1 /* 2 * Copyright (C) 2013 The Android Open Source Project 3 * 4 * Licensed under the Apache License, Version 2.0 (the "License"); 5 * you may not use this file except in compliance with the License. 6 * You may obtain a copy of the License at 7 * 8 * http://www.apache.org/licenses/LICENSE-2.0 9 * 10 * Unless required by applicable law or agreed to in writing, software 11 * distributed under the License is distributed on an "AS IS" BASIS, 12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 13 * See the License for the specific language governing permissions and 14 * limitations under the License. 15 */ 16 17 #ifndef DRM_H_ 18 19 #define DRM_H_ 20 21 #include "SharedLibrary.h" 22 23 #include <media/IDrm.h> 24 #include <media/IDrmClient.h> 25 #include <utils/threads.h> 26 27 namespace android { 28 29 class DrmFactory; 30 class DrmPlugin; 31 struct DrmSessionClientInterface; 32 33 struct Drm : public BnDrm, 34 public IBinder::DeathRecipient, 35 public DrmPluginListener { 36 Drm(); 37 virtual ~Drm(); 38 39 virtual status_t initCheck() const; 40 41 virtual bool isCryptoSchemeSupported(const uint8_t uuid[16], const String8 &mimeType); 42 43 virtual status_t createPlugin(const uint8_t uuid[16]); 44 45 virtual status_t destroyPlugin(); 46 47 virtual status_t openSession(Vector<uint8_t> &sessionId); 48 49 virtual status_t closeSession(Vector<uint8_t> const &sessionId); 50 51 virtual status_t 52 getKeyRequest(Vector<uint8_t> const &sessionId, 53 Vector<uint8_t> const &initData, 54 String8 const &mimeType, DrmPlugin::KeyType keyType, 55 KeyedVector<String8, String8> const &optionalParameters, 56 Vector<uint8_t> &request, String8 &defaultUrl, 57 DrmPlugin::KeyRequestType *keyRequestType); 58 59 virtual status_t provideKeyResponse(Vector<uint8_t> const &sessionId, 60 Vector<uint8_t> const &response, 61 Vector<uint8_t> &keySetId); 62 63 virtual status_t removeKeys(Vector<uint8_t> const &keySetId); 64 65 virtual status_t restoreKeys(Vector<uint8_t> const &sessionId, 66 Vector<uint8_t> const &keySetId); 67 68 virtual status_t queryKeyStatus(Vector<uint8_t> const &sessionId, 69 KeyedVector<String8, String8> &infoMap) const; 70 71 virtual status_t getProvisionRequest(String8 const &certType, 72 String8 const &certAuthority, 73 Vector<uint8_t> &request, 74 String8 &defaulUrl); 75 76 virtual status_t provideProvisionResponse(Vector<uint8_t> const &response, 77 Vector<uint8_t> &certificate, 78 Vector<uint8_t> &wrappedKey); 79 80 virtual status_t unprovisionDevice(); 81 82 virtual status_t getSecureStops(List<Vector<uint8_t> > &secureStops); 83 virtual status_t getSecureStop(Vector<uint8_t> const &ssid, Vector<uint8_t> &secureStop); 84 85 virtual status_t releaseSecureStops(Vector<uint8_t> const &ssRelease); 86 virtual status_t releaseAllSecureStops(); 87 88 virtual status_t getPropertyString(String8 const &name, String8 &value ) const; 89 virtual status_t getPropertyByteArray(String8 const &name, 90 Vector<uint8_t> &value ) const; 91 virtual status_t setPropertyString(String8 const &name, String8 const &value ) const; 92 virtual status_t setPropertyByteArray(String8 const &name, 93 Vector<uint8_t> const &value ) const; 94 95 virtual status_t setCipherAlgorithm(Vector<uint8_t> const &sessionId, 96 String8 const &algorithm); 97 98 virtual status_t setMacAlgorithm(Vector<uint8_t> const &sessionId, 99 String8 const &algorithm); 100 101 virtual status_t encrypt(Vector<uint8_t> const &sessionId, 102 Vector<uint8_t> const &keyId, 103 Vector<uint8_t> const &input, 104 Vector<uint8_t> const &iv, 105 Vector<uint8_t> &output); 106 107 virtual status_t decrypt(Vector<uint8_t> const &sessionId, 108 Vector<uint8_t> const &keyId, 109 Vector<uint8_t> const &input, 110 Vector<uint8_t> const &iv, 111 Vector<uint8_t> &output); 112 113 virtual status_t sign(Vector<uint8_t> const &sessionId, 114 Vector<uint8_t> const &keyId, 115 Vector<uint8_t> const &message, 116 Vector<uint8_t> &signature); 117 118 virtual status_t verify(Vector<uint8_t> const &sessionId, 119 Vector<uint8_t> const &keyId, 120 Vector<uint8_t> const &message, 121 Vector<uint8_t> const &signature, 122 bool &match); 123 124 virtual status_t signRSA(Vector<uint8_t> const &sessionId, 125 String8 const &algorithm, 126 Vector<uint8_t> const &message, 127 Vector<uint8_t> const &wrappedKey, 128 Vector<uint8_t> &signature); 129 130 virtual status_t setListener(const sp<IDrmClient>& listener); 131 132 virtual void sendEvent(DrmPlugin::EventType eventType, int extra, 133 Vector<uint8_t> const *sessionId, 134 Vector<uint8_t> const *data); 135 136 virtual void sendExpirationUpdate(Vector<uint8_t> const *sessionId, 137 int64_t expiryTimeInMS); 138 139 virtual void sendKeysChange(Vector<uint8_t> const *sessionId, 140 Vector<DrmPlugin::KeyStatus> const *keyStatusList, 141 bool hasNewUsableKey); 142 143 virtual void binderDied(const wp<IBinder> &the_late_who); 144 145 private: 146 static Mutex mLock; 147 148 status_t mInitCheck; 149 150 sp<DrmSessionClientInterface> mDrmSessionClient; 151 152 sp<IDrmClient> mListener; 153 mutable Mutex mEventLock; 154 mutable Mutex mNotifyLock; 155 156 sp<SharedLibrary> mLibrary; 157 DrmFactory *mFactory; 158 DrmPlugin *mPlugin; 159 160 static KeyedVector<Vector<uint8_t>, String8> mUUIDToLibraryPathMap; 161 static KeyedVector<String8, wp<SharedLibrary> > mLibraryPathToOpenLibraryMap; 162 static Mutex mMapLock; 163 164 void findFactoryForScheme(const uint8_t uuid[16]); 165 bool loadLibraryForScheme(const String8 &path, const uint8_t uuid[16]); 166 void closeFactory(); 167 void writeByteArray(Parcel &obj, Vector<uint8_t> const *array); 168 169 DISALLOW_EVIL_CONSTRUCTORS(Drm); 170 }; 171 172 } // namespace android 173 174 #endif // CRYPTO_H_ 175