blob: 55b9bb883dedde7b11f66229cfe225841a4ef4d6 [file] [log] [blame]
Jeff Tinkera53d6552017-01-20 00:31:46 -08001/*
2 * Copyright (C) 2017 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17//#define LOG_NDEBUG 0
18#define LOG_TAG "CryptoHal"
19#include <utils/Log.h>
Jeff Tinkera53d6552017-01-20 00:31:46 -080020
21#include <android/hardware/drm/1.0/types.h>
Steven Moreland7dcb4db2019-05-13 13:10:51 -070022#include <android/hidl/manager/1.2/IServiceManager.h>
Jeff Tinkera53d6552017-01-20 00:31:46 -080023#include <binder/IMemory.h>
Steven Moreland7dcb4db2019-05-13 13:10:51 -070024#include <hidl/ServiceManagement.h>
Jeff Tinker7d2c6e82018-02-16 16:14:59 -080025#include <hidlmemory/FrameworkUtils.h>
Jeff Tinkera53d6552017-01-20 00:31:46 -080026#include <media/hardware/CryptoAPI.h>
27#include <media/stagefright/foundation/ADebug.h>
28#include <media/stagefright/foundation/AString.h>
29#include <media/stagefright/foundation/hexdump.h>
30#include <media/stagefright/MediaErrors.h>
Jeff Tinker7d2c6e82018-02-16 16:14:59 -080031#include <mediadrm/CryptoHal.h>
32
Jeff Tinkerb8684f32018-12-12 08:41:31 -080033using drm::V1_0::BufferType;
34using drm::V1_0::DestinationBuffer;
35using drm::V1_0::ICryptoFactory;
36using drm::V1_0::ICryptoPlugin;
37using drm::V1_0::Mode;
38using drm::V1_0::Pattern;
39using drm::V1_0::SharedBuffer;
40using drm::V1_0::Status;
41using drm::V1_0::SubSample;
Jeff Tinkera53d6552017-01-20 00:31:46 -080042
Jeff Tinkera53d6552017-01-20 00:31:46 -080043using ::android::hardware::hidl_array;
44using ::android::hardware::hidl_handle;
45using ::android::hardware::hidl_memory;
46using ::android::hardware::hidl_string;
47using ::android::hardware::hidl_vec;
Robert Shih895fba92019-07-16 16:29:44 -070048using ::android::hardware::HidlMemory;
Jeff Tinkera53d6552017-01-20 00:31:46 -080049using ::android::hardware::Return;
50using ::android::hardware::Void;
51using ::android::sp;
52
Jeff Tinkerb8684f32018-12-12 08:41:31 -080053typedef drm::V1_2::Status Status_V1_2;
Jeff Tinkera53d6552017-01-20 00:31:46 -080054
55namespace android {
56
57static status_t toStatusT(Status status) {
58 switch (status) {
59 case Status::OK:
60 return OK;
61 case Status::ERROR_DRM_NO_LICENSE:
62 return ERROR_DRM_NO_LICENSE;
63 case Status::ERROR_DRM_LICENSE_EXPIRED:
64 return ERROR_DRM_LICENSE_EXPIRED;
65 case Status::ERROR_DRM_RESOURCE_BUSY:
66 return ERROR_DRM_RESOURCE_BUSY;
67 case Status::ERROR_DRM_INSUFFICIENT_OUTPUT_PROTECTION:
68 return ERROR_DRM_INSUFFICIENT_OUTPUT_PROTECTION;
69 case Status::ERROR_DRM_SESSION_NOT_OPENED:
70 return ERROR_DRM_SESSION_NOT_OPENED;
71 case Status::ERROR_DRM_CANNOT_HANDLE:
72 return ERROR_DRM_CANNOT_HANDLE;
Jeff Tinkerd0cb8312017-03-15 11:17:00 -070073 case Status::ERROR_DRM_DECRYPT:
74 return ERROR_DRM_DECRYPT;
Jeff Tinkera53d6552017-01-20 00:31:46 -080075 default:
76 return UNKNOWN_ERROR;
77 }
78}
79
Jeff Tinkerb8684f32018-12-12 08:41:31 -080080static status_t toStatusT_1_2(Status_V1_2 status) {
81 switch (status) {
82 case Status_V1_2::ERROR_DRM_SESSION_LOST_STATE:
83 return ERROR_DRM_SESSION_LOST_STATE;;
84 case Status_V1_2::ERROR_DRM_FRAME_TOO_LARGE:
85 return ERROR_DRM_FRAME_TOO_LARGE;
86 case Status_V1_2::ERROR_DRM_INSUFFICIENT_SECURITY:
87 return ERROR_DRM_INSUFFICIENT_SECURITY;
88 default:
89 return toStatusT(static_cast<Status>(status));
90 }
91}
Jeff Tinkera53d6552017-01-20 00:31:46 -080092
93static hidl_vec<uint8_t> toHidlVec(const Vector<uint8_t> &vector) {
94 hidl_vec<uint8_t> vec;
95 vec.setToExternal(const_cast<uint8_t *>(vector.array()), vector.size());
96 return vec;
97}
98
99static hidl_vec<uint8_t> toHidlVec(const void *ptr, size_t size) {
100 hidl_vec<uint8_t> vec;
101 vec.resize(size);
102 memcpy(vec.data(), ptr, size);
103 return vec;
104}
105
106static hidl_array<uint8_t, 16> toHidlArray16(const uint8_t *ptr) {
107 if (!ptr) {
108 return hidl_array<uint8_t, 16>();
109 }
110 return hidl_array<uint8_t, 16>(ptr);
111}
112
113
Jeff Tinkera53d6552017-01-20 00:31:46 -0800114static String8 toString8(hidl_string hString) {
115 return String8(hString.c_str());
116}
117
118
119CryptoHal::CryptoHal()
Jeff Tinkerabeb36a2017-02-17 09:42:46 -0800120 : mFactories(makeCryptoFactories()),
121 mInitCheck((mFactories.size() == 0) ? ERROR_UNSUPPORTED : NO_INIT),
Chong Zhang6dcab2b2017-03-28 14:18:27 -0700122 mHeapSeqNum(0) {
Jeff Tinkera53d6552017-01-20 00:31:46 -0800123}
124
125CryptoHal::~CryptoHal() {
126}
127
Jeff Tinkerabeb36a2017-02-17 09:42:46 -0800128Vector<sp<ICryptoFactory>> CryptoHal::makeCryptoFactories() {
129 Vector<sp<ICryptoFactory>> factories;
Jeff Tinkera53d6552017-01-20 00:31:46 -0800130
Steven Moreland7dcb4db2019-05-13 13:10:51 -0700131 auto manager = hardware::defaultServiceManager1_2();
Jeff Tinkerabeb36a2017-02-17 09:42:46 -0800132 if (manager != NULL) {
Steven Moreland7dcb4db2019-05-13 13:10:51 -0700133 manager->listManifestByInterface(drm::V1_0::ICryptoFactory::descriptor,
Jeff Tinkerabeb36a2017-02-17 09:42:46 -0800134 [&factories](const hidl_vec<hidl_string> &registered) {
135 for (const auto &instance : registered) {
Jeff Tinkere307dc42018-02-11 19:53:54 +0000136 auto factory = drm::V1_0::ICryptoFactory::getService(instance);
Jeff Tinkerabeb36a2017-02-17 09:42:46 -0800137 if (factory != NULL) {
Jeff Tinkere307dc42018-02-11 19:53:54 +0000138 ALOGD("found drm@1.0 ICryptoFactory %s", instance.c_str());
Jeff Tinkerabeb36a2017-02-17 09:42:46 -0800139 factories.push_back(factory);
Jeff Tinkere307dc42018-02-11 19:53:54 +0000140 }
141 }
142 }
143 );
Steven Moreland7dcb4db2019-05-13 13:10:51 -0700144 manager->listManifestByInterface(drm::V1_1::ICryptoFactory::descriptor,
Jeff Tinkere307dc42018-02-11 19:53:54 +0000145 [&factories](const hidl_vec<hidl_string> &registered) {
146 for (const auto &instance : registered) {
147 auto factory = drm::V1_1::ICryptoFactory::getService(instance);
148 if (factory != NULL) {
149 ALOGD("found drm@1.1 ICryptoFactory %s", instance.c_str());
150 factories.push_back(factory);
Jeff Tinkerabeb36a2017-02-17 09:42:46 -0800151 }
152 }
153 }
154 );
Jeff Tinkera53d6552017-01-20 00:31:46 -0800155 }
Jeff Tinkerabeb36a2017-02-17 09:42:46 -0800156
157 if (factories.size() == 0) {
158 // must be in passthrough mode, load the default passthrough service
Jeff Tinkere309b222017-04-05 08:01:28 -0700159 auto passthrough = ICryptoFactory::getService();
Jeff Tinkerabeb36a2017-02-17 09:42:46 -0800160 if (passthrough != NULL) {
Jeff Tinkere307dc42018-02-11 19:53:54 +0000161 ALOGI("makeCryptoFactories: using default passthrough crypto instance");
Jeff Tinkerabeb36a2017-02-17 09:42:46 -0800162 factories.push_back(passthrough);
163 } else {
164 ALOGE("Failed to find any crypto factories");
165 }
166 }
167 return factories;
Jeff Tinkera53d6552017-01-20 00:31:46 -0800168}
169
Jeff Tinkerabeb36a2017-02-17 09:42:46 -0800170sp<ICryptoPlugin> CryptoHal::makeCryptoPlugin(const sp<ICryptoFactory>& factory,
171 const uint8_t uuid[16], const void *initData, size_t initDataSize) {
Jeff Tinkera53d6552017-01-20 00:31:46 -0800172
173 sp<ICryptoPlugin> plugin;
Jeff Tinkerabeb36a2017-02-17 09:42:46 -0800174 Return<void> hResult = factory->createPlugin(toHidlArray16(uuid),
Jeff Tinkera53d6552017-01-20 00:31:46 -0800175 toHidlVec(initData, initDataSize),
176 [&](Status status, const sp<ICryptoPlugin>& hPlugin) {
177 if (status != Status::OK) {
178 ALOGE("Failed to make crypto plugin");
179 return;
180 }
181 plugin = hPlugin;
182 }
183 );
184 return plugin;
185}
186
187
188status_t CryptoHal::initCheck() const {
189 return mInitCheck;
190}
191
192
193bool CryptoHal::isCryptoSchemeSupported(const uint8_t uuid[16]) {
194 Mutex::Autolock autoLock(mLock);
Jeff Tinkerabeb36a2017-02-17 09:42:46 -0800195
196 for (size_t i = 0; i < mFactories.size(); i++) {
197 if (mFactories[i]->isCryptoSchemeSupported(uuid)) {
198 return true;
199 }
Jeff Tinkera53d6552017-01-20 00:31:46 -0800200 }
201 return false;
202}
203
Jeff Tinkerabeb36a2017-02-17 09:42:46 -0800204status_t CryptoHal::createPlugin(const uint8_t uuid[16], const void *data,
205 size_t size) {
Jeff Tinkera53d6552017-01-20 00:31:46 -0800206 Mutex::Autolock autoLock(mLock);
207
Jeff Tinkerabeb36a2017-02-17 09:42:46 -0800208 for (size_t i = 0; i < mFactories.size(); i++) {
209 if (mFactories[i]->isCryptoSchemeSupported(uuid)) {
210 mPlugin = makeCryptoPlugin(mFactories[i], uuid, data, size);
Jeff Tinkerb8684f32018-12-12 08:41:31 -0800211 if (mPlugin != NULL) {
212 mPluginV1_2 = drm::V1_2::ICryptoPlugin::castFrom(mPlugin);
213 }
Jeff Tinkerabeb36a2017-02-17 09:42:46 -0800214 }
215 }
Jeff Tinkera53d6552017-01-20 00:31:46 -0800216
217 if (mPlugin == NULL) {
218 mInitCheck = ERROR_UNSUPPORTED;
219 } else {
220 mInitCheck = OK;
221 }
222
223 return mInitCheck;
224}
225
226status_t CryptoHal::destroyPlugin() {
227 Mutex::Autolock autoLock(mLock);
228
229 if (mInitCheck != OK) {
230 return mInitCheck;
231 }
232
233 mPlugin.clear();
Jeff Tinkerb8684f32018-12-12 08:41:31 -0800234 mPluginV1_2.clear();
Jeff Tinkera53d6552017-01-20 00:31:46 -0800235 return OK;
236}
237
238bool CryptoHal::requiresSecureDecoderComponent(const char *mime) const {
239 Mutex::Autolock autoLock(mLock);
240
241 if (mInitCheck != OK) {
Jeff Tinkercca23772018-05-07 11:41:56 -0700242 return false;
Jeff Tinkera53d6552017-01-20 00:31:46 -0800243 }
244
Jeff Tinkercca23772018-05-07 11:41:56 -0700245 Return<bool> hResult = mPlugin->requiresSecureDecoderComponent(hidl_string(mime));
246 if (!hResult.isOk()) {
247 return false;
248 }
249 return hResult;
Jeff Tinkera53d6552017-01-20 00:31:46 -0800250}
251
252
253/**
254 * If the heap base isn't set, get the heap base from the IMemory
255 * and send it to the HAL so it can map a remote heap of the same
256 * size. Once the heap base is established, shared memory buffers
257 * are sent by providing an offset into the heap and a buffer size.
258 */
Robert Shih895fba92019-07-16 16:29:44 -0700259int32_t CryptoHal::setHeapBase(const sp<HidlMemory>& heap) {
Robert Shihc9f7efa2019-07-16 16:19:59 -0700260 if (heap == NULL || mHeapSeqNum < 0) {
261 ALOGE("setHeapBase(): heap %p mHeapSeqNum %d", heap.get(), mHeapSeqNum);
Chong Zhang6dcab2b2017-03-28 14:18:27 -0700262 return -1;
263 }
Chong Zhang6dcab2b2017-03-28 14:18:27 -0700264
265 Mutex::Autolock autoLock(mLock);
266
267 int32_t seqNum = mHeapSeqNum++;
Robert Shihc9f7efa2019-07-16 16:19:59 -0700268 uint32_t bufferId = static_cast<uint32_t>(seqNum);
Robert Shih895fba92019-07-16 16:29:44 -0700269 mHeapSizes.add(seqNum, heap->size());
270 Return<void> hResult = mPlugin->setSharedBufferBase(*heap, bufferId);
Jeff Tinker3cb53162017-02-16 12:06:32 -0800271 ALOGE_IF(!hResult.isOk(), "setSharedBufferBase(): remote call failed");
Chong Zhang6dcab2b2017-03-28 14:18:27 -0700272 return seqNum;
Jeff Tinker3cb53162017-02-16 12:06:32 -0800273}
274
Chong Zhang6dcab2b2017-03-28 14:18:27 -0700275void CryptoHal::clearHeapBase(int32_t seqNum) {
276 Mutex::Autolock autoLock(mLock);
277
Jeff Tinker0db0fa12018-05-22 16:55:57 -0700278 /*
279 * Clear the remote shared memory mapping by setting the shared
280 * buffer base to a null hidl_memory.
281 *
282 * TODO: Add a releaseSharedBuffer method in a future DRM HAL
283 * API version to make this explicit.
284 */
Robert Shih895fba92019-07-16 16:29:44 -0700285 ssize_t index = mHeapSizes.indexOfKey(seqNum);
Jeff Tinker20795c72018-05-30 18:20:09 -0700286 if (index >= 0) {
287 if (mPlugin != NULL) {
Robert Shih895fba92019-07-16 16:29:44 -0700288 uint32_t bufferId = static_cast<uint32_t>(seqNum);
Jeff Tinker20795c72018-05-30 18:20:09 -0700289 Return<void> hResult = mPlugin->setSharedBufferBase(hidl_memory(), bufferId);
290 ALOGE_IF(!hResult.isOk(), "setSharedBufferBase(): remote call failed");
291 }
Robert Shih895fba92019-07-16 16:29:44 -0700292 mHeapSizes.removeItem(seqNum);
Jeff Tinker20795c72018-05-30 18:20:09 -0700293 }
Chong Zhangd07c9272017-03-28 11:02:06 -0700294}
295
Robert Shih895fba92019-07-16 16:29:44 -0700296status_t CryptoHal::checkSharedBuffer(const ::SharedBuffer &buffer) {
297 int32_t seqNum = static_cast<int32_t>(buffer.bufferId);
Jeff Tinkerb1f8c802018-04-19 16:23:21 -0700298 // memory must be in one of the heaps that have been set
Robert Shih895fba92019-07-16 16:29:44 -0700299 if (mHeapSizes.indexOfKey(seqNum) < 0) {
Jeff Tinkerb1f8c802018-04-19 16:23:21 -0700300 return UNKNOWN_ERROR;
301 }
Jeff Tinker3cb53162017-02-16 12:06:32 -0800302
Jeff Tinkerb1f8c802018-04-19 16:23:21 -0700303 // memory must be within the address space of the heap
Robert Shih895fba92019-07-16 16:29:44 -0700304 size_t heapSize = mHeapSizes.valueFor(seqNum);
305 if (heapSize < buffer.offset + buffer.size ||
306 SIZE_MAX - buffer.offset < buffer.size) {
Jeff Tinkerb1f8c802018-04-19 16:23:21 -0700307 android_errorWriteLog(0x534e4554, "76221123");
308 return UNKNOWN_ERROR;
309 }
310
Jeff Tinkera53d6552017-01-20 00:31:46 -0800311 return OK;
312}
313
314ssize_t CryptoHal::decrypt(const uint8_t keyId[16], const uint8_t iv[16],
315 CryptoPlugin::Mode mode, const CryptoPlugin::Pattern &pattern,
Robert Shih895fba92019-07-16 16:29:44 -0700316 const ::SharedBuffer &hSource, size_t offset,
Jeff Tinkera53d6552017-01-20 00:31:46 -0800317 const CryptoPlugin::SubSample *subSamples, size_t numSubSamples,
Robert Shih895fba92019-07-16 16:29:44 -0700318 const ::DestinationBuffer &hDestination, AString *errorDetailMsg) {
Jeff Tinkera53d6552017-01-20 00:31:46 -0800319 Mutex::Autolock autoLock(mLock);
320
321 if (mInitCheck != OK) {
322 return mInitCheck;
323 }
324
Jeff Tinkera53d6552017-01-20 00:31:46 -0800325 Mode hMode;
326 switch(mode) {
327 case CryptoPlugin::kMode_Unencrypted:
328 hMode = Mode::UNENCRYPTED ;
329 break;
330 case CryptoPlugin::kMode_AES_CTR:
331 hMode = Mode::AES_CTR;
332 break;
333 case CryptoPlugin::kMode_AES_WV:
334 hMode = Mode::AES_CBC_CTS;
335 break;
336 case CryptoPlugin::kMode_AES_CBC:
337 hMode = Mode::AES_CBC;
338 break;
339 default:
340 return UNKNOWN_ERROR;
341 }
342
343 Pattern hPattern;
344 hPattern.encryptBlocks = pattern.mEncryptBlocks;
345 hPattern.skipBlocks = pattern.mSkipBlocks;
346
347 std::vector<SubSample> stdSubSamples;
348 for (size_t i = 0; i < numSubSamples; i++) {
349 SubSample subSample;
350 subSample.numBytesOfClearData = subSamples[i].mNumBytesOfClearData;
351 subSample.numBytesOfEncryptedData = subSamples[i].mNumBytesOfEncryptedData;
352 stdSubSamples.push_back(subSample);
353 }
354 auto hSubSamples = hidl_vec<SubSample>(stdSubSamples);
355
356 bool secure;
Robert Shih895fba92019-07-16 16:29:44 -0700357 if (hDestination.type == BufferType::SHARED_MEMORY) {
358 status_t status = checkSharedBuffer(hDestination.nonsecureMemory);
Jeff Tinker3cb53162017-02-16 12:06:32 -0800359 if (status != OK) {
360 return status;
361 }
Jeff Tinkera53d6552017-01-20 00:31:46 -0800362 secure = false;
Robert Shih895fba92019-07-16 16:29:44 -0700363 } else if (hDestination.type == BufferType::NATIVE_HANDLE) {
Jeff Tinkera53d6552017-01-20 00:31:46 -0800364 secure = true;
Jeff Tinker24420472018-01-11 17:46:16 -0800365 } else {
366 android_errorWriteLog(0x534e4554, "70526702");
367 return UNKNOWN_ERROR;
Jeff Tinkera53d6552017-01-20 00:31:46 -0800368 }
369
Robert Shih895fba92019-07-16 16:29:44 -0700370 status_t status = checkSharedBuffer(hSource);
Jeff Tinker3cb53162017-02-16 12:06:32 -0800371 if (status != OK) {
372 return status;
373 }
Jeff Tinkera53d6552017-01-20 00:31:46 -0800374
375 status_t err = UNKNOWN_ERROR;
376 uint32_t bytesWritten = 0;
377
Jeff Tinkerb8684f32018-12-12 08:41:31 -0800378 Return<void> hResult;
Jeff Tinkera53d6552017-01-20 00:31:46 -0800379
Jeff Tinkerb8684f32018-12-12 08:41:31 -0800380 if (mPluginV1_2 != NULL) {
381 hResult = mPluginV1_2->decrypt_1_2(secure, toHidlArray16(keyId), toHidlArray16(iv),
382 hMode, hPattern, hSubSamples, hSource, offset, hDestination,
383 [&](Status_V1_2 status, uint32_t hBytesWritten, hidl_string hDetailedError) {
384 if (status == Status_V1_2::OK) {
385 bytesWritten = hBytesWritten;
386 *errorDetailMsg = toString8(hDetailedError);
387 }
388 err = toStatusT_1_2(status);
389 }
390 );
391 } else {
392 hResult = mPlugin->decrypt(secure, toHidlArray16(keyId), toHidlArray16(iv),
393 hMode, hPattern, hSubSamples, hSource, offset, hDestination,
394 [&](Status status, uint32_t hBytesWritten, hidl_string hDetailedError) {
395 if (status == Status::OK) {
396 bytesWritten = hBytesWritten;
397 *errorDetailMsg = toString8(hDetailedError);
398 }
399 err = toStatusT(status);
400 }
401 );
Jeff Tinkera53d6552017-01-20 00:31:46 -0800402 }
403
Jeff Tinkerb8684f32018-12-12 08:41:31 -0800404 err = hResult.isOk() ? err : DEAD_OBJECT;
Jeff Tinkera53d6552017-01-20 00:31:46 -0800405 if (err == OK) {
406 return bytesWritten;
407 }
408 return err;
409}
410
411void CryptoHal::notifyResolution(uint32_t width, uint32_t height) {
412 Mutex::Autolock autoLock(mLock);
413
414 if (mInitCheck != OK) {
415 return;
416 }
417
418 mPlugin->notifyResolution(width, height);
419}
420
421status_t CryptoHal::setMediaDrmSession(const Vector<uint8_t> &sessionId) {
422 Mutex::Autolock autoLock(mLock);
423
424 if (mInitCheck != OK) {
425 return mInitCheck;
426 }
427
428 return toStatusT(mPlugin->setMediaDrmSession(toHidlVec(sessionId)));
429}
430
431} // namespace android