Loading drm/libmediadrm/CryptoHalAidl.cpp +4 −2 Original line number Diff line number Diff line Loading @@ -353,7 +353,9 @@ ssize_t CryptoHalAidl::decrypt(const uint8_t keyId[16], const uint8_t iv[16], err = statusAidlToStatusT(statusAidl); std::string msgStr(statusAidl.getMessage()); if (errorDetailMsg != nullptr) { *errorDetailMsg = toString8(msgStr); } if (err != OK) { ALOGE("Failed on decrypt, error description:%s", statusAidl.getDescription().c_str()); return err; Loading drm/libmediadrm/CryptoHalHidl.cpp +6 −2 Original line number Diff line number Diff line Loading @@ -342,8 +342,10 @@ ssize_t CryptoHalHidl::decrypt(const uint8_t keyId[16], const uint8_t iv[16], [&](Status_V1_2 status, uint32_t hBytesWritten, hidl_string hDetailedError) { if (status == Status_V1_2::OK) { bytesWritten = hBytesWritten; if (errorDetailMsg != nullptr) { *errorDetailMsg = toString8(hDetailedError); } } err = toStatusT(status); }); } else { Loading @@ -353,8 +355,10 @@ ssize_t CryptoHalHidl::decrypt(const uint8_t keyId[16], const uint8_t iv[16], [&](Status status, uint32_t hBytesWritten, hidl_string hDetailedError) { if (status == Status::OK) { bytesWritten = hBytesWritten; if (errorDetailMsg != nullptr) { *errorDetailMsg = toString8(hDetailedError); } } err = toStatusT(status); }); } Loading drm/libmediadrm/fuzzer/mediadrm_fuzzer.cpp +3 −2 Original line number Diff line number Diff line Loading @@ -20,6 +20,7 @@ #include <binder/MemoryDealer.h> #include <hidlmemory/FrameworkUtils.h> #include <media/stagefright/foundation/AString.h> #include <mediadrm/CryptoHal.h> #include <mediadrm/DrmHal.h> #include <utils/String8.h> Loading Loading @@ -401,7 +402,7 @@ void DrmFuzzer::invokeCryptoDecrypt(const uint8_t *data) { .secureMemory = nullptr}; const uint64_t offset = 0; AString *errorDetailMsg = nullptr; AString errorDetailMsg; CryptoPlugin::Mode mode; bool shouldPassRandomCryptoMode = mFuzzedDataProvider->ConsumeBool(); if (shouldPassRandomCryptoMode) { Loading @@ -411,7 +412,7 @@ void DrmFuzzer::invokeCryptoDecrypt(const uint8_t *data) { kCryptoMode[mFuzzedDataProvider->ConsumeIntegralInRange<size_t>(0, kNumCryptoMode - 1)]; } mCrypto->decrypt(keyId, iv, mode, pattern, sourceBuffer, offset, subSamples, numSubSamples, destBuffer, errorDetailMsg); destBuffer, &errorDetailMsg); if (heapSeqNum >= 0) { mCrypto->unsetHeap(heapSeqNum); Loading Loading
drm/libmediadrm/CryptoHalAidl.cpp +4 −2 Original line number Diff line number Diff line Loading @@ -353,7 +353,9 @@ ssize_t CryptoHalAidl::decrypt(const uint8_t keyId[16], const uint8_t iv[16], err = statusAidlToStatusT(statusAidl); std::string msgStr(statusAidl.getMessage()); if (errorDetailMsg != nullptr) { *errorDetailMsg = toString8(msgStr); } if (err != OK) { ALOGE("Failed on decrypt, error description:%s", statusAidl.getDescription().c_str()); return err; Loading
drm/libmediadrm/CryptoHalHidl.cpp +6 −2 Original line number Diff line number Diff line Loading @@ -342,8 +342,10 @@ ssize_t CryptoHalHidl::decrypt(const uint8_t keyId[16], const uint8_t iv[16], [&](Status_V1_2 status, uint32_t hBytesWritten, hidl_string hDetailedError) { if (status == Status_V1_2::OK) { bytesWritten = hBytesWritten; if (errorDetailMsg != nullptr) { *errorDetailMsg = toString8(hDetailedError); } } err = toStatusT(status); }); } else { Loading @@ -353,8 +355,10 @@ ssize_t CryptoHalHidl::decrypt(const uint8_t keyId[16], const uint8_t iv[16], [&](Status status, uint32_t hBytesWritten, hidl_string hDetailedError) { if (status == Status::OK) { bytesWritten = hBytesWritten; if (errorDetailMsg != nullptr) { *errorDetailMsg = toString8(hDetailedError); } } err = toStatusT(status); }); } Loading
drm/libmediadrm/fuzzer/mediadrm_fuzzer.cpp +3 −2 Original line number Diff line number Diff line Loading @@ -20,6 +20,7 @@ #include <binder/MemoryDealer.h> #include <hidlmemory/FrameworkUtils.h> #include <media/stagefright/foundation/AString.h> #include <mediadrm/CryptoHal.h> #include <mediadrm/DrmHal.h> #include <utils/String8.h> Loading Loading @@ -401,7 +402,7 @@ void DrmFuzzer::invokeCryptoDecrypt(const uint8_t *data) { .secureMemory = nullptr}; const uint64_t offset = 0; AString *errorDetailMsg = nullptr; AString errorDetailMsg; CryptoPlugin::Mode mode; bool shouldPassRandomCryptoMode = mFuzzedDataProvider->ConsumeBool(); if (shouldPassRandomCryptoMode) { Loading @@ -411,7 +412,7 @@ void DrmFuzzer::invokeCryptoDecrypt(const uint8_t *data) { kCryptoMode[mFuzzedDataProvider->ConsumeIntegralInRange<size_t>(0, kNumCryptoMode - 1)]; } mCrypto->decrypt(keyId, iv, mode, pattern, sourceBuffer, offset, subSamples, numSubSamples, destBuffer, errorDetailMsg); destBuffer, &errorDetailMsg); if (heapSeqNum >= 0) { mCrypto->unsetHeap(heapSeqNum); Loading