/*
* Copyright (C) 2017 The Android Open Source Project
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#define LOG_TAG "mediacas_hidl_hal_test"
#include <VtsHalHidlTargetTestBase.h>
#include <VtsHalHidlTargetTestEnvBase.h>
#include <android-base/logging.h>
#include <android/hardware/cas/1.0/ICas.h>
#include <android/hardware/cas/1.0/ICasListener.h>
#include <android/hardware/cas/1.0/IDescramblerBase.h>
#include <android/hardware/cas/1.0/IMediaCasService.h>
#include <android/hardware/cas/1.0/types.h>
#include <android/hardware/cas/native/1.0/IDescrambler.h>
#include <android/hardware/cas/native/1.0/types.h>
#include <binder/MemoryDealer.h>
#include <hidl/HidlSupport.h>
#include <hidl/HidlTransportSupport.h>
#include <hidl/Status.h>
#include <hidlmemory/FrameworkUtils.h>
#include <utils/Condition.h>
#include <utils/Mutex.h>
#define CLEAR_KEY_SYSTEM_ID 0xF6D8
#define INVALID_SYSTEM_ID 0
#define WAIT_TIMEOUT 3000000000
#define PROVISION_STR \
"{ " \
" \"id\": 21140844, " \
" \"name\": \"Test Title\", " \
" \"lowercase_organization_name\": \"Android\", " \
" \"asset_key\": { " \
" \"encryption_key\": \"nezAr3CHFrmBR9R8Tedotw==\" " \
" }, " \
" \"cas_type\": 1, " \
" \"track_types\": [ ] " \
"} "
using android::Condition;
using android::hardware::cas::V1_0::ICas;
using android::hardware::cas::V1_0::ICasListener;
using android::hardware::cas::V1_0::IDescramblerBase;
using android::hardware::cas::V1_0::Status;
using android::hardware::cas::native::V1_0::IDescrambler;
using android::hardware::cas::native::V1_0::SubSample;
using android::hardware::cas::native::V1_0::SharedBuffer;
using android::hardware::cas::native::V1_0::DestinationBuffer;
using android::hardware::cas::native::V1_0::BufferType;
using android::hardware::cas::native::V1_0::ScramblingControl;
using android::hardware::cas::V1_0::IMediaCasService;
using android::hardware::cas::V1_0::HidlCasPluginDescriptor;
using android::hardware::fromHeap;
using android::hardware::hidl_vec;
using android::hardware::hidl_string;
using android::hardware::HidlMemory;
using android::hardware::Return;
using android::hardware::Void;
using android::IMemory;
using android::IMemoryHeap;
using android::MemoryDealer;
using android::Mutex;
using android::sp;
namespace {
const uint8_t kEcmBinaryBuffer[] = {
0x00, 0x00, 0x01, 0xf0, 0x00, 0x50, 0x00, 0x01, 0x00, 0x00, 0x00, 0x01, 0x00, 0x46, 0x00,
0x00, 0x00, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x27, 0x10, 0x02, 0x00,
0x01, 0x77, 0x01, 0x42, 0x95, 0x6c, 0x0e, 0xe3, 0x91, 0xbc, 0xfd, 0x05, 0xb1, 0x60, 0x4f,
0x17, 0x82, 0xa4, 0x86, 0x9b, 0x23, 0x56, 0x00, 0x01, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00,
0x27, 0x10, 0x02, 0x00, 0x01, 0x77, 0x01, 0x42, 0x95, 0x6c, 0xd7, 0x43, 0x62, 0xf8, 0x1c,
0x62, 0x19, 0x05, 0xc7, 0x3a, 0x42, 0xcd, 0xfd, 0xd9, 0x13, 0x48,
};
const SubSample kSubSamples[] = {{162, 0}, {0, 184}, {0, 184}};
const uint8_t kInBinaryBuffer[] = {
0x00, 0x00, 0x00, 0x01, 0x09, 0xf0, 0x00, 0x00, 0x00, 0x01, 0x67, 0x42, 0xc0, 0x1e, 0xdb, 0x01,
0x40, 0x16, 0xec, 0x04, 0x40, 0x00, 0x00, 0x03, 0x00, 0x40, 0x00, 0x00, 0x0f, 0x03, 0xc5, 0x8b,
0xb8, 0x00, 0x00, 0x00, 0x01, 0x68, 0xca, 0x8c, 0xb2, 0x00, 0x00, 0x01, 0x06, 0x05, 0xff, 0xff,
0x70, 0xdc, 0x45, 0xe9, 0xbd, 0xe6, 0xd9, 0x48, 0xb7, 0x96, 0x2c, 0xd8, 0x20, 0xd9, 0x23, 0xee,
0xef, 0x78, 0x32, 0x36, 0x34, 0x20, 0x2d, 0x20, 0x63, 0x6f, 0x72, 0x65, 0x20, 0x31, 0x34, 0x32,
0x20, 0x2d, 0x20, 0x48, 0x2e, 0x32, 0x36, 0x34, 0x2f, 0x4d, 0x50, 0x45, 0x47, 0x2d, 0x34, 0x20,
0x41, 0x56, 0x43, 0x20, 0x63, 0x6f, 0x64, 0x65, 0x63, 0x20, 0x2d, 0x20, 0x43, 0x6f, 0x70, 0x79,
0x6c, 0x65, 0x66, 0x74, 0x20, 0x32, 0x30, 0x30, 0x33, 0x2d, 0x32, 0x30, 0x31, 0x34, 0x20, 0x2d,
0x20, 0x68, 0x74, 0x74, 0x70, 0x3a, 0x2f, 0x2f, 0x77, 0x77, 0x77, 0x2e, 0x76, 0x69, 0x64, 0x65,
0x6f, 0x6c, 0x61, 0x6e, 0x2e, 0x6f, 0x72, 0x67, 0x2f, 0x78, 0x32, 0x36, 0x34, 0x2e, 0x68, 0x74,
0x6d, 0x6c, 0x6e, 0x45, 0x21, 0x82, 0x38, 0xf0, 0x9d, 0x7d, 0x96, 0xe6, 0x94, 0xae, 0xe2, 0x87,
0x8f, 0x04, 0x49, 0xe5, 0xf6, 0x8c, 0x8b, 0x9a, 0x10, 0x18, 0xba, 0x94, 0xe9, 0x22, 0x31, 0x04,
0x7e, 0x60, 0x5b, 0xc4, 0x24, 0x00, 0x90, 0x62, 0x0d, 0xdc, 0x85, 0x74, 0x75, 0x78, 0xd0, 0x14,
0x08, 0xcb, 0x02, 0x1d, 0x7d, 0x9d, 0x34, 0xe8, 0x81, 0xb9, 0xf7, 0x09, 0x28, 0x79, 0x29, 0x8d,
0xe3, 0x14, 0xed, 0x5f, 0xca, 0xaf, 0xf4, 0x1c, 0x49, 0x15, 0xe1, 0x80, 0x29, 0x61, 0x76, 0x80,
0x43, 0xf8, 0x58, 0x53, 0x40, 0xd7, 0x31, 0x6d, 0x61, 0x81, 0x41, 0xe9, 0x77, 0x9f, 0x9c, 0xe1,
0x6d, 0xf2, 0xee, 0xd9, 0xc8, 0x67, 0xd2, 0x5f, 0x48, 0x73, 0xe3, 0x5c, 0xcd, 0xa7, 0x45, 0x58,
0xbb, 0xdd, 0x28, 0x1d, 0x68, 0xfc, 0xb4, 0xc6, 0xf6, 0x92, 0xf6, 0x30, 0x03, 0xaa, 0xe4, 0x32,
0xf6, 0x34, 0x51, 0x4b, 0x0f, 0x8c, 0xf9, 0xac, 0x98, 0x22, 0xfb, 0x49, 0xc8, 0xbf, 0xca, 0x8c,
0x80, 0x86, 0x5d, 0xd7, 0xa4, 0x52, 0xb1, 0xd9, 0xa6, 0x04, 0x4e, 0xb3, 0x2d, 0x1f, 0xb8, 0x35,
0xcc, 0x45, 0x6d, 0x9c, 0x20, 0xa7, 0xa4, 0x34, 0x59, 0x72, 0xe3, 0xae, 0xba, 0x49, 0xde, 0xd1,
0xaa, 0xee, 0x3d, 0x77, 0xfc, 0x5d, 0xc6, 0x1f, 0x9d, 0xac, 0xc2, 0x15, 0x66, 0xb8, 0xe1, 0x54,
0x4e, 0x74, 0x93, 0xdb, 0x9a, 0x24, 0x15, 0x6e, 0x20, 0xa3, 0x67, 0x3e, 0x5a, 0x24, 0x41, 0x5e,
0xb0, 0xe6, 0x35, 0x87, 0x1b, 0xc8, 0x7a, 0xf9, 0x77, 0x65, 0xe0, 0x01, 0xf2, 0x4c, 0xe4, 0x2b,
0xa9, 0x64, 0x96, 0x96, 0x0b, 0x46, 0xca, 0xea, 0x79, 0x0e, 0x78, 0xa3, 0x5f, 0x43, 0xfc, 0x47,
0x6a, 0x12, 0xfa, 0xc4, 0x33, 0x0e, 0x88, 0x1c, 0x19, 0x3a, 0x00, 0xc3, 0x4e, 0xb5, 0xd8, 0xfa,
0x8e, 0xf1, 0xbc, 0x3d, 0xb2, 0x7e, 0x50, 0x8d, 0x67, 0xc3, 0x6b, 0xed, 0xe2, 0xea, 0xa6, 0x1f,
0x25, 0x24, 0x7c, 0x94, 0x74, 0x50, 0x49, 0xe3, 0xc6, 0x58, 0x2e, 0xfd, 0x28, 0xb4, 0xc6, 0x73,
0xb1, 0x53, 0x74, 0x27, 0x94, 0x5c, 0xdf, 0x69, 0xb7, 0xa1, 0xd7, 0xf5, 0xd3, 0x8a, 0x2c, 0x2d,
0xb4, 0x5e, 0x8a, 0x16, 0x14, 0x54, 0x64, 0x6e, 0x00, 0x6b, 0x11, 0x59, 0x8a, 0x63, 0x38, 0x80,
0x76, 0xc3, 0xd5, 0x59, 0xf7, 0x3f, 0xd2, 0xfa, 0xa5, 0xca, 0x82, 0xff, 0x4a, 0x62, 0xf0, 0xe3,
0x42, 0xf9, 0x3b, 0x38, 0x27, 0x8a, 0x89, 0xaa, 0x50, 0x55, 0x4b, 0x29, 0xf1, 0x46, 0x7c, 0x75,
0xef, 0x65, 0xaf, 0x9b, 0x0d, 0x6d, 0xda, 0x25, 0x94, 0x14, 0xc1, 0x1b, 0xf0, 0xc5, 0x4c, 0x24,
0x0e, 0x65,
};
const uint8_t kOutRefBinaryBuffer[] = {
0x00, 0x00, 0x00, 0x01, 0x09, 0xf0, 0x00, 0x00, 0x00, 0x01, 0x67, 0x42, 0xc0, 0x1e, 0xdb, 0x01,
0x40, 0x16, 0xec, 0x04, 0x40, 0x00, 0x00, 0x03, 0x00, 0x40, 0x00, 0x00, 0x0f, 0x03, 0xc5, 0x8b,
0xb8, 0x00, 0x00, 0x00, 0x01, 0x68, 0xca, 0x8c, 0xb2, 0x00, 0x00, 0x01, 0x06, 0x05, 0xff, 0xff,
0x70, 0xdc, 0x45, 0xe9, 0xbd, 0xe6, 0xd9, 0x48, 0xb7, 0x96, 0x2c, 0xd8, 0x20, 0xd9, 0x23, 0xee,
0xef, 0x78, 0x32, 0x36, 0x34, 0x20, 0x2d, 0x20, 0x63, 0x6f, 0x72, 0x65, 0x20, 0x31, 0x34, 0x32,
0x20, 0x2d, 0x20, 0x48, 0x2e, 0x32, 0x36, 0x34, 0x2f, 0x4d, 0x50, 0x45, 0x47, 0x2d, 0x34, 0x20,
0x41, 0x56, 0x43, 0x20, 0x63, 0x6f, 0x64, 0x65, 0x63, 0x20, 0x2d, 0x20, 0x43, 0x6f, 0x70, 0x79,
0x6c, 0x65, 0x66, 0x74, 0x20, 0x32, 0x30, 0x30, 0x33, 0x2d, 0x32, 0x30, 0x31, 0x34, 0x20, 0x2d,
0x20, 0x68, 0x74, 0x74, 0x70, 0x3a, 0x2f, 0x2f, 0x77, 0x77, 0x77, 0x2e, 0x76, 0x69, 0x64, 0x65,
0x6f, 0x6c, 0x61, 0x6e, 0x2e, 0x6f, 0x72, 0x67, 0x2f, 0x78, 0x32, 0x36, 0x34, 0x2e, 0x68, 0x74,
0x6d, 0x6c, 0x20, 0x2d, 0x20, 0x6f, 0x70, 0x74, 0x69, 0x6f, 0x6e, 0x73, 0x3a, 0x20, 0x63, 0x61,
0x62, 0x61, 0x63, 0x3d, 0x30, 0x20, 0x72, 0x65, 0x66, 0x3d, 0x32, 0x20, 0x64, 0x65, 0x62, 0x6c,
0x6f, 0x63, 0x6b, 0x3d, 0x31, 0x3a, 0x30, 0x3a, 0x30, 0x20, 0x61, 0x6e, 0x61, 0x6c, 0x79, 0x73,
0x65, 0x3d, 0x30, 0x78, 0x31, 0x3a, 0x30, 0x78, 0x31, 0x31, 0x31, 0x20, 0x6d, 0x65, 0x3d, 0x68,
0x65, 0x78, 0x20, 0x73, 0x75, 0x62, 0x6d, 0x65, 0x3d, 0x37, 0x20, 0x70, 0x73, 0x79, 0x3d, 0x31,
0x20, 0x70, 0x73, 0x79, 0x5f, 0x72, 0x64, 0x3d, 0x31, 0x2e, 0x30, 0x30, 0x3a, 0x30, 0x2e, 0x30,
0x30, 0x20, 0x6d, 0x69, 0x78, 0x65, 0x64, 0x5f, 0x72, 0x65, 0x66, 0x3d, 0x31, 0x20, 0x6d, 0x65,
0x5f, 0x72, 0x61, 0x6e, 0x67, 0x65, 0x3d, 0x31, 0x36, 0x20, 0x63, 0x68, 0x72, 0x6f, 0x6d, 0x61,
0x5f, 0x6d, 0x65, 0x3d, 0x31, 0x20, 0x74, 0x72, 0x65, 0x6c, 0x6c, 0x69, 0x73, 0x3d, 0x31, 0x20,
0x38, 0x78, 0x38, 0x64, 0x63, 0x74, 0x3d, 0x30, 0x20, 0x63, 0x71, 0x6d, 0x3d, 0x30, 0x20, 0x64,
0x65, 0x61, 0x64, 0x7a, 0x6f, 0x6e, 0x65, 0x3d, 0x32, 0x31, 0x2c, 0x31, 0x31, 0x20, 0x66, 0x61,
0x73, 0x74, 0x5f, 0x70, 0x73, 0x6b, 0x69, 0x70, 0x3d, 0x31, 0x20, 0x63, 0x68, 0x72, 0x6f, 0x6d,
0x61, 0x5f, 0x71, 0x70, 0x5f, 0x6f, 0x66, 0x66, 0x73, 0x65, 0x74, 0x3d, 0x2d, 0x32, 0x20, 0x74,
0x68, 0x72, 0x65, 0x61, 0x64, 0x73, 0x3d, 0x36, 0x30, 0x20, 0x6c, 0x6f, 0x6f, 0x6b, 0x61, 0x68,
0x65, 0x61, 0x64, 0x5f, 0x74, 0x68, 0x72, 0x65, 0x61, 0x64, 0x73, 0x3d, 0x35, 0x20, 0x73, 0x6c,
0x69, 0x63, 0x65, 0x64, 0x5f, 0x74, 0x68, 0x72, 0x65, 0x61, 0x64, 0x73, 0x3d, 0x30, 0x20, 0x6e,
0x72, 0x3d, 0x30, 0x20, 0x64, 0x65, 0x63, 0x69, 0x6d, 0x61, 0x74, 0x65, 0x3d, 0x31, 0x20, 0x69,
0x6e, 0x74, 0x65, 0x72, 0x6c, 0x61, 0x63, 0x65, 0x64, 0x3d, 0x30, 0x20, 0x62, 0x6c, 0x75, 0x72,
0x61, 0x79, 0x5f, 0x63, 0x6f, 0x6d, 0x70, 0x61, 0x74, 0x3d, 0x30, 0x20, 0x63, 0x6f, 0x6e, 0x73,
0x74, 0x72, 0x61, 0x69, 0x6e, 0x65, 0x64, 0x5f, 0x69, 0x6e, 0x74, 0x72, 0x61, 0x3d, 0x30, 0x20,
0x62, 0x66, 0x72, 0x61, 0x6d, 0x65, 0x73, 0x3d, 0x30, 0x20, 0x77, 0x65, 0x69, 0x67, 0x68, 0x74,
0x70, 0x3d, 0x30, 0x20, 0x6b, 0x65, 0x79, 0x69, 0x6e, 0x74, 0x3d, 0x32, 0x35, 0x30, 0x20, 0x6b,
0x65, 0x79, 0x69, 0x6e, 0x74, 0x5f, 0x6d, 0x69, 0x6e, 0x3d, 0x32, 0x35, 0x20, 0x73, 0x63, 0x65,
0x6e, 0x65,
};
class MediaCasListener : public ICasListener {
public:
virtual Return<void> onEvent(int32_t event, int32_t arg,
const hidl_vec<uint8_t>& data) override {
android::Mutex::Autolock autoLock(mMsgLock);
mEvent = event;
mEventArg = arg;
mEventData = data;
mEventReceived = true;
mMsgCondition.signal();
return Void();
}
void testEventEcho(sp<ICas>& mediaCas, int32_t& event, int32_t& eventArg,
hidl_vec<uint8_t>& eventData);
private:
int32_t mEvent = -1;
int32_t mEventArg = -1;
bool mEventReceived = false;
hidl_vec<uint8_t> mEventData;
android::Mutex mMsgLock;
android::Condition mMsgCondition;
};
void MediaCasListener::testEventEcho(sp<ICas>& mediaCas, int32_t& event, int32_t& eventArg,
hidl_vec<uint8_t>& eventData) {
mEventReceived = false;
auto returnStatus = mediaCas->sendEvent(event, eventArg, eventData);
EXPECT_TRUE(returnStatus.isOk());
EXPECT_EQ(Status::OK, returnStatus);
android::Mutex::Autolock autoLock(mMsgLock);
while (!mEventReceived) {
if (-ETIMEDOUT == mMsgCondition.waitRelative(mMsgLock, WAIT_TIMEOUT)) {
EXPECT_TRUE(false) << "event not received within timeout";
return;
}
}
EXPECT_EQ(mEvent, event);
EXPECT_EQ(mEventArg, eventArg);
EXPECT_TRUE(mEventData == eventData);
}
// Test environment for Cas HIDL HAL.
class CasHidlEnvironment : public ::testing::VtsHalHidlTargetTestEnvBase {
public:
// get the test environment singleton
static CasHidlEnvironment* Instance() {
static CasHidlEnvironment* instance = new CasHidlEnvironment;
return instance;
}
virtual void registerTestServices() override { registerTestService<IMediaCasService>(); }
};
class MediaCasHidlTest : public ::testing::VtsHalHidlTargetTestBase {
public:
virtual void SetUp() override {
mService = ::testing::VtsHalHidlTargetTestBase::getService<IMediaCasService>(
CasHidlEnvironment::Instance()->getServiceName<IMediaCasService>());
ASSERT_NE(mService, nullptr);
}
sp<IMediaCasService> mService;
protected:
static void description(const std::string& description) {
RecordProperty("description", description);
}
sp<ICas> mMediaCas;
sp<IDescramblerBase> mDescramblerBase;
sp<MediaCasListener> mCasListener;
typedef struct _OobInputTestParams {
const SubSample* subSamples;
uint32_t numSubSamples;
size_t imemSizeActual;
uint64_t imemOffset;
uint64_t imemSize;
uint64_t srcOffset;
uint64_t dstOffset;
} OobInputTestParams;
::testing::AssertionResult createCasPlugin(int32_t caSystemId);
::testing::AssertionResult openCasSession(std::vector<uint8_t>* sessionId);
::testing::AssertionResult descrambleTestInputBuffer(
const sp<IDescrambler>& descrambler,
Status* descrambleStatus,
sp<IMemory>* hidlInMemory);
::testing::AssertionResult descrambleTestOobInput(
const sp<IDescrambler>& descrambler,
Status* descrambleStatus,
const OobInputTestParams& params);
};
::testing::AssertionResult MediaCasHidlTest::createCasPlugin(int32_t caSystemId) {
auto status = mService->isSystemIdSupported(caSystemId);
if (!status.isOk() || !status) {
return ::testing::AssertionFailure();
}
status = mService->isDescramblerSupported(caSystemId);
if (!status.isOk() || !status) {
return ::testing::AssertionFailure();
}
mCasListener = new MediaCasListener();
auto pluginStatus = mService->createPlugin(caSystemId, mCasListener);
if (!pluginStatus.isOk()) {
return ::testing::AssertionFailure();
}
mMediaCas = pluginStatus;
if (mMediaCas == nullptr) {
return ::testing::AssertionFailure();
}
auto descramblerStatus = mService->createDescrambler(caSystemId);
if (!descramblerStatus.isOk()) {
return ::testing::AssertionFailure();
}
mDescramblerBase = descramblerStatus;
return ::testing::AssertionResult(mDescramblerBase != nullptr);
}
::testing::AssertionResult MediaCasHidlTest::openCasSession(std::vector<uint8_t>* sessionId) {
Status sessionStatus;
auto returnVoid = mMediaCas->openSession([&](Status status, const hidl_vec<uint8_t>& id) {
sessionStatus = status;
*sessionId = id;
});
return ::testing::AssertionResult(returnVoid.isOk() && (Status::OK == sessionStatus));
}
::testing::AssertionResult MediaCasHidlTest::descrambleTestInputBuffer(
const sp<IDescrambler>& descrambler, Status* descrambleStatus, sp<IMemory>* inMemory) {
hidl_vec<SubSample> hidlSubSamples;
hidlSubSamples.setToExternal(const_cast<SubSample*>(kSubSamples),
(sizeof(kSubSamples) / sizeof(SubSample)), false /*own*/);
sp<MemoryDealer> dealer = new MemoryDealer(sizeof(kInBinaryBuffer), "vts-cas");
if (nullptr == dealer.get()) {
ALOGE("couldn't get MemoryDealer!");
return ::testing::AssertionFailure();
}
sp<IMemory> mem = dealer->allocate(sizeof(kInBinaryBuffer));
if (nullptr == mem.get()) {
ALOGE("couldn't allocate IMemory!");
return ::testing::AssertionFailure();
}
*inMemory = mem;
// build HidlMemory from memory heap
ssize_t offset;
size_t size;
sp<IMemoryHeap> heap = mem->getMemory(&offset, &size);
if (nullptr == heap.get()) {
ALOGE("couldn't get memory heap!");
return ::testing::AssertionFailure();
}
uint8_t* ipBuffer = static_cast<uint8_t*>(static_cast<void*>(mem->pointer()));
memcpy(ipBuffer, kInBinaryBuffer, sizeof(kInBinaryBuffer));
// hidlMemory is not to be passed out of scope!
sp<HidlMemory> hidlMemory = fromHeap(heap);
SharedBuffer srcBuffer = {
.heapBase = *hidlMemory,
.offset = (uint64_t) offset,
.size = (uint64_t) size
};
DestinationBuffer dstBuffer;
dstBuffer.type = BufferType::SHARED_MEMORY;
dstBuffer.nonsecureMemory = srcBuffer;
uint32_t outBytes;
hidl_string detailedError;
auto returnVoid = descrambler->descramble(
ScramblingControl::EVENKEY /*2*/, hidlSubSamples, srcBuffer, 0, dstBuffer, 0,
[&](Status status, uint32_t bytesWritten, const hidl_string& detailedErr) {
*descrambleStatus = status;
outBytes = bytesWritten;
detailedError = detailedErr;
});
if (!returnVoid.isOk() || *descrambleStatus != Status::OK) {
ALOGI("descramble failed, trans=%s, status=%d, outBytes=%u, error=%s",
returnVoid.description().c_str(), *descrambleStatus, outBytes, detailedError.c_str());
}
return ::testing::AssertionResult(returnVoid.isOk());
}
::testing::AssertionResult MediaCasHidlTest::descrambleTestOobInput(
const sp<IDescrambler>& descrambler,
Status* descrambleStatus,
const OobInputTestParams& params) {
hidl_vec<SubSample> hidlSubSamples;
hidlSubSamples.setToExternal(
const_cast<SubSample*>(params.subSamples), params.numSubSamples, false /*own*/);
sp<MemoryDealer> dealer = new MemoryDealer(params.imemSizeActual, "vts-cas");
if (nullptr == dealer.get()) {
ALOGE("couldn't get MemoryDealer!");
return ::testing::AssertionFailure();
}
sp<IMemory> mem = dealer->allocate(params.imemSizeActual);
if (nullptr == mem.get()) {
ALOGE("couldn't allocate IMemory!");
return ::testing::AssertionFailure();
}
// build HidlMemory from memory heap
ssize_t offset;
size_t size;
sp<IMemoryHeap> heap = mem->getMemory(&offset, &size);
if (nullptr == heap.get()) {
ALOGE("couldn't get memory heap!");
return ::testing::AssertionFailure();
}
// hidlMemory is not to be passed out of scope!
sp<HidlMemory> hidlMemory = fromHeap(heap);
SharedBuffer srcBuffer = {
.heapBase = *hidlMemory,
.offset = (uint64_t) offset + params.imemOffset,
.size = (uint64_t) params.imemSize,
};
DestinationBuffer dstBuffer;
dstBuffer.type = BufferType::SHARED_MEMORY;
dstBuffer.nonsecureMemory = srcBuffer;
uint32_t outBytes;
hidl_string detailedError;
auto returnVoid = descrambler->descramble(
ScramblingControl::EVENKEY /*2*/, hidlSubSamples,
srcBuffer,
params.srcOffset,
dstBuffer,
params.dstOffset,
[&](Status status, uint32_t bytesWritten, const hidl_string& detailedErr) {
*descrambleStatus = status;
outBytes = bytesWritten;
detailedError = detailedErr;
});
if (!returnVoid.isOk() || *descrambleStatus != Status::OK) {
ALOGI("descramble failed, trans=%s, status=%d, outBytes=%u, error=%s",
returnVoid.description().c_str(), *descrambleStatus, outBytes, detailedError.c_str());
}
return ::testing::AssertionResult(returnVoid.isOk());
}
TEST_F(MediaCasHidlTest, EnumeratePlugins) {
description("Test enumerate plugins");
hidl_vec<HidlCasPluginDescriptor> descriptors;
EXPECT_TRUE(mService
->enumeratePlugins([&descriptors](
hidl_vec<HidlCasPluginDescriptor> const& desc) { descriptors = desc; })
.isOk());
if (descriptors.size() == 0) {
ALOGW("[ WARN ] enumeratePlugins list empty");
return;
}
sp<MediaCasListener> casListener = new MediaCasListener();
for (size_t i = 0; i < descriptors.size(); i++) {
int32_t caSystemId = descriptors[i].caSystemId;
ASSERT_TRUE(createCasPlugin(caSystemId));
}
}
TEST_F(MediaCasHidlTest, TestInvalidSystemIdFails) {
description("Test failure for invalid system ID");
sp<MediaCasListener> casListener = new MediaCasListener();
ASSERT_FALSE(mService->isSystemIdSupported(INVALID_SYSTEM_ID));
ASSERT_FALSE(mService->isDescramblerSupported(INVALID_SYSTEM_ID));
auto pluginStatus = mService->createPlugin(INVALID_SYSTEM_ID, casListener);
ASSERT_TRUE(pluginStatus.isOk());
sp<ICas> mediaCas = pluginStatus;
EXPECT_EQ(mediaCas, nullptr);
auto descramblerStatus = mService->createDescrambler(INVALID_SYSTEM_ID);
ASSERT_TRUE(descramblerStatus.isOk());
sp<IDescramblerBase> descramblerBase = descramblerStatus;
EXPECT_EQ(descramblerBase, nullptr);
}
TEST_F(MediaCasHidlTest, TestClearKeyPluginInstalled) {
description("Test if ClearKey plugin is installed");
hidl_vec<HidlCasPluginDescriptor> descriptors;
EXPECT_TRUE(mService
->enumeratePlugins([&descriptors](
hidl_vec<HidlCasPluginDescriptor> const& desc) { descriptors = desc; })
.isOk());
if (descriptors.size() == 0) {
ALOGW("[ WARN ] enumeratePlugins list empty");
}
for (size_t i = 0; i < descriptors.size(); i++) {
int32_t caSystemId = descriptors[i].caSystemId;
if (CLEAR_KEY_SYSTEM_ID == caSystemId) {
return;
}
}
ASSERT_TRUE(false) << "ClearKey plugin not installed";
}
TEST_F(MediaCasHidlTest, TestClearKeyApis) {
description("Test that valid call sequences succeed");
ASSERT_TRUE(createCasPlugin(CLEAR_KEY_SYSTEM_ID));
auto returnStatus = mMediaCas->provision(hidl_string(PROVISION_STR));
EXPECT_TRUE(returnStatus.isOk());
EXPECT_EQ(Status::OK, returnStatus);
hidl_vec<uint8_t> hidlPvtData;
hidlPvtData.resize(256);
returnStatus = mMediaCas->setPrivateData(hidlPvtData);
EXPECT_TRUE(returnStatus.isOk());
EXPECT_EQ(Status::OK, returnStatus);
std::vector<uint8_t> sessionId;
ASSERT_TRUE(openCasSession(&sessionId));
returnStatus = mMediaCas->setSessionPrivateData(sessionId, hidlPvtData);
EXPECT_TRUE(returnStatus.isOk());
EXPECT_EQ(Status::OK, returnStatus);
std::vector<uint8_t> streamSessionId;
ASSERT_TRUE(openCasSession(&streamSessionId));
returnStatus = mMediaCas->setSessionPrivateData(streamSessionId, hidlPvtData);
EXPECT_TRUE(returnStatus.isOk());
EXPECT_EQ(Status::OK, returnStatus);
returnStatus = mDescramblerBase->setMediaCasSession(sessionId);
EXPECT_TRUE(returnStatus.isOk());
EXPECT_EQ(Status::OK, returnStatus);
returnStatus = mDescramblerBase->setMediaCasSession(streamSessionId);
EXPECT_TRUE(returnStatus.isOk());
EXPECT_EQ(Status::OK, returnStatus);
hidl_vec<uint8_t> hidlNullPtr;
hidlNullPtr.setToExternal(static_cast<uint8_t*>(nullptr), 0);
returnStatus = mMediaCas->refreshEntitlements(3, hidlNullPtr);
EXPECT_TRUE(returnStatus.isOk());
EXPECT_EQ(Status::OK, returnStatus);
uint8_t refreshData[] = {0, 1, 2, 3};
hidl_vec<uint8_t> hidlRefreshData;
hidlRefreshData.setToExternal(static_cast<uint8_t*>(refreshData), sizeof(refreshData));
returnStatus = mMediaCas->refreshEntitlements(10, hidlRefreshData);
EXPECT_TRUE(returnStatus.isOk());
EXPECT_EQ(Status::OK, returnStatus);
int32_t eventID = 1;
int32_t eventArg = 2;
mCasListener->testEventEcho(mMediaCas, eventID, eventArg, hidlNullPtr);
eventID = 3;
eventArg = 4;
uint8_t eventData[] = {'e', 'v', 'e', 'n', 't', 'd', 'a', 't', 'a'};
hidl_vec<uint8_t> hidlEventData;
hidlEventData.setToExternal(static_cast<uint8_t*>(eventData), sizeof(eventData));
mCasListener->testEventEcho(mMediaCas, eventID, eventArg, hidlEventData);
uint8_t clearKeyEmmData[] = {'c', 'l', 'e', 'a', 'r', 'k', 'e', 'y', 'e', 'm', 'm'};
hidl_vec<uint8_t> hidlClearKeyEmm;
hidlClearKeyEmm.setToExternal(static_cast<uint8_t*>(clearKeyEmmData), sizeof(clearKeyEmmData));
returnStatus = mMediaCas->processEmm(hidlClearKeyEmm);
EXPECT_TRUE(returnStatus.isOk());
EXPECT_EQ(Status::OK, returnStatus);
hidl_vec<uint8_t> hidlEcm;
hidlEcm.setToExternal(const_cast<uint8_t*>(kEcmBinaryBuffer), sizeof(kEcmBinaryBuffer));
returnStatus = mMediaCas->processEcm(sessionId, hidlEcm);
EXPECT_TRUE(returnStatus.isOk());
EXPECT_EQ(Status::OK, returnStatus);
returnStatus = mMediaCas->processEcm(streamSessionId, hidlEcm);
EXPECT_TRUE(returnStatus.isOk());
EXPECT_EQ(Status::OK, returnStatus);
EXPECT_FALSE(mDescramblerBase->requiresSecureDecoderComponent("video/avc"));
sp<IDescrambler> descrambler;
descrambler = IDescrambler::castFrom(mDescramblerBase);
ASSERT_NE(descrambler, nullptr);
Status descrambleStatus = Status::OK;
sp<IMemory> dataMemory;
ASSERT_TRUE(descrambleTestInputBuffer(descrambler, &descrambleStatus, &dataMemory));
EXPECT_EQ(Status::OK, descrambleStatus);
ASSERT_NE(nullptr, dataMemory.get());
uint8_t* opBuffer = static_cast<uint8_t*>(static_cast<void*>(dataMemory->pointer()));
int compareResult =
memcmp(static_cast<const void*>(opBuffer), static_cast<const void*>(kOutRefBinaryBuffer),
sizeof(kOutRefBinaryBuffer));
EXPECT_EQ(0, compareResult);
returnStatus = mDescramblerBase->release();
EXPECT_TRUE(returnStatus.isOk());
EXPECT_EQ(Status::OK, returnStatus);
returnStatus = mMediaCas->release();
EXPECT_TRUE(returnStatus.isOk());
EXPECT_EQ(Status::OK, returnStatus);
}
TEST_F(MediaCasHidlTest, TestClearKeySessionClosedAfterRelease) {
description("Test that all sessions are closed after a MediaCas object is released");
ASSERT_TRUE(createCasPlugin(CLEAR_KEY_SYSTEM_ID));
auto returnStatus = mMediaCas->provision(hidl_string(PROVISION_STR));
EXPECT_TRUE(returnStatus.isOk());
EXPECT_EQ(Status::OK, returnStatus);
std::vector<uint8_t> sessionId;
ASSERT_TRUE(openCasSession(&sessionId));
std::vector<uint8_t> streamSessionId;
ASSERT_TRUE(openCasSession(&streamSessionId));
returnStatus = mMediaCas->release();
EXPECT_TRUE(returnStatus.isOk());
EXPECT_EQ(Status::OK, returnStatus);
returnStatus = mDescramblerBase->setMediaCasSession(sessionId);
EXPECT_TRUE(returnStatus.isOk());
EXPECT_EQ(Status::ERROR_CAS_SESSION_NOT_OPENED, returnStatus);
returnStatus = mDescramblerBase->setMediaCasSession(streamSessionId);
EXPECT_TRUE(returnStatus.isOk());
EXPECT_EQ(Status::ERROR_CAS_SESSION_NOT_OPENED, returnStatus);
}
TEST_F(MediaCasHidlTest, TestClearKeyErrors) {
description("Test that invalid call sequences fail with expected error codes");
ASSERT_TRUE(createCasPlugin(CLEAR_KEY_SYSTEM_ID));
/*
* Test MediaCas error codes
*/
// Provision should fail with an invalid asset string
auto returnStatus = mMediaCas->provision(hidl_string("invalid asset string"));
EXPECT_TRUE(returnStatus.isOk());
EXPECT_EQ(Status::ERROR_CAS_NO_LICENSE, returnStatus);
// Open a session, then close it so that it should become invalid
std::vector<uint8_t> invalidSessionId;
ASSERT_TRUE(openCasSession(&invalidSessionId));
returnStatus = mMediaCas->closeSession(invalidSessionId);
EXPECT_TRUE(returnStatus.isOk());
EXPECT_EQ(Status::OK, returnStatus);
// processEcm should fail with an invalid session id
hidl_vec<uint8_t> hidlEcm;
hidlEcm.setToExternal(const_cast<uint8_t*>(kEcmBinaryBuffer), sizeof(kEcmBinaryBuffer));
returnStatus = mMediaCas->processEcm(invalidSessionId, hidlEcm);
EXPECT_TRUE(returnStatus.isOk());
EXPECT_EQ(Status::ERROR_CAS_SESSION_NOT_OPENED, returnStatus);
std::vector<uint8_t> sessionId;
ASSERT_TRUE(openCasSession(&sessionId));
// processEcm should fail without provisioning
hidlEcm.setToExternal(const_cast<uint8_t*>(kEcmBinaryBuffer), sizeof(kEcmBinaryBuffer));
returnStatus = mMediaCas->processEcm(sessionId, hidlEcm);
EXPECT_TRUE(returnStatus.isOk());
EXPECT_EQ(Status::ERROR_CAS_NOT_PROVISIONED, returnStatus);
returnStatus = mMediaCas->provision(hidl_string(PROVISION_STR));
EXPECT_TRUE(returnStatus.isOk());
EXPECT_EQ(Status::OK, returnStatus);
// processEcm should fail with ecm buffer that's too short
hidlEcm.setToExternal(const_cast<uint8_t*>(kEcmBinaryBuffer), 8);
returnStatus = mMediaCas->processEcm(sessionId, hidlEcm);
EXPECT_TRUE(returnStatus.isOk());
EXPECT_EQ(Status::BAD_VALUE, returnStatus);
// processEcm should fail with ecm with bad descriptor count
uint8_t badDescriptor[sizeof(kEcmBinaryBuffer)];
memcpy(badDescriptor, kEcmBinaryBuffer, sizeof(kEcmBinaryBuffer));
badDescriptor[17] = 0x03; // change the descriptor count field to 3 (invalid)
hidlEcm.setToExternal(static_cast<uint8_t*>(badDescriptor), sizeof(badDescriptor));
returnStatus = mMediaCas->processEcm(sessionId, hidlEcm);
EXPECT_TRUE(returnStatus.isOk());
EXPECT_EQ(Status::ERROR_CAS_UNKNOWN, returnStatus);
/*
* Test MediaDescrambler error codes
*/
// setMediaCasSession should fail with an invalid session id
returnStatus = mDescramblerBase->setMediaCasSession(invalidSessionId);
EXPECT_TRUE(returnStatus.isOk());
EXPECT_EQ(Status::ERROR_CAS_SESSION_NOT_OPENED, returnStatus);
// descramble should fail without a valid session
sp<IDescrambler> descrambler;
descrambler = IDescrambler::castFrom(mDescramblerBase);
ASSERT_NE(descrambler, nullptr);
Status descrambleStatus = Status::OK;
sp<IMemory> dataMemory;
ASSERT_TRUE(descrambleTestInputBuffer(descrambler, &descrambleStatus, &dataMemory));
EXPECT_EQ(Status::ERROR_CAS_DECRYPT_UNIT_NOT_INITIALIZED, descrambleStatus);
// Now set a valid session, should still fail because no valid ecm is processed
returnStatus = mDescramblerBase->setMediaCasSession(sessionId);
EXPECT_TRUE(returnStatus.isOk());
EXPECT_EQ(Status::OK, returnStatus);
ASSERT_TRUE(descrambleTestInputBuffer(descrambler, &descrambleStatus, &dataMemory));
EXPECT_EQ(Status::ERROR_CAS_DECRYPT, descrambleStatus);
// Verify that requiresSecureDecoderComponent handles empty mime
EXPECT_FALSE(mDescramblerBase->requiresSecureDecoderComponent(""));
// Verify that requiresSecureDecoderComponent handles invalid mime
EXPECT_FALSE(mDescramblerBase->requiresSecureDecoderComponent("bad"));
}
TEST_F(MediaCasHidlTest, TestClearKeyOobFails) {
description("Test that oob descramble request fails with expected error");
ASSERT_TRUE(createCasPlugin(CLEAR_KEY_SYSTEM_ID));
auto returnStatus = mMediaCas->provision(hidl_string(PROVISION_STR));
EXPECT_TRUE(returnStatus.isOk());
EXPECT_EQ(Status::OK, returnStatus);
std::vector<uint8_t> sessionId;
ASSERT_TRUE(openCasSession(&sessionId));
returnStatus = mDescramblerBase->setMediaCasSession(sessionId);
EXPECT_TRUE(returnStatus.isOk());
EXPECT_EQ(Status::OK, returnStatus);
hidl_vec<uint8_t> hidlEcm;
hidlEcm.setToExternal(const_cast<uint8_t*>(kEcmBinaryBuffer), sizeof(kEcmBinaryBuffer));
returnStatus = mMediaCas->processEcm(sessionId, hidlEcm);
EXPECT_TRUE(returnStatus.isOk());
EXPECT_EQ(Status::OK, returnStatus);
sp<IDescrambler> descrambler = IDescrambler::castFrom(mDescramblerBase);
ASSERT_NE(nullptr, descrambler.get());
Status descrambleStatus = Status::OK;
// test invalid src buffer offset
ASSERT_TRUE(descrambleTestOobInput(
descrambler,
&descrambleStatus,
{
.subSamples = kSubSamples,
.numSubSamples = sizeof(kSubSamples)/sizeof(SubSample),
.imemSizeActual = sizeof(kInBinaryBuffer),
.imemOffset = 0xcccccc,
.imemSize = sizeof(kInBinaryBuffer),
.srcOffset = 0,
.dstOffset = 0
}));
EXPECT_EQ(Status::BAD_VALUE, descrambleStatus);
// test invalid src buffer size
ASSERT_TRUE(descrambleTestOobInput(
descrambler,
&descrambleStatus,
{
.subSamples = kSubSamples,
.numSubSamples = sizeof(kSubSamples)/sizeof(SubSample),
.imemSizeActual = sizeof(kInBinaryBuffer),
.imemOffset = 0,
.imemSize = 0xcccccc,
.srcOffset = 0,
.dstOffset = 0
}));
EXPECT_EQ(Status::BAD_VALUE, descrambleStatus);
// test invalid src buffer size
ASSERT_TRUE(descrambleTestOobInput(
descrambler,
&descrambleStatus,
{
.subSamples = kSubSamples,
.numSubSamples = sizeof(kSubSamples)/sizeof(SubSample),
.imemSizeActual = sizeof(kInBinaryBuffer),
.imemOffset = 1,
.imemSize = (uint64_t)-1,
.srcOffset = 0,
.dstOffset = 0
}));
EXPECT_EQ(Status::BAD_VALUE, descrambleStatus);
// test invalid srcOffset
ASSERT_TRUE(descrambleTestOobInput(
descrambler,
&descrambleStatus,
{
.subSamples = kSubSamples,
.numSubSamples = sizeof(kSubSamples)/sizeof(SubSample),
.imemSizeActual = sizeof(kInBinaryBuffer),
.imemOffset = 0,
.imemSize = sizeof(kInBinaryBuffer),
.srcOffset = 0xcccccc,
.dstOffset = 0
}));
EXPECT_EQ(Status::BAD_VALUE, descrambleStatus);
// test invalid dstOffset
ASSERT_TRUE(descrambleTestOobInput(
descrambler,
&descrambleStatus,
{
.subSamples = kSubSamples,
.numSubSamples = sizeof(kSubSamples)/sizeof(SubSample),
.imemSizeActual = sizeof(kInBinaryBuffer),
.imemOffset = 0,
.imemSize = sizeof(kInBinaryBuffer),
.srcOffset = 0,
.dstOffset = 0xcccccc
}));
EXPECT_EQ(Status::BAD_VALUE, descrambleStatus);
// test detection of oob subsample sizes
const SubSample invalidSubSamples1[] =
{{162, 0}, {0, 184}, {0, 0xdddddd}};
ASSERT_TRUE(descrambleTestOobInput(
descrambler,
&descrambleStatus,
{
.subSamples = invalidSubSamples1,
.numSubSamples = sizeof(invalidSubSamples1)/sizeof(SubSample),
.imemSizeActual = sizeof(kInBinaryBuffer),
.imemOffset = 0,
.imemSize = sizeof(kInBinaryBuffer),
.srcOffset = 0,
.dstOffset = 0
}));
EXPECT_EQ(Status::BAD_VALUE, descrambleStatus);
// test detection of overflowing subsample sizes
const SubSample invalidSubSamples2[] =
{{162, 0}, {0, 184}, {2, (uint32_t)-1}};
ASSERT_TRUE(descrambleTestOobInput(
descrambler,
&descrambleStatus,
{
.subSamples = invalidSubSamples2,
.numSubSamples = sizeof(invalidSubSamples2)/sizeof(SubSample),
.imemSizeActual = sizeof(kInBinaryBuffer),
.imemOffset = 0,
.imemSize = sizeof(kInBinaryBuffer),
.srcOffset = 0,
.dstOffset = 0
}));
EXPECT_EQ(Status::BAD_VALUE, descrambleStatus);
returnStatus = mDescramblerBase->release();
EXPECT_TRUE(returnStatus.isOk());
EXPECT_EQ(Status::OK, returnStatus);
returnStatus = mMediaCas->release();
EXPECT_TRUE(returnStatus.isOk());
EXPECT_EQ(Status::OK, returnStatus);
}
} // anonymous namespace
int main(int argc, char** argv) {
::testing::AddGlobalTestEnvironment(CasHidlEnvironment::Instance());
::testing::InitGoogleTest(&argc, argv);
CasHidlEnvironment::Instance()->init(&argc, argv);
int status = RUN_ALL_TESTS();
LOG(INFO) << "Test result = " << status;
return status;
}