Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(550)

Side by Side Diff: chrome/test/data/media/encrypted_media_utils.js

Issue 182113005: Update EME browser tests to include EME WD (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: WD -> unprefixed Created 6 years, 9 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 // Copyright 2013 The Chromium Authors. All rights reserved. 1 // Copyright 2013 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 var keySystem = QueryString.keySystem; 5 var keySystem = QueryString.keySystem;
6 var mediaFile = QueryString.mediaFile; 6 var mediaFile = QueryString.mediaFile;
7 var mediaType = QueryString.mediaType || 'video/webm; codecs="vorbis, vp8"'; 7 var mediaType = QueryString.mediaType || 'video/webm; codecs="vorbis, vp8"';
8 var useMSE = QueryString.useMSE == 1; 8 var useMSE = QueryString.useMSE == 1;
9 var usePrefixedEME = QueryString.usePrefixedEME == 1;
9 var forceInvalidResponse = QueryString.forceInvalidResponse == 1; 10 var forceInvalidResponse = QueryString.forceInvalidResponse == 1;
10 var sessionToLoad = QueryString.sessionToLoad; 11 var sessionToLoad = QueryString.sessionToLoad;
11 var licenseServerURL = QueryString.licenseServerURL; 12 var licenseServerURL = QueryString.licenseServerURL;
12 // Number of possible retries used to get a license from license server. 13 // Number of possible retries used to get a license from license server.
13 // This is used to avoid server boot up delays since there is no direct way 14 // This is used to avoid server boot up delays since there is no direct way
14 // to know if it is ready crbug.com/339289. 15 // to know if it is ready crbug.com/339289.
15 var requestLicenseTries = 3; 16 var requestLicenseTries = 3;
16 // Delay in ms between retries to get a license from license server. 17 // Delay in ms between retries to get a license from license server.
17 var licenseRequestRetryDelayMs = 3000; 18 var licenseRequestRetryDelayMs = 3000;
18 19
(...skipping 24 matching lines...) Expand all
43 function hasPrefix(msg, prefix) { 44 function hasPrefix(msg, prefix) {
44 if (msg.length < prefix.length) 45 if (msg.length < prefix.length)
45 return false; 46 return false;
46 for (var i = 0; i < prefix.length; ++i) { 47 for (var i = 0; i < prefix.length; ++i) {
47 if (String.fromCharCode(msg[i]) != prefix[i]) 48 if (String.fromCharCode(msg[i]) != prefix[i])
48 return false; 49 return false;
49 } 50 }
50 return true; 51 return true;
51 } 52 }
52 53
54 // JWK routines copied from third_party/WebKit/LayoutTests/media/
55 // encrypted-media/encrypted-media-utils.js
56 //
57 // Encodes data (Uint8Array) into base64 string without trailing '='.
58 // TODO: Update once the EME spec is updated to say base64url encoding.
59 function base64Encode(data)
60 {
61 var result = btoa(String.fromCharCode.apply(null, data));
62 return result.replace(/=+$/g, '');
63 }
64
65 // Creates a JWK from raw key ID and key.
66 function createJWK(keyId, key)
67 {
68 var jwk = "{\"kty\":\"oct\",\"kid\":\"";
69 jwk += base64Encode(keyId);
70 jwk += "\",\"k\":\"";
71 jwk += base64Encode(key);
72 jwk += "\"}";
73 return jwk;
74 }
75
76 // Creates a JWK Set from an array of JWK(s).
77 function createJWKSet()
78 {
79 var jwkSet = "{\"keys\":[";
80 for (var i = 0; i < arguments.length; i++) {
81 if (i != 0)
82 jwkSet += ",";
83 jwkSet += arguments[i];
84 }
85 jwkSet += "]}";
86 return jwkSet;
87 }
88
53 function isHeartbeatMessage(msg) { 89 function isHeartbeatMessage(msg) {
54 return hasPrefix(msg, HEART_BEAT_HEADER); 90 return hasPrefix(msg, HEART_BEAT_HEADER);
55 } 91 }
56 92
57 function isFileIOTestMessage(msg) { 93 function isFileIOTestMessage(msg) {
58 return hasPrefix(msg, FILE_IO_TEST_RESULT_HEADER); 94 return hasPrefix(msg, FILE_IO_TEST_RESULT_HEADER);
59 } 95 }
60 96
61 function loadEncryptedMediaFromURL(video) { 97 function loadEncryptedMediaFromURL(video) {
62 return loadEncryptedMedia(video, mediaFile, keySystem, KEY, useMSE); 98 return loadEncryptedMedia(video, mediaFile, keySystem, KEY, useMSE,
99 usePrefixedEME);
63 } 100 }
64 101
65 function loadEncryptedMedia(video, mediaFile, keySystem, key, useMSE, 102 function loadEncryptedMedia(video, mediaFile, keySystem, key, useMSE,
66 appendSourceCallbackFn) { 103 usePrefixedEME, appendSourceCallbackFn) {
67 var keyRequested = false; 104 var keyRequested = false;
68 var sourceOpened = false; 105 var sourceOpened = false;
106 var mediaKeys;
107 var mediaKeySession;
69 // Add properties to enable verification that events occurred. 108 // Add properties to enable verification that events occurred.
70 video.receivedKeyAdded = false; 109 video.receivedKeyAdded = false;
71 video.receivedHeartbeat = false; 110 video.receivedHeartbeat = false;
72 video.isHeartbeatExpected = keySystem === EXTERNAL_CLEAR_KEY_KEY_SYSTEM; 111 video.isHeartbeatExpected = keySystem === EXTERNAL_CLEAR_KEY_KEY_SYSTEM;
73 video.receivedKeyMessage = false; 112 video.receivedKeyMessage = false;
74 113
75 if (!(video && mediaFile && keySystem && key)) { 114 if (!(video && mediaFile && keySystem && key)) {
76 failTest('Missing parameters in loadEncryptedMedia().'); 115 failTest('Missing parameters in loadEncryptedMedia().');
77 return; 116 return;
78 } 117 }
79 118
119 // Shared by prefixed and unprefixed EME.
80 function onNeedKey(e) { 120 function onNeedKey(e) {
81 if (keyRequested) 121 if (keyRequested)
82 return; 122 return;
83 keyRequested = true; 123 keyRequested = true;
84 console.log('onNeedKey', e); 124 console.log('onNeedKey', e);
85 125
86 var initData = sessionToLoad ? stringToUint8Array( 126 var initData = sessionToLoad ? stringToUint8Array(
87 PREFIXED_API_LOAD_SESSION_HEADER + sessionToLoad) : e.initData; 127 PREFIXED_API_LOAD_SESSION_HEADER + sessionToLoad) : e.initData;
88 try { 128 try {
89 video.webkitGenerateKeyRequest(keySystem, initData); 129 if (usePrefixedEME) {
130 video.webkitGenerateKeyRequest(keySystem, initData);
131 } else {
132 mediaKeySession = mediaKeys.createSession(e.contentType, initData);
133 mediaKeySession.addEventListener('message', onMessage);
134 mediaKeySession.addEventListener('error', function() {
135 setResultInTitle("KeyError");
136 });
137 mediaKeySession.addEventListener('ready', onReady);
138 }
90 } 139 }
91 catch(error) { 140 catch(error) {
92 setResultInTitle(error.name); 141 setResultInTitle(error.name);
93 } 142 }
94 } 143 }
95 144
145 // Prefixed EME callbacks.
96 function onKeyAdded(e) { 146 function onKeyAdded(e) {
97 e.target.receivedKeyAdded = true; 147 e.target.receivedKeyAdded = true;
98 } 148 }
99 149
100 function onKeyMessage(message) { 150 function onKeyMessage(message) {
101 video.receivedKeyMessage = true; 151 video.receivedKeyMessage = true;
152
102 if (!message.keySystem || message.keySystem != keySystem) { 153 if (!message.keySystem || message.keySystem != keySystem) {
103 failTest('Message with unexpected keySystem: ' + message.keySystem); 154 failTest('Message with unexpected keySystem: ' + message.keySystem);
104 return; 155 return;
105 } 156 }
106 157
107 if (!message.sessionId) { 158 if (!message.sessionId) {
108 failTest('Message without a sessionId: ' + message.sessionId); 159 failTest('Message without a sessionId: ' + message.sessionId);
109 return; 160 return;
110 } 161 }
111 162
163 processMessage(message, message.keySystem, message.defaultURL);
164 }
165
166 // Unprefixed EME callbacks.
167 function onReady(e) {
168 }
169
170 function onMessage(message) {
171 processMessage(message, keySystem, message.destinationURL);
172 }
173
174 // Shared by prefixed and unprefixed EME.
175 function processMessage(message, keySystem, url) {
176 video.receivedKeyMessage = true;
177
112 if (!message.message) { 178 if (!message.message) {
113 failTest('Message without a message content: ' + message.message); 179 failTest('Message without a message content: ' + message.message);
114 return; 180 return;
115 } 181 }
116 182
117 if (isHeartbeatMessage(message.message)) { 183 if (isHeartbeatMessage(message.message)) {
118 console.log('onKeyMessage - heartbeat', message); 184 console.log('processMessage - heartbeat', message);
119 message.target.receivedHeartbeat = true; 185 video.receivedHeartbeat = true;
120 verifyHeartbeatMessage(message); 186 verifyHeartbeatMessage(keySystem, url);
121 return; 187 return;
122 } 188 }
123 189
124 if (isFileIOTestMessage(message.message)) { 190 if (isFileIOTestMessage(message.message)) {
125 var success = getFileIOTestResult(message); 191 var success = getFileIOTestResult(keySystem, message);
126 console.log('onKeyMessage - CDM file IO test: ' + 192 console.log('processMessage - CDM file IO test: ' +
127 (success ? 'Success' : 'Fail')); 193 (success ? 'Success' : 'Fail'));
128 if (success) 194 if (success)
129 setResultInTitle("FILEIOTESTSUCCESS"); 195 setResultInTitle("FILEIOTESTSUCCESS");
130 else 196 else
131 setResultInTitle("FAILED"); 197 setResultInTitle("FAILED");
132 return; 198 return;
133 } 199 }
134 200
135 // For FileIOTest key system, no need to start playback. 201 // For FileIOTest key system, no need to start playback.
136 if (message.keySystem == EXTERNAL_CLEAR_KEY_FILE_IO_TEST_KEY_SYSTEM) 202 if (keySystem == EXTERNAL_CLEAR_KEY_FILE_IO_TEST_KEY_SYSTEM)
137 return; 203 return;
138 204
139 // No tested key system returns defaultURL in for key request messages. 205 // No tested key system returns defaultURL in for key request messages.
140 if (message.defaultURL) { 206 if (url) {
141 failTest('Message unexpectedly has defaultURL: ' + message.defaultURL); 207 failTest('Message unexpectedly has URL: ' + url);
142 return; 208 return;
143 } 209 }
144 210
145 // When loading a session, no need to call webkitAddKey(). 211 // When loading a session, no need to call update()/webkitAddKey().
146 if (sessionToLoad) 212 if (sessionToLoad)
147 return; 213 return;
148 214
149 console.log('onKeyMessage - key request', message); 215 console.log('processMessage - key request', message);
150 if (forceInvalidResponse) { 216 if (forceInvalidResponse) {
151 console.log('Forcing an invalid onKeyMessage response.'); 217 console.log('processMessage - Forcing an invalid response.');
152 var invalidData = new Uint8Array([0xAA]); 218 var invalidData = new Uint8Array([0xAA]);
153 video.webkitAddKey(keySystem, invalidData, invalidData); 219 if (usePrefixedEME) {
220 video.webkitAddKey(keySystem, invalidData, invalidData);
221 } else {
222 var jwkSet = stringToUint8Array(
223 createJWKSet(createJWK(invalidData, invalidData)));
224 mediaKeySession.update(jwkSet);
225 }
154 return; 226 return;
155 } 227 }
156 // Check if should send request to locally running license server. 228 // Check if should send request to locally running license server.
157 if (licenseServerURL) { 229 if (licenseServerURL) {
158 requestLicense(message); 230 requestLicense(message);
159 return; 231 return;
160 } 232 }
161 console.log('Respond to onKeyMessage with test key.'); 233 console.log('processMessage - Respond with test key.');
162 var initData = message.message; 234 var initData = message.message;
163 if (mediaType.indexOf('mp4') != -1) 235 if (mediaType.indexOf('mp4') != -1)
164 initData = KEY_ID; // Temporary hack for Clear Key in v0.1. 236 initData = KEY_ID; // Temporary hack for Clear Key in v0.1.
165 video.webkitAddKey(keySystem, key, initData); 237 if (usePrefixedEME) {
238 video.webkitAddKey(keySystem, key, initData);
239 } else {
240 var jwkSet = stringToUint8Array(createJWKSet(createJWK(initData, key)));
241 mediaKeySession.update(jwkSet);
242 }
166 } 243 }
167 244
168 function verifyHeartbeatMessage(message) { 245 function verifyHeartbeatMessage(keySystem, url) {
169 String.prototype.startsWith = function(prefix) { 246 String.prototype.startsWith = function(prefix) {
170 return this.indexOf(prefix) === 0; 247 return this.indexOf(prefix) === 0;
171 } 248 }
172 249
173 function isExternalClearKey(keySystem) { 250 function isExternalClearKey(keySystem) {
174 return keySystem == EXTERNAL_CLEAR_KEY_KEY_SYSTEM || 251 return keySystem == EXTERNAL_CLEAR_KEY_KEY_SYSTEM ||
175 keySystem.startsWith(EXTERNAL_CLEAR_KEY_KEY_SYSTEM + '.'); 252 keySystem.startsWith(EXTERNAL_CLEAR_KEY_KEY_SYSTEM + '.');
176 } 253 }
177 254
178 // Only External Clear Key sends a HEARTBEAT message. 255 // Only External Clear Key sends a HEARTBEAT message.
179 if (!isExternalClearKey(message.keySystem)) { 256 if (!isExternalClearKey(keySystem)) {
180 failTest('Unexpected heartbeat from ' + message.keySystem); 257 failTest('Unexpected heartbeat from ' + keySystem);
181 return; 258 return;
182 } 259 }
183 260
184 if (message.defaultURL != EXTERNAL_CLEAR_KEY_HEARTBEAT_URL) { 261 if (url != EXTERNAL_CLEAR_KEY_HEARTBEAT_URL) {
185 failTest('Heartbeat message with unexpected defaultURL: ' + 262 failTest('Heartbeat message with unexpected URL: ' + url);
186 message.defaultURL);
187 return; 263 return;
188 } 264 }
189 } 265 }
190 266
191 function getFileIOTestResult(e) { 267 function getFileIOTestResult(keySystem, e) {
192 // Only External Clear Key sends a FILEIOTESTRESULT message. 268 // Only External Clear Key sends a FILEIOTESTRESULT message.
193 if (e.keySystem != EXTERNAL_CLEAR_KEY_FILE_IO_TEST_KEY_SYSTEM) { 269 if (keySystem != EXTERNAL_CLEAR_KEY_FILE_IO_TEST_KEY_SYSTEM) {
194 failTest('Unexpected CDM file IO test result from ' + e.keySystem); 270 failTest('Unexpected CDM file IO test result from ' + keySystem);
195 return false; 271 return false;
196 } 272 }
197 273
198 // The test result is either '0' or '1' appended to the header. 274 // The test result is either '0' or '1' appended to the header.
199 if (e.message.length != FILE_IO_TEST_RESULT_HEADER.length + 1) 275 if (e.message.length != FILE_IO_TEST_RESULT_HEADER.length + 1)
200 return false; 276 return false;
201 277
202 var result_index = FILE_IO_TEST_RESULT_HEADER.length; 278 var result_index = FILE_IO_TEST_RESULT_HEADER.length;
203 return String.fromCharCode(e.message[result_index]) == 1; 279 return String.fromCharCode(e.message[result_index]) == 1;
204 } 280 }
205 281
206 video.addEventListener('webkitneedkey', onNeedKey); 282 if (usePrefixedEME) {
207 video.addEventListener('webkitkeymessage', onKeyMessage); 283 video.addEventListener('webkitneedkey', onNeedKey);
208 video.addEventListener('webkitkeyerror', function() { 284 video.addEventListener('webkitkeymessage', onKeyMessage);
209 setResultInTitle("KeyError"); 285 video.addEventListener('webkitkeyerror', function() {
210 }); 286 setResultInTitle("KeyError");
211 video.addEventListener('webkitkeyadded', onKeyAdded); 287 });
288 video.addEventListener('webkitkeyadded', onKeyAdded);
289 } else {
290 video.addEventListener('needkey', onNeedKey);
291 }
212 installTitleEventHandler(video, 'error'); 292 installTitleEventHandler(video, 'error');
213 293
214 if (useMSE) { 294 if (useMSE) {
215 var mediaSource = loadMediaSource(mediaFile, mediaType, 295 var mediaSource = loadMediaSource(mediaFile, mediaType,
216 appendSourceCallbackFn); 296 appendSourceCallbackFn);
217 video.src = window.URL.createObjectURL(mediaSource); 297 video.src = window.URL.createObjectURL(mediaSource);
218 } else { 298 } else {
219 video.src = mediaFile; 299 video.src = mediaFile;
220 } 300 }
301 if (!usePrefixedEME) {
302 mediaKeys = new MediaKeys(keySystem);
303 video.setMediaKeys(mediaKeys);
304 }
221 } 305 }
222 306
223 function getInitDataFromKeyId(keyID) { 307 function getInitDataFromKeyId(keyID) {
224 var init_key_id = new Uint8Array(keyID.length); 308 var init_key_id = new Uint8Array(keyID.length);
225 for(var i = 0; i < keyID.length; i++) { 309 for(var i = 0; i < keyID.length; i++) {
226 init_key_id[i] = keyID.charCodeAt(i); 310 init_key_id[i] = keyID.charCodeAt(i);
227 } 311 }
228 return init_key_id; 312 return init_key_id;
229 } 313 }
230 314
(...skipping 19 matching lines...) Expand all
250 licenseRequestRetryDelayMs + 'ms.'); 334 licenseRequestRetryDelayMs + 'ms.');
251 setTimeout(requestLicense, licenseRequestRetryDelayMs, message); 335 setTimeout(requestLicense, licenseRequestRetryDelayMs, message);
252 } 336 }
253 else 337 else
254 failTest('Bad license server response: ' + this.response); 338 failTest('Bad license server response: ' + this.response);
255 } 339 }
256 } 340 }
257 console.log('license request message', message.message); 341 console.log('license request message', message.message);
258 xmlhttp.send(message.message); 342 xmlhttp.send(message.message);
259 } 343 }
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698