Update L3 LoadLicense() and LoadProvisioning() to work with new KDF
functions In CL https://widevine-internal-review.git.corp.google.com/c/cdm/+/183531 KDF was merged into new OEMCrypto_LoadLicense() and OEMCrypto_LoadProvisioning(). This change renames L3 existing old functions with suffix _V18, and adds the two new functions. Note: jenkins/run_dynamic_level3 and jenkis/run_level3_static_tests can't be enabled util https://b.corp.google.com/issues/320525541 is resolved. Test: the generated L3 from this CL can pass static and dynamic adapter tests with commit ID 567069f2fb800c4ec4e844e03273d1924ae6673b. More updates may be need to L3 source for it to work with the latest oemcrypto-v19 branch. Bug: 299333403 Change-Id: If6dec630c00b65468d4194196f3ff6f308c6dbe8
This commit is contained in:
@@ -40,7 +40,7 @@ OEMCryptoResult Haystack_GetOEMPublicCertificate(uint8_t* public_cert,
|
||||
size_t* public_cert_length);
|
||||
OEMCryptoResult Haystack_GetDeviceID(uint8_t* deviceID, size_t* idLength);
|
||||
OEMCryptoResult Haystack_LoadOEMPrivateKey(OEMCrypto_SESSION session);
|
||||
OEMCryptoResult Haystack_LoadProvisioning(
|
||||
OEMCryptoResult Haystack_LoadProvisioning_V18(
|
||||
OEMCrypto_SESSION session, const uint8_t* message, size_t message_length,
|
||||
size_t core_message_length, const uint8_t* signature,
|
||||
size_t signature_length, uint8_t* wrapped_private_key,
|
||||
@@ -104,12 +104,12 @@ OEMCryptoResult Haystack_MoveEntry(OEMCrypto_SESSION session,
|
||||
OEMCryptoResult Haystack_SelectKey(const OEMCrypto_SESSION session,
|
||||
const uint8_t* key_id, size_t key_id_length,
|
||||
OEMCryptoCipherMode cipher_mode);
|
||||
OEMCryptoResult Haystack_LoadLicense(OEMCrypto_SESSION session,
|
||||
const uint8_t* message,
|
||||
size_t message_length,
|
||||
size_t core_message_length,
|
||||
const uint8_t* signature,
|
||||
size_t signature_length);
|
||||
OEMCryptoResult Haystack_LoadLicense_V18(OEMCrypto_SESSION session,
|
||||
const uint8_t* message,
|
||||
size_t message_length,
|
||||
size_t core_message_length,
|
||||
const uint8_t* signature,
|
||||
size_t signature_length);
|
||||
OEMCryptoResult Haystack_SetDecryptHash(OEMCrypto_SESSION session,
|
||||
uint32_t frame_number,
|
||||
const uint8_t* hash,
|
||||
@@ -168,7 +168,24 @@ OEMCryptoResult Haystack_Generic_Verify(const uint8_t* key_handle,
|
||||
OEMCrypto_Algorithm algorithm,
|
||||
const OEMCrypto_SharedMemory* signature,
|
||||
size_t signature_length);
|
||||
|
||||
OEMCryptoResult Haystack_LoadLicense(
|
||||
OEMCrypto_SESSION session, const uint8_t* context, size_t context_length,
|
||||
const uint8_t* derivation_key, size_t derivation_key_length,
|
||||
const uint8_t* message, size_t message_length, size_t core_message_length,
|
||||
const uint8_t* signature, size_t signature_length);
|
||||
OEMCryptoResult Haystack_LoadProvisioning(
|
||||
OEMCrypto_SESSION session, const uint8_t* provision_request,
|
||||
size_t provision_request_length, const uint8_t* message,
|
||||
size_t message_length, size_t core_message_length, const uint8_t* signature,
|
||||
size_t signature_length, uint8_t* wrapped_private_key,
|
||||
size_t* wrapped_private_key_length);
|
||||
OEMCryptoResult Haystack_LoadProvisioningCast(
|
||||
OEMCrypto_SESSION session, const uint8_t* derivation_key,
|
||||
size_t derivation_key_length, const uint8_t* provision_request,
|
||||
size_t provision_request_length, const uint8_t* message,
|
||||
size_t message_length, size_t core_message_length, const uint8_t* signature,
|
||||
size_t signature_length, uint8_t* wrapped_private_key,
|
||||
size_t* wrapped_private_key_length);
|
||||
} // namespace haystack
|
||||
|
||||
#endif
|
||||
|
||||
Reference in New Issue
Block a user