Home | History | Annotate | Download | only in hidl
      1 /*
      2  * Copyright (C) 2018 The Android Open Source Project
      3  *
      4  * Licensed under the Apache License, Version 2.0 (the "License");
      5  * you may not use this file except in compliance with the License.
      6  * You may obtain a copy of the License at
      7  *
      8  *      http://www.apache.org/licenses/LICENSE-2.0
      9  *
     10  * Unless required by applicable law or agreed to in writing, software
     11  * distributed under the License is distributed on an "AS IS" BASIS,
     12  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
     13  * See the License for the specific language governing permissions and
     14  * limitations under the License.
     15  */
     16 
     17 //#define LOG_NDEBUG 0
     18 #define LOG_TAG "hidl_InitDataParser"
     19 
     20 #include <algorithm>
     21 #include <utils/Log.h>
     22 
     23 #include "InitDataParser.h"
     24 
     25 #include "Base64.h"
     26 
     27 #include "ClearKeyUUID.h"
     28 #include "MimeType.h"
     29 #include "Utils.h"
     30 
     31 namespace android {
     32 namespace hardware {
     33 namespace drm {
     34 namespace V1_2 {
     35 namespace clearkey {
     36 
     37 namespace {
     38     const size_t kKeyIdSize = 16;
     39     const size_t kSystemIdSize = 16;
     40 }
     41 
     42 std::vector<uint8_t> StrToVector(const std::string& str) {
     43     std::vector<uint8_t> vec(str.begin(), str.end());
     44     return vec;
     45 }
     46 
     47 Status InitDataParser::parse(const std::vector<uint8_t>& initData,
     48         const std::string& mimeType,
     49         V1_0::KeyType keyType,
     50         std::vector<uint8_t>* licenseRequest) {
     51     // Build a list of the key IDs
     52     std::vector<const uint8_t*> keyIds;
     53 
     54     if (mimeType == kIsoBmffVideoMimeType.c_str() ||
     55         mimeType == kIsoBmffAudioMimeType.c_str() ||
     56         mimeType == kCencInitDataFormat.c_str()) {
     57         Status res = parsePssh(initData, &keyIds);
     58         if (res != Status::OK) {
     59             return res;
     60         }
     61     } else if (mimeType == kWebmVideoMimeType.c_str() ||
     62         mimeType == kWebmAudioMimeType.c_str() ||
     63         mimeType == kWebmInitDataFormat.c_str()) {
     64         // WebM "init data" is just a single key ID
     65         if (initData.size() != kKeyIdSize) {
     66             return Status::ERROR_DRM_CANNOT_HANDLE;
     67         }
     68         keyIds.push_back(initData.data());
     69     } else {
     70         return Status::ERROR_DRM_CANNOT_HANDLE;
     71     }
     72 
     73     if (keyType == V1_0::KeyType::RELEASE) {
     74         // restore key
     75     }
     76 
     77     // Build the request
     78     std::string requestJson = generateRequest(keyType, keyIds);
     79     std::vector<uint8_t> requestJsonVec = StrToVector(requestJson);
     80 
     81     licenseRequest->clear();
     82     licenseRequest->insert(licenseRequest->end(), requestJsonVec.begin(), requestJsonVec.end());
     83     return Status::OK;
     84 }
     85 
     86 Status InitDataParser::parsePssh(const std::vector<uint8_t>& initData,
     87         std::vector<const uint8_t*>* keyIds) {
     88     size_t readPosition = 0;
     89 
     90     // Validate size field
     91     uint32_t expectedSize = initData.size();
     92     expectedSize = htonl(expectedSize);
     93     if (memcmp(&initData[readPosition], &expectedSize,
     94                sizeof(expectedSize)) != 0) {
     95         return Status::ERROR_DRM_CANNOT_HANDLE;
     96     }
     97     readPosition += sizeof(expectedSize);
     98 
     99     // Validate PSSH box identifier
    100     const char psshIdentifier[4] = {'p', 's', 's', 'h'};
    101     if (memcmp(&initData[readPosition], psshIdentifier,
    102                sizeof(psshIdentifier)) != 0) {
    103         return Status::ERROR_DRM_CANNOT_HANDLE;
    104     }
    105     readPosition += sizeof(psshIdentifier);
    106 
    107     // Validate EME version number
    108     const uint8_t psshVersion1[4] = {1, 0, 0, 0};
    109     if (memcmp(&initData[readPosition], psshVersion1,
    110                sizeof(psshVersion1)) != 0) {
    111         return Status::ERROR_DRM_CANNOT_HANDLE;
    112     }
    113     readPosition += sizeof(psshVersion1);
    114 
    115     // Validate system ID
    116     if (!clearkeydrm::isClearKeyUUID(&initData[readPosition])) {
    117         return Status::ERROR_DRM_CANNOT_HANDLE;
    118     }
    119     readPosition += kSystemIdSize;
    120 
    121     // Read key ID count
    122     uint32_t keyIdCount;
    123     memcpy(&keyIdCount, &initData[readPosition], sizeof(keyIdCount));
    124     keyIdCount = ntohl(keyIdCount);
    125     readPosition += sizeof(keyIdCount);
    126     if (readPosition + ((uint64_t)keyIdCount * kKeyIdSize) !=
    127             initData.size() - sizeof(uint32_t)) {
    128         return Status::ERROR_DRM_CANNOT_HANDLE;
    129     }
    130 
    131     // Calculate the key ID offsets
    132     for (uint32_t i = 0; i < keyIdCount; ++i) {
    133         size_t keyIdPosition = readPosition + (i * kKeyIdSize);
    134         keyIds->push_back(&initData[keyIdPosition]);
    135     }
    136     return Status::OK;
    137 }
    138 
    139 std::string InitDataParser::generateRequest(V1_0::KeyType keyType,
    140         const std::vector<const uint8_t*>& keyIds) {
    141     const std::string kRequestPrefix("{\"kids\":[");
    142     const std::string kTemporarySession("],\"type\":\"temporary\"}");
    143     const std::string kPersistentSession("],\"type\":\"persistent-license\"}");
    144 
    145     std::string request(kRequestPrefix);
    146     std::string encodedId;
    147     for (size_t i = 0; i < keyIds.size(); ++i) {
    148         encodedId.clear();
    149         encodeBase64Url(keyIds[i], kKeyIdSize, &encodedId);
    150         if (i != 0) {
    151             request.append(",");
    152         }
    153         request.push_back('\"');
    154         request.append(encodedId);
    155         request.push_back('\"');
    156     }
    157     if (keyType == V1_0::KeyType::STREAMING) {
    158         request.append(kTemporarySession);
    159     } else if (keyType == V1_0::KeyType::OFFLINE ||
    160                    keyType == V1_0::KeyType::RELEASE) {
    161             request.append(kPersistentSession);
    162     }
    163 
    164     // Android's Base64 encoder produces padding. EME forbids padding.
    165     const char kBase64Padding = '=';
    166     request.erase(std::remove(request.begin(), request.end(), kBase64Padding), request.end());
    167 
    168     return request;
    169 }
    170 
    171 } // namespace clearkey
    172 } // namespace V1_2
    173 } // namespace drm
    174 } // namespace hardware
    175 } // namespace android
    176