/* * Copyright (C) 2017 The Android Open Source Project * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ #ifndef DRM_HAL_H_ #define DRM_HAL_H_ #include <android/hardware/drm/1.0/IDrmPlugin.h> #include <android/hardware/drm/1.0/IDrmPluginListener.h> #include <android/hardware/drm/1.0/IDrmFactory.h> #include <media/IDrm.h> #include <media/IDrmClient.h> #include <utils/threads.h> using ::android::hardware::drm::V1_0::EventType; using ::android::hardware::drm::V1_0::IDrmFactory; using ::android::hardware::drm::V1_0::IDrmPlugin; using ::android::hardware::drm::V1_0::IDrmPluginListener; using ::android::hardware::drm::V1_0::KeyStatus; using ::android::hardware::hidl_vec; using ::android::hardware::Return; using ::android::hardware::Void; namespace android { struct DrmSessionClientInterface; struct DrmHal : public BnDrm, public IBinder::DeathRecipient, public IDrmPluginListener { DrmHal(); virtual ~DrmHal(); virtual status_t initCheck() const; virtual bool isCryptoSchemeSupported(const uint8_t uuid[16], const String8 &mimeType); virtual status_t createPlugin(const uint8_t uuid[16], const String8 &appPackageName); virtual status_t destroyPlugin(); virtual status_t openSession(Vector<uint8_t> &sessionId); virtual status_t closeSession(Vector<uint8_t> const &sessionId); virtual status_t getKeyRequest(Vector<uint8_t> const &sessionId, Vector<uint8_t> const &initData, String8 const &mimeType, DrmPlugin::KeyType keyType, KeyedVector<String8, String8> const &optionalParameters, Vector<uint8_t> &request, String8 &defaultUrl, DrmPlugin::KeyRequestType *keyRequestType); virtual status_t provideKeyResponse(Vector<uint8_t> const &sessionId, Vector<uint8_t> const &response, Vector<uint8_t> &keySetId); virtual status_t removeKeys(Vector<uint8_t> const &keySetId); virtual status_t restoreKeys(Vector<uint8_t> const &sessionId, Vector<uint8_t> const &keySetId); virtual status_t queryKeyStatus(Vector<uint8_t> const &sessionId, KeyedVector<String8, String8> &infoMap) const; virtual status_t getProvisionRequest(String8 const &certType, String8 const &certAuthority, Vector<uint8_t> &request, String8 &defaulUrl); virtual status_t provideProvisionResponse(Vector<uint8_t> const &response, Vector<uint8_t> &certificate, Vector<uint8_t> &wrappedKey); virtual status_t getSecureStops(List<Vector<uint8_t>> &secureStops); virtual status_t getSecureStop(Vector<uint8_t> const &ssid, Vector<uint8_t> &secureStop); virtual status_t releaseSecureStops(Vector<uint8_t> const &ssRelease); virtual status_t releaseAllSecureStops(); virtual status_t getPropertyString(String8 const &name, String8 &value ) const; virtual status_t getPropertyByteArray(String8 const &name, Vector<uint8_t> &value ) const; virtual status_t setPropertyString(String8 const &name, String8 const &value ) const; virtual status_t setPropertyByteArray(String8 const &name, Vector<uint8_t> const &value ) const; virtual status_t setCipherAlgorithm(Vector<uint8_t> const &sessionId, String8 const &algorithm); virtual status_t setMacAlgorithm(Vector<uint8_t> const &sessionId, String8 const &algorithm); virtual status_t encrypt(Vector<uint8_t> const &sessionId, Vector<uint8_t> const &keyId, Vector<uint8_t> const &input, Vector<uint8_t> const &iv, Vector<uint8_t> &output); virtual status_t decrypt(Vector<uint8_t> const &sessionId, Vector<uint8_t> const &keyId, Vector<uint8_t> const &input, Vector<uint8_t> const &iv, Vector<uint8_t> &output); virtual status_t sign(Vector<uint8_t> const &sessionId, Vector<uint8_t> const &keyId, Vector<uint8_t> const &message, Vector<uint8_t> &signature); virtual status_t verify(Vector<uint8_t> const &sessionId, Vector<uint8_t> const &keyId, Vector<uint8_t> const &message, Vector<uint8_t> const &signature, bool &match); virtual status_t signRSA(Vector<uint8_t> const &sessionId, String8 const &algorithm, Vector<uint8_t> const &message, Vector<uint8_t> const &wrappedKey, Vector<uint8_t> &signature); virtual status_t setListener(const sp<IDrmClient>& listener); // Methods of IDrmPluginListener Return<void> sendEvent(EventType eventType, const hidl_vec<uint8_t>& sessionId, const hidl_vec<uint8_t>& data); Return<void> sendExpirationUpdate(const hidl_vec<uint8_t>& sessionId, int64_t expiryTimeInMS); Return<void> sendKeysChange(const hidl_vec<uint8_t>& sessionId, const hidl_vec<KeyStatus>& keyStatusList, bool hasNewUsableKey); virtual void binderDied(const wp<IBinder> &the_late_who); private: static Mutex mLock; sp<DrmSessionClientInterface> mDrmSessionClient; sp<IDrmClient> mListener; mutable Mutex mEventLock; mutable Mutex mNotifyLock; const Vector<sp<IDrmFactory>> mFactories; sp<IDrmPlugin> mPlugin; /** * mInitCheck is: * NO_INIT if a plugin hasn't been created yet * ERROR_UNSUPPORTED if a plugin can't be created for the uuid * OK after a plugin has been created and mPlugin is valid */ status_t mInitCheck; Vector<sp<IDrmFactory>> makeDrmFactories(); sp<IDrmPlugin> makeDrmPlugin(const sp<IDrmFactory>& factory, const uint8_t uuid[16], const String8& appPackageName); void writeByteArray(Parcel &obj, const hidl_vec<uint8_t>& array); DISALLOW_EVIL_CONSTRUCTORS(DrmHal); }; } // namespace android #endif // DRM_HAL_H_