Merge cdm changes to android repo
Bug: 251924225 Test: GtsMediaTestCases Change-Id: I1b4e64c0abf701fe1f5017f14dc72b72c3ea6770
This commit is contained in:
@@ -177,6 +177,57 @@ bool ExtractSignedMessage(const std::string& response,
|
||||
return true;
|
||||
}
|
||||
|
||||
// TODO(b/242744857): This extra debugging may not be needed in all cases. When
|
||||
// provisioning fails, this dumps the cert and other information.
|
||||
std::string DumpProvAttempt(const std::string& url, const std::string& request,
|
||||
const std::string& http_message) {
|
||||
std::stringstream info;
|
||||
info << "Provisioning url: " << url << "\n";
|
||||
info << "Request: " << wvutil::unlimited_b2a_hex(request) << "\n";
|
||||
info << "http_message: " << wvutil::unlimited_b2a_hex(http_message) << "\n";
|
||||
if (wvoec::global_features.derive_key_method ==
|
||||
wvoec::DeviceFeatures::TEST_PROVISION_30) {
|
||||
std::vector<uint8_t> cert;
|
||||
size_t cert_length = 0;
|
||||
OEMCryptoResult result = OEMCrypto_GetOEMPublicCertificate(
|
||||
cert.data(), &cert_length, kLevelDefault);
|
||||
if (result == OEMCrypto_ERROR_SHORT_BUFFER) {
|
||||
cert.resize(cert_length);
|
||||
result = OEMCrypto_GetOEMPublicCertificate(cert.data(), &cert_length,
|
||||
kLevelDefault);
|
||||
}
|
||||
if (result != OEMCrypto_SUCCESS) {
|
||||
info << "--- ERROR GETTING CERT. result=" << result;
|
||||
} else {
|
||||
info << "OEM Cert = (len=" << cert_length << ") "
|
||||
<< wvutil::unlimited_b2a_hex(cert);
|
||||
}
|
||||
}
|
||||
if (wvoec::global_features.derive_key_method ==
|
||||
wvoec::DeviceFeatures::TEST_PROVISION_40) {
|
||||
std::vector<uint8_t> bcc;
|
||||
size_t bcc_length = 0;
|
||||
std::vector<uint8_t> signature;
|
||||
size_t signature_length = 0;
|
||||
OEMCryptoResult result = OEMCrypto_GetBootCertificateChain(
|
||||
bcc.data(), &bcc_length, signature.data(), &signature_length);
|
||||
if (result == OEMCrypto_ERROR_SHORT_BUFFER) {
|
||||
bcc.resize(bcc_length);
|
||||
signature.resize(signature_length);
|
||||
result = OEMCrypto_GetBootCertificateChain(
|
||||
bcc.data(), &bcc_length, signature.data(), &signature_length);
|
||||
}
|
||||
if (result != OEMCrypto_SUCCESS) {
|
||||
info << "--- ERROR GETTING BCC. result=" << result;
|
||||
} else {
|
||||
info << "BCC = (len=" << bcc_length << ") "
|
||||
<< wvutil::unlimited_b2a_hex(bcc) << "\n"
|
||||
<< "Additional Sig = (len=" << signature_length << ") "
|
||||
<< wvutil::unlimited_b2a_hex(signature) << "\n";
|
||||
}
|
||||
}
|
||||
return info.str();
|
||||
}
|
||||
} // namespace
|
||||
|
||||
std::unique_ptr<ConfigTestEnv> WvCdmTestBase::default_config_;
|
||||
@@ -443,11 +494,16 @@ void WvCdmTestBase::Provision() {
|
||||
|
||||
ASSERT_EQ(NO_ERROR, cdm_engine.HandleProvisioningResponse(
|
||||
binary_protobuf_response, kLevelDefault, &cert,
|
||||
&wrapped_key));
|
||||
&wrapped_key))
|
||||
<< "Binary provisioning failed. "
|
||||
<< DumpProvAttempt(provisioning_server_url, prov_request,
|
||||
http_message);
|
||||
} else {
|
||||
ASSERT_EQ(NO_ERROR,
|
||||
cdm_engine.HandleProvisioningResponse(
|
||||
http_message, kLevelDefault, &cert, &wrapped_key));
|
||||
ASSERT_EQ(NO_ERROR, cdm_engine.HandleProvisioningResponse(
|
||||
http_message, kLevelDefault, &cert, &wrapped_key))
|
||||
<< "Non-binary provisioning failed. "
|
||||
<< DumpProvAttempt(provisioning_server_url, prov_request,
|
||||
http_message);
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
Reference in New Issue
Block a user