Chromium Code Reviews| OLD | NEW |
|---|---|
| (Empty) | |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | |
| 2 // Use of this source code is governed by a BSD-style license that can be | |
| 3 // found in the LICENSE file. | |
| 4 | |
| 5 #include "webkit/media/crypto/clear_key_cdm.h" | |
| 6 | |
| 7 #include <vector> | |
| 8 | |
| 9 #include "base/bind.h" | |
| 10 #include "base/logging.h" | |
| 11 #include "base/time.h" | |
| 12 #include "media/base/decoder_buffer.h" | |
| 13 | |
| 14 static const char kClearKeyCdmVersion[] = "0.1.0.0"; | |
| 15 | |
| 16 static scoped_refptr<media::DecoderBuffer> CopyDecoderBufferFrom( | |
| 17 const cdm::InputBuffer& input_buffer) { | |
| 18 scoped_refptr<media::DecoderBuffer> output_buffer = | |
| 19 media::DecoderBuffer::CopyFrom(input_buffer.data, input_buffer.data_size); | |
| 20 | |
| 21 std::vector<media::SubsampleEntry> subsamples; | |
| 22 for (uint32_t i = 0; i < input_buffer.num_subsamples; ++i) { | |
| 23 media::SubsampleEntry subsample; | |
| 24 subsample.clear_bytes = input_buffer.subsamples[i].clear_bytes; | |
| 25 subsample.cypher_bytes = input_buffer.subsamples[i].cipher_bytes; | |
| 26 subsamples.push_back(subsample); | |
| 27 } | |
| 28 | |
| 29 scoped_ptr<media::DecryptConfig> decrypt_config(new media::DecryptConfig( | |
| 30 std::string(reinterpret_cast<const char*>(input_buffer.key_id), | |
| 31 input_buffer.key_id_size), | |
| 32 std::string(reinterpret_cast<const char*>(input_buffer.iv), | |
| 33 input_buffer.key_id_size), | |
| 34 std::string(reinterpret_cast<const char*>(input_buffer.checksum), | |
| 35 input_buffer.checksum_size), | |
| 36 input_buffer.data_offset, | |
| 37 subsamples)); | |
| 38 | |
| 39 output_buffer->SetDecryptConfig(decrypt_config.Pass()); | |
| 40 output_buffer->SetTimestamp( | |
| 41 base::TimeDelta::FromMilliseconds(input_buffer.timestamp)); | |
| 42 output_buffer->SetDuration( | |
| 43 base::TimeDelta::FromMilliseconds(input_buffer.duration)); | |
| 44 | |
| 45 return output_buffer; | |
| 46 } | |
| 47 | |
| 48 template<typename Type> | |
| 49 class ScopedResetter { | |
| 50 public: | |
| 51 explicit ScopedResetter(Type* object) : object_(object) {} | |
| 52 ~ScopedResetter() { | |
| 53 object_->Reset(); | |
| 54 } | |
| 55 | |
| 56 private: | |
| 57 Type* const object_; | |
| 58 }; | |
| 59 | |
| 60 template<typename Type> | |
| 61 static Type* AllocateAndCopy(const Type* data, int size) { | |
| 62 COMPILE_ASSERT(sizeof(Type) == 1, type_size_is_not_one); | |
| 63 Type* copy = new Type[size]; | |
| 64 memcpy(copy, data, size); | |
| 65 return copy; | |
| 66 } | |
| 67 | |
| 68 cdm::ContentDecryptionModule* CreateCdmInstance() { | |
| 69 return new webkit_media::ClearKeyCdm(); | |
| 70 } | |
| 71 | |
| 72 void DestroyCdmInstance(cdm::ContentDecryptionModule* instance) { | |
| 73 delete instance; | |
| 74 } | |
| 75 | |
| 76 const char* GetCdmVersion() { | |
| 77 return kClearKeyCdmVersion; | |
| 78 } | |
| 79 | |
| 80 namespace webkit_media { | |
| 81 | |
| 82 ClearKeyCdm::Client::Client() : status_(kKeyError), key_message_length_(0) {} | |
| 83 | |
| 84 ClearKeyCdm::Client::~Client() {} | |
| 85 | |
| 86 void ClearKeyCdm::Client::Reset() { | |
| 87 status_ = kKeyError; | |
| 88 session_id_.clear(); | |
| 89 key_message_.reset(); | |
| 90 key_message_length_ = 0; | |
| 91 default_url_.clear(); | |
| 92 } | |
| 93 | |
| 94 void ClearKeyCdm::Client::KeyAdded(const std::string& key_system, | |
| 95 const std::string& session_id) { | |
| 96 status_ = kKeyAdded; | |
| 97 session_id_ = session_id; | |
| 98 } | |
| 99 | |
| 100 void ClearKeyCdm::Client::KeyError(const std::string& key_system, | |
| 101 const std::string& session_id, | |
| 102 media::Decryptor::KeyError error_code, | |
| 103 int system_code) { | |
| 104 status_ = kKeyError; | |
| 105 session_id_ = session_id; | |
| 106 } | |
| 107 | |
| 108 void ClearKeyCdm::Client::KeyMessage(const std::string& key_system, | |
| 109 const std::string& session_id, | |
| 110 scoped_array<uint8> message, | |
| 111 int message_length, | |
| 112 const std::string& default_url) { | |
| 113 status_ = kKeyMessage; | |
| 114 session_id_ = session_id; | |
| 115 key_message_ = message.Pass(); | |
| 116 key_message_length_ = message_length; | |
| 117 } | |
| 118 | |
| 119 void ClearKeyCdm::Client::NeedKey(const std::string& key_system, | |
| 120 const std::string& session_id, | |
| 121 scoped_array<uint8> init_data, | |
| 122 int init_data_length) { | |
| 123 // In the current implementation of AesDecryptor, NeedKey is not used. | |
| 124 // If no key is available to decrypt an input buffer, it returns kNoKey to | |
| 125 // the caller instead of firing NeedKey. | |
| 126 NOTREACHED(); | |
| 127 } | |
| 128 | |
| 129 ClearKeyCdm::ClearKeyCdm() : decryptor_(&client_) {} | |
| 130 | |
| 131 ClearKeyCdm::~ClearKeyCdm() {} | |
| 132 | |
| 133 ClearKeyCdm::Status ClearKeyCdm::GenerateKeyRequest(const uint8_t* init_data, | |
| 134 int init_data_size, | |
| 135 char** session_id, | |
| 136 int* session_id_size, | |
| 137 uint8_t** key_request, | |
| 138 int* key_request_size, | |
| 139 char** default_url, | |
| 140 int* default_url_size) { | |
| 141 base::AutoLock auto_lock(lock_); | |
| 142 ScopedResetter<Client> auto_resetter(&client_); | |
| 143 decryptor_.GenerateKeyRequest("", init_data, init_data_size); | |
| 144 | |
| 145 if (client_.status() != Client::kKeyMessage) | |
| 146 return kErrorUnknown; | |
| 147 | |
| 148 // Client methods are called synchronously, so we can use client variables | |
| 149 // here. | |
| 150 *session_id_size = client_.session_id().size(); | |
| 151 *session_id = AllocateAndCopy(client_.session_id().data(), *session_id_size); | |
| 152 *key_request_size = client_.key_message_length(); | |
| 153 *key_request = AllocateAndCopy(client_.key_message(), *key_request_size); | |
| 154 *default_url_size = client_.default_url().size(); | |
| 155 *default_url = AllocateAndCopy(client_.default_url().data(), | |
| 156 *default_url_size); | |
| 157 return kSuccess; | |
| 158 } | |
| 159 | |
| 160 ClearKeyCdm::Status ClearKeyCdm::AddKey(const char* session_id, | |
| 161 int session_id_size, | |
| 162 const uint8_t* key, | |
| 163 int key_size, | |
| 164 const uint8_t* key_id, | |
| 165 int key_id_size) { | |
| 166 base::AutoLock auto_lock(lock_); | |
| 167 ScopedResetter<Client> auto_resetter(&client_); | |
| 168 decryptor_.AddKey("", key, key_size, key_id, key_id_size, | |
| 169 std::string(session_id, session_id_size)); | |
| 170 | |
| 171 // Client methods are called synchronously, so we can use client variables | |
|
ddorwin
2012/08/16 17:36:50
Not sure what this is trying to say (that isn't al
xhwang
2012/08/20 21:09:45
Done.
| |
| 172 // here. | |
| 173 if (client_.status() != Client::kKeyAdded) | |
| 174 return kErrorUnknown; | |
| 175 | |
| 176 return kSuccess; | |
| 177 } | |
| 178 | |
| 179 ClearKeyCdm::Status ClearKeyCdm::CancelKeyRequest(const char* session_id, | |
| 180 int session_id_size) { | |
| 181 base::AutoLock auto_lock(lock_); | |
| 182 ScopedResetter<Client> auto_resetter(&client_); | |
| 183 decryptor_.CancelKeyRequest("", std::string(session_id, session_id_size)); | |
| 184 return kSuccess; | |
| 185 } | |
| 186 | |
| 187 static void CopyDecryptResults( | |
| 188 media::Decryptor::Status* status_copy, | |
| 189 scoped_refptr<media::DecoderBuffer>* buffer_copy, | |
| 190 media::Decryptor::Status status, | |
| 191 const scoped_refptr<media::DecoderBuffer>& buffer) { | |
| 192 *status_copy = status; | |
| 193 *buffer_copy = buffer; | |
| 194 } | |
| 195 | |
| 196 ClearKeyCdm::Status ClearKeyCdm::Decrypt( | |
| 197 const char* session_id, | |
| 198 int session_id_size, | |
| 199 const cdm::InputBuffer& encrypted_buffer, | |
| 200 cdm::OutputBuffer* decrypted_buffer) { | |
| 201 scoped_refptr<media::DecoderBuffer> decoder_buffer = | |
| 202 CopyDecoderBufferFrom(encrypted_buffer); | |
| 203 | |
| 204 // Callback is called synchronously, so we can use variables on the stack. | |
| 205 media::Decryptor::Status status; | |
| 206 scoped_refptr<media::DecoderBuffer> buffer; | |
| 207 decryptor_.Decrypt(decoder_buffer, | |
| 208 base::Bind(&CopyDecryptResults, &status, &buffer)); | |
| 209 | |
| 210 if (status == media::Decryptor::kError) | |
| 211 return kErrorUnknown; | |
| 212 | |
| 213 if (status == media::Decryptor::kNoKey) | |
| 214 return kErrorNoKey; | |
| 215 | |
| 216 DCHECK(buffer); | |
| 217 int data_size = buffer->GetDataSize(); | |
| 218 decrypted_buffer->data = AllocateAndCopy(buffer->GetData(), data_size); | |
| 219 decrypted_buffer->data_size = data_size; | |
| 220 decrypted_buffer->timestamp = buffer->GetTimestamp().InMilliseconds(); | |
| 221 decrypted_buffer->duration = buffer->GetDuration().InMilliseconds(); | |
| 222 return kSuccess; | |
| 223 } | |
| 224 | |
| 225 } // namespace webkit_media | |
| OLD | NEW |