Increment(keyStatus.type);
Jeff Tinkera53d6552017-01-20 00:31:46 -0800538 }
Jeff Tinkera53d6552017-01-20 00:31:46 -0800539
540 Mutex::Autolock lock(mNotifyLock);
Robert Shih61e1c762019-10-31 21:26:58 -0700541 listener->sendKeysChange(sessionId, keyStatusList, hasNewUsableKey);
Adam Stonecea91ce2018-01-22 19:23:28 -0800542 } else {
543 // There's no listener. But we still want to count the key change
544 // events.
Robert Shih61e1c762019-10-31 21:26:58 -0700545 size_t nKeys = hKeyStatusList.size();
Adam Stonecea91ce2018-01-22 19:23:28 -0800546 for (size_t i = 0; i < nKeys; i++) {
Robert Shih61e1c762019-10-31 21:26:58 -0700547 mMetrics.mKeyStatusChangeCounter.Increment(hKeyStatusList[i].type);
Adam Stonecea91ce2018-01-22 19:23:28 -0800548 }
Jeff Tinkera53d6552017-01-20 00:31:46 -0800549 }
Adam Stonecea91ce2018-01-22 19:23:28 -0800550
Jeff Tinkera53d6552017-01-20 00:31:46 -0800551 return Void();
552}
553
Jeff Tinkerb8684f32018-12-12 08:41:31 -0800554Return<void> DrmHal::sendSessionLostState(
555 const hidl_vec<uint8_t>& sessionId) {
556
557 mEventLock.lock();
558 sp<IDrmClient> listener = mListener;
559 mEventLock.unlock();
560
561 if (listener != NULL) {
Jeff Tinkerb8684f32018-12-12 08:41:31 -0800562 Mutex::Autolock lock(mNotifyLock);
Robert Shih61e1c762019-10-31 21:26:58 -0700563 listener->sendSessionLostState(sessionId);
Jeff Tinkerb8684f32018-12-12 08:41:31 -0800564 }
565 return Void();
566}
567
Jeff Tinkerdb3fa5f2019-01-25 22:56:56 -0800568status_t DrmHal::matchMimeTypeAndSecurityLevel(const sp<IDrmFactory> &factory,
569 const uint8_t uuid[16],
570 const String8 &mimeType,
571 DrmPlugin::SecurityLevel level,
572 bool *isSupported) {
573 *isSupported = false;
574
575 // handle default value cases
576 if (level == DrmPlugin::kSecurityLevelUnknown) {
577 if (mimeType == "") {
578 // isCryptoSchemeSupported(uuid)
579 *isSupported = true;
580 } else {
581 // isCryptoSchemeSupported(uuid, mimeType)
582 *isSupported = factory->isContentTypeSupported(mimeType.string());
583 }
584 return OK;
585 } else if (mimeType == "") {
586 return BAD_VALUE;
Jeff Tinker99dbfa82019-01-17 17:27:06 -0800587 }
588
Jeff Tinkerdb3fa5f2019-01-25 22:56:56 -0800589 sp<drm::V1_2::IDrmFactory> factoryV1_2 = drm::V1_2::IDrmFactory::castFrom(factory);
590 if (factoryV1_2 == NULL) {
591 return ERROR_UNSUPPORTED;
Jeff Tinker99dbfa82019-01-17 17:27:06 -0800592 } else {
Jeff Tinkerdb3fa5f2019-01-25 22:56:56 -0800593 *isSupported = factoryV1_2->isCryptoSchemeSupported_1_2(uuid,
594 mimeType.string(), toHidlSecurityLevel(level));
595 return OK;
Jeff Tinker99dbfa82019-01-17 17:27:06 -0800596 }
Jeff Tinker99dbfa82019-01-17 17:27:06 -0800597}
598
Jeff Tinkerdb3fa5f2019-01-25 22:56:56 -0800599status_t DrmHal::isCryptoSchemeSupported(const uint8_t uuid[16],
600 const String8 &mimeType,
601 DrmPlugin::SecurityLevel level,
602 bool *isSupported) {
Jeff Tinkera53d6552017-01-20 00:31:46 -0800603 Mutex::Autolock autoLock(mLock);
Jeff Tinkerdb3fa5f2019-01-25 22:56:56 -0800604 *isSupported = false;
605 for (ssize_t i = mFactories.size() - 1; i >= 0; i--) {
606 if (mFactories[i]->isCryptoSchemeSupported(uuid)) {
607 return matchMimeTypeAndSecurityLevel(mFactories[i],
608 uuid, mimeType, level, isSupported);
Jeff Tinkera53d6552017-01-20 00:31:46 -0800609 }
610 }
Jeff Tinkerdb3fa5f2019-01-25 22:56:56 -0800611 return OK;
Jeff Tinkera53d6552017-01-20 00:31:46 -0800612}
613
Edwin Wong68b3d9f2017-01-06 19:07:54 -0800614status_t DrmHal::createPlugin(const uint8_t uuid[16],
615 const String8& appPackageName) {
Jeff Tinkera53d6552017-01-20 00:31:46 -0800616 Mutex::Autolock autoLock(mLock);
617
Jeff Tinkerdb3fa5f2019-01-25 22:56:56 -0800618 for (ssize_t i = mFactories.size() - 1; i >= 0; i--) {
Jeff Tinkerabeb36a2017-02-17 09:42:46 -0800619 if (mFactories[i]->isCryptoSchemeSupported(uuid)) {
Peter Kalauskas7676a402018-12-27 11:04:16 -0800620 auto plugin = makeDrmPlugin(mFactories[i], uuid, appPackageName);
621 if (plugin != NULL) {
622 mPlugin = plugin;
Edwin Wong5641aa22018-01-30 17:52:21 -0800623 mPluginV1_1 = drm::V1_1::IDrmPlugin::castFrom(mPlugin);
Jeff Tinkerc8baaba2018-10-23 11:32:36 -0700624 mPluginV1_2 = drm::V1_2::IDrmPlugin::castFrom(mPlugin);
Peter Kalauskas7676a402018-12-27 11:04:16 -0800625 break;
Edwin Wong5641aa22018-01-30 17:52:21 -0800626 }
Jeff Tinkerabeb36a2017-02-17 09:42:46 -0800627 }
628 }
Jeff Tinkera53d6552017-01-20 00:31:46 -0800629
630 if (mPlugin == NULL) {
631 mInitCheck = ERROR_UNSUPPORTED;
632 } else {
Jeff Tinkerb8684f32018-12-12 08:41:31 -0800633 mInitCheck = OK;
634 if (mPluginV1_2 != NULL) {
635 if (!mPluginV1_2->setListener(this).isOk()) {
636 mInitCheck = DEAD_OBJECT;
637 }
638 } else if (!mPlugin->setListener(this).isOk()) {
Jeff Tinker319d5f42017-07-26 15:44:33 -0700639 mInitCheck = DEAD_OBJECT;
Jeff Tinkerb8684f32018-12-12 08:41:31 -0800640 }
641 if (mInitCheck != OK) {
642 mPlugin.clear();
643 mPluginV1_1.clear();
644 mPluginV1_2.clear();
Jeff Tinker319d5f42017-07-26 15:44:33 -0700645 }
Jeff Tinkera53d6552017-01-20 00:31:46 -0800646 }
647
Jeff Tinkerb8684f32018-12-12 08:41:31 -0800648
Jeff Tinkera53d6552017-01-20 00:31:46 -0800649 return mInitCheck;
650}
651
652status_t DrmHal::destroyPlugin() {
Jeff Tinker7dfe28f2018-02-15 12:17:40 -0800653 cleanup();
Jeff Tinkera53d6552017-01-20 00:31:46 -0800654 return OK;
655}
656
Jeff Tinker41d279a2018-02-11 19:52:08 +0000657status_t DrmHal::openSession(DrmPlugin::SecurityLevel level,
658 Vector<uint8_t> &sessionId) {
Jeff Tinkera53d6552017-01-20 00:31:46 -0800659 Mutex::Autolock autoLock(mLock);
Jeff Tinker6d998b62017-12-18 14:37:43 -0800660 INIT_CHECK();
Jeff Tinkera53d6552017-01-20 00:31:46 -0800661
Jeff Tinker99dbfa82019-01-17 17:27:06 -0800662 SecurityLevel hSecurityLevel = toHidlSecurityLevel(level);
Jeff Tinker41d279a2018-02-11 19:52:08 +0000663 bool setSecurityLevel = true;
Tobias Thierer5f5e43f2018-02-11 15:00:57 +0000664
Jeff Tinker99dbfa82019-01-17 17:27:06 -0800665 if (level == DrmPlugin::kSecurityLevelMax) {
Jeff Tinker41d279a2018-02-11 19:52:08 +0000666 setSecurityLevel = false;
Jeff Tinker99dbfa82019-01-17 17:27:06 -0800667 } else {
668 if (hSecurityLevel == SecurityLevel::UNKNOWN) {
669 return ERROR_DRM_CANNOT_HANDLE;
670 }
Jeff Tinker41d279a2018-02-11 19:52:08 +0000671 }
672
673 status_t err = UNKNOWN_ERROR;
Jeff Tinkera53d6552017-01-20 00:31:46 -0800674 bool retry = true;
675 do {
676 hidl_vec<uint8_t> hSessionId;
677
Jeff Tinker41d279a2018-02-11 19:52:08 +0000678 Return<void> hResult;
679 if (mPluginV1_1 == NULL || !setSecurityLevel) {
680 hResult = mPlugin->openSession(
681 [&](Status status,const hidl_vec<uint8_t>& id) {
682 if (status == Status::OK) {
683 sessionId = toVector(id);
684 }
685 err = toStatusT(status);
Jeff Tinkera53d6552017-01-20 00:31:46 -0800686 }
Jeff Tinker41d279a2018-02-11 19:52:08 +0000687 );
688 } else {
689 hResult = mPluginV1_1->openSession_1_1(hSecurityLevel,
690 [&](Status status, const hidl_vec<uint8_t>& id) {
691 if (status == Status::OK) {
692 sessionId = toVector(id);
693 }
694 err = toStatusT(status);
695 }
696 );
697 }
Jeff Tinkera53d6552017-01-20 00:31:46 -0800698
699 if (!hResult.isOk()) {
700 err = DEAD_OBJECT;
701 }
702
703 if (err == ERROR_DRM_RESOURCE_BUSY && retry) {
704 mLock.unlock();
705 // reclaimSession may call back to closeSession, since mLock is
706 // shared between Drm instances, we should unlock here to avoid
707 // deadlock.
Robert Shih6152d7c2019-11-19 22:54:27 -0800708 retry = DrmSessionManager::Instance()->reclaimSession(AIBinder_getCallingPid());
Jeff Tinkera53d6552017-01-20 00:31:46 -0800709 mLock.lock();
710 } else {
711 retry = false;
712 }
713 } while (retry);
714
715 if (err == OK) {
Robert Shih0f3a8a02019-11-14 15:43:39 -0800716 std::shared_ptr<DrmSessionClient> client(new DrmSessionClient(this, sessionId));
Robert Shih6152d7c2019-11-19 22:54:27 -0800717 DrmSessionManager::Instance()->addSession(AIBinder_getCallingPid(),
Robert Shih0f3a8a02019-11-14 15:43:39 -0800718 std::static_pointer_cast<IResourceManagerClient>(client), sessionId);
719 mOpenSessions.push_back(client);
Adam Stone568b3c42018-01-31 12:57:16 -0800720 mMetrics.SetSessionStart(sessionId);
Jeff Tinkera53d6552017-01-20 00:31:46 -0800721 }
Adam Stoneaaf87dd2018-01-08 11:55:06 -0800722
Adam Stonef0e618d2018-01-17 19:20:41 -0800723 mMetrics.mOpenSessionCounter.Increment(err);
Jeff Tinkera53d6552017-01-20 00:31:46 -0800724 return err;
725}
726
727status_t DrmHal::closeSession(Vector<uint8_t> const &sessionId) {
728 Mutex::Autolock autoLock(mLock);
Jeff Tinker6d998b62017-12-18 14:37:43 -0800729 INIT_CHECK();
Jeff Tinkera53d6552017-01-20 00:31:46 -0800730
Jeff Tinker319d5f42017-07-26 15:44:33 -0700731 Return<Status> status = mPlugin->closeSession(toHidlVec(sessionId));
732 if (status.isOk()) {
733 if (status == Status::OK) {
734 DrmSessionManager::Instance()->removeSession(sessionId);
Robert Shih0f3a8a02019-11-14 15:43:39 -0800735 for (auto i = mOpenSessions.begin(); i != mOpenSessions.end(); i++) {
736 if (isEqualSessionId((*i)->mSessionId, sessionId)) {
737 mOpenSessions.erase(i);
Jeff Tinker319d5f42017-07-26 15:44:33 -0700738 break;
739 }
Jeff Tinker61332812017-05-15 16:53:10 -0700740 }
741 }
Adam Stonecea91ce2018-01-22 19:23:28 -0800742 status_t response = toStatusT(status);
Adam Stone568b3c42018-01-31 12:57:16 -0800743 mMetrics.SetSessionEnd(sessionId);
Adam Stonecea91ce2018-01-22 19:23:28 -0800744 mMetrics.mCloseSessionCounter.Increment(response);
745 return response;
Jeff Tinkera53d6552017-01-20 00:31:46 -0800746 }
Adam Stonecea91ce2018-01-22 19:23:28 -0800747 mMetrics.mCloseSessionCounter.Increment(DEAD_OBJECT);
Jeff Tinker319d5f42017-07-26 15:44:33 -0700748 return DEAD_OBJECT;
Jeff Tinkera53d6552017-01-20 00:31:46 -0800749}
750
Jeff Tinkerb8684f32018-12-12 08:41:31 -0800751static DrmPlugin::KeyRequestType toKeyRequestType(
752 KeyRequestType keyRequestType) {
753 switch (keyRequestType) {
754 case KeyRequestType::INITIAL:
755 return DrmPlugin::kKeyRequestType_Initial;
756 break;
757 case KeyRequestType::RENEWAL:
758 return DrmPlugin::kKeyRequestType_Renewal;
759 break;
760 case KeyRequestType::RELEASE:
761 return DrmPlugin::kKeyRequestType_Release;
762 break;
763 default:
764 return DrmPlugin::kKeyRequestType_Unknown;
765 break;
766 }
767}
768
769static DrmPlugin::KeyRequestType toKeyRequestType_1_1(
770 KeyRequestType_V1_1 keyRequestType) {
771 switch (keyRequestType) {
772 case KeyRequestType_V1_1::NONE:
773 return DrmPlugin::kKeyRequestType_None;
774 break;
775 case KeyRequestType_V1_1::UPDATE:
776 return DrmPlugin::kKeyRequestType_Update;
777 break;
778 default:
779 return toKeyRequestType(static_cast<KeyRequestType>(keyRequestType));
780 break;
781 }
782}
783
Jeff Tinkera53d6552017-01-20 00:31:46 -0800784status_t DrmHal::getKeyRequest(Vector<uint8_t> const &sessionId,
785 Vector<uint8_t> const &initData, String8 const &mimeType,
786 DrmPlugin::KeyType keyType, KeyedVector<String8,
787 String8> const &optionalParameters, Vector<uint8_t> &request,
788 String8 &defaultUrl, DrmPlugin::KeyRequestType *keyRequestType) {
789 Mutex::Autolock autoLock(mLock);
Jeff Tinker6d998b62017-12-18 14:37:43 -0800790 INIT_CHECK();
Adam Stonefb679e32018-02-07 10:25:48 -0800791 EventTimer<status_t> keyRequestTimer(&mMetrics.mGetKeyRequestTimeUs);
Jeff Tinkera53d6552017-01-20 00:31:46 -0800792
793 DrmSessionManager::Instance()->useSession(sessionId);
794
795 KeyType hKeyType;
796 if (keyType == DrmPlugin::kKeyType_Streaming) {
797 hKeyType = KeyType::STREAMING;
798 } else if (keyType == DrmPlugin::kKeyType_Offline) {
799 hKeyType = KeyType::OFFLINE;
800 } else if (keyType == DrmPlugin::kKeyType_Release) {
801 hKeyType = KeyType::RELEASE;
802 } else {
Adam Stonef0e618d2018-01-17 19:20:41 -0800803 keyRequestTimer.SetAttribute(BAD_VALUE);
Jeff Tinkera53d6552017-01-20 00:31:46 -0800804 return BAD_VALUE;
805 }
806
807 ::KeyedVector hOptionalParameters = toHidlKeyedVector(optionalParameters);
808
809 status_t err = UNKNOWN_ERROR;
Jeff Tinkerb8684f32018-12-12 08:41:31 -0800810 Return<void> hResult;
Jeff Tinkera53d6552017-01-20 00:31:46 -0800811
Jeff Tinkerb8684f32018-12-12 08:41:31 -0800812 if (mPluginV1_2 != NULL) {
813 hResult = mPluginV1_2->getKeyRequest_1_2(
814 toHidlVec(sessionId), toHidlVec(initData),
815 toHidlString(mimeType), hKeyType, hOptionalParameters,
816 [&](Status_V1_2 status, const hidl_vec<uint8_t>& hRequest,
817 KeyRequestType_V1_1 hKeyRequestType,
818 const hidl_string& hDefaultUrl) {
819 if (status == Status_V1_2::OK) {
820 request = toVector(hRequest);
821 defaultUrl = toString8(hDefaultUrl);
822 *keyRequestType = toKeyRequestType_1_1(hKeyRequestType);
823 }
824 err = toStatusT_1_2(status);
825 });
826 } else if (mPluginV1_1 != NULL) {
827 hResult = mPluginV1_1->getKeyRequest_1_1(
Rahul Frias59bc3fa2018-01-22 23:48:52 -0800828 toHidlVec(sessionId), toHidlVec(initData),
829 toHidlString(mimeType), hKeyType, hOptionalParameters,
830 [&](Status status, const hidl_vec<uint8_t>& hRequest,
Jeff Tinkerb8684f32018-12-12 08:41:31 -0800831 KeyRequestType_V1_1 hKeyRequestType,
832 const hidl_string& hDefaultUrl) {
833 if (status == Status::OK) {
834 request = toVector(hRequest);
835 defaultUrl = toString8(hDefaultUrl);
836 *keyRequestType = toKeyRequestType_1_1(hKeyRequestType);
Jeff Tinkera53d6552017-01-20 00:31:46 -0800837 }
838 err = toStatusT(status);
Jeff Tinkerb8684f32018-12-12 08:41:31 -0800839 });
840 } else {
841 hResult = mPlugin->getKeyRequest(
842 toHidlVec(sessionId), toHidlVec(initData),
843 toHidlString(mimeType), hKeyType, hOptionalParameters,
844 [&](Status status, const hidl_vec<uint8_t>& hRequest,
845 KeyRequestType hKeyRequestType,
846 const hidl_string& hDefaultUrl) {
847 if (status == Status::OK) {
848 request = toVector(hRequest);
849 defaultUrl = toString8(hDefaultUrl);
850 *keyRequestType = toKeyRequestType(hKeyRequestType);
851 }
852 err = toStatusT(status);
853 });
854 }
Jeff Tinkera53d6552017-01-20 00:31:46 -0800855
Adam Stonef0e618d2018-01-17 19:20:41 -0800856 err = hResult.isOk() ? err : DEAD_OBJECT;
857 keyRequestTimer.SetAttribute(err);
858 return err;
Jeff Tinkera53d6552017-01-20 00:31:46 -0800859}
860
861status_t DrmHal::provideKeyResponse(Vector<uint8_t> const &sessionId,
862 Vector<uint8_t> const &response, Vector<uint8_t> &keySetId) {
863 Mutex::Autolock autoLock(mLock);
Jeff Tinker6d998b62017-12-18 14:37:43 -0800864 INIT_CHECK();
George Burgess IVc42403d2019-10-18 09:54:32 -0700865 EventTimer<status_t> keyResponseTimer(&mMetrics.mProvideKeyResponseTimeUs);
Jeff Tinkera53d6552017-01-20 00:31:46 -0800866
867 DrmSessionManager::Instance()->useSession(sessionId);
868
869 status_t err = UNKNOWN_ERROR;
870
871 Return<void> hResult = mPlugin->provideKeyResponse(toHidlVec(sessionId),
872 toHidlVec(response),
873 [&](Status status, const hidl_vec<uint8_t>& hKeySetId) {
874 if (status == Status::OK) {
875 keySetId = toVector(hKeySetId);
876 }
877 err = toStatusT(status);
878 }
879 );
Adam Stonecea91ce2018-01-22 19:23:28 -0800880 err = hResult.isOk() ? err : DEAD_OBJECT;
881 keyResponseTimer.SetAttribute(err);
882 return err;
Jeff Tinkera53d6552017-01-20 00:31:46 -0800883}
884
885status_t DrmHal::removeKeys(Vector<uint8_t> const &keySetId) {
886 Mutex::Autolock autoLock(mLock);
Jeff Tinker6d998b62017-12-18 14:37:43 -0800887 INIT_CHECK();
Jeff Tinkera53d6552017-01-20 00:31:46 -0800888
Jeff Tinker58ad4752018-02-16 16:51:59 -0800889 Return<Status> status = mPlugin->removeKeys(toHidlVec(keySetId));
890 return status.isOk() ? toStatusT(status) : DEAD_OBJECT;
Jeff Tinkera53d6552017-01-20 00:31:46 -0800891}
892
893status_t DrmHal::restoreKeys(Vector<uint8_t> const &sessionId,
894 Vector<uint8_t> const &keySetId) {
895 Mutex::Autolock autoLock(mLock);
Jeff Tinker6d998b62017-12-18 14:37:43 -0800896 INIT_CHECK();
Jeff Tinkera53d6552017-01-20 00:31:46 -0800897
898 DrmSessionManager::Instance()->useSession(sessionId);
899
Jeff Tinker58ad4752018-02-16 16:51:59 -0800900 Return<Status> status = mPlugin->restoreKeys(toHidlVec(sessionId),
901 toHidlVec(keySetId));
902 return status.isOk() ? toStatusT(status) : DEAD_OBJECT;
Jeff Tinkera53d6552017-01-20 00:31:46 -0800903}
904
905status_t DrmHal::queryKeyStatus(Vector<uint8_t> const &sessionId,
906 KeyedVector<String8, String8> &infoMap) const {
907 Mutex::Autolock autoLock(mLock);
Jeff Tinker6d998b62017-12-18 14:37:43 -0800908 INIT_CHECK();
Jeff Tinkera53d6552017-01-20 00:31:46 -0800909
910 DrmSessionManager::Instance()->useSession(sessionId);
911
912 ::KeyedVector hInfoMap;
913
914 status_t err = UNKNOWN_ERROR;
915
916 Return<void> hResult = mPlugin->queryKeyStatus(toHidlVec(sessionId),
917 [&](Status status, const hidl_vec<KeyValue>& map) {
918 if (status == Status::OK) {
919 infoMap = toKeyedVector(map);
920 }
921 err = toStatusT(status);
922 }
923 );
924
925 return hResult.isOk() ? err : DEAD_OBJECT;
926}
927
928status_t DrmHal::getProvisionRequest(String8 const &certType,
929 String8 const &certAuthority, Vector<uint8_t> &request,
930 String8 &defaultUrl) {
931 Mutex::Autolock autoLock(mLock);
Jeff Tinker6d998b62017-12-18 14:37:43 -0800932 INIT_CHECK();
Jeff Tinkera53d6552017-01-20 00:31:46 -0800933
934 status_t err = UNKNOWN_ERROR;
Jeff Tinkerb8684f32018-12-12 08:41:31 -0800935 Return<void> hResult;
Jeff Tinkera53d6552017-01-20 00:31:46 -0800936
Jeff Tinkerb8684f32018-12-12 08:41:31 -0800937 if (mPluginV1_2 != NULL) {
938 Return<void> hResult = mPluginV1_2->getProvisionRequest_1_2(
939 toHidlString(certType), toHidlString(certAuthority),
940 [&](Status_V1_2 status, const hidl_vec<uint8_t>& hRequest,
941 const hidl_string& hDefaultUrl) {
942 if (status == Status_V1_2::OK) {
943 request = toVector(hRequest);
944 defaultUrl = toString8(hDefaultUrl);
945 }
946 err = toStatusT_1_2(status);
Jeff Tinkera53d6552017-01-20 00:31:46 -0800947 }
Jeff Tinkerb8684f32018-12-12 08:41:31 -0800948 );
949 } else {
950 Return<void> hResult = mPlugin->getProvisionRequest(
951 toHidlString(certType), toHidlString(certAuthority),
952 [&](Status status, const hidl_vec<uint8_t>& hRequest,
953 const hidl_string& hDefaultUrl) {
954 if (status == Status::OK) {
955 request = toVector(hRequest);
956 defaultUrl = toString8(hDefaultUrl);
957 }
958 err = toStatusT(status);
959 }
960 );
961 }
Jeff Tinkera53d6552017-01-20 00:31:46 -0800962
Adam Stonecea91ce2018-01-22 19:23:28 -0800963 err = hResult.isOk() ? err : DEAD_OBJECT;
964 mMetrics.mGetProvisionRequestCounter.Increment(err);
965 return err;
Jeff Tinkera53d6552017-01-20 00:31:46 -0800966}
967
968status_t DrmHal::provideProvisionResponse(Vector<uint8_t> const &response,
Edwin Wong68b3d9f2017-01-06 19:07:54 -0800969 Vector<uint8_t> &certificate, Vector<uint8_t> &wrappedKey) {
Jeff Tinkera53d6552017-01-20 00:31:46 -0800970 Mutex::Autolock autoLock(mLock);
Jeff Tinker6d998b62017-12-18 14:37:43 -0800971 INIT_CHECK();
Jeff Tinkera53d6552017-01-20 00:31:46 -0800972
973 status_t err = UNKNOWN_ERROR;
974
975 Return<void> hResult = mPlugin->provideProvisionResponse(toHidlVec(response),
976 [&](Status status, const hidl_vec<uint8_t>& hCertificate,
977 const hidl_vec<uint8_t>& hWrappedKey) {
978 if (status == Status::OK) {
979 certificate = toVector(hCertificate);
980 wrappedKey = toVector(hWrappedKey);
981 }
982 err = toStatusT(status);
983 }
984 );
985
Adam Stonecea91ce2018-01-22 19:23:28 -0800986 err = hResult.isOk() ? err : DEAD_OBJECT;
987 mMetrics.mProvideProvisionResponseCounter.Increment(err);
988 return err;
Jeff Tinkera53d6552017-01-20 00:31:46 -0800989}
990
Jeff Tinkerabeb36a2017-02-17 09:42:46 -0800991status_t DrmHal::getSecureStops(List<Vector<uint8_t>> &secureStops) {
Jeff Tinkera53d6552017-01-20 00:31:46 -0800992 Mutex::Autolock autoLock(mLock);
Jeff Tinker6d998b62017-12-18 14:37:43 -0800993 INIT_CHECK();
Jeff Tinkera53d6552017-01-20 00:31:46 -0800994
995 status_t err = UNKNOWN_ERROR;
996
997 Return<void> hResult = mPlugin->getSecureStops(
998 [&](Status status, const hidl_vec<SecureStop>& hSecureStops) {
999 if (status == Status::OK) {
1000 secureStops = toSecureStops(hSecureStops);
1001 }
1002 err = toStatusT(status);
1003 }
1004 );
1005
1006 return hResult.isOk() ? err : DEAD_OBJECT;
1007}
1008
1009
Jeff Tinker15177d72018-01-25 12:57:55 -08001010status_t DrmHal::getSecureStopIds(List<Vector<uint8_t>> &secureStopIds) {
1011 Mutex::Autolock autoLock(mLock);
1012
1013 if (mInitCheck != OK) {
1014 return mInitCheck;
1015 }
1016
1017 if (mPluginV1_1 == NULL) {
1018 return ERROR_DRM_CANNOT_HANDLE;
1019 }
1020
1021 status_t err = UNKNOWN_ERROR;
1022
1023 Return<void> hResult = mPluginV1_1->getSecureStopIds(
1024 [&](Status status, const hidl_vec<SecureStopId>& hSecureStopIds) {
1025 if (status == Status::OK) {
1026 secureStopIds = toSecureStopIds(hSecureStopIds);
1027 }
1028 err = toStatusT(status);
1029 }
1030 );
1031
1032 return hResult.isOk() ? err : DEAD_OBJECT;
1033}
1034
1035
Jeff Tinkera53d6552017-01-20 00:31:46 -08001036status_t DrmHal::getSecureStop(Vector<uint8_t> const &ssid, Vector<uint8_t> &secureStop) {
1037 Mutex::Autolock autoLock(mLock);
Jeff Tinker6d998b62017-12-18 14:37:43 -08001038 INIT_CHECK();
Jeff Tinkera53d6552017-01-20 00:31:46 -08001039
1040 status_t err = UNKNOWN_ERROR;
1041
1042 Return<void> hResult = mPlugin->getSecureStop(toHidlVec(ssid),
1043 [&](Status status, const SecureStop& hSecureStop) {
1044 if (status == Status::OK) {
1045 secureStop = toVector(hSecureStop.opaqueData);
1046 }
1047 err = toStatusT(status);
1048 }
1049 );
1050
1051 return hResult.isOk() ? err : DEAD_OBJECT;
1052}
1053
1054status_t DrmHal::releaseSecureStops(Vector<uint8_t> const &ssRelease) {
1055 Mutex::Autolock autoLock(mLock);
Jeff Tinker6d998b62017-12-18 14:37:43 -08001056 INIT_CHECK();
Jeff Tinkera53d6552017-01-20 00:31:46 -08001057
Jeff Tinker58ad4752018-02-16 16:51:59 -08001058 Return<Status> status(Status::ERROR_DRM_UNKNOWN);
Jeff Tinker15177d72018-01-25 12:57:55 -08001059 if (mPluginV1_1 != NULL) {
1060 SecureStopRelease secureStopRelease;
1061 secureStopRelease.opaqueData = toHidlVec(ssRelease);
Jeff Tinker58ad4752018-02-16 16:51:59 -08001062 status = mPluginV1_1->releaseSecureStops(secureStopRelease);
1063 } else {
1064 status = mPlugin->releaseSecureStop(toHidlVec(ssRelease));
Jeff Tinker15177d72018-01-25 12:57:55 -08001065 }
Jeff Tinker58ad4752018-02-16 16:51:59 -08001066 return status.isOk() ? toStatusT(status) : DEAD_OBJECT;
Jeff Tinkera53d6552017-01-20 00:31:46 -08001067}
1068
Jeff Tinker15177d72018-01-25 12:57:55 -08001069status_t DrmHal::removeSecureStop(Vector<uint8_t> const &ssid) {
1070 Mutex::Autolock autoLock(mLock);
1071
1072 if (mInitCheck != OK) {
1073 return mInitCheck;
1074 }
1075
1076 if (mPluginV1_1 == NULL) {
1077 return ERROR_DRM_CANNOT_HANDLE;
1078 }
1079
Jeff Tinker58ad4752018-02-16 16:51:59 -08001080 Return<Status> status = mPluginV1_1->removeSecureStop(toHidlVec(ssid));
1081 return status.isOk() ? toStatusT(status) : DEAD_OBJECT;
Jeff Tinker15177d72018-01-25 12:57:55 -08001082}
1083
1084status_t DrmHal::removeAllSecureStops() {
Jeff Tinkera53d6552017-01-20 00:31:46 -08001085 Mutex::Autolock autoLock(mLock);
Jeff Tinker6d998b62017-12-18 14:37:43 -08001086 INIT_CHECK();
Jeff Tinkera53d6552017-01-20 00:31:46 -08001087
Jeff Tinker58ad4752018-02-16 16:51:59 -08001088 Return<Status> status(Status::ERROR_DRM_UNKNOWN);
Jeff Tinker15177d72018-01-25 12:57:55 -08001089 if (mPluginV1_1 != NULL) {
Jeff Tinker58ad4752018-02-16 16:51:59 -08001090 status = mPluginV1_1->removeAllSecureStops();
1091 } else {
1092 status = mPlugin->releaseAllSecureStops();
Jeff Tinker15177d72018-01-25 12:57:55 -08001093 }
Jeff Tinker58ad4752018-02-16 16:51:59 -08001094 return status.isOk() ? toStatusT(status) : DEAD_OBJECT;
Jeff Tinkera53d6552017-01-20 00:31:46 -08001095}
1096
Jeff Tinker6d998b62017-12-18 14:37:43 -08001097status_t DrmHal::getHdcpLevels(DrmPlugin::HdcpLevel *connected,
1098 DrmPlugin::HdcpLevel *max) const {
1099 Mutex::Autolock autoLock(mLock);
1100 INIT_CHECK();
1101
1102 if (connected == NULL || max == NULL) {
1103 return BAD_VALUE;
1104 }
1105 status_t err = UNKNOWN_ERROR;
1106
Jeff Tinker6d998b62017-12-18 14:37:43 -08001107 *connected = DrmPlugin::kHdcpLevelUnknown;
1108 *max = DrmPlugin::kHdcpLevelUnknown;
1109
Jeff Tinker44c2cc42019-01-14 10:24:18 -08001110 Return<void> hResult;
1111 if (mPluginV1_2 != NULL) {
1112 hResult = mPluginV1_2->getHdcpLevels_1_2(
1113 [&](Status_V1_2 status, const HdcpLevel_V1_2& hConnected, const HdcpLevel_V1_2& hMax) {
1114 if (status == Status_V1_2::OK) {
1115 *connected = toHdcpLevel(hConnected);
1116 *max = toHdcpLevel(hMax);
1117 }
1118 err = toStatusT_1_2(status);
1119 });
1120 } else if (mPluginV1_1 != NULL) {
1121 hResult = mPluginV1_1->getHdcpLevels(
1122 [&](Status status, const HdcpLevel& hConnected, const HdcpLevel& hMax) {
1123 if (status == Status::OK) {
1124 *connected = toHdcpLevel(static_cast<HdcpLevel_V1_2>(hConnected));
1125 *max = toHdcpLevel(static_cast<HdcpLevel_V1_2>(hMax));
1126 }
1127 err = toStatusT(status);
1128 });
1129 } else {
1130 return ERROR_DRM_CANNOT_HANDLE;
1131 }
Jeff Tinker6d998b62017-12-18 14:37:43 -08001132
1133 return hResult.isOk() ? err : DEAD_OBJECT;
1134}
1135
1136status_t DrmHal::getNumberOfSessions(uint32_t *open, uint32_t *max) const {
1137 Mutex::Autolock autoLock(mLock);
1138 INIT_CHECK();
1139
1140 if (open == NULL || max == NULL) {
1141 return BAD_VALUE;
1142 }
1143 status_t err = UNKNOWN_ERROR;
1144
1145 *open = 0;
1146 *max = 0;
1147
1148 if (mPluginV1_1 == NULL) {
1149 return ERROR_DRM_CANNOT_HANDLE;
1150 }
1151
1152 Return<void> hResult = mPluginV1_1->getNumberOfSessions(
1153 [&](Status status, uint32_t hOpen, uint32_t hMax) {
1154 if (status == Status::OK) {
1155 *open = hOpen;
1156 *max = hMax;
1157 }
1158 err = toStatusT(status);
1159 }
1160 );
1161
1162 return hResult.isOk() ? err : DEAD_OBJECT;
1163}
1164
1165status_t DrmHal::getSecurityLevel(Vector<uint8_t> const &sessionId,
1166 DrmPlugin::SecurityLevel *level) const {
1167 Mutex::Autolock autoLock(mLock);
1168 INIT_CHECK();
1169
1170 if (level == NULL) {
1171 return BAD_VALUE;
1172 }
1173 status_t err = UNKNOWN_ERROR;
1174
1175 if (mPluginV1_1 == NULL) {
1176 return ERROR_DRM_CANNOT_HANDLE;
1177 }
1178
1179 *level = DrmPlugin::kSecurityLevelUnknown;
1180
1181 Return<void> hResult = mPluginV1_1->getSecurityLevel(toHidlVec(sessionId),
1182 [&](Status status, SecurityLevel hLevel) {
1183 if (status == Status::OK) {
1184 *level = toSecurityLevel(hLevel);
1185 }
1186 err = toStatusT(status);
1187 }
1188 );
1189
1190 return hResult.isOk() ? err : DEAD_OBJECT;
1191}
1192
Jeff Tinkerc8baaba2018-10-23 11:32:36 -07001193status_t DrmHal::getOfflineLicenseKeySetIds(List<Vector<uint8_t>> &keySetIds) const {
1194 Mutex::Autolock autoLock(mLock);
1195
1196 if (mInitCheck != OK) {
1197 return mInitCheck;
1198 }
1199
1200 if (mPluginV1_2 == NULL) {
Jeff Tinkerdb3fa5f2019-01-25 22:56:56 -08001201 return ERROR_UNSUPPORTED;
Jeff Tinkerc8baaba2018-10-23 11:32:36 -07001202 }
1203
1204 status_t err = UNKNOWN_ERROR;
1205
1206 Return<void> hResult = mPluginV1_2->getOfflineLicenseKeySetIds(
1207 [&](Status status, const hidl_vec<KeySetId>& hKeySetIds) {
1208 if (status == Status::OK) {
1209 keySetIds = toKeySetIds(hKeySetIds);
1210 }
1211 err = toStatusT(status);
1212 }
1213 );
1214
1215 return hResult.isOk() ? err : DEAD_OBJECT;
1216}
1217
1218status_t DrmHal::removeOfflineLicense(Vector<uint8_t> const &keySetId) {
1219 Mutex::Autolock autoLock(mLock);
1220
1221 if (mInitCheck != OK) {
1222 return mInitCheck;
1223 }
1224
1225 if (mPluginV1_2 == NULL) {
Jeff Tinkerdb3fa5f2019-01-25 22:56:56 -08001226 return ERROR_UNSUPPORTED;
Jeff Tinkerc8baaba2018-10-23 11:32:36 -07001227 }
1228
1229 Return<Status> status = mPluginV1_2->removeOfflineLicense(toHidlVec(keySetId));
1230 return status.isOk() ? toStatusT(status) : DEAD_OBJECT;
1231}
1232
1233status_t DrmHal::getOfflineLicenseState(Vector<uint8_t> const &keySetId,
1234 DrmPlugin::OfflineLicenseState *licenseState) const {
1235 Mutex::Autolock autoLock(mLock);
1236
1237 if (mInitCheck != OK) {
1238 return mInitCheck;
1239 }
1240
1241 if (mPluginV1_2 == NULL) {
Jeff Tinkerdb3fa5f2019-01-25 22:56:56 -08001242 return ERROR_UNSUPPORTED;
Jeff Tinkerc8baaba2018-10-23 11:32:36 -07001243 }
1244 *licenseState = DrmPlugin::kOfflineLicenseStateUnknown;
1245
1246 status_t err = UNKNOWN_ERROR;
1247
1248 Return<void> hResult = mPluginV1_2->getOfflineLicenseState(toHidlVec(keySetId),
1249 [&](Status status, OfflineLicenseState hLicenseState) {
1250 if (status == Status::OK) {
1251 *licenseState = toOfflineLicenseState(hLicenseState);
1252 }
1253 err = toStatusT(status);
1254 }
1255 );
1256
1257 return hResult.isOk() ? err : DEAD_OBJECT;
1258}
1259
Jeff Tinkera53d6552017-01-20 00:31:46 -08001260status_t DrmHal::getPropertyString(String8 const &name, String8 &value ) const {
1261 Mutex::Autolock autoLock(mLock);
John W. Bruce33ecc4f2017-04-03 16:49:05 -07001262 return getPropertyStringInternal(name, value);
1263}
1264
1265status_t DrmHal::getPropertyStringInternal(String8 const &name, String8 &value) const {
1266 // This function is internal to the class and should only be called while
1267 // mLock is already held.
Jeff Tinker6d998b62017-12-18 14:37:43 -08001268 INIT_CHECK();
Jeff Tinkera53d6552017-01-20 00:31:46 -08001269
1270 status_t err = UNKNOWN_ERROR;
1271
1272 Return<void> hResult = mPlugin->getPropertyString(toHidlString(name),
1273 [&](Status status, const hidl_string& hValue) {
1274 if (status == Status::OK) {
1275 value = toString8(hValue);
1276 }
1277 err = toStatusT(status);
1278 }
1279 );
1280
1281 return hResult.isOk() ? err : DEAD_OBJECT;
1282}
1283
1284status_t DrmHal::getPropertyByteArray(String8 const &name, Vector<uint8_t> &value ) const {
1285 Mutex::Autolock autoLock(mLock);
John W. Bruce33ecc4f2017-04-03 16:49:05 -07001286 return getPropertyByteArrayInternal(name, value);
1287}
1288
1289status_t DrmHal::getPropertyByteArrayInternal(String8 const &name, Vector<uint8_t> &value ) const {
1290 // This function is internal to the class and should only be called while
1291 // mLock is already held.
Jeff Tinker6d998b62017-12-18 14:37:43 -08001292 INIT_CHECK();
Jeff Tinkera53d6552017-01-20 00:31:46 -08001293
1294 status_t err = UNKNOWN_ERROR;
1295
1296 Return<void> hResult = mPlugin->getPropertyByteArray(toHidlString(name),
1297 [&](Status status, const hidl_vec<uint8_t>& hValue) {
1298 if (status == Status::OK) {
1299 value = toVector(hValue);
1300 }
1301 err = toStatusT(status);
1302 }
1303 );
1304
Adam Stonecea91ce2018-01-22 19:23:28 -08001305 err = hResult.isOk() ? err : DEAD_OBJECT;
1306 if (name == kPropertyDeviceUniqueId) {
1307 mMetrics.mGetDeviceUniqueIdCounter.Increment(err);
1308 }
1309 return err;
Jeff Tinkera53d6552017-01-20 00:31:46 -08001310}
1311
1312status_t DrmHal::setPropertyString(String8 const &name, String8 const &value ) const {
1313 Mutex::Autolock autoLock(mLock);
Jeff Tinker6d998b62017-12-18 14:37:43 -08001314 INIT_CHECK();
Jeff Tinkera53d6552017-01-20 00:31:46 -08001315
Jeff Tinker58ad4752018-02-16 16:51:59 -08001316 Return<Status> status = mPlugin->setPropertyString(toHidlString(name),
Jeff Tinkera53d6552017-01-20 00:31:46 -08001317 toHidlString(value));
Jeff Tinker58ad4752018-02-16 16:51:59 -08001318 return status.isOk() ? toStatusT(status) : DEAD_OBJECT;
Jeff Tinkera53d6552017-01-20 00:31:46 -08001319}
1320
1321status_t DrmHal::setPropertyByteArray(String8 const &name,
1322 Vector<uint8_t> const &value ) const {
1323 Mutex::Autolock autoLock(mLock);
Jeff Tinker6d998b62017-12-18 14:37:43 -08001324 INIT_CHECK();
Jeff Tinkera53d6552017-01-20 00:31:46 -08001325
Jeff Tinker58ad4752018-02-16 16:51:59 -08001326 Return<Status> status = mPlugin->setPropertyByteArray(toHidlString(name),
Jeff Tinkera53d6552017-01-20 00:31:46 -08001327 toHidlVec(value));
Jeff Tinker58ad4752018-02-16 16:51:59 -08001328 return status.isOk() ? toStatusT(status) : DEAD_OBJECT;
Jeff Tinkera53d6552017-01-20 00:31:46 -08001329}
1330
Robert Shih93538812019-11-12 12:21:35 -08001331status_t DrmHal::getMetrics(const sp<IDrmMetricsConsumer> &consumer) {
1332 if (consumer == nullptr) {
Adam Stone28f27c32018-02-05 15:07:48 -08001333 return UNEXPECTED_NULL;
1334 }
Robert Shih93538812019-11-12 12:21:35 -08001335 consumer->consumeFrameworkMetrics(mMetrics);
Adam Stone28f27c32018-02-05 15:07:48 -08001336
1337 // Append vendor metrics if they are supported.
1338 if (mPluginV1_1 != NULL) {
1339 String8 vendor;
1340 String8 description;
1341 if (getPropertyStringInternal(String8("vendor"), vendor) != OK
1342 || vendor.isEmpty()) {
1343 ALOGE("Get vendor failed or is empty");
1344 vendor = "NONE";
1345 }
1346 if (getPropertyStringInternal(String8("description"), description) != OK
1347 || description.isEmpty()) {
1348 ALOGE("Get description failed or is empty.");
1349 description = "NONE";
1350 }
1351 vendor += ".";
1352 vendor += description;
1353
1354 hidl_vec<DrmMetricGroup> pluginMetrics;
1355 status_t err = UNKNOWN_ERROR;
1356
1357 Return<void> status = mPluginV1_1->getMetrics(
1358 [&](Status status, hidl_vec<DrmMetricGroup> pluginMetrics) {
1359 if (status != Status::OK) {
1360 ALOGV("Error getting plugin metrics: %d", status);
1361 } else {
Robert Shih93538812019-11-12 12:21:35 -08001362 consumer->consumeHidlMetrics(vendor, pluginMetrics);
Adam Stone28f27c32018-02-05 15:07:48 -08001363 }
1364 err = toStatusT(status);
1365 });
1366 return status.isOk() ? err : DEAD_OBJECT;
Adam Stonef0e618d2018-01-17 19:20:41 -08001367 }
1368
Adam Stoneab394d12017-12-22 12:34:20 -08001369 return OK;
1370}
Jeff Tinkera53d6552017-01-20 00:31:46 -08001371
1372status_t DrmHal::setCipherAlgorithm(Vector<uint8_t> const &sessionId,
1373 String8 const &algorithm) {
1374 Mutex::Autolock autoLock(mLock);
Jeff Tinker6d998b62017-12-18 14:37:43 -08001375 INIT_CHECK();
Jeff Tinkera53d6552017-01-20 00:31:46 -08001376
1377 DrmSessionManager::Instance()->useSession(sessionId);
1378
Jeff Tinkere6412942018-04-30 17:35:16 -07001379 Return<Status> status = mPlugin->setCipherAlgorithm(toHidlVec(sessionId),
Jeff Tinkera53d6552017-01-20 00:31:46 -08001380 toHidlString(algorithm));
Jeff Tinkere6412942018-04-30 17:35:16 -07001381 return status.isOk() ? toStatusT(status) : DEAD_OBJECT;
Jeff Tinkera53d6552017-01-20 00:31:46 -08001382}
1383
1384status_t DrmHal::setMacAlgorithm(Vector<uint8_t> const &sessionId,
1385 String8 const &algorithm) {
1386 Mutex::Autolock autoLock(mLock);
Jeff Tinker6d998b62017-12-18 14:37:43 -08001387 INIT_CHECK();
Jeff Tinkera53d6552017-01-20 00:31:46 -08001388
1389 DrmSessionManager::Instance()->useSession(sessionId);
1390
Jeff Tinkere6412942018-04-30 17:35:16 -07001391 Return<Status> status = mPlugin->setMacAlgorithm(toHidlVec(sessionId),
Jeff Tinkera53d6552017-01-20 00:31:46 -08001392 toHidlString(algorithm));
Jeff Tinkere6412942018-04-30 17:35:16 -07001393 return status.isOk() ? toStatusT(status) : DEAD_OBJECT;
Jeff Tinkera53d6552017-01-20 00:31:46 -08001394}
1395
1396status_t DrmHal::encrypt(Vector<uint8_t> const &sessionId,
Edwin Wong68b3d9f2017-01-06 19:07:54 -08001397 Vector<uint8_t> const &keyId, Vector<uint8_t> const &input,
1398 Vector<uint8_t> const &iv, Vector<uint8_t> &output) {
Jeff Tinkera53d6552017-01-20 00:31:46 -08001399 Mutex::Autolock autoLock(mLock);
Jeff Tinker6d998b62017-12-18 14:37:43 -08001400 INIT_CHECK();
Jeff Tinkera53d6552017-01-20 00:31:46 -08001401
1402 DrmSessionManager::Instance()->useSession(sessionId);
1403
1404 status_t err = UNKNOWN_ERROR;
1405
1406 Return<void> hResult = mPlugin->encrypt(toHidlVec(sessionId),
1407 toHidlVec(keyId), toHidlVec(input), toHidlVec(iv),
1408 [&](Status status, const hidl_vec<uint8_t>& hOutput) {
1409 if (status == Status::OK) {
1410 output = toVector(hOutput);
1411 }
1412 err = toStatusT(status);
1413 }
1414 );
1415
1416 return hResult.isOk() ? err : DEAD_OBJECT;
1417}
1418
1419status_t DrmHal::decrypt(Vector<uint8_t> const &sessionId,
Edwin Wong68b3d9f2017-01-06 19:07:54 -08001420 Vector<uint8_t> const &keyId, Vector<uint8_t> const &input,
1421 Vector<uint8_t> const &iv, Vector<uint8_t> &output) {
Jeff Tinkera53d6552017-01-20 00:31:46 -08001422 Mutex::Autolock autoLock(mLock);
Jeff Tinker6d998b62017-12-18 14:37:43 -08001423 INIT_CHECK();
Jeff Tinkera53d6552017-01-20 00:31:46 -08001424
1425 DrmSessionManager::Instance()->useSession(sessionId);
1426
1427 status_t err = UNKNOWN_ERROR;
1428
1429 Return<void> hResult = mPlugin->decrypt(toHidlVec(sessionId),
1430 toHidlVec(keyId), toHidlVec(input), toHidlVec(iv),
1431 [&](Status status, const hidl_vec<uint8_t>& hOutput) {
1432 if (status == Status::OK) {
1433 output = toVector(hOutput);
1434 }
1435 err = toStatusT(status);
1436 }
1437 );
1438
1439 return hResult.isOk() ? err : DEAD_OBJECT;
1440}
1441
1442status_t DrmHal::sign(Vector<uint8_t> const &sessionId,
Edwin Wong68b3d9f2017-01-06 19:07:54 -08001443 Vector<uint8_t> const &keyId, Vector<uint8_t> const &message,
1444 Vector<uint8_t> &signature) {
Jeff Tinkera53d6552017-01-20 00:31:46 -08001445 Mutex::Autolock autoLock(mLock);
Jeff Tinker6d998b62017-12-18 14:37:43 -08001446 INIT_CHECK();
Jeff Tinkera53d6552017-01-20 00:31:46 -08001447
1448 DrmSessionManager::Instance()->useSession(sessionId);
1449
1450 status_t err = UNKNOWN_ERROR;
1451
1452 Return<void> hResult = mPlugin->sign(toHidlVec(sessionId),
1453 toHidlVec(keyId), toHidlVec(message),
1454 [&](Status status, const hidl_vec<uint8_t>& hSignature) {
1455 if (status == Status::OK) {
1456 signature = toVector(hSignature);
1457 }
1458 err = toStatusT(status);
1459 }
1460 );
1461
1462 return hResult.isOk() ? err : DEAD_OBJECT;
1463}
1464
1465status_t DrmHal::verify(Vector<uint8_t> const &sessionId,
Edwin Wong68b3d9f2017-01-06 19:07:54 -08001466 Vector<uint8_t> const &keyId, Vector<uint8_t> const &message,
1467 Vector<uint8_t> const &signature, bool &match) {
Jeff Tinkera53d6552017-01-20 00:31:46 -08001468 Mutex::Autolock autoLock(mLock);
Jeff Tinker6d998b62017-12-18 14:37:43 -08001469 INIT_CHECK();
Jeff Tinkera53d6552017-01-20 00:31:46 -08001470
1471 DrmSessionManager::Instance()->useSession(sessionId);
1472
1473 status_t err = UNKNOWN_ERROR;
1474
1475 Return<void> hResult = mPlugin->verify(toHidlVec(sessionId),toHidlVec(keyId),
1476 toHidlVec(message), toHidlVec(signature),
1477 [&](Status status, bool hMatch) {
1478 if (status == Status::OK) {
1479 match = hMatch;
1480 } else {
1481 match = false;
1482 }
1483 err = toStatusT(status);
1484 }
1485 );
1486
1487 return hResult.isOk() ? err : DEAD_OBJECT;
1488}
1489
1490status_t DrmHal::signRSA(Vector<uint8_t> const &sessionId,
Edwin Wong68b3d9f2017-01-06 19:07:54 -08001491 String8 const &algorithm, Vector<uint8_t> const &message,
1492 Vector<uint8_t> const &wrappedKey, Vector<uint8_t> &signature) {
Jeff Tinkera53d6552017-01-20 00:31:46 -08001493 Mutex::Autolock autoLock(mLock);
Jeff Tinker6d998b62017-12-18 14:37:43 -08001494 INIT_CHECK();
Jeff Tinkera53d6552017-01-20 00:31:46 -08001495
Jeff Tinkera53d6552017-01-20 00:31:46 -08001496 DrmSessionManager::Instance()->useSession(sessionId);
1497
1498 status_t err = UNKNOWN_ERROR;
1499
1500 Return<void> hResult = mPlugin->signRSA(toHidlVec(sessionId),
1501 toHidlString(algorithm), toHidlVec(message), toHidlVec(wrappedKey),
1502 [&](Status status, const hidl_vec<uint8_t>& hSignature) {
1503 if (status == Status::OK) {
1504 signature = toVector(hSignature);
1505 }
1506 err = toStatusT(status);
1507 }
1508 );
1509
1510 return hResult.isOk() ? err : DEAD_OBJECT;
1511}
1512
Adam Stonefb679e32018-02-07 10:25:48 -08001513void DrmHal::reportFrameworkMetrics() const
1514{
Robert Shih82ea6be2019-11-07 17:47:23 -08001515 mediametrics_handle_t item(mediametrics_create("mediadrm"));
1516 mediametrics_setUid(item, mMetrics.GetAppUid());
Adam Stonefb679e32018-02-07 10:25:48 -08001517 String8 vendor;
1518 String8 description;
1519 status_t result = getPropertyStringInternal(String8("vendor"), vendor);
1520 if (result != OK) {
Jeff Tinker987ac702018-02-15 17:02:22 -08001521 ALOGE("Failed to get vendor from drm plugin: %d", result);
Adam Stonefb679e32018-02-07 10:25:48 -08001522 } else {
Robert Shih82ea6be2019-11-07 17:47:23 -08001523 mediametrics_setCString(item, "vendor", vendor.c_str());
Adam Stonefb679e32018-02-07 10:25:48 -08001524 }
1525 result = getPropertyStringInternal(String8("description"), description);
1526 if (result != OK) {
Jeff Tinker987ac702018-02-15 17:02:22 -08001527 ALOGE("Failed to get description from drm plugin: %d", result);
Adam Stonefb679e32018-02-07 10:25:48 -08001528 } else {
Robert Shih82ea6be2019-11-07 17:47:23 -08001529 mediametrics_setCString(item, "description", description.c_str());
Adam Stonefb679e32018-02-07 10:25:48 -08001530 }
Adam Stoneab394d12017-12-22 12:34:20 -08001531
Adam Stonefb679e32018-02-07 10:25:48 -08001532 std::string serializedMetrics;
1533 result = mMetrics.GetSerializedMetrics(&serializedMetrics);
1534 if (result != OK) {
Jeff Tinker987ac702018-02-15 17:02:22 -08001535 ALOGE("Failed to serialize framework metrics: %d", result);
Adam Stonefb679e32018-02-07 10:25:48 -08001536 }
Adam Stone32494f52018-02-26 22:53:27 -08001537 std::string b64EncodedMetrics = toBase64StringNoPad(serializedMetrics.data(),
1538 serializedMetrics.size());
1539 if (!b64EncodedMetrics.empty()) {
Robert Shih82ea6be2019-11-07 17:47:23 -08001540 mediametrics_setCString(item, "serialized_metrics", b64EncodedMetrics.c_str());
Adam Stonefb679e32018-02-07 10:25:48 -08001541 }
Robert Shih82ea6be2019-11-07 17:47:23 -08001542 if (!mediametrics_selfRecord(item)) {
Jeff Tinker987ac702018-02-15 17:02:22 -08001543 ALOGE("Failed to self record framework metrics");
Adam Stonefb679e32018-02-07 10:25:48 -08001544 }
Robert Shih82ea6be2019-11-07 17:47:23 -08001545 mediametrics_delete(item);
Adam Stonefb679e32018-02-07 10:25:48 -08001546}
1547
1548void DrmHal::reportPluginMetrics() const
John W. Bruce33ecc4f2017-04-03 16:49:05 -07001549{
Adam Stone32494f52018-02-26 22:53:27 -08001550 Vector<uint8_t> metricsVector;
John W. Bruce33ecc4f2017-04-03 16:49:05 -07001551 String8 vendor;
1552 String8 description;
1553 if (getPropertyStringInternal(String8("vendor"), vendor) == OK &&
1554 getPropertyStringInternal(String8("description"), description) == OK &&
Adam Stone32494f52018-02-26 22:53:27 -08001555 getPropertyByteArrayInternal(String8("metrics"), metricsVector) == OK) {
1556 std::string metricsString = toBase64StringNoPad(metricsVector.array(),
1557 metricsVector.size());
1558 status_t res = android::reportDrmPluginMetrics(metricsString, vendor,
Robert Shih82ea6be2019-11-07 17:47:23 -08001559 description, mMetrics.GetAppUid());
John W. Bruce33ecc4f2017-04-03 16:49:05 -07001560 if (res != OK) {
Jeff Tinker987ac702018-02-15 17:02:22 -08001561 ALOGE("Metrics were retrieved but could not be reported: %d", res);
John W. Bruce33ecc4f2017-04-03 16:49:05 -07001562 }
1563 }
1564}
1565
Jeff Tinkera53d6552017-01-20 00:31:46 -08001566} // namespace android