Trim unnecessary CDM metrics.
Bug: 35269103 Test: Removing unnecessary code. Existing tests pass. Change-Id: I1ba8572a8b3fabbf707e77b366717c9ba3069ace
This commit is contained in:
@@ -297,24 +297,16 @@ CdmResponseType CdmEngine::GenerateKeyRequest(
|
||||
}
|
||||
}
|
||||
|
||||
M_TIME(
|
||||
sts = iter->second->GenerateKeyRequest(
|
||||
init_data,
|
||||
license_type,
|
||||
app_parameters,
|
||||
key_request),
|
||||
iter->second->GetMetrics(),
|
||||
cdm_session_generate_key_request_,
|
||||
sts);
|
||||
sts = iter->second->GenerateKeyRequest(
|
||||
init_data,
|
||||
license_type,
|
||||
app_parameters,
|
||||
key_request);
|
||||
|
||||
if (KEY_MESSAGE != sts) {
|
||||
if (sts == NEED_PROVISIONING) {
|
||||
M_TIME(
|
||||
cert_provisioning_requested_security_level_ =
|
||||
iter->second->GetRequestedSecurityLevel(),
|
||||
iter->second->GetMetrics(),
|
||||
cdm_session_get_requested_security_level_,
|
||||
cert_provisioning_requested_security_level_);
|
||||
cert_provisioning_requested_security_level_ =
|
||||
iter->second->GetRequestedSecurityLevel();
|
||||
}
|
||||
LOGE("CdmEngine::GenerateKeyRequest: key request generation failed, "
|
||||
"sts = %d", static_cast<int>(sts));
|
||||
@@ -369,13 +361,7 @@ CdmResponseType CdmEngine::AddKey(const CdmSessionId& session_id,
|
||||
return EMPTY_KEY_DATA_1;
|
||||
}
|
||||
|
||||
CdmResponseType sts;
|
||||
M_TIME(
|
||||
sts = iter->second->AddKey(
|
||||
key_data),
|
||||
iter->second->GetMetrics(),
|
||||
cdm_session_add_key_,
|
||||
sts);
|
||||
CdmResponseType sts = iter->second->AddKey(key_data);
|
||||
if (key_set_id) {
|
||||
*key_set_id = iter->second->key_set_id();
|
||||
}
|
||||
@@ -419,12 +405,8 @@ CdmResponseType CdmEngine::RestoreKey(const CdmSessionId& session_id,
|
||||
cdm_session_restore_offline_session_,
|
||||
sts);
|
||||
if (sts == NEED_PROVISIONING) {
|
||||
M_TIME(
|
||||
cert_provisioning_requested_security_level_ =
|
||||
iter->second->GetRequestedSecurityLevel(),
|
||||
iter->second->GetMetrics(),
|
||||
cdm_session_get_requested_security_level_,
|
||||
cert_provisioning_requested_security_level_);
|
||||
cert_provisioning_requested_security_level_ =
|
||||
iter->second->GetRequestedSecurityLevel();
|
||||
}
|
||||
if (sts != KEY_ADDED && sts != GET_RELEASED_LICENSE_ERROR) {
|
||||
LOGE("CdmEngine::RestoreKey: restore offline session failed = %d", sts);
|
||||
@@ -442,10 +424,7 @@ CdmResponseType CdmEngine::RemoveKeys(const CdmSessionId& session_id) {
|
||||
return SESSION_NOT_FOUND_5;
|
||||
}
|
||||
|
||||
M_TIME(
|
||||
iter->second->ReleaseCrypto(),
|
||||
iter->second->GetMetrics(),
|
||||
cdm_session_release_crypto_);
|
||||
iter->second->ReleaseCrypto();
|
||||
|
||||
return NO_ERROR;
|
||||
}
|
||||
@@ -468,13 +447,7 @@ CdmResponseType CdmEngine::GenerateRenewalRequest(
|
||||
|
||||
key_request->message.clear();
|
||||
|
||||
CdmResponseType sts;
|
||||
M_TIME(
|
||||
sts= iter->second->GenerateRenewalRequest(
|
||||
key_request),
|
||||
iter->second->GetMetrics(),
|
||||
cdm_session_generate_renewal_request_,
|
||||
sts);
|
||||
CdmResponseType sts = iter->second->GenerateRenewalRequest(key_request);
|
||||
|
||||
if (KEY_MESSAGE != sts) {
|
||||
LOGE("CdmEngine::GenerateRenewalRequest: key request gen. failed, sts=%d",
|
||||
@@ -598,14 +571,7 @@ CdmResponseType CdmEngine::QueryStatus(SecurityLevel security_level,
|
||||
*query_response = system_id_stream.str();
|
||||
} else if (query_token == QUERY_KEY_PROVISIONING_ID) {
|
||||
std::string provisioning_id;
|
||||
bool got_id;
|
||||
M_TIME(
|
||||
got_id = crypto_session.GetProvisioningId(
|
||||
&provisioning_id),
|
||||
&metrics_,
|
||||
crypto_session_get_provisioning_id_,
|
||||
got_id);
|
||||
if (!got_id) {
|
||||
if (!crypto_session.GetProvisioningId(&provisioning_id)) {
|
||||
LOGW("CdmEngine::QueryStatus: GetProvisioningId failed");
|
||||
return UNKNOWN_ERROR;
|
||||
}
|
||||
@@ -615,15 +581,7 @@ CdmResponseType CdmEngine::QueryStatus(SecurityLevel security_level,
|
||||
query_token == QUERY_KEY_MAX_HDCP_LEVEL) {
|
||||
CryptoSession::HdcpCapability current_hdcp;
|
||||
CryptoSession::HdcpCapability max_hdcp;
|
||||
bool got_hdcp;
|
||||
M_TIME(
|
||||
got_hdcp = crypto_session.GetHdcpCapabilities(
|
||||
¤t_hdcp,
|
||||
&max_hdcp),
|
||||
&metrics_,
|
||||
crypto_session_get_hdcp_capabilities_,
|
||||
got_hdcp);
|
||||
if (!got_hdcp) {
|
||||
if (!crypto_session.GetHdcpCapabilities(¤t_hdcp, &max_hdcp)) {
|
||||
LOGW("CdmEngine::QueryStatus: GetHdcpCapabilities failed");
|
||||
return UNKNOWN_ERROR;
|
||||
}
|
||||
@@ -648,14 +606,7 @@ CdmResponseType CdmEngine::QueryStatus(SecurityLevel security_level,
|
||||
supports_usage_reporting ? QUERY_VALUE_TRUE : QUERY_VALUE_FALSE;
|
||||
} else if (query_token == QUERY_KEY_NUMBER_OF_OPEN_SESSIONS) {
|
||||
size_t number_of_open_sessions;
|
||||
bool got_num;
|
||||
M_TIME(
|
||||
got_num = crypto_session.GetNumberOfOpenSessions(
|
||||
&number_of_open_sessions),
|
||||
&metrics_,
|
||||
crypto_session_get_number_of_open_sessions_,
|
||||
got_num);
|
||||
if (!got_num) {
|
||||
if (!crypto_session.GetNumberOfOpenSessions(&number_of_open_sessions)) {
|
||||
LOGW("CdmEngine::QueryStatus: GetNumberOfOpenSessions failed");
|
||||
return UNKNOWN_ERROR;
|
||||
}
|
||||
@@ -665,14 +616,7 @@ CdmResponseType CdmEngine::QueryStatus(SecurityLevel security_level,
|
||||
*query_response = open_sessions_stream.str();
|
||||
} else if (query_token == QUERY_KEY_MAX_NUMBER_OF_SESSIONS) {
|
||||
size_t maximum_number_of_sessions;
|
||||
bool got_num;
|
||||
M_TIME(
|
||||
got_num = crypto_session.GetMaxNumberOfSessions(
|
||||
&maximum_number_of_sessions),
|
||||
&metrics_,
|
||||
crypto_session_get_max_number_of_sessions_,
|
||||
got_num);
|
||||
if (!got_num) {
|
||||
if (!crypto_session.GetMaxNumberOfSessions(&maximum_number_of_sessions)) {
|
||||
LOGW("CdmEngine::QueryStatus: GetMaxNumberOfOpenSessions failed");
|
||||
return UNKNOWN_ERROR;
|
||||
}
|
||||
@@ -682,14 +626,7 @@ CdmResponseType CdmEngine::QueryStatus(SecurityLevel security_level,
|
||||
*query_response = max_sessions_stream.str();
|
||||
} else if (query_token == QUERY_KEY_OEMCRYPTO_API_VERSION) {
|
||||
uint32_t api_version;
|
||||
bool got_version;
|
||||
M_TIME(
|
||||
got_version = crypto_session.GetApiVersion(
|
||||
&api_version),
|
||||
&metrics_,
|
||||
crypto_session_get_api_version_,
|
||||
got_version);
|
||||
if (!got_version) {
|
||||
if (crypto_session.GetApiVersion(&api_version)) {
|
||||
LOGW("CdmEngine::QueryStatus: GetApiVersion failed");
|
||||
return UNKNOWN_ERROR;
|
||||
}
|
||||
@@ -715,15 +652,7 @@ CdmResponseType CdmEngine::QuerySessionStatus(const CdmSessionId& session_id,
|
||||
session_id.c_str());
|
||||
return SESSION_NOT_FOUND_8;
|
||||
}
|
||||
|
||||
CdmResponseType sts;
|
||||
M_TIME(
|
||||
sts = iter->second->QueryStatus(
|
||||
query_response),
|
||||
iter->second->GetMetrics(),
|
||||
cdm_session_query_status_,
|
||||
sts);
|
||||
return sts;
|
||||
return iter->second->QueryStatus(query_response);
|
||||
}
|
||||
|
||||
bool CdmEngine::IsReleaseSession(const CdmSessionId& session_id) {
|
||||
@@ -757,14 +686,7 @@ CdmResponseType CdmEngine::QueryKeyStatus(const CdmSessionId& session_id,
|
||||
session_id.c_str());
|
||||
return SESSION_NOT_FOUND_9;
|
||||
}
|
||||
CdmResponseType sts;
|
||||
M_TIME(
|
||||
sts = iter->second->QueryKeyStatus(
|
||||
query_response),
|
||||
iter->second->GetMetrics(),
|
||||
cdm_session_query_key_status_,
|
||||
sts);
|
||||
return sts;
|
||||
return iter->second->QueryKeyStatus(query_response);
|
||||
}
|
||||
|
||||
CdmResponseType CdmEngine::QueryKeyAllowedUsage(const CdmSessionId& session_id,
|
||||
@@ -781,15 +703,7 @@ CdmResponseType CdmEngine::QueryKeyAllowedUsage(const CdmSessionId& session_id,
|
||||
session_id.c_str());
|
||||
return SESSION_NOT_FOUND_12;
|
||||
}
|
||||
CdmResponseType sts;
|
||||
M_TIME(
|
||||
sts = iter->second->QueryKeyAllowedUsage(
|
||||
key_id,
|
||||
key_usage),
|
||||
iter->second->GetMetrics(),
|
||||
cdm_session_query_key_allowed_usage_,
|
||||
sts);
|
||||
return sts;
|
||||
return iter->second->QueryKeyAllowedUsage(key_id, key_usage);
|
||||
}
|
||||
|
||||
CdmResponseType CdmEngine::QueryKeyAllowedUsage(const std::string& key_id,
|
||||
@@ -805,13 +719,8 @@ CdmResponseType CdmEngine::QueryKeyAllowedUsage(const std::string& key_id,
|
||||
key_usage->Clear();
|
||||
for (CdmSessionMap::iterator iter = sessions_.begin();
|
||||
iter != sessions_.end(); ++iter) {
|
||||
M_TIME(
|
||||
session_sts = iter->second->QueryKeyAllowedUsage(
|
||||
key_id,
|
||||
&found_in_this_session),
|
||||
iter->second->GetMetrics(),
|
||||
cdm_session_query_key_allowed_usage_,
|
||||
session_sts);
|
||||
session_sts = iter->second->QueryKeyAllowedUsage(
|
||||
key_id, &found_in_this_session);
|
||||
if (session_sts == NO_ERROR) {
|
||||
if (found) {
|
||||
// Found another key. If usage settings do not match, fail.
|
||||
@@ -842,14 +751,7 @@ CdmResponseType CdmEngine::QueryOemCryptoSessionId(
|
||||
session_id.c_str());
|
||||
return SESSION_NOT_FOUND_10;
|
||||
}
|
||||
CdmResponseType sts;
|
||||
M_TIME(
|
||||
sts = iter->second->QueryOemCryptoSessionId(
|
||||
query_response),
|
||||
iter->second->GetMetrics(),
|
||||
cdm_session_query_oemcrypto_session_id_,
|
||||
sts);
|
||||
return sts;
|
||||
return iter->second->QueryOemCryptoSessionId(query_response);
|
||||
}
|
||||
|
||||
/*
|
||||
@@ -1333,12 +1235,7 @@ CdmResponseType CdmEngine::LoadUsageSession(const CdmKeySetId& key_set_id,
|
||||
}
|
||||
|
||||
CdmKeyRequest request;
|
||||
M_TIME(
|
||||
status = iter->second->GenerateReleaseRequest(
|
||||
&request),
|
||||
iter->second->GetMetrics(),
|
||||
cdm_session_generate_release_request_,
|
||||
status);
|
||||
status = iter->second->GenerateReleaseRequest(&request);
|
||||
|
||||
*release_message = request.message;
|
||||
|
||||
@@ -1347,10 +1244,7 @@ CdmResponseType CdmEngine::LoadUsageSession(const CdmKeySetId& key_set_id,
|
||||
break;
|
||||
case KEY_CANCELED:
|
||||
/* usage information not present in OEMCrypto, delete and try again */
|
||||
M_TIME(
|
||||
iter->second->DeleteLicense(),
|
||||
iter->second->GetMetrics(),
|
||||
cdm_session_delete_license_);
|
||||
iter->second->DeleteLicense();
|
||||
break;
|
||||
default:
|
||||
LOGE("CdmEngine::LoadUsageSession: generate release request error: %d",
|
||||
@@ -1393,15 +1287,7 @@ CdmResponseType CdmEngine::Decrypt(const CdmSessionId& session_id,
|
||||
int64_t seconds_remaining = 0;
|
||||
for (CdmSessionMap::iterator iter = sessions_.begin();
|
||||
iter != sessions_.end(); ++iter) {
|
||||
|
||||
bool is_key_loaded;
|
||||
M_TIME(
|
||||
is_key_loaded = iter->second->IsKeyLoaded(
|
||||
*parameters.key_id),
|
||||
iter->second->GetMetrics(),
|
||||
cdm_session_is_key_loaded_,
|
||||
is_key_loaded);
|
||||
if (is_key_loaded) {
|
||||
if (iter->second->IsKeyLoaded(*parameters.key_id)) {
|
||||
int64_t duration = iter->second->GetDurationRemaining();
|
||||
if (duration > seconds_remaining) {
|
||||
session_iter = iter;
|
||||
@@ -1418,14 +1304,7 @@ CdmResponseType CdmEngine::Decrypt(const CdmSessionId& session_id,
|
||||
return SESSION_NOT_FOUND_FOR_DECRYPT;
|
||||
}
|
||||
|
||||
CdmResponseType decrypt_sts;
|
||||
M_TIME(
|
||||
decrypt_sts = session_iter->second->Decrypt(
|
||||
parameters),
|
||||
session_iter->second->GetMetrics(),
|
||||
cdm_session_decrypt_,
|
||||
decrypt_sts);
|
||||
return decrypt_sts;
|
||||
return session_iter->second->Decrypt(parameters);
|
||||
}
|
||||
|
||||
CdmResponseType CdmEngine::GenericEncrypt(
|
||||
@@ -1438,20 +1317,8 @@ CdmResponseType CdmEngine::GenericEncrypt(
|
||||
session_id.c_str());
|
||||
return SESSION_NOT_FOUND_13;
|
||||
}
|
||||
CdmResponseType sts;
|
||||
M_TIME(
|
||||
sts = iter->second->GenericEncrypt(
|
||||
in_buffer,
|
||||
key_id,
|
||||
iv,
|
||||
algorithm,
|
||||
out_buffer),
|
||||
iter->second->GetMetrics(),
|
||||
cdm_session_generic_encrypt_,
|
||||
sts,
|
||||
metrics::Pow2Bucket(in_buffer.size()),
|
||||
algorithm);
|
||||
return sts;
|
||||
return iter->second->GenericEncrypt(in_buffer, key_id, iv,
|
||||
algorithm, out_buffer);
|
||||
}
|
||||
|
||||
CdmResponseType CdmEngine::GenericDecrypt(
|
||||
@@ -1465,20 +1332,8 @@ CdmResponseType CdmEngine::GenericDecrypt(
|
||||
session_id.c_str());
|
||||
return SESSION_NOT_FOUND_14;
|
||||
}
|
||||
CdmResponseType sts;
|
||||
M_TIME(
|
||||
sts = iter->second->GenericDecrypt(
|
||||
in_buffer,
|
||||
key_id,
|
||||
iv,
|
||||
algorithm,
|
||||
out_buffer),
|
||||
iter->second->GetMetrics(),
|
||||
cdm_session_generic_decrypt_,
|
||||
sts,
|
||||
metrics::Pow2Bucket(in_buffer.size()),
|
||||
algorithm);
|
||||
return sts;
|
||||
return iter->second->GenericDecrypt(in_buffer, key_id, iv,
|
||||
algorithm, out_buffer);
|
||||
}
|
||||
|
||||
CdmResponseType CdmEngine::GenericSign(
|
||||
@@ -1491,19 +1346,7 @@ CdmResponseType CdmEngine::GenericSign(
|
||||
session_id.c_str());
|
||||
return SESSION_NOT_FOUND_15;
|
||||
}
|
||||
CdmResponseType sts;
|
||||
M_TIME(
|
||||
sts = iter->second->GenericSign(
|
||||
message,
|
||||
key_id,
|
||||
algorithm,
|
||||
signature),
|
||||
iter->second->GetMetrics(),
|
||||
cdm_session_generic_sign_,
|
||||
sts,
|
||||
metrics::Pow2Bucket(message.size()),
|
||||
algorithm);
|
||||
return sts;
|
||||
return iter->second->GenericSign(message, key_id, algorithm, signature);
|
||||
}
|
||||
|
||||
CdmResponseType CdmEngine::GenericVerify(
|
||||
@@ -1516,18 +1359,8 @@ CdmResponseType CdmEngine::GenericVerify(
|
||||
session_id.c_str());
|
||||
return SESSION_NOT_FOUND_16;
|
||||
}
|
||||
CdmResponseType sts;
|
||||
M_TIME(
|
||||
sts = iter->second->GenericVerify(
|
||||
message,
|
||||
key_id,
|
||||
algorithm,
|
||||
signature),
|
||||
iter->second->GetMetrics(),
|
||||
cdm_session_generic_verify_,
|
||||
sts,
|
||||
metrics::Pow2Bucket(message.size()),
|
||||
algorithm);
|
||||
CdmResponseType sts = iter->second->GenericVerify(message, key_id,
|
||||
algorithm, signature);
|
||||
return sts;
|
||||
}
|
||||
|
||||
@@ -1627,12 +1460,7 @@ void CdmEngine::OnTimerEvent() {
|
||||
// usage is updated for all sessions so this needs to be
|
||||
// called only once per update usage information period
|
||||
if (iter->second->get_usage_support_type() == kUsageTableSupport) {
|
||||
CdmResponseType status;
|
||||
M_TIME(
|
||||
status = iter->second->UpdateUsageTableInformation(),
|
||||
iter->second->GetMetrics(),
|
||||
cdm_session_update_usage_information_,
|
||||
status);
|
||||
CdmResponseType status = iter->second->UpdateUsageTableInformation();
|
||||
if (NO_ERROR != status) {
|
||||
LOGW("Update usage information failed: %d", status);
|
||||
} else {
|
||||
|
||||
Reference in New Issue
Block a user