Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(268)

Unified Diff: ppapi/api/private/pp_decrypt_config.idl

Issue 10857027: Add content decryptor related structs and update PP{P|B}_ContentDecryptor_Private. (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: Resolve comments. Created 8 years, 4 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
« no previous file with comments | « no previous file | ppapi/api/private/ppb_content_decryptor_private.idl » ('j') | no next file with comments »
Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
Index: ppapi/api/private/pp_decrypt_config.idl
diff --git a/ppapi/api/private/pp_decrypt_config.idl b/ppapi/api/private/pp_decrypt_config.idl
new file mode 100644
index 0000000000000000000000000000000000000000..d61f80136a602e3f845d05f07c574a0fb8a70294
--- /dev/null
+++ b/ppapi/api/private/pp_decrypt_config.idl
@@ -0,0 +1,117 @@
+/* Copyright (c) 2012 The Chromium Authors. All rights reserved.
+ * Use of this source code is governed by a BSD-style license that can be
+ * found in the LICENSE file.
+ */
+
+/**
+ * The <code>PP_DecryptTrackingInfo</code> struct contains necessary information
+ * that can be used to associate the decrypted data with a decrypt request
+ * and/or an input buffer.
+ */
+[assert_size(16)]
+struct PP_DecryptTrackingInfo {
+ /**
+ * Client-specified identifier for the associated decrypt request. By using
+ * this value, the client can associate the decrypted data with a decryption
+ * request.
+ */
+ uint64_t request_id;
ddorwin 2012/08/16 23:56:05 This is only used for decrypt (no decode), right?
xhwang 2012/08/17 01:00:35 Even with decode, we still need to find the right
+
+ /**
+ * Timestamp in microseconds of the associated buffer. By using this value,
+ * the client can associate the decrypted (and decoded) data with an input
+ * buffer. This is needed because the decoded buffers can be out of the input
ddorwin 2012/08/16 23:56:05 ... buffers may be delivered out of order and not
xhwang 2012/08/17 01:00:35 Done.
+ * order.
+ */
+ int64_t timestamp;
+};
+
+/**
+ * The <code>PP_DecryptSubsampleDescription</code> struct contains information
+ * to support subsample decryption.
+ *
+ * An input buffer can be split into several continuous subsamples.
+ * A <code>PP_DecryptSubsampleEntry</code> specifies the number of clear and
+ * cipher bytes in each subsample. For example, the following buffer has three
+ * subsamples:
+ *
+ * |<----- subsample1 ----->|<----- subsample2 ----->|<----- subsample3 ----->|
+ * | clear1 | cipher1 | clear2 | cipher2 | clear3 | cipher3 |
+ *
+ * For decryption, all of the cipher bytes in a buffer should be treated as a
+ * continuous (in the subsample order) logical stream. The clear bytes should
dmichael (off chromium) 2012/08/16 22:26:51 continuous->contiguous?
xhwang 2012/08/17 01:00:35 Done.
+ * not be considered as part of decryption.
+ *
+ * Logical stream to decrypt: | cipher1 | cipher2 | cipher3 |
+ * Decrypted stream: | decrypted1| decrypted2 | decrypted3 |
+ *
+ * After decryption, the decrypted bytes should be copied over the position
+ * of the corresponding cipher bytes in the original buffer to form the output
+ * buffer. Following the above example, the decrypted buffer should be:
+ *
+ * |<----- subsample1 ----->|<----- subsample2 ----->|<----- subsample3 ----->|
+ * | clear1 | decrypted1| clear2 | decrypted2 | clear3 | decrypted3 |
+ */
+[assert_size(8)]
+struct PP_DecryptSubsampleDescription {
+ /**
+ * Size in bytes of clear data in a subsample entry.
+ */
+ uint32_t clear_bytes;
+
+ /**
+ * Size in bytes of encrypted data in a subsample entry.
+ */
+ uint32_t cipher_bytes;
+};
+
+/**
+ * The <code>PP_DecryptConfig</code> struct contains all information needed to
+ * decrypt an encrypted buffer.
+ */
+[assert_size(256)]
+struct PP_DecryptConfig {
+ /**
+ * Information needed by the client to track the buffer to be decrypted.
+ *
+ * TODO(xhwang): Consider moving this out of <code>PP_DecryptConfig</code>
+ * since strictly speaking it's not a part of the decrypt config. Keep it
+ * here for now because there is a limit of 5 parameters in the IPC message
+ * so we don't want to pass too many parameters in the Decrypt() calls.
+ */
+ PP_DecryptTrackingInfo tracking_info;
+
+ /**
+ * Size in bytes of data to be discarded before applying the decryption.
+ */
+ uint32_t data_offset;
+
+ /**
+ * Key ID of the buffer to be decrypted.
+ *
+ * TODO(xhwang): For WebM the key ID can be as large as 2048 bytes in theory.
+ * But it's not used in current implementations. If we really need to support
+ * it, we should move key ID out as a separate parameter, e.g. as PP_Var, or
+ * make the whole PP_DecryptConfig as a PP_Resource.
+ */
+ uint8_t[64] key_id;
+ uint32_t key_id_size;
+
+ /**
+ * Initialization vector of the buffer to be decrypted.
+ */
+ uint8_t[16] iv;
+ uint32_t iv_size;
+
+ /**
+ * Checksum of the buffer to be decrypted.
+ */
+ uint8_t[12] checksum;
+ uint32_t checksum_size;
+
+ /**
+ * Subsample information of the buffer to be decrypted.
+ */
+ PP_DecryptSubsampleDescription[16] subsamples;
+ uint32_t num_subsamples;
+};
« no previous file with comments | « no previous file | ppapi/api/private/ppb_content_decryptor_private.idl » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698