Revert "Use aidl interface for Widevine service."
This reverts commit 96a8ccd4a1.
Reason for revert:
Could break DeviceManifest/SingleManifestTest#ManifestAidlHalsServed
Bug: 200055138
Bug: 170964303
Bug: 217241995
Change-Id: I9c42df15defec428c9ef8c62439c63d4a603fee6
This commit is contained in:
@@ -299,8 +299,7 @@ CryptoSession::~CryptoSession() {
|
||||
}
|
||||
|
||||
CdmResponseType CryptoSession::GetProvisioningMethod(
|
||||
RequestedSecurityLevel requested_security_level,
|
||||
CdmClientTokenType* token_type) {
|
||||
SecurityLevel requested_security_level, CdmClientTokenType* token_type) {
|
||||
OEMCrypto_ProvisioningMethod method;
|
||||
WithOecReadLock("GetProvisioningMethod", [&] {
|
||||
method = OEMCrypto_GetProvisioningMethod(requested_security_level);
|
||||
@@ -468,7 +467,7 @@ void CryptoSession::DisableDelayedTermination() {
|
||||
}
|
||||
|
||||
bool CryptoSession::SetUpUsageTableHeader(
|
||||
RequestedSecurityLevel requested_security_level) {
|
||||
SecurityLevel requested_security_level) {
|
||||
if (usage_table_header_ != nullptr) {
|
||||
LOGE("Usage table is already set up for the current crypto session");
|
||||
return false;
|
||||
@@ -617,9 +616,9 @@ CdmSecurityLevel CryptoSession::GetSecurityLevel() {
|
||||
}
|
||||
|
||||
CdmSecurityLevel CryptoSession::GetSecurityLevel(
|
||||
RequestedSecurityLevel requested_security_level) {
|
||||
SecurityLevel requested_security_level) {
|
||||
LOGV("Getting security level: requested_security_level = %s",
|
||||
RequestedSecurityLevelToString(requested_security_level));
|
||||
SecurityLevelToString(requested_security_level));
|
||||
RETURN_IF_UNINITIALIZED(kSecurityLevelUninitialized);
|
||||
const OEMCrypto_Security_Level level = WithOecReadLock(
|
||||
"GetSecurityLevel",
|
||||
@@ -642,7 +641,7 @@ CdmSecurityLevel CryptoSession::GetSecurityLevel(
|
||||
"Ill-formed security level: "
|
||||
"level = \"L%u\", requested_security_level = %s",
|
||||
static_cast<unsigned int>(level),
|
||||
RequestedSecurityLevelToString(requested_security_level));
|
||||
SecurityLevelToString(requested_security_level));
|
||||
return kSecurityLevelUnknown;
|
||||
}
|
||||
|
||||
@@ -732,10 +731,10 @@ bool CryptoSession::GetApiVersion(uint32_t* version) {
|
||||
return GetApiVersion(requested_security_level_, version);
|
||||
}
|
||||
|
||||
bool CryptoSession::GetApiVersion(RequestedSecurityLevel security_level,
|
||||
bool CryptoSession::GetApiVersion(SecurityLevel security_level,
|
||||
uint32_t* version) {
|
||||
LOGV("Getting API version: security_level = %s",
|
||||
RequestedSecurityLevelToString(security_level));
|
||||
SecurityLevelToString(security_level));
|
||||
if (!version) {
|
||||
LOGE("Output parameter |version| not provided");
|
||||
return false;
|
||||
@@ -750,10 +749,10 @@ bool CryptoSession::GetApiVersion(RequestedSecurityLevel security_level,
|
||||
return true;
|
||||
}
|
||||
|
||||
bool CryptoSession::GetApiMinorVersion(RequestedSecurityLevel security_level,
|
||||
bool CryptoSession::GetApiMinorVersion(SecurityLevel security_level,
|
||||
uint32_t* minor_version) {
|
||||
LOGV("Getting API minor version: security_level = %s",
|
||||
RequestedSecurityLevelToString(security_level));
|
||||
SecurityLevelToString(security_level));
|
||||
if (!minor_version) {
|
||||
LOGE("Output parameter |minor_version| not provided");
|
||||
return false;
|
||||
@@ -891,10 +890,9 @@ uint8_t CryptoSession::GetSecurityPatchLevel() {
|
||||
return patch;
|
||||
}
|
||||
|
||||
CdmResponseType CryptoSession::Open(
|
||||
RequestedSecurityLevel requested_security_level) {
|
||||
CdmResponseType CryptoSession::Open(SecurityLevel requested_security_level) {
|
||||
LOGD("Opening crypto session: requested_security_level = %s",
|
||||
RequestedSecurityLevelToString(requested_security_level));
|
||||
SecurityLevelToString(requested_security_level));
|
||||
RETURN_IF_UNINITIALIZED(CRYPTO_SESSION_NOT_INITIALIZED);
|
||||
if (open_) return NO_ERROR;
|
||||
|
||||
@@ -1874,8 +1872,8 @@ bool CryptoSession::HasUsageInfoSupport(bool* has_support) {
|
||||
});
|
||||
}
|
||||
|
||||
bool CryptoSession::HasUsageInfoSupport(
|
||||
RequestedSecurityLevel requested_security_level, bool* has_support) {
|
||||
bool CryptoSession::HasUsageInfoSupport(SecurityLevel requested_security_level,
|
||||
bool* has_support) {
|
||||
RETURN_IF_UNINITIALIZED(false);
|
||||
RETURN_IF_NULL(has_support, false);
|
||||
return WithOecReadLock("HasUsageInfoSupport", [&] {
|
||||
@@ -1884,9 +1882,9 @@ bool CryptoSession::HasUsageInfoSupport(
|
||||
}
|
||||
|
||||
bool CryptoSession::HasUsageInfoSupportInternal(
|
||||
RequestedSecurityLevel requested_security_level, bool* has_support) {
|
||||
SecurityLevel requested_security_level, bool* has_support) {
|
||||
LOGV("requested_security_level = %s",
|
||||
RequestedSecurityLevelToString(requested_security_level));
|
||||
SecurityLevelToString(requested_security_level));
|
||||
*has_support = WithOecReadLock("HasUsageInfoSupport", [&] {
|
||||
return OEMCrypto_SupportsUsageTable(requested_security_level);
|
||||
});
|
||||
@@ -2111,11 +2109,11 @@ CdmResponseType CryptoSession::GetHdcpCapabilities(HdcpCapability* current,
|
||||
return GetHdcpCapabilities(requested_security_level_, current, max);
|
||||
}
|
||||
|
||||
CdmResponseType CryptoSession::GetHdcpCapabilities(
|
||||
RequestedSecurityLevel security_level, HdcpCapability* current,
|
||||
HdcpCapability* max) {
|
||||
CdmResponseType CryptoSession::GetHdcpCapabilities(SecurityLevel security_level,
|
||||
HdcpCapability* current,
|
||||
HdcpCapability* max) {
|
||||
LOGV("Getting HDCP capabilities: id = %u, security_level = %s",
|
||||
oec_session_id_, RequestedSecurityLevelToString(security_level));
|
||||
oec_session_id_, SecurityLevelToString(security_level));
|
||||
RETURN_IF_UNINITIALIZED(CRYPTO_SESSION_NOT_INITIALIZED);
|
||||
RETURN_IF_NULL(current, PARAMETER_NULL);
|
||||
RETURN_IF_NULL(max, PARAMETER_NULL);
|
||||
@@ -2168,9 +2166,9 @@ CdmResponseType CryptoSession::GetRandom(size_t data_length,
|
||||
}
|
||||
|
||||
CdmResponseType CryptoSession::GetNumberOfOpenSessions(
|
||||
RequestedSecurityLevel security_level, size_t* count) {
|
||||
SecurityLevel security_level, size_t* count) {
|
||||
LOGV("Getting number of open sessions: id = %u, security_level = %s",
|
||||
oec_session_id_, RequestedSecurityLevelToString(security_level));
|
||||
oec_session_id_, SecurityLevelToString(security_level));
|
||||
RETURN_IF_UNINITIALIZED(CRYPTO_SESSION_NOT_INITIALIZED);
|
||||
RETURN_IF_NULL(count, PARAMETER_NULL);
|
||||
|
||||
@@ -2192,9 +2190,9 @@ CdmResponseType CryptoSession::GetNumberOfOpenSessions(
|
||||
}
|
||||
|
||||
CdmResponseType CryptoSession::GetMaxNumberOfSessions(
|
||||
RequestedSecurityLevel security_level, size_t* max) {
|
||||
SecurityLevel security_level, size_t* max) {
|
||||
LOGV("Getting max number of sessions: id = %u, security_level = %s",
|
||||
oec_session_id_, RequestedSecurityLevelToString(security_level));
|
||||
oec_session_id_, SecurityLevelToString(security_level));
|
||||
RETURN_IF_UNINITIALIZED(CRYPTO_SESSION_NOT_INITIALIZED);
|
||||
RETURN_IF_NULL(max, PARAMETER_NULL);
|
||||
|
||||
@@ -2250,10 +2248,10 @@ bool CryptoSession::GetResourceRatingTier(uint32_t* tier) {
|
||||
return GetResourceRatingTier(requested_security_level_, tier);
|
||||
}
|
||||
|
||||
bool CryptoSession::GetResourceRatingTier(RequestedSecurityLevel security_level,
|
||||
bool CryptoSession::GetResourceRatingTier(SecurityLevel security_level,
|
||||
uint32_t* tier) {
|
||||
LOGV("Getting resource rating tier: security_level = %s",
|
||||
RequestedSecurityLevelToString(security_level));
|
||||
SecurityLevelToString(security_level));
|
||||
RETURN_IF_UNINITIALIZED(false);
|
||||
RETURN_IF_NULL(tier, false);
|
||||
|
||||
@@ -2278,10 +2276,10 @@ bool CryptoSession::GetBuildInformation(std::string* info) {
|
||||
return GetBuildInformation(requested_security_level_, info);
|
||||
}
|
||||
|
||||
bool CryptoSession::GetBuildInformation(RequestedSecurityLevel security_level,
|
||||
bool CryptoSession::GetBuildInformation(SecurityLevel security_level,
|
||||
std::string* info) {
|
||||
LOGV("Getting build information: security_level = %s",
|
||||
RequestedSecurityLevelToString(security_level));
|
||||
SecurityLevelToString(security_level));
|
||||
RETURN_IF_UNINITIALIZED(false);
|
||||
RETURN_IF_NULL(info, false);
|
||||
|
||||
@@ -2310,10 +2308,10 @@ bool CryptoSession::GetBuildInformation(RequestedSecurityLevel security_level,
|
||||
return true;
|
||||
}
|
||||
|
||||
bool CryptoSession::GetMaximumUsageTableEntries(
|
||||
RequestedSecurityLevel security_level, size_t* number_of_entries) {
|
||||
bool CryptoSession::GetMaximumUsageTableEntries(SecurityLevel security_level,
|
||||
size_t* number_of_entries) {
|
||||
LOGV("Getting maximum usage table entries: security_level = %s",
|
||||
RequestedSecurityLevelToString(security_level));
|
||||
SecurityLevelToString(security_level));
|
||||
RETURN_IF_UNINITIALIZED(false);
|
||||
if (number_of_entries == nullptr) {
|
||||
LOGE("Output parameter |number_of_entries| not provided");
|
||||
@@ -2334,7 +2332,7 @@ bool CryptoSession::GetMaximumUsageTableEntries(
|
||||
return *number_of_entries >= kMinimumUsageTableEntriesSupported;
|
||||
}
|
||||
|
||||
bool CryptoSession::GetDecryptHashSupport(RequestedSecurityLevel security_level,
|
||||
bool CryptoSession::GetDecryptHashSupport(SecurityLevel security_level,
|
||||
uint32_t* decrypt_hash_support) {
|
||||
LOGV("Checking if decrypt hash is supported");
|
||||
RETURN_IF_UNINITIALIZED(false);
|
||||
@@ -2651,10 +2649,10 @@ CdmResponseType CryptoSession::GenericVerify(const std::string& message,
|
||||
}
|
||||
|
||||
CdmResponseType CryptoSession::CreateUsageTableHeader(
|
||||
RequestedSecurityLevel requested_security_level,
|
||||
SecurityLevel requested_security_level,
|
||||
CdmUsageTableHeader* usage_table_header) {
|
||||
LOGV("Creating usage table header: requested_security_level = %s",
|
||||
RequestedSecurityLevelToString(requested_security_level));
|
||||
SecurityLevelToString(requested_security_level));
|
||||
RETURN_IF_NULL(usage_table_header, PARAMETER_NULL);
|
||||
|
||||
usage_table_header->resize(kEstimatedInitialUsageTableHeader);
|
||||
@@ -2692,10 +2690,10 @@ CdmResponseType CryptoSession::CreateUsageTableHeader(
|
||||
}
|
||||
|
||||
CdmResponseType CryptoSession::LoadUsageTableHeader(
|
||||
RequestedSecurityLevel requested_security_level,
|
||||
SecurityLevel requested_security_level,
|
||||
const CdmUsageTableHeader& usage_table_header) {
|
||||
LOGV("Loading usage table header: requested_security_level = %s",
|
||||
RequestedSecurityLevelToString(requested_security_level));
|
||||
SecurityLevelToString(requested_security_level));
|
||||
|
||||
const OEMCryptoResult result = WithOecWriteLock("LoadUsageTableHeader", [&] {
|
||||
return OEMCrypto_LoadUsageTableHeader(
|
||||
@@ -2733,10 +2731,10 @@ CdmResponseType CryptoSession::LoadUsageTableHeader(
|
||||
}
|
||||
|
||||
CdmResponseType CryptoSession::ShrinkUsageTableHeader(
|
||||
RequestedSecurityLevel requested_security_level, uint32_t new_entry_count,
|
||||
SecurityLevel requested_security_level, uint32_t new_entry_count,
|
||||
CdmUsageTableHeader* usage_table_header) {
|
||||
LOGV("Shrinking usage table header: requested_security_level = %s",
|
||||
RequestedSecurityLevelToString(requested_security_level));
|
||||
SecurityLevelToString(requested_security_level));
|
||||
RETURN_IF_NULL(usage_table_header, PARAMETER_NULL);
|
||||
|
||||
size_t usage_table_header_len = 0;
|
||||
|
||||
Reference in New Issue
Block a user