Cherry pick cdm udc-widevine-release changes to udc-widevine-dev to be in sync with 18.3 release

Merged from go/wvgerrit/178231

Bug: 290252845
Test: WVTS tests seem to be running and passing
Change-Id: Ifff9123a73e173e835a6e89ba7c2760e1cd500fd
(cherry picked from commit 6889845d2e7e24f22c00b333335c34259b3fc96e)
This commit is contained in:
Vicky Min
2023-07-12 18:59:13 +00:00
parent 42a5f26c5a
commit bc20b9dac9
460 changed files with 16767 additions and 3215 deletions

View File

@@ -0,0 +1,73 @@
// Copyright 2023 Google LLC. All Rights Reserved. This file and proprietary
// source code may only be used and distributed under the Widevine
// License Agreement.
#include <array>
#include <vector>
#include "FuzzedDataProvider.h"
#include "OEMCryptoCENC.h"
#include "oemcrypto_fuzz_helper.h"
extern "C" int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) {
wvoec::RedirectStdoutToFile();
wvoec::OEMCryptoLicenseAPIFuzz license_api_fuzz;
license_api_fuzz.Initialize();
FuzzedDataProvider fuzzed_data(data, size);
if (fuzzed_data.ConsumeBool()) {
license_api_fuzz.license_messages().set_control(
license_api_fuzz.license_messages().control() |
wvoec::kControlAllowHashVerification);
}
const uint32_t session_id = license_api_fuzz.session().session_id();
const std::array<uint8_t, 16> content_key_id{};
const uint32_t frame_number = fuzzed_data.ConsumeIntegral<uint32_t>();
std::array<OEMCrypto_SharedMemory, 1> sample_buffer{};
OEMCrypto_SubSampleDescription subsample;
subsample.num_bytes_clear = 0;
subsample.num_bytes_encrypted = sample_buffer.size();
subsample.subsample_flags =
OEMCrypto_FirstSubsample | OEMCrypto_LastSubsample;
subsample.block_offset = 0;
OEMCrypto_SampleDescription sample;
sample.buffers.input_data = sample_buffer.data();
sample.buffers.input_data_length = sample_buffer.size();
sample.buffers.output_descriptor.type = OEMCrypto_BufferType_Clear;
sample.buffers.output_descriptor.buffer.clear.clear_buffer =
sample_buffer.data();
sample.buffers.output_descriptor.buffer.clear.clear_buffer_length =
sample_buffer.size();
memset(sample.iv, 0, sizeof(sample.iv));
sample.subsamples = &subsample;
sample.subsamples_length = 1;
OEMCrypto_CENCEncryptPatternDesc pattern;
pattern.encrypt = 0;
pattern.skip = 0;
uint32_t failed_frame_number_data;
uint32_t* const failed_frame_number =
fuzzed_data.ConsumeBool() ? &failed_frame_number_data : nullptr;
const std::vector<uint8_t> hash =
fuzzed_data.ConsumeRemainingBytes<uint8_t>();
license_api_fuzz.LoadLicense();
std::vector<uint8_t> key_handle;
wvoec::GetKeyHandleIntoVector(session_id, content_key_id.data(),
content_key_id.size(),
OEMCrypto_CipherMode_CENC, key_handle);
OEMCrypto_SetDecryptHash(session_id, frame_number, hash.data(), hash.size());
OEMCrypto_DecryptCENC(key_handle.data(), key_handle.size(), &sample, 1,
&pattern);
OEMCrypto_GetHashErrorCode(session_id, failed_frame_number);
license_api_fuzz.Terminate();
return 0;
}