Chromium Code Reviews| Index: ppapi/examples/content_decryptor/content_decryptor.cc |
| diff --git a/ppapi/examples/content_decryptor/content_decryptor.cc b/ppapi/examples/content_decryptor/content_decryptor.cc |
| new file mode 100644 |
| index 0000000000000000000000000000000000000000..f57d5b920f65ed2ac48e5bf28d922e7f63711ed3 |
| --- /dev/null |
| +++ b/ppapi/examples/content_decryptor/content_decryptor.cc |
| @@ -0,0 +1,276 @@ |
| +// Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| +// Use of this source code is governed by a BSD-style license that can be |
| +// found in the LICENSE file. |
| + |
| +#include <cassert> |
| +#include <string> |
| + |
| +#include "base/basictypes.h" |
| +#include "base/rand_util.h" |
| +#include "base/values.h" |
| +#include "base/memory/scoped_ptr.h" |
| +#include "ppapi/c/pp_errors.h" |
| +#include "ppapi/cpp/completion_callback.h" |
| +#include "ppapi/cpp/core.h" |
| +#include "ppapi/cpp/instance.h" |
| +#include "ppapi/cpp/module.h" |
| +#include "ppapi/cpp/resource.h" |
| +#include "ppapi/cpp/var.h" |
| +#include "ppapi/cpp/dev/buffer_dev.h" |
| +#include "ppapi/cpp/dev/content_decryptor_dev.h" |
| +#include "ppapi/shared_impl/var.h" |
| +#include "ppapi/utility/completion_callback_factory.h" |
| + |
| +using ppapi::StringVar; |
| + |
| +namespace { |
| + |
| +struct DecryptorMessage { |
| + DecryptorMessage() : media_error(0), system_error(0) {} |
| + std::string key_system; |
| + std::string session_id; |
| + std::string default_url; |
| + std::string message_data; |
| + uint16 media_error; |
| + uint16 system_error; |
| +}; |
| + |
| +struct DecryptedData { |
|
ddorwin
2012/07/28 01:43:26
This will be different for each type of data retur
Tom Finegan
2012/07/31 15:34:26
Renamed to DecryptedBlock.
|
| + DecryptedData() : callback(PP_MakeCompletionCallback(NULL, NULL)) {} |
| + PP_CompletionCallback callback; |
| + std::string data; |
| +}; |
| + |
| +bool IsMainThread() { |
| + return pp::Module::Get()->core()->IsMainThread(); |
| +} |
| + |
| +void CallOnMain(pp::CompletionCallback cb) { |
| + pp::Module::Get()->core()->CallOnMainThread(0, cb, PP_OK); |
| +} |
| + |
| +} // namespace |
| + |
| + |
| +// A wrapper class responsible for managing interaction between the browser and |
| +// a Content Decryption Module (CDM). |
| +class CDMWrapper : public pp::Instance, |
| + public pp::ContentDecryptor_Dev { |
| + public: |
| + const static size_t kSessionIdLength = 8; |
|
ddorwin
2012/07/28 01:43:26
Bits? Bytes?
8 seems odd for either. I would just
Tom Finegan
2012/07/31 15:34:26
Just pulled a number out of the air-- removed, doi
|
| + CDMWrapper(PP_Instance instance, pp::Module* module); |
| + virtual ~CDMWrapper() {} |
| + |
| + // PPP_ContentDecryptor_Dev methods |
| + virtual bool GenerateKeyRequest(PP_Var key_system, PP_Resource init_data); |
| + virtual bool AddKey(PP_Var session_id, PP_Resource key); |
| + virtual bool CancelKeyRequest(PP_Var session_id); |
| + virtual bool Decrypt(PP_Resource encrypted_block, |
| + PP_CompletionCallback callback); |
| + |
| + virtual bool DecryptAndDecode(PP_Resource encrypted_block, |
| + PP_CompletionCallback callback) { |
| + return false; |
| + } |
| + |
| + virtual bool Init(uint32_t argc, const char* argn[], const char* argv[]) { |
| + return true; |
| + } |
| + |
| + private: |
| + PP_Resource StringToBufferResource(const std::string& str); |
| + |
| + // <code>PPB_ContentDecryptor_Dev</code> dispatchers. These are passed to |
| + // <code>callback_factory_</code> to ensure that calls into |
| + // <code>PPP_ContentDecryptor_Dev</code> are asynchronous. |
| + void NeedKey(int32 result, const DecryptorMessage& decryptor_message); |
| + void KeyAdded(int32 result, const DecryptorMessage& decryptor_message); |
| + void KeyMessage(int32 result, const DecryptorMessage& decryptor_message); |
| + void KeyError(int32 result, const DecryptorMessage& decryptor_message); |
| + void DeliverBlock(int32 result, const DecryptedData& decrypted_data); |
| + |
| + pp::CompletionCallbackFactory<CDMWrapper> callback_factory_; |
| + |
| + virtual bool IsValidSessionId(std::string session_id) { |
| + // TODO(tomfinegan): The CDM MUST handle multiple session IDs. This simple |
| + // implementation exists for testing purposes. |
| + return (!session_id_.empty() && session_id == session_id_); |
| + } |
| + |
| + // TODO(tomfinegan): This needs to be mappable to init data (key IDs in the |
| + // WebM case). For WebM it most likely will be 1 key ID and 1 session per |
| + // stream. For now we'll just use a random number. |
| + std::string session_id_; |
| + |
| + // Key ID obtained from init data passed to <code>GenerateKeyRequest</code>. |
| + // As-is: WebM video specific; Inadequate for WebM with encrypted audio (A/V |
| + // will not have same key ID/key/session ID). Probably inadequate for ISO. |
| + std::string key_id_; |
| + |
| + // TODO(tomfinegan): Should these be multimaps of session_id:key_system and |
| + // session_id:key? Or am I completely confused? :) |
| + std::string key_; |
| + std::string key_system_; |
| +}; |
| + |
| +CDMWrapper::CDMWrapper(PP_Instance instance, |
| + pp::Module* module) |
| + : pp::Instance(instance), |
| + pp::ContentDecryptor_Dev(this) { |
| + callback_factory_.Initialize(this); |
| +} |
| + |
| +bool CDMWrapper::GenerateKeyRequest(PP_Var key_system_arg, |
| + PP_Resource init_data) { |
| + if (init_data) { |
| + pp::Buffer_Dev init_buffer(init_data); |
| + if (!init_buffer.data() || init_buffer.size() == 0) { |
| + return false; |
| + } |
| + |
| + // TODO(tomfinegan): Testing only implementation; init data will not always |
| + // be the key ID. |
| + key_id_.assign(reinterpret_cast<char*>(init_buffer.data()), |
| + init_buffer.size()); |
| + } |
| + |
| + StringVar* key_system_var = StringVar::FromPPVar(key_system_arg); |
| + |
| + // TODO(tomfinegan): confirm support for the key system. |
| + |
| + DecryptorMessage decryptor_message; |
| + key_system_ = key_system_var->value(); |
| + decryptor_message.key_system = key_system_; |
| + session_id_ = base::RandBytesAsString(kSessionIdLength); |
|
ddorwin
2012/07/28 01:43:26
For Clear Key, I think we should just use an incre
Tom Finegan
2012/07/31 15:34:26
Done.
|
| + decryptor_message.session_id = session_id_; |
| + decryptor_message.default_url = "http://www.google.com"; |
| + decryptor_message.message_data = "key request"; |
| + |
| + CallOnMain(callback_factory_.NewCallback(&CDMWrapper::KeyMessage, |
| + decryptor_message)); |
| + return true; |
| +} |
| + |
| +bool CDMWrapper::AddKey(PP_Var session_id_var, PP_Resource key) { |
| + if (!IsValidSessionId(StringVar::FromPPVar(session_id_var)->value())) |
| + return false; |
| + |
| + pp::Buffer_Dev key_buffer(key); |
| + if (!key_buffer.data()) |
| + return false; |
| + |
| + key_.assign(reinterpret_cast<char*>(key_buffer.data()), key_buffer.size()); |
| + |
| + DecryptorMessage decryptor_message; |
| + decryptor_message.key_system = key_system_; |
| + decryptor_message.session_id = session_id_; |
| + CallOnMain(callback_factory_.NewCallback(&CDMWrapper::KeyAdded, |
| + decryptor_message)); |
| + return true; |
| +} |
| + |
| +bool CDMWrapper::CancelKeyRequest(PP_Var session_id_var) { |
| + std::string session_id = StringVar::FromPPVar(session_id_var)->value(); |
| + |
| + // TODO(tomfinegan): cancel pending key request in CDM. |
| + |
| + return true; |
| +} |
| + |
| +bool CDMWrapper::Decrypt(PP_Resource encrypted_block, |
| + PP_CompletionCallback callback) { |
| + pp::Buffer_Dev block_buffer(encrypted_block); |
| + if (!block_buffer.data() || !callback.func) { |
| + return false; |
| + } |
| + |
| + DecryptedData decrypted_data; |
| + decrypted_data.callback = callback; |
| + decrypted_data.data = "Pretend I'm decrypted data!"; |
| + CallOnMain(callback_factory_.NewCallback(&CDMWrapper::DeliverBlock, |
| + decrypted_data)); |
|
ddorwin
2012/07/28 01:43:26
This is probably a copy, which means we're copying
|
| + return true; |
| +} |
| + |
| +PP_Resource CDMWrapper::StringToBufferResource(const std::string& str) { |
| + if (str.empty()) |
| + return 0; |
| + |
| + pp::Buffer_Dev buffer(this, str.size()); |
| + if (!buffer.data()) |
| + return 0; |
| + |
| + memcpy(buffer.data(), str.data(), str.size()); |
| + return buffer.detach(); |
| +} |
| + |
| +void CDMWrapper::NeedKey(int32 result, |
| + const DecryptorMessage& decryptor_message) { |
| + PP_Var key_system = StringVar::StringToPPVar(decryptor_message.key_system); |
| + PP_Var session_id = StringVar::StringToPPVar(decryptor_message.session_id); |
| + PP_Resource init_data = |
| + StringToBufferResource(decryptor_message.message_data); |
| + pp::ContentDecryptor_Dev::NeedKey(key_system, session_id, init_data); |
| +} |
| + |
| +void CDMWrapper::KeyAdded(int32 result, |
| + const DecryptorMessage& decryptor_message) { |
| + PP_Var key_system = StringVar::StringToPPVar(decryptor_message.key_system); |
| + PP_Var session_id = StringVar::StringToPPVar(decryptor_message.session_id); |
| + pp::ContentDecryptor_Dev::KeyAdded(key_system, session_id); |
| +} |
| + |
| +void CDMWrapper::KeyMessage(int32 result, |
| + const DecryptorMessage& decryptor_message) { |
| + PP_Var key_system = StringVar::StringToPPVar(decryptor_message.key_system); |
| + PP_Var session_id = StringVar::StringToPPVar(decryptor_message.session_id); |
| + PP_Resource message = |
| + StringToBufferResource(decryptor_message.message_data); |
| + PP_Var default_url = |
| + StringVar::StringToPPVar(decryptor_message.default_url); |
| + pp::ContentDecryptor_Dev::KeyMessage(key_system, |
| + session_id, |
| + message, |
| + default_url); |
| +} |
| + |
| +void CDMWrapper::KeyError(int32 result, |
| + const DecryptorMessage& decryptor_message) { |
| + PP_Var key_system = StringVar::StringToPPVar(decryptor_message.key_system); |
| + PP_Var session_id = StringVar::StringToPPVar(decryptor_message.session_id); |
| + pp::ContentDecryptor_Dev::KeyError(key_system, |
| + session_id, |
| + decryptor_message.media_error, |
| + decryptor_message.system_error); |
| +} |
| + |
| +void CDMWrapper::DeliverBlock(int32 result, |
| + const DecryptedData& decrypted_data) { |
| + PP_Resource decrypted_resource = StringToBufferResource( |
| + decrypted_data.data); |
| + if (decrypted_resource) { |
| + pp::ContentDecryptor_Dev::DeliverBlock(decrypted_resource, |
| + decrypted_data.callback); |
| + } |
| +} |
| + |
| +// This object is the global object representing this plugin library as long |
| +// as it is loaded. |
| +class MyModule : public pp::Module { |
| + public: |
| + MyModule() : pp::Module() {} |
| + virtual ~MyModule() {} |
| + |
| + virtual pp::Instance* CreateInstance(PP_Instance instance) { |
| + return new CDMWrapper(instance, this); |
| + } |
| +}; |
| + |
| +namespace pp { |
| + |
| +// Factory function for your specialization of the Module object. |
| +Module* CreateModule() { |
| + return new MyModule(); |
| +} |
| + |
| +} // namespace pp |