/* * Copyright (C) 2014 The Android Open Source Project * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ /* * This file defines an NDK API. * Do not remove methods. * Do not change method signatures. * Do not change the value of constants. * Do not change the size of any of the classes defined in here. * Do not reference types that are not part of the NDK. * Do not #include files that aren't part of the NDK. */ #ifndef _NDK_MEDIA_DRM_H #define _NDK_MEDIA_DRM_H #include #ifdef __cplusplus extern "C" { #endif #include #include struct AMediaDrm; typedef struct AMediaDrm AMediaDrm; typedef struct { const uint8_t *ptr; size_t length; } AMediaDrmByteArray; typedef AMediaDrmByteArray AMediaDrmSessionId; typedef AMediaDrmByteArray AMediaDrmScope; typedef AMediaDrmByteArray AMediaDrmKeySetId; typedef AMediaDrmByteArray AMediaDrmSecureStop; typedef enum AMediaDrmEventType { /** * This event type indicates that the app needs to request a certificate from * the provisioning server. The request message data is obtained using * AMediaDrm_getProvisionRequest. */ EVENT_PROVISION_REQUIRED = 1, /** * This event type indicates that the app needs to request keys from a license * server. The request message data is obtained using AMediaDrm_getKeyRequest. */ EVENT_KEY_REQUIRED = 2, /** * This event type indicates that the licensed usage duration for keys in a session * has expired. The keys are no longer valid. */ EVENT_KEY_EXPIRED = 3, /** * This event may indicate some specific vendor-defined condition, see your * DRM provider documentation for details */ EVENT_VENDOR_DEFINED = 4 } AMediaDrmEventType; typedef void (*AMediaDrmEventListener)(AMediaDrm *, const AMediaDrmSessionId &sessionId, AMediaDrmEventType eventType, int extra, const uint8_t *data, size_t dataSize); /** * Query if the given scheme identified by its UUID is supported on this device, and * whether the drm plugin is able to handle the media container format specified by mimeType. * * uuid identifies the universal unique ID of the crypto scheme. uuid must be 16 bytes. * mimeType is the MIME type of the media container, e.g. "video/mp4". If mimeType * is not known or required, it can be provided as NULL. */ bool AMediaDrm_isCryptoSchemeSupported(const uint8_t *uuid, const char *mimeType); /** * Create a MediaDrm instance from a UUID * uuid identifies the universal unique ID of the crypto scheme. uuid must be 16 bytes. */ AMediaDrm* AMediaDrm_createByUUID(const uint8_t *uuid); /** * Release a MediaDrm object */ void AMediaDrm_release(AMediaDrm *); /** * Register a callback to be invoked when an event occurs * * listener is the callback that will be invoked on event */ media_status_t AMediaDrm_setOnEventListener(AMediaDrm *, AMediaDrmEventListener listener); /** * Open a new session with the MediaDrm object. A session ID is returned. * * returns MEDIADRM_NOT_PROVISIONED_ERROR if provisioning is needed * returns MEDIADRM_RESOURCE_BUSY_ERROR if required resources are in use */ media_status_t AMediaDrm_openSession(AMediaDrm *, AMediaDrmSessionId &sessionId); /** * Close a session on the MediaDrm object that was previously opened * with AMediaDrm_openSession. */ media_status_t AMediaDrm_closeSession(AMediaDrm *, const AMediaDrmSessionId &sessionId); typedef enum AMediaDrmKeyType { /** * This key request type species that the keys will be for online use, they will * not be saved to the device for subsequent use when the device is not connected * to a network. */ KEY_TYPE_STREAMING = 1, /** * This key request type specifies that the keys will be for offline use, they * will be saved to the device for use when the device is not connected to a network. */ KEY_TYPE_OFFLINE = 2, /** * This key request type specifies that previously saved offline keys should be released. */ KEY_TYPE_RELEASE = 3 } AMediaDrmKeyType; /** * Data type containing {key, value} pair */ typedef struct AMediaDrmKeyValuePair { const char *mKey; const char *mValue; } AMediaDrmKeyValue; /** * A key request/response exchange occurs between the app and a license server * to obtain or release keys used to decrypt encrypted content. * AMediaDrm_getKeyRequest is used to obtain an opaque key request byte array that * is delivered to the license server. The opaque key request byte array is * returned in KeyRequest.data. The recommended URL to deliver the key request to * is returned in KeyRequest.defaultUrl. * * After the app has received the key request response from the server, * it should deliver to the response to the DRM engine plugin using the method * AMediaDrm_provideKeyResponse. * * scope may be a sessionId or a keySetId, depending on the specified keyType. * When the keyType is KEY_TYPE_STREAMING or KEY_TYPE_OFFLINE, scope should be set * to the sessionId the keys will be provided to. When the keyType is * KEY_TYPE_RELEASE, scope should be set to the keySetId of the keys being released. * Releasing keys from a device invalidates them for all sessions. * * init container-specific data, its meaning is interpreted based on the mime type * provided in the mimeType parameter. It could contain, for example, the content * ID, key ID or other data obtained from the content metadata that is required in * generating the key request. init may be null when keyType is KEY_TYPE_RELEASE. * * initSize is the number of bytes of initData * * mimeType identifies the mime type of the content. * * keyType specifes the type of the request. The request may be to acquire keys for * streaming or offline content, or to release previously acquired keys, which are * identified by a keySetId. * * optionalParameters are included in the key request message to allow a client * application to provide additional message parameters to the server. * * numOptionalParameters indicates the number of optional parameters provided * by the caller * * On exit: * 1. The keyRequest pointer will reference the opaque key request data. It * will reside in memory owned by the AMediaDrm object, and will remain * accessible until the next call to AMediaDrm_getKeyRequest or until the * MediaDrm object is released. * 2. keyRequestSize will be set to the size of the request * * returns MEDIADRM_NOT_PROVISIONED_ERROR if reprovisioning is needed, due to a * problem with the device certificate. */ media_status_t AMediaDrm_getKeyRequest(AMediaDrm *, const AMediaDrmScope &scope, const uint8_t *init, size_t initSize, const char *mimeType, AMediaDrmKeyType keyType, const AMediaDrmKeyValue *optionalParameters, size_t numOptionalParameters, const uint8_t *&keyRequest, size_t &keyRequestSize); /** * A key response is received from the license server by the app, then it is * provided to the DRM engine plugin using provideKeyResponse. When the * response is for an offline key request, a keySetId is returned that can be * used to later restore the keys to a new session with AMediaDrm_restoreKeys. * When the response is for a streaming or release request, a null keySetId is * returned. * * scope may be a sessionId or keySetId depending on the type of the * response. Scope should be set to the sessionId when the response is for either * streaming or offline key requests. Scope should be set to the keySetId when * the response is for a release request. * * response points to the opaque response from the server * responseSize should be set to the size of the response in bytes */ media_status_t AMediaDrm_provideKeyResponse(AMediaDrm *, const AMediaDrmScope &scope, const uint8_t *response, size_t responseSize, AMediaDrmKeySetId &keySetId); /** * Restore persisted offline keys into a new session. keySetId identifies the * keys to load, obtained from a prior call to AMediaDrm_provideKeyResponse. * * sessionId is the session ID for the DRM session * keySetId identifies the saved key set to restore */ media_status_t AMediaDrm_restoreKeys(AMediaDrm *, const AMediaDrmSessionId &sessionId, const AMediaDrmKeySetId &keySetId); /** * Remove the current keys from a session. * * keySetId identifies keys to remove */ media_status_t AMediaDrm_removeKeys(AMediaDrm *, const AMediaDrmSessionId &keySetId); /** * Request an informative description of the key status for the session. The status is * in the form of {key, value} pairs. Since DRM license policies vary by vendor, * the specific status field names are determined by each DRM vendor. Refer to your * DRM provider documentation for definitions of the field names for a particular * DRM engine plugin. * * On entry, numPairs should be set by the caller to the maximum number of pairs * that can be returned (the size of the array). On exit, numPairs will be set * to the number of entries written to the array. If the number of {key, value} pairs * to be returned is greater than *numPairs, MEDIADRM_SHORT_BUFFER will be returned * and numPairs will be set to the number of pairs available. */ media_status_t AMediaDrm_queryKeyStatus(AMediaDrm *, const AMediaDrmSessionId &sessionId, AMediaDrmKeyValue *keyValuePairs, size_t &numPairs); /** * A provision request/response exchange occurs between the app and a provisioning * server to retrieve a device certificate. If provisionining is required, the * EVENT_PROVISION_REQUIRED event will be sent to the event handler. * getProvisionRequest is used to obtain the opaque provision request byte array that * should be delivered to the provisioning server. * On exit: * 1. The provision request data will be referenced by provisionRequest, in * memory owned by the AMediaDrm object. It will remain accessible until the * next call to getProvisionRequest. * 2. provisionRequestSize will be set to the size of the request data. * 3. serverUrl will reference a NULL terminated string containing the URL * the provisioning request should be sent to. It will remain accessible until * the next call to getProvisionRequest. */ media_status_t AMediaDrm_getProvisionRequest(AMediaDrm *, const uint8_t *&provisionRequest, size_t &provisionRequestSize, const char *&serverUrl); /** * After a provision response is received by the app, it is provided to the DRM * engine plugin using this method. * * response is the opaque provisioning response byte array to provide to the * DRM engine plugin. * responseSize is the length of the provisioning response in bytes. * * returns MEDIADRM_DEVICE_REVOKED_ERROR if the response indicates that the * server rejected the request */ media_status_t AMediaDrm_provideProvisionResponse(AMediaDrm *, const uint8_t *response, size_t responseSize); /** * A means of enforcing limits on the number of concurrent streams per subscriber * across devices is provided via SecureStop. This is achieved by securely * monitoring the lifetime of sessions. * * Information from the server related to the current playback session is written * to persistent storage on the device when each MediaCrypto object is created. * * In the normal case, playback will be completed, the session destroyed and the * Secure Stops will be queried. The app queries secure stops and forwards the * secure stop message to the server which verifies the signature and notifies the * server side database that the session destruction has been confirmed. The persisted * record on the client is only removed after positive confirmation that the server * received the message using releaseSecureStops(). * * numSecureStops is set by the caller to the maximum number of secure stops to * return. On exit, *numSecureStops will be set to the number actually returned. * If *numSecureStops is too small for the number of secure stops available, * MEDIADRM_SHORT_BUFFER will be returned and *numSecureStops will be set to the * number required. */ media_status_t AMediaDrm_getSecureStops(AMediaDrm *, AMediaDrmSecureStop *secureStops, size_t &numSecureStops); /** * Process the SecureStop server response message ssRelease. After authenticating * the message, remove the SecureStops identified in the response. * * ssRelease is the server response indicating which secure stops to release */ media_status_t AMediaDrm_releaseSecureStops(AMediaDrm *, const AMediaDrmSecureStop &ssRelease); /** * String property name: identifies the maker of the DRM engine plugin */ const char *PROPERTY_VENDOR = "vendor"; /** * String property name: identifies the version of the DRM engine plugin */ const char *PROPERTY_VERSION = "version"; /** * String property name: describes the DRM engine plugin */ const char *PROPERTY_DESCRIPTION = "description"; /** * String property name: a comma-separated list of cipher and mac algorithms * supported by CryptoSession. The list may be empty if the DRM engine * plugin does not support CryptoSession operations. */ const char *PROPERTY_ALGORITHMS = "algorithms"; /** * Read a DRM engine plugin String property value, given the property name string. * * propertyName identifies the property to query * On return, propertyValue will be set to point to the property value. The * memory that the value resides in is owned by the NDK MediaDrm API and * will remain valid until the next call to AMediaDrm_getPropertyString. */ media_status_t AMediaDrm_getPropertyString(AMediaDrm *, const char *propertyName, const char *&propertyValue); /** * Byte array property name: the device unique identifier is established during * device provisioning and provides a means of uniquely identifying each device. */ const char *PROPERTY_DEVICE_UNIQUE_ID = "deviceUniqueId"; /** * Read a DRM engine plugin byte array property value, given the property name string. * On return, *propertyValue will be set to point to the property value. The * memory that the value resides in is owned by the NDK MediaDrm API and * will remain valid until the next call to AMediaDrm_getPropertyByteArray. */ media_status_t AMediaDrm_getPropertyByteArray(AMediaDrm *, const char *propertyName, AMediaDrmByteArray &propertyValue); /** * Set a DRM engine plugin String property value. */ media_status_t AMediaDrm_setPropertyString(AMediaDrm *, const char *propertyName, const char *value); /** * Set a DRM engine plugin byte array property value. */ media_status_t AMediaDrm_setPropertyByteArray(AMediaDrm *, const char *propertyName, const uint8_t *value, size_t valueSize); /** * In addition to supporting decryption of DASH Common Encrypted Media, the * MediaDrm APIs provide the ability to securely deliver session keys from * an operator's session key server to a client device, based on the factory-installed * root of trust, and then perform encrypt, decrypt, sign and verify operations * with the session key on arbitrary user data. * * Operators create session key servers that receive session key requests and provide * encrypted session keys which can be used for general purpose crypto operations. * * Generic encrypt/decrypt/sign/verify methods are based on the established session * keys. These keys are exchanged using the getKeyRequest/provideKeyResponse methods. * * Applications of this capability include securing various types of purchased or * private content, such as applications, books and other media, photos or media * delivery protocols. */ /* * Encrypt the data referenced by input of length dataSize using algorithm specified * by cipherAlgorithm, and write the encrypted result into output. The caller must * ensure that the output buffer is large enough to accept dataSize bytes. The key * to use is identified by the 16 byte keyId. The key must have been loaded into * the session using provideKeyResponse. */ media_status_t AMediaDrm_encrypt(AMediaDrm *, const AMediaDrmSessionId &sessionId, const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv, const uint8_t *input, uint8_t *output, size_t dataSize); /* * Decrypt the data referenced by input of length dataSize using algorithm specified * by cipherAlgorithm, and write the decrypted result into output. The caller must * ensure that the output buffer is large enough to accept dataSize bytes. The key * to use is identified by the 16 byte keyId. The key must have been loaded into * the session using provideKeyResponse. */ media_status_t AMediaDrm_decrypt(AMediaDrm *, const AMediaDrmSessionId &sessionId, const char *cipherAlgorithm, uint8_t *keyId, uint8_t *iv, const uint8_t *input, uint8_t *output, size_t dataSize); /* * Generate a signature using the specified macAlgorithm over the message data * referenced by message of size messageSize and store the signature in the * buffer referenced signature of max size *signatureSize. If the buffer is not * large enough to hold the signature, MEDIADRM_SHORT_BUFFER is returned and * *signatureSize is set to the buffer size required. The key to use is identified * by the 16 byte keyId. The key must have been loaded into the session using * provideKeyResponse. */ media_status_t AMediaDrm_sign(AMediaDrm *, const AMediaDrmSessionId &sessionId, const char *macAlgorithm, uint8_t *keyId, uint8_t *message, size_t messageSize, uint8_t *signature, size_t *signatureSize); /* * Perform a signature verification using the specified macAlgorithm over the message * data referenced by the message parameter of size messageSize. Returns MEDIADRM_OK * if the signature matches, otherwise MEDAIDRM_VERIFY_FAILED is returned. The key to * use is identified by the 16 byte keyId. The key must have been loaded into the * session using provideKeyResponse. */ media_status_t AMediaDrm_verify(AMediaDrm *, const AMediaDrmSessionId &sessionId, const char *macAlgorithm, uint8_t *keyId, const uint8_t *message, size_t messageSize, const uint8_t *signature, size_t signatureSize); #ifdef __cplusplus } // extern "C" #endif #endif //_NDK_MEDIA_DRM_H