Index: webkit/media/crypto/ppapi/content_decryption_module.h |
diff --git a/webkit/media/crypto/ppapi/content_decryption_module.h b/webkit/media/crypto/ppapi/content_decryption_module.h |
index cb21258a6fb24feb19ab45813e34f3c15fb1082d..098e6e1462c2820165044a2d146ae7b184ec77fe 100644 |
--- a/webkit/media/crypto/ppapi/content_decryption_module.h |
+++ b/webkit/media/crypto/ppapi/content_decryption_module.h |
@@ -29,8 +29,11 @@ namespace cdm { |
enum Status { |
kSuccess = 0, |
- kErrorUnknown, |
- kErrorNoKey |
+ kDecryptOnly, // The CDM does not support to DecryptAndDecode() requested |
ddorwin
2012/09/03 12:35:30
"to" does not seem like the correct grammar.
|
+ // decoder config but can still be used to do Decrypt() only. |
+ kNeedMoreData, // Decoder needs more data to produce a decoded frame/sample. |
+ kNoKey, // The decryption key is not available for decryption. |
+ kError |
}; |
// TODO(xhwang): Use int32_t instead of uint32_t for sizes here and below and |
@@ -129,6 +132,76 @@ struct OutputBuffer { |
int64_t timestamp; // Presentation timestamp in microseconds. |
}; |
+struct VideoFrame { |
+ // Surface formats based on FOURCC labels, see: |
+ // http://www.fourcc.org/yuv.php |
+ enum Format { |
+ kInvalidFormat = 0, // Invalid format value. Used for error reporting. |
+ kEmpty, // An empty frame. |
+ kI420 // 12bpp YVU planar 1x1 Y, 2x2 UV samples. |
+ }; |
+ |
+ struct Size { |
+ Size() : width(0), height(0) {} |
+ Size(int32_t width, int32_t height) : width(width), height(height) {} |
+ |
+ int32_t width; |
+ int32_t height; |
+ }; |
+ |
+ static const int32_t kMaxPlanes = 3; |
+ |
+ VideoFrame() |
+ : format(kInvalidFormat), |
+ timestamp(0) { |
+ for (int i = 0; i < kMaxPlanes; ++i) { |
+ strides[i] = 0; |
+ data[i] = NULL; |
+ } |
+ } |
+ |
+ Format format; |
+ |
+ // Width and height of the video frame. |
+ Size data_size; |
+ |
+ // Array of strides for each plane, typically greater or equal to the width |
+ // of the surface divided by the horizontal sampling period. Note that |
+ // strides can be negative. |
+ int32_t strides[kMaxPlanes]; |
+ |
+ // Array of data pointers to each plane. |
+ uint8_t* data[kMaxPlanes]; |
+ |
+ int64_t timestamp; // Presentation timestamp in microseconds. |
+}; |
+ |
+struct VideoDecoderConfig { |
+ enum VideoCodec { |
+ kUnknownVideoCodec = 0, |
+ kCodecVP8 |
+ }; |
+ |
+ enum VideoCodecProfile { |
+ kUnknownVideoCodecProfile = 0, |
+ kVp8ProfileMain |
+ }; |
+ |
+ VideoDecoderConfig() |
+ : codec(kUnknownVideoCodec), |
+ profile(kUnknownVideoCodecProfile), |
+ format(VideoFrame::kInvalidFormat), |
+ extra_data(NULL), |
+ extra_data_size() {} |
+ |
+ VideoCodec codec; |
+ VideoCodecProfile profile; |
+ VideoFrame::Format format; |
+ VideoFrame::Size coded_size; |
+ uint8_t* extra_data; |
+ int32_t extra_data_size; |
+}; |
+ |
class ContentDecryptionModule { |
public: |
// Generates a |key_request| given the |init_data|. |
@@ -136,7 +209,7 @@ class ContentDecryptionModule { |
// in which case the callee should have allocated memory for the output |
// parameters (e.g |session_id| in |key_request|) and passed the ownership |
// to the caller. |
- // Returns kErrorUnknown otherwise, in which case the output parameters should |
+ // Returns kError otherwise, in which case the output parameters should |
// not be used by the caller. |
// |
// TODO(xhwang): It's not safe to pass the ownership of the dynamically |
@@ -148,7 +221,7 @@ class ContentDecryptionModule { |
// Adds the |key| to the CDM to be associated with |key_id|. |
// Returns kSuccess if the key was successfully added. |
- // Returns kErrorUnknown otherwise. |
+ // Returns kError otherwise. |
virtual Status AddKey(const char* session_id, |
int session_id_size, |
const uint8_t* key, |
@@ -159,7 +232,7 @@ class ContentDecryptionModule { |
// Cancels any pending key request made to the CDM for |session_id|. |
// Returns kSuccess if all pending key requests for |session_id| were |
// successfully canceled or there was no key request to be canceled. |
- // Returns kErrorUnknown otherwise. |
+ // Returns kError otherwise. |
virtual Status CancelKeyRequest(const char* session_id, |
int session_id_size) = 0; |
@@ -167,10 +240,11 @@ class ContentDecryptionModule { |
// Returns kSuccess if decryption succeeded, in which case the callee |
// should have filled the |decrypted_buffer| and passed the ownership of |
// |data| in |decrypted_buffer| to the caller. |
- // Returns kErrorNoKey if the CDM did not have the necessary decryption key |
+ // Returns kNoKey if the CDM did not have the necessary decryption key |
// to decrypt. |
- // Returns kErrorUnknown if any other error happened. |
- // In these two cases, |decrypted_buffer| should not be used by the caller. |
+ // Returns kError if any other error happened. |
+ // If the return value is not kSuccess, |decrypted_buffer| should be discarded |
+ // and not be used by the caller. |
// |
// TODO(xhwang): It's not safe to pass the ownership of the dynamically |
// allocated memory over library boundaries. Fix it after related PPAPI change |
@@ -178,6 +252,45 @@ class ContentDecryptionModule { |
virtual Status Decrypt(const InputBuffer& encrypted_buffer, |
OutputBuffer* decrypted_buffer) = 0; |
+ // Initializes the CDM video decoder with |video_decoder_config|. This |
+ // function must be called before DecryptAndDecode() is called. |
+ // Returns kSuccess if the |video_decoder_config| is supported and the CDM |
+ // video decoder is successfully initialized. |
+ // Returns kDecryptOnly if the |video_decoder_config| is not supported |
+ // but the CDM can still be used to Decrypt() the video stream. |
+ // Returns kError if |video_decoder_config| is not supported and the |
+ // CDM can not be used (or is not allowed) to Decrypt() the video stream. |
+ virtual Status InitializeVideoDecoder( |
+ const VideoDecoderConfig& video_decoder_config) = 0; |
+ |
+ // Decrypts the |encrypted_buffer| and decodes the decrypted buffer into a |
+ // |video_frame|. Upon end-of-stream, the caller should call this function |
+ // repeatedly with empty |encrypted_buffer| (|data| being NULL) until |
+ // only empty |video_frame| (|format| being kEmpty) is produced. |
+ // Returns kSuccess if decryption and decoding both succeeded, in which case |
+ // the callee should have filled the |video_frame| and passed the ownership of |
+ // |data| in |video_frame| to the caller. |
+ // Returns kNoKey if the CDM did not have the necessary decryption key |
+ // to decrypt. |
+ // Returns kNeedMoreData if more data was needed by the decoder to generate |
+ // a decoded frame (e.g. during initialization). |
+ // Returns kError if any other (decryption or decoding) error happened. |
+ // If the return value is not kSuccess, |video_frame| should be discarded and |
+ // not be used by the caller. |
+ // |
+ // TODO(xhwang): It's not safe to pass the ownership of the dynamically |
+ // allocated memory over library boundaries. Fix it after related PPAPI change |
+ // and sample CDM are landed. |
+ virtual Status DecryptAndDecodeVideo(const InputBuffer& encrypted_buffer, |
+ VideoFrame* video_frame) = 0; |
+ |
+ // Resets the CDM video decoder to an initialized clean state. |
+ virtual void ResetVideoDecoder() = 0; |
+ |
+ // Stops the CDM video decoder and set it to an uninitialized state. Note |
+ // that a VideoDecoder cannot be re-initialized after it has been stopped. |
+ virtual void StopVideoDecoder() = 0; |
+ |
virtual ~ContentDecryptionModule() {} |
}; |