/* Copyright (C) 2013-2021 Carl Hetherington This file is part of libdcp. libdcp is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version. libdcp is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with libdcp. If not, see . In addition, as a special exception, the copyright holders give permission to link the code of portions of this program with the OpenSSL library under certain conditions as described in each individual source file, and distribute linked combinations including the two. You must obey the GNU General Public License in all respects for all of the code used other than OpenSSL. If you modify file(s) with this exception, you may extend this exception to your version of the file(s), but you are not obligated to do so. If you do not wish to do so, delete this exception statement from your version. If you delete this exception statement from all source files in the program, then also delete it here. */ #include "certificate_chain.h" #include "cpl.h" #include "decrypted_kdm.h" #include "encrypted_kdm.h" #include "mono_j2k_picture_asset.h" #include "j2k_picture_asset_writer.h" #include "reel.h" #include "reel_mono_picture_asset.h" #include "reel_sound_asset.h" #include "reel_smpte_text_asset.h" #include "smpte_text_asset.h" #include "test.h" #include "types.h" #include "util.h" #include "warnings.h" #include LIBDCP_DISABLE_WARNINGS #include LIBDCP_ENABLE_WARNINGS #include using std::dynamic_pointer_cast; using std::make_shared; using std::shared_ptr; using std::string; using std::vector; using boost::optional; /** Check reading and decryption of a KDM */ BOOST_AUTO_TEST_CASE (kdm_test) { dcp::DecryptedKDM kdm ( dcp::EncryptedKDM ( dcp::file_to_string ("test/data/kdm_TONEPLATES-SMPTE-ENC_.smpte-430-2.ROOT.NOT_FOR_PRODUCTION_20130706_20230702_CAR_OV_t1_8971c838.xml") ), dcp::file_to_string ("test/data/private.key") ); auto keys = kdm.keys (); BOOST_CHECK_EQUAL (keys.size(), 2U); BOOST_CHECK_EQUAL (keys.front().cpl_id(), "eece17de-77e8-4a55-9347-b6bab5724b9f"); BOOST_CHECK_EQUAL (keys.front().id(), "4ac4f922-8239-4831-b23b-31426d0542c4"); BOOST_CHECK_EQUAL (keys.front().key().hex(), "8a2729c3e5b65c45d78305462104c3fb"); BOOST_CHECK_EQUAL (keys.back().cpl_id(), "eece17de-77e8-4a55-9347-b6bab5724b9f"); BOOST_CHECK_EQUAL (keys.back().id(), "73baf5de-e195-4542-ab28-8a465f7d4079"); BOOST_CHECK_EQUAL (keys.back().key().hex(), "5327fb7ec2e807bd57059615bf8a169d"); } /** Check that we can read in a KDM and then write it back out again the same */ BOOST_AUTO_TEST_CASE (kdm_passthrough_test) { dcp::EncryptedKDM kdm ( dcp::file_to_string ("test/data/kdm_TONEPLATES-SMPTE-ENC_.smpte-430-2.ROOT.NOT_FOR_PRODUCTION_20130706_20230702_CAR_OV_t1_8971c838.xml") ); auto parser = make_shared(); parser->parse_memory (kdm.as_xml ()); parser->get_document()->write_to_file_formatted ("build/kdm.xml", "UTF-8"); check_xml ( dcp::file_to_string("test/data/kdm_TONEPLATES-SMPTE-ENC_.smpte-430-2.ROOT.NOT_FOR_PRODUCTION_20130706_20230702_CAR_OV_t1_8971c838.xml"), dcp::file_to_string("build/kdm.xml"), {}, true ); } /** Test some of the utility methods of DecryptedKDM */ BOOST_AUTO_TEST_CASE (decrypted_kdm_test) { auto data = new uint8_t[16]; auto p = data; dcp::DecryptedKDM::put_uuid (&p, "8971c838-d0c3-405d-bc57-43afa9d91242"); BOOST_CHECK_EQUAL (data[0], 0x89); BOOST_CHECK_EQUAL (data[1], 0x71); BOOST_CHECK_EQUAL (data[2], 0xc8); BOOST_CHECK_EQUAL (data[3], 0x38); BOOST_CHECK_EQUAL (data[4], 0xd0); BOOST_CHECK_EQUAL (data[5], 0xc3); BOOST_CHECK_EQUAL (data[6], 0x40); BOOST_CHECK_EQUAL (data[7], 0x5d); BOOST_CHECK_EQUAL (data[8], 0xbc); BOOST_CHECK_EQUAL (data[9], 0x57); BOOST_CHECK_EQUAL (data[10], 0x43); BOOST_CHECK_EQUAL (data[11], 0xaf); BOOST_CHECK_EQUAL (data[12], 0xa9); BOOST_CHECK_EQUAL (data[13], 0xd9); BOOST_CHECK_EQUAL (data[14], 0x12); BOOST_CHECK_EQUAL (data[15], 0x42); p = data; BOOST_CHECK_EQUAL (dcp::DecryptedKDM::get_uuid (&p), "8971c838-d0c3-405d-bc57-43afa9d91242"); delete[] data; } /** Check that tags have the scope attribute. * Wolfgang Woehl believes this is compulsory and I am more-or-less inclined to agree. */ BOOST_AUTO_TEST_CASE (kdm_key_type_scope) { dcp::EncryptedKDM kdm ( dcp::file_to_string ("test/data/kdm_TONEPLATES-SMPTE-ENC_.smpte-430-2.ROOT.NOT_FOR_PRODUCTION_20130706_20230702_CAR_OV_t1_8971c838.xml") ); cxml::Document doc; doc.read_string (kdm.as_xml ()); auto typed_key_ids = doc.node_child("AuthenticatedPublic")-> node_child("RequiredExtensions")-> node_child("KDMRequiredExtensions")-> node_child("KeyIdList")-> node_children("TypedKeyId"); for (auto i: typed_key_ids) { for (auto j: i->node_children("KeyType")) { BOOST_CHECK (j->string_attribute("scope") == "http://www.smpte-ra.org/430-1/2006/KDM#kdm-key-type"); } } } static cxml::ConstNodePtr kdm_forensic_test (cxml::Document& doc, bool picture, optional audio) { dcp::DecryptedKDM decrypted ( dcp::EncryptedKDM ( dcp::file_to_string ("test/data/kdm_TONEPLATES-SMPTE-ENC_.smpte-430-2.ROOT.NOT_FOR_PRODUCTION_20130706_20230702_CAR_OV_t1_8971c838.xml") ), dcp::file_to_string ("test/data/private.key") ); auto signer = make_shared(dcp::file_to_string("test/data/certificate_chain")); signer->set_key(dcp::file_to_string("test/data/private.key")); dcp::EncryptedKDM kdm = decrypted.encrypt ( signer, signer->leaf(), vector(), dcp::Formulation::MODIFIED_TRANSITIONAL_1, picture, audio ); /* Check that we can pass this through correctly */ BOOST_CHECK_EQUAL (kdm.as_xml(), dcp::EncryptedKDM(kdm.as_xml()).as_xml()); doc.read_string (kdm.as_xml()); return doc.node_child("AuthenticatedPublic")-> node_child("RequiredExtensions")-> node_child("KDMRequiredExtensions")-> optional_node_child("ForensicMarkFlagList"); } /** Check ForensicMarkFlagList handling: disable picture and all audio */ BOOST_AUTO_TEST_CASE (kdm_forensic_test1) { cxml::Document doc; auto forensic = kdm_forensic_test(doc, true, 0); BOOST_REQUIRE (forensic); auto flags = forensic->node_children("ForensicMarkFlag"); BOOST_REQUIRE_EQUAL (flags.size(), 2U); BOOST_CHECK_EQUAL (flags.front()->content(), "http://www.smpte-ra.org/430-1/2006/KDM#mrkflg-picture-disable"); BOOST_CHECK_EQUAL (flags.back()->content(), "http://www.smpte-ra.org/430-1/2006/KDM#mrkflg-audio-disable"); } /** Check ForensicMarkFlagList handling: disable picture but not audio */ BOOST_AUTO_TEST_CASE (kdm_forensic_test2) { cxml::Document doc; auto forensic = kdm_forensic_test(doc, true, optional()); BOOST_REQUIRE (forensic); auto flags = forensic->node_children("ForensicMarkFlag"); BOOST_REQUIRE_EQUAL (flags.size(), 1U); BOOST_CHECK_EQUAL (flags.front()->content(), "http://www.smpte-ra.org/430-1/2006/KDM#mrkflg-picture-disable"); } /** Check ForensicMarkFlagList handling: disable audio but not picture */ BOOST_AUTO_TEST_CASE (kdm_forensic_test3) { cxml::Document doc; auto forensic = kdm_forensic_test(doc, false, 0); BOOST_REQUIRE (forensic); auto flags = forensic->node_children("ForensicMarkFlag"); BOOST_REQUIRE_EQUAL (flags.size(), 1U); BOOST_CHECK_EQUAL (flags.front()->content(), "http://www.smpte-ra.org/430-1/2006/KDM#mrkflg-audio-disable"); } /** Check ForensicMarkFlagList handling: disable picture and audio above channel 3 */ BOOST_AUTO_TEST_CASE (kdm_forensic_test4) { cxml::Document doc; auto forensic = kdm_forensic_test(doc, true, 3); BOOST_REQUIRE (forensic); auto flags = forensic->node_children("ForensicMarkFlag"); BOOST_REQUIRE_EQUAL (flags.size(), 2U); BOOST_CHECK_EQUAL (flags.front()->content(), "http://www.smpte-ra.org/430-1/2006/KDM#mrkflg-picture-disable"); BOOST_CHECK_EQUAL (flags.back()->content(), "http://www.smpte-ra.org/430-1/2006/KDM#mrkflg-audio-disable-above-channel-3"); } /** Check ForensicMarkFlagList handling: disable neither */ BOOST_AUTO_TEST_CASE (kdm_forensic_test5) { cxml::Document doc; auto forensic = kdm_forensic_test(doc, false, optional()); BOOST_CHECK (!forensic); } /** Check that KDM validity periods are checked for being within the certificate validity */ BOOST_AUTO_TEST_CASE (validity_period_test1) { auto signer = make_shared(dcp::file_to_string("test/data/certificate_chain")); signer->set_key(dcp::file_to_string("test/data/private.key")); auto asset = make_shared(dcp::Fraction(24, 1), dcp::Standard::SMPTE); asset->set_key (dcp::Key()); auto writer = asset->start_write("build/test/validity_period_test1.mxf", dcp::Behaviour::MAKE_NEW); dcp::ArrayData frame ("test/data/flat_red.j2c"); writer->write (frame.data(), frame.size()); writer->finalize (); auto reel = make_shared(); reel->add(make_shared(asset, 0)); auto cpl = make_shared("test", dcp::ContentKind::FEATURE, dcp::Standard::SMPTE); cpl->add(reel); /* This certificate_chain is valid from 22/12/2022 to 19/12/2032 */ /* Inside */ BOOST_CHECK_NO_THROW( dcp::DecryptedKDM( cpl, dcp::Key(dcp::file_to_string("test/data/private.key")), dcp::LocalTime("2025-01-01T00:00:00"), dcp::LocalTime("2027-07-31T00:00:00"), "", "", "" ).encrypt(signer, signer->leaf(), vector(), dcp::Formulation::MODIFIED_TRANSITIONAL_1, true, optional()) ); /* Starts too early */ BOOST_CHECK_THROW( dcp::DecryptedKDM( cpl, dcp::Key(dcp::file_to_string("test/data/private.key")), dcp::LocalTime("1981-01-01T00:00:00"), dcp::LocalTime("2017-07-31T00:00:00"), "", "", "" ).encrypt(signer, signer->leaf(), vector(), dcp::Formulation::MODIFIED_TRANSITIONAL_1, true, optional()), dcp::BadKDMDateError ); /* Finishes too late */ BOOST_CHECK_THROW( dcp::DecryptedKDM( cpl, dcp::Key(dcp::file_to_string("test/data/private.key")), dcp::LocalTime("2015-01-01T00:00:00"), dcp::LocalTime("2035-07-31T00:00:00"), "", "", "" ).encrypt(signer, signer->leaf(), vector(), dcp::Formulation::MODIFIED_TRANSITIONAL_1, true, optional()), dcp::BadKDMDateError ); /* Starts too early and finishes too late */ BOOST_CHECK_THROW( dcp::DecryptedKDM( cpl, dcp::Key(dcp::file_to_string("test/data/private.key")), dcp::LocalTime("1981-01-01T00:00:00"), dcp::LocalTime("2035-07-31T00:00:00"), "", "", "" ).encrypt(signer, signer->leaf(), vector(), dcp::Formulation::MODIFIED_TRANSITIONAL_1, true, optional()), dcp::BadKDMDateError ); } /** Test the case where we have: * - a OV + VF * - a single KDM which has keys for both OV and VF assets * and we load VF, then KDM, then the OV. The OV's assets should have their * KDMs properly assigned. */ BOOST_AUTO_TEST_CASE (vf_kdm_test) { /* Make OV */ boost::filesystem::path const ov_path = "build/test/vf_kdm_test_ov"; boost::filesystem::path const vf_path = "build/test/vf_kdm_test_vf"; dcp::Key key; auto ov = make_simple(ov_path, 1, 48, dcp::Standard::SMPTE, key); ov->write_xml (); auto ov_reel = ov->cpls()[0]->reels()[0]; auto ov_reel_picture = make_shared(dynamic_pointer_cast(ov_reel->main_picture())->mono_j2k_asset(), 0); auto ov_reel_sound = make_shared(ov_reel->main_sound()->asset(), 0); /* Make VF */ auto subs = make_shared(); subs->add(simple_text()); subs->set_key(key); boost::filesystem::remove_all (vf_path); boost::filesystem::create_directory (vf_path); dcp::ArrayData data(4096); subs->add_font ("afont", data); subs->write (vf_path / "subs.xml"); auto reel_subs = make_shared(dcp::TextType::OPEN_SUBTITLE, subs, dcp::Fraction(24, 1), 192, 0); auto reel = make_shared(ov_reel_picture, ov_reel_sound, reel_subs); auto cpl = make_shared("A Test DCP", dcp::ContentKind::TRAILER, dcp::Standard::SMPTE); cpl->add (reel); auto vf = make_shared("build/test/vf_kdm_test_vf"); vf->add (cpl); vf->write_xml (); /* Make KDM for VF */ auto kdm = dcp::DecryptedKDM( cpl, key, dcp::LocalTime ("2016-01-01T00:00:00+00:00"), dcp::LocalTime ("2017-01-08T00:00:00+00:00"), "libdcp", "test", "2012-07-17T04:45:18+00:00" ); /* Decrypt VF with the KDM */ dcp::DCP reload_vf(vf_path); reload_vf.read(); reload_vf.add (kdm); /* Add the OV */ dcp::DCP reload_ov(ov_path); reload_ov.read(); reload_vf.resolve_refs(reload_ov.assets()); /* Check that we can decrypt the VF */ BOOST_REQUIRE_EQUAL(reload_vf.cpls().size(), 1U); BOOST_REQUIRE_EQUAL(reload_vf.cpls()[0]->reels().size(), 1U); BOOST_REQUIRE(reload_vf.cpls()[0]->reels()[0]->main_picture()); BOOST_REQUIRE(reload_vf.cpls()[0]->reels()[0]->main_picture()->asset()); auto mono_asset = dynamic_pointer_cast(reload_vf.cpls()[0]->reels()[0]->main_picture()->asset()); BOOST_REQUIRE(mono_asset); auto reader = mono_asset->start_read(); reader->set_check_hmac(false); reader->get_frame(0)->xyz_image(); }