Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(185)

Side by Side Diff: webkit/media/crypto/content_decryption_module.h

Issue 10823299: Add ContentDecryptionModule interface. (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: Resolve comments. Created 8 years, 4 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
« no previous file with comments | « no previous file | no next file » | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
(Empty)
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
4
5 #ifndef WEBKIT_MEDIA_CRYPTO_CONTENT_DECRYPTION_MODULE_H_
6 #define WEBKIT_MEDIA_CRYPTO_CONTENT_DECRYPTION_MODULE_H_
7
8 #if defined(_MSC_VER)
9 typedef unsigned char uint8_t;
10 typedef __int64 int64_t;
11 #else
12 #include <stdint.h>
13 #endif
14
15 class ContentDecryptionModule;
16
17 extern ContentDecryptionModule* CdmCreateInstance();
scherkus (not reviewing) 2012/08/15 23:26:29 do these need to be extern C?
scherkus (not reviewing) 2012/08/15 23:26:29 what about deleting the instance? we can't assume
xhwang 2012/08/16 02:37:43 Done.
xhwang 2012/08/16 02:37:43 Done.
18 extern const char* CdmGetVersion();
19
20 enum CdmStatus {
scherkus (not reviewing) 2012/08/15 23:26:29 move into CDM class and rename as Status?
xhwang 2012/08/16 02:37:43 Done.
21 kCdmStatusSuccess = 0,
22 kCdmStatusErrorUnknown,
23 kCdmStatusErrorNoKey
24 };
25
26 // An input buffer can be split into several continuous subsamples.
27 // A SubsampleEntry specifies the number of clear and cypher bytes in each
scherkus (not reviewing) 2012/08/15 23:26:29 s/cypher/cipher/g (all src/crypto/ code uses ciph
xhwang 2012/08/16 02:37:43 Done. Will fix cypher in src/media later.
28 // subsample. For example, the following buffer has three subsamples:
29 //
30 // |<----- subsample1 ----->|<----- subsample2 ----->|<----- subsample3 ----->|
31 // | clear1 | cypher1 | clear2 | cypher2 | clear3 | cypher3 |
32 //
33 // For decryption, all of the cypher bytes in a buffer should be concatenated
34 // (in the subsample order) into a single logical stream. The clear bytes should
35 // not be considered as part of decryption.
36 //
37 // Stream to decrypt: | cypher1 | cypher2 | cypher3 |
38 // Decrypted stream: |decryped1| decryped2 | decryped3 |
39 //
40 // After decryption, the decrypted bytes should be copied over the position
41 // of the corresponding cypher bytes in the original buffer to form the output
42 // buffer. Following the above example, the decrypted buffer should be:
43 //
44 // |<----- subsample1 ----->|<----- subsample2 ----->|<----- subsample3 ----->|
45 // | clear1 |decryped1| clear2 | decryped2 | clear3 | decryped3 |
46 //
47 struct SubsampleEntry {
48 int clear_bytes;
49 int cypher_bytes;
50 };
51
52 struct InputBuffer {
53 uint8_t* data; // Pointer to the beginning of the input data.
54 int data_size; // Size (in bytes) of |data|.
55 int data_offset; // Number of bytes to be discarded before decryption.
56 uint8_t* key_id; // Key ID to identify the decryption key.
scherkus (not reviewing) 2012/08/15 23:26:29 nit: add blank line between each data+size pair (i
xhwang 2012/08/16 02:37:43 Done.
57 int key_id_size; // Size (in bytes) of |key_id|.
58 uint8_t* iv; // Initialization vector.
59 int iv_size; // Size (in bytes) of |iv|.
60 uint8_t* checksum;
61 int checksum_size; // Size (in bytes) of the |checksum|.
62 struct SubsampleEntry* subsamples;
63 int num_subsamples; // Number of subsamples in |subsamples|.
64 int64_t timestamp; // Presentation timestamp in milliseconds.
65 int64_t duration; // Duration in milliseconds.
scherkus (not reviewing) 2012/08/15 23:26:29 AFAIK we no longer care about duration
xhwang 2012/08/16 02:37:43 Will media::Buffer drop the duration?
66 };
67
68 struct OutputBuffer {
69 uint8_t* data; // Pointer to the beginning of the output data.
70 int data_size; // Size (in bytes) of |data|.
71 int64_t timestamp; // Presentation timestamp in milliseconds.
72 int64_t duration; // Duration in milliseconds.
73 };
74
75 class ContentDecryptionModule {
76 public:
77 // Generates a |key_request| as well as a |session_id| given the |init_data|.
78 // The CDM may also extract a |default_url|.
79 // Returns kCdmStatusSuccess if the key request is successfully generated,
scherkus (not reviewing) 2012/08/15 23:26:29 s/is/was
xhwang 2012/08/16 02:37:43 Done, here and below.
80 // in which case the callee should have allocated memory for the output
scherkus (not reviewing) 2012/08/15 23:26:29 I'm suspicious of this memory allocating business
xhwang 2012/08/16 02:37:43 Thank you so much for the suggestions. We were awa
ddorwin 2012/08/16 04:15:48 More accurately, we'll need to do some experimenta
scherkus (not reviewing) 2012/08/16 21:18:57 For (3) I'm assuming we would build both halves of
81 // parameters (e.g |session_id|) and passed the ownership to the caller.
82 // Returns kCdmStatusErrorUnknown otherwise, in which case the output
83 // parameters should not be used by the caller.
84 virtual CdmStatus GenerateKeyRequest(const uint8_t* init_data,
85 int init_data_size,
86 char** session_id,
87 int* session_id_size,
88 uint8_t** key_request,
89 int* key_request_size,
90 char** default_url,
91 int* default_url_size) = 0;
92
93 // Adds the |key| to the CDM.
94 // Returns kCdmStatusSuccess if the key is successfully added.
95 // Returns kCdmStatusErrorUnknown otherwise.
96 virtual CdmStatus AddKey(const char* session_id,
97 int session_id_size,
98 const uint8_t* key,
99 int key_size) = 0;
100
101 // Cancels any pending key request made to the CDM for |session_id|.
102 // Returns kCdmStatusSuccess if all pending key requests for |session_id| are
103 // successfully canceled or there is no key request to be canceled.
ddorwin 2012/08/15 06:48:10 FYI, TBD what to do if no matching session. May be
104 // Returns kCdmStatusErrorUnknown otherwise.
105 virtual CdmStatus CancelKeyRequest(const char* session_id,
106 int session_id_size) = 0;
107
108 // Decrypts the |encrypted_buffer|.
109 // Returns kCdmStatusSuccess if decryption succeeds, in which case the callee
110 // should have filled the |decrypted_buffer| and passed the ownership of
111 // |data| in |decrypted_buffer| to the caller.
112 // Returns kCdmStatusErrorNoKey if the CDM does not have the necessary
113 // decryption key to decrypt.
114 // Returns kCdmStatusErrorUnknown if any other error happens.
115 // In these two cases, |decrypted_buffer| should not be used by the caller.
116 virtual CdmStatus Decrypt(const char* session_id,
117 int session_id_size,
118 const InputBuffer& encrypted_buffer,
119 OutputBuffer* decrypted_buffer) = 0;
120
121 virtual ~ContentDecryptionModule() {};
122 };
123
124 #endif // WEBKIT_MEDIA_CRYPTO_CONTENT_DECRYPTION_MODULE_H_
OLDNEW
« no previous file with comments | « no previous file | no next file » | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698