-
Notifications
You must be signed in to change notification settings - Fork 6
/
CryptoPlugin.cpp
107 lines (93 loc) · 3.59 KB
/
CryptoPlugin.cpp
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
/*
* Copyright (C) 2014 The Android Open Source Project
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
//#define LOG_NDEBUG 0
#define LOG_TAG "ClearKeyCryptoPlugin"
#include <utils/Log.h>
#include <media/stagefright/MediaErrors.h>
#include "CryptoPlugin.h"
#include "SessionLibrary.h"
extern "C" {
#include "aes_crypto.h"
}
namespace clearkeydrm {
using android::Vector;
using android::AString;
using android::status_t;
// Returns negative values for error code and positive values for the size of
// decrypted data. In theory, the output size can be larger than the input
// size, but in practice this will never happen for AES-CTR.
ssize_t CryptoPlugin::decrypt(bool secure, const KeyId keyId, const Iv iv,
Mode mode, const Pattern &/* pattern */, const void* srcPtr,
const SubSample* subSamples, size_t numSubSamples,
void* dstPtr, AString* errorDetailMsg) {
#ifdef SDP_PROTOTYPE
/* force secure mode */
ALOGI("%s: setting secure=1", __func__);
secure = 1;
#endif
if (mode == kMode_Unencrypted) {
size_t offset = 0;
for (size_t i = 0; i < numSubSamples; ++i) {
const SubSample& subSample = subSamples[i];
if (subSample.mNumBytesOfEncryptedData != 0) {
errorDetailMsg->setTo(
"Encrypted subsamples found in allegedly unencrypted "
"data.");
return android::ERROR_DRM_DECRYPT;
}
if (subSample.mNumBytesOfClearData != 0) {
if (!secure)
memcpy(reinterpret_cast<uint8_t*>(dstPtr) + offset,
reinterpret_cast<const uint8_t*>(srcPtr) + offset,
subSample.mNumBytesOfClearData);
else
TEE_copy_secure_memory(reinterpret_cast<const uint8_t*>(dstPtr),
reinterpret_cast<const uint8_t*>(srcPtr),
subSample.mNumBytesOfClearData, offset);
offset += subSample.mNumBytesOfClearData;
}
}
return static_cast<ssize_t>(offset);
} else if (mode == kMode_AES_CTR) {
size_t bytesDecrypted;
status_t res = mSession->decrypt(keyId, iv, srcPtr, dstPtr, subSamples,
numSubSamples, &bytesDecrypted, secure);
if (res == android::OK) {
return static_cast<ssize_t>(bytesDecrypted);
} else {
errorDetailMsg->setTo("Decryption Error");
return static_cast<ssize_t>(res);
}
} else {
errorDetailMsg->setTo(
"Selected encryption mode is not supported by the ClearKey DRM "
"Plugin.");
return android::ERROR_DRM_CANNOT_HANDLE;
}
}
android::status_t CryptoPlugin::setMediaDrmSession(
const android::Vector<uint8_t>& sessionId) {
if (!sessionId.size()) {
mSession.clear();
} else {
mSession = SessionLibrary::get()->findSession(sessionId);
if (!mSession.get()) {
return android::ERROR_DRM_SESSION_NOT_OPENED;
}
}
return android::OK;
}
} // namespace clearkeydrm