| OLD | NEW |
| (Empty) |
| 1 // Copyright 2016 The Chromium Authors. All rights reserved. | |
| 2 // Use of this source code is governed by a BSD-style license that can be | |
| 3 // found in the LICENSE file. | |
| 4 | |
| 5 #include "media/remoting/rpc/proto_utils.h" | |
| 6 | |
| 7 #include <algorithm> | |
| 8 | |
| 9 #include "base/big_endian.h" | |
| 10 #include "base/logging.h" | |
| 11 #include "base/time/time.h" | |
| 12 #include "base/values.h" | |
| 13 #include "media/base/encryption_scheme.h" | |
| 14 #include "media/remoting/rpc/proto_enum_utils.h" | |
| 15 | |
| 16 namespace media { | |
| 17 namespace remoting { | |
| 18 | |
| 19 namespace { | |
| 20 | |
| 21 constexpr size_t kPayloadVersionFieldSize = sizeof(uint8_t); | |
| 22 constexpr size_t kProtoBufferHeaderSize = sizeof(uint16_t); | |
| 23 constexpr size_t kDataBufferHeaderSize = sizeof(uint32_t); | |
| 24 | |
| 25 std::unique_ptr<::media::DecryptConfig> ConvertProtoToDecryptConfig( | |
| 26 const pb::DecryptConfig& config_message) { | |
| 27 if (!config_message.has_key_id()) | |
| 28 return nullptr; | |
| 29 if (!config_message.has_iv()) | |
| 30 return nullptr; | |
| 31 | |
| 32 std::vector<::media::SubsampleEntry> entries( | |
| 33 config_message.sub_samples_size()); | |
| 34 for (int i = 0; i < config_message.sub_samples_size(); ++i) { | |
| 35 entries.push_back( | |
| 36 ::media::SubsampleEntry(config_message.sub_samples(i).clear_bytes(), | |
| 37 config_message.sub_samples(i).cypher_bytes())); | |
| 38 } | |
| 39 | |
| 40 std::unique_ptr<::media::DecryptConfig> decrypt_config( | |
| 41 new ::media::DecryptConfig(config_message.key_id(), config_message.iv(), | |
| 42 entries)); | |
| 43 return decrypt_config; | |
| 44 } | |
| 45 | |
| 46 scoped_refptr<::media::DecoderBuffer> ConvertProtoToDecoderBuffer( | |
| 47 const pb::DecoderBuffer& buffer_message, | |
| 48 scoped_refptr<::media::DecoderBuffer> buffer) { | |
| 49 if (buffer_message.is_eos()) { | |
| 50 VLOG(1) << "EOS data"; | |
| 51 return ::media::DecoderBuffer::CreateEOSBuffer(); | |
| 52 } | |
| 53 | |
| 54 if (buffer_message.has_timestamp_usec()) { | |
| 55 buffer->set_timestamp( | |
| 56 base::TimeDelta::FromMicroseconds(buffer_message.timestamp_usec())); | |
| 57 } | |
| 58 | |
| 59 if (buffer_message.has_duration_usec()) { | |
| 60 buffer->set_duration( | |
| 61 base::TimeDelta::FromMicroseconds(buffer_message.duration_usec())); | |
| 62 } | |
| 63 VLOG(3) << "timestamp:" << buffer_message.timestamp_usec() | |
| 64 << " duration:" << buffer_message.duration_usec(); | |
| 65 | |
| 66 if (buffer_message.has_is_key_frame()) | |
| 67 buffer->set_is_key_frame(buffer_message.is_key_frame()); | |
| 68 | |
| 69 if (buffer_message.has_decrypt_config()) { | |
| 70 buffer->set_decrypt_config( | |
| 71 ConvertProtoToDecryptConfig(buffer_message.decrypt_config())); | |
| 72 } | |
| 73 | |
| 74 bool has_discard = false; | |
| 75 base::TimeDelta front_discard; | |
| 76 if (buffer_message.has_front_discard_usec()) { | |
| 77 has_discard = true; | |
| 78 front_discard = | |
| 79 base::TimeDelta::FromMicroseconds(buffer_message.front_discard_usec()); | |
| 80 } | |
| 81 base::TimeDelta back_discard; | |
| 82 if (buffer_message.has_back_discard_usec()) { | |
| 83 has_discard = true; | |
| 84 back_discard = | |
| 85 base::TimeDelta::FromMicroseconds(buffer_message.back_discard_usec()); | |
| 86 } | |
| 87 | |
| 88 if (has_discard) { | |
| 89 buffer->set_discard_padding( | |
| 90 ::media::DecoderBuffer::DiscardPadding(front_discard, back_discard)); | |
| 91 } | |
| 92 | |
| 93 if (buffer_message.has_splice_timestamp_usec()) { | |
| 94 buffer->set_splice_timestamp(base::TimeDelta::FromMicroseconds( | |
| 95 buffer_message.splice_timestamp_usec())); | |
| 96 } | |
| 97 | |
| 98 if (buffer_message.has_side_data()) { | |
| 99 buffer->CopySideDataFrom( | |
| 100 reinterpret_cast<const uint8_t*>(buffer_message.side_data().data()), | |
| 101 buffer_message.side_data().size()); | |
| 102 } | |
| 103 | |
| 104 return buffer; | |
| 105 } | |
| 106 | |
| 107 void ConvertDecryptConfigToProto(const ::media::DecryptConfig& decrypt_config, | |
| 108 pb::DecryptConfig* config_message) { | |
| 109 DCHECK(config_message); | |
| 110 | |
| 111 config_message->set_key_id(decrypt_config.key_id()); | |
| 112 config_message->set_iv(decrypt_config.iv()); | |
| 113 | |
| 114 for (const auto& entry : decrypt_config.subsamples()) { | |
| 115 pb::DecryptConfig::SubSample* sub_sample = | |
| 116 config_message->add_sub_samples(); | |
| 117 sub_sample->set_clear_bytes(entry.clear_bytes); | |
| 118 sub_sample->set_cypher_bytes(entry.cypher_bytes); | |
| 119 } | |
| 120 } | |
| 121 | |
| 122 void ConvertDecoderBufferToProto( | |
| 123 const scoped_refptr<::media::DecoderBuffer>& decoder_buffer, | |
| 124 pb::DecoderBuffer* buffer_message) { | |
| 125 if (decoder_buffer->end_of_stream()) { | |
| 126 buffer_message->set_is_eos(true); | |
| 127 return; | |
| 128 } | |
| 129 | |
| 130 VLOG(3) << "timestamp:" << decoder_buffer->timestamp().InMicroseconds() | |
| 131 << " duration:" << decoder_buffer->duration().InMicroseconds(); | |
| 132 buffer_message->set_timestamp_usec( | |
| 133 decoder_buffer->timestamp().InMicroseconds()); | |
| 134 buffer_message->set_duration_usec( | |
| 135 decoder_buffer->duration().InMicroseconds()); | |
| 136 buffer_message->set_is_key_frame(decoder_buffer->is_key_frame()); | |
| 137 | |
| 138 if (decoder_buffer->decrypt_config()) { | |
| 139 ConvertDecryptConfigToProto(*decoder_buffer->decrypt_config(), | |
| 140 buffer_message->mutable_decrypt_config()); | |
| 141 } | |
| 142 | |
| 143 buffer_message->set_front_discard_usec( | |
| 144 decoder_buffer->discard_padding().first.InMicroseconds()); | |
| 145 buffer_message->set_back_discard_usec( | |
| 146 decoder_buffer->discard_padding().second.InMicroseconds()); | |
| 147 buffer_message->set_splice_timestamp_usec( | |
| 148 decoder_buffer->splice_timestamp().InMicroseconds()); | |
| 149 | |
| 150 if (decoder_buffer->side_data_size()) { | |
| 151 buffer_message->set_side_data(decoder_buffer->side_data(), | |
| 152 decoder_buffer->side_data_size()); | |
| 153 } | |
| 154 } | |
| 155 | |
| 156 } // namespace | |
| 157 | |
| 158 scoped_refptr<::media::DecoderBuffer> ByteArrayToDecoderBuffer( | |
| 159 const uint8_t* data, | |
| 160 uint32_t size) { | |
| 161 base::BigEndianReader reader(reinterpret_cast<const char*>(data), size); | |
| 162 uint8_t payload_version = 0; | |
| 163 uint16_t proto_size = 0; | |
| 164 pb::DecoderBuffer segment; | |
| 165 uint32_t buffer_size = 0; | |
| 166 if (reader.ReadU8(&payload_version) && payload_version == 0 && | |
| 167 reader.ReadU16(&proto_size) && | |
| 168 static_cast<int>(proto_size) < reader.remaining() && | |
| 169 segment.ParseFromArray(reader.ptr(), proto_size) && | |
| 170 reader.Skip(proto_size) && reader.ReadU32(&buffer_size) && | |
| 171 static_cast<int64_t>(buffer_size) <= reader.remaining()) { | |
| 172 // Deserialize proto buffer. It passes the pre allocated DecoderBuffer into | |
| 173 // the function because the proto buffer may overwrite DecoderBuffer since | |
| 174 // it may be EOS buffer. | |
| 175 scoped_refptr<media::DecoderBuffer> decoder_buffer = | |
| 176 ConvertProtoToDecoderBuffer( | |
| 177 segment, | |
| 178 DecoderBuffer::CopyFrom( | |
| 179 reinterpret_cast<const uint8_t*>(reader.ptr()), buffer_size)); | |
| 180 return decoder_buffer; | |
| 181 } | |
| 182 | |
| 183 LOG(ERROR) << "Not able to convert byte array to ::media::DecoderBuffer"; | |
| 184 return nullptr; | |
| 185 } | |
| 186 | |
| 187 std::vector<uint8_t> DecoderBufferToByteArray( | |
| 188 const scoped_refptr<::media::DecoderBuffer>& decoder_buffer) { | |
| 189 pb::DecoderBuffer decoder_buffer_message; | |
| 190 ConvertDecoderBufferToProto(decoder_buffer, &decoder_buffer_message); | |
| 191 | |
| 192 size_t decoder_buffer_size = | |
| 193 decoder_buffer->end_of_stream() ? 0 : decoder_buffer->data_size(); | |
| 194 size_t size = kPayloadVersionFieldSize + kProtoBufferHeaderSize + | |
| 195 decoder_buffer_message.ByteSize() + kDataBufferHeaderSize + | |
| 196 decoder_buffer_size; | |
| 197 std::vector<uint8_t> buffer(size); | |
| 198 base::BigEndianWriter writer(reinterpret_cast<char*>(buffer.data()), | |
| 199 buffer.size()); | |
| 200 if (writer.WriteU8(0) && | |
| 201 writer.WriteU16( | |
| 202 static_cast<uint16_t>(decoder_buffer_message.GetCachedSize())) && | |
| 203 decoder_buffer_message.SerializeToArray( | |
| 204 writer.ptr(), decoder_buffer_message.GetCachedSize()) && | |
| 205 writer.Skip(decoder_buffer_message.GetCachedSize()) && | |
| 206 writer.WriteU32(decoder_buffer_size)) { | |
| 207 if (decoder_buffer_size) { | |
| 208 // DecoderBuffer frame data. | |
| 209 writer.WriteBytes(reinterpret_cast<const void*>(decoder_buffer->data()), | |
| 210 decoder_buffer->data_size()); | |
| 211 } | |
| 212 return buffer; | |
| 213 } | |
| 214 | |
| 215 // Reset buffer since serialization of the data failed. | |
| 216 LOG(ERROR) << "Not able to convert ::media::DecoderBuffer to byte array"; | |
| 217 buffer.clear(); | |
| 218 return buffer; | |
| 219 } | |
| 220 | |
| 221 void ConvertEncryptionSchemeToProto( | |
| 222 const ::media::EncryptionScheme& encryption_scheme, | |
| 223 pb::EncryptionScheme* message) { | |
| 224 DCHECK(message); | |
| 225 message->set_mode( | |
| 226 ToProtoEncryptionSchemeCipherMode(encryption_scheme.mode()).value()); | |
| 227 message->set_encrypt_blocks(encryption_scheme.pattern().encrypt_blocks()); | |
| 228 message->set_skip_blocks(encryption_scheme.pattern().skip_blocks()); | |
| 229 } | |
| 230 | |
| 231 ::media::EncryptionScheme ConvertProtoToEncryptionScheme( | |
| 232 const pb::EncryptionScheme& message) { | |
| 233 return ::media::EncryptionScheme( | |
| 234 ToMediaEncryptionSchemeCipherMode(message.mode()).value(), | |
| 235 ::media::EncryptionScheme::Pattern(message.encrypt_blocks(), | |
| 236 message.skip_blocks())); | |
| 237 } | |
| 238 | |
| 239 void ConvertAudioDecoderConfigToProto( | |
| 240 const ::media::AudioDecoderConfig& audio_config, | |
| 241 pb::AudioDecoderConfig* audio_message) { | |
| 242 DCHECK(audio_config.IsValidConfig()); | |
| 243 DCHECK(audio_message); | |
| 244 | |
| 245 audio_message->set_codec( | |
| 246 ToProtoAudioDecoderConfigCodec(audio_config.codec()).value()); | |
| 247 audio_message->set_sample_format( | |
| 248 ToProtoAudioDecoderConfigSampleFormat(audio_config.sample_format()) | |
| 249 .value()); | |
| 250 audio_message->set_channel_layout( | |
| 251 ToProtoAudioDecoderConfigChannelLayout(audio_config.channel_layout()) | |
| 252 .value()); | |
| 253 audio_message->set_samples_per_second(audio_config.samples_per_second()); | |
| 254 audio_message->set_seek_preroll_usec( | |
| 255 audio_config.seek_preroll().InMicroseconds()); | |
| 256 audio_message->set_codec_delay(audio_config.codec_delay()); | |
| 257 | |
| 258 if (!audio_config.extra_data().empty()) { | |
| 259 audio_message->set_extra_data(audio_config.extra_data().data(), | |
| 260 audio_config.extra_data().size()); | |
| 261 } | |
| 262 | |
| 263 if (audio_config.is_encrypted()) { | |
| 264 pb::EncryptionScheme* encryption_scheme_message = | |
| 265 audio_message->mutable_encryption_scheme(); | |
| 266 ConvertEncryptionSchemeToProto(audio_config.encryption_scheme(), | |
| 267 encryption_scheme_message); | |
| 268 } | |
| 269 } | |
| 270 | |
| 271 bool ConvertProtoToAudioDecoderConfig( | |
| 272 const pb::AudioDecoderConfig& audio_message, | |
| 273 ::media::AudioDecoderConfig* audio_config) { | |
| 274 DCHECK(audio_config); | |
| 275 audio_config->Initialize( | |
| 276 ToMediaAudioCodec(audio_message.codec()).value(), | |
| 277 ToMediaSampleFormat(audio_message.sample_format()).value(), | |
| 278 ToMediaChannelLayout(audio_message.channel_layout()).value(), | |
| 279 audio_message.samples_per_second(), | |
| 280 std::vector<uint8_t>(audio_message.extra_data().begin(), | |
| 281 audio_message.extra_data().end()), | |
| 282 ConvertProtoToEncryptionScheme(audio_message.encryption_scheme()), | |
| 283 base::TimeDelta::FromMicroseconds(audio_message.seek_preroll_usec()), | |
| 284 audio_message.codec_delay()); | |
| 285 return audio_config->IsValidConfig(); | |
| 286 } | |
| 287 | |
| 288 void ConvertVideoDecoderConfigToProto( | |
| 289 const ::media::VideoDecoderConfig& video_config, | |
| 290 pb::VideoDecoderConfig* video_message) { | |
| 291 DCHECK(video_config.IsValidConfig()); | |
| 292 DCHECK(video_message); | |
| 293 | |
| 294 video_message->set_codec( | |
| 295 ToProtoVideoDecoderConfigCodec(video_config.codec()).value()); | |
| 296 video_message->set_profile( | |
| 297 ToProtoVideoDecoderConfigProfile(video_config.profile()).value()); | |
| 298 video_message->set_format( | |
| 299 ToProtoVideoDecoderConfigFormat(video_config.format()).value()); | |
| 300 video_message->set_color_space( | |
| 301 ToProtoVideoDecoderConfigColorSpace(video_config.color_space()).value()); | |
| 302 | |
| 303 pb::Size* coded_size_message = video_message->mutable_coded_size(); | |
| 304 coded_size_message->set_width(video_config.coded_size().width()); | |
| 305 coded_size_message->set_height(video_config.coded_size().height()); | |
| 306 | |
| 307 pb::Rect* visible_rect_message = video_message->mutable_visible_rect(); | |
| 308 visible_rect_message->set_x(video_config.visible_rect().x()); | |
| 309 visible_rect_message->set_y(video_config.visible_rect().y()); | |
| 310 visible_rect_message->set_width(video_config.visible_rect().width()); | |
| 311 visible_rect_message->set_height(video_config.visible_rect().height()); | |
| 312 | |
| 313 pb::Size* natural_size_message = video_message->mutable_natural_size(); | |
| 314 natural_size_message->set_width(video_config.natural_size().width()); | |
| 315 natural_size_message->set_height(video_config.natural_size().height()); | |
| 316 | |
| 317 if (!video_config.extra_data().empty()) { | |
| 318 video_message->set_extra_data(video_config.extra_data().data(), | |
| 319 video_config.extra_data().size()); | |
| 320 } | |
| 321 | |
| 322 if (video_config.is_encrypted()) { | |
| 323 pb::EncryptionScheme* encryption_scheme_message = | |
| 324 video_message->mutable_encryption_scheme(); | |
| 325 ConvertEncryptionSchemeToProto(video_config.encryption_scheme(), | |
| 326 encryption_scheme_message); | |
| 327 } | |
| 328 } | |
| 329 | |
| 330 bool ConvertProtoToVideoDecoderConfig( | |
| 331 const pb::VideoDecoderConfig& video_message, | |
| 332 ::media::VideoDecoderConfig* video_config) { | |
| 333 DCHECK(video_config); | |
| 334 ::media::EncryptionScheme encryption_scheme; | |
| 335 video_config->Initialize( | |
| 336 ToMediaVideoCodec(video_message.codec()).value(), | |
| 337 ToMediaVideoCodecProfile(video_message.profile()).value(), | |
| 338 ToMediaVideoPixelFormat(video_message.format()).value(), | |
| 339 ToMediaColorSpace(video_message.color_space()).value(), | |
| 340 gfx::Size(video_message.coded_size().width(), | |
| 341 video_message.coded_size().height()), | |
| 342 gfx::Rect(video_message.visible_rect().x(), | |
| 343 video_message.visible_rect().y(), | |
| 344 video_message.visible_rect().width(), | |
| 345 video_message.visible_rect().height()), | |
| 346 gfx::Size(video_message.natural_size().width(), | |
| 347 video_message.natural_size().height()), | |
| 348 std::vector<uint8_t>(video_message.extra_data().begin(), | |
| 349 video_message.extra_data().end()), | |
| 350 ConvertProtoToEncryptionScheme(video_message.encryption_scheme())); | |
| 351 return video_config->IsValidConfig(); | |
| 352 } | |
| 353 | |
| 354 void ConvertCdmKeyInfoToProto( | |
| 355 const ::media::CdmKeysInfo& keys_information, | |
| 356 pb::CdmClientOnSessionKeysChange* key_change_message) { | |
| 357 for (const auto& info : keys_information) { | |
| 358 pb::CdmKeyInformation* key = key_change_message->add_key_information(); | |
| 359 key->set_key_id(info->key_id.data(), info->key_id.size()); | |
| 360 key->set_status(ToProtoCdmKeyInformation(info->status).value()); | |
| 361 key->set_system_code(info->system_code); | |
| 362 } | |
| 363 } | |
| 364 | |
| 365 void ConvertProtoToCdmKeyInfo( | |
| 366 const pb::CdmClientOnSessionKeysChange keychange_message, | |
| 367 CdmKeysInfo* key_information) { | |
| 368 DCHECK(key_information); | |
| 369 key_information->reserve(keychange_message.key_information_size()); | |
| 370 for (int i = 0; i < keychange_message.key_information_size(); ++i) { | |
| 371 const pb::CdmKeyInformation key_info_msg = | |
| 372 keychange_message.key_information(i); | |
| 373 | |
| 374 std::unique_ptr<::media::CdmKeyInformation> key( | |
| 375 new ::media::CdmKeyInformation( | |
| 376 key_info_msg.key_id(), | |
| 377 ToMediaCdmKeyInformationKeyStatus(key_info_msg.status()).value(), | |
| 378 key_info_msg.system_code())); | |
| 379 key_information->push_back(std::move(key)); | |
| 380 } | |
| 381 } | |
| 382 | |
| 383 void ConvertCdmPromiseToProto(const CdmPromiseResult& result, | |
| 384 pb::CdmPromise* promise_message) { | |
| 385 promise_message->set_success(result.success()); | |
| 386 if (!result.success()) { | |
| 387 promise_message->set_exception( | |
| 388 ToProtoCdmException(result.exception()).value()); | |
| 389 promise_message->set_system_code(result.system_code()); | |
| 390 promise_message->set_error_message(result.error_message()); | |
| 391 } | |
| 392 } | |
| 393 | |
| 394 void ConvertCdmPromiseWithSessionIdToProto(const CdmPromiseResult& result, | |
| 395 const std::string& session_id, | |
| 396 pb::CdmPromise* promise_message) { | |
| 397 ConvertCdmPromiseToProto(result, promise_message); | |
| 398 promise_message->set_session_id(session_id); | |
| 399 } | |
| 400 | |
| 401 void ConvertCdmPromiseWithCdmIdToProto(const CdmPromiseResult& result, | |
| 402 int cdm_id, | |
| 403 pb::CdmPromise* promise_message) { | |
| 404 ConvertCdmPromiseToProto(result, promise_message); | |
| 405 promise_message->set_cdm_id(cdm_id); | |
| 406 } | |
| 407 | |
| 408 bool ConvertProtoToCdmPromise(const pb::CdmPromise& promise_message, | |
| 409 CdmPromiseResult* result) { | |
| 410 if (!promise_message.has_success()) | |
| 411 return false; | |
| 412 | |
| 413 bool success = promise_message.success(); | |
| 414 if (success) { | |
| 415 *result = CdmPromiseResult::SuccessResult(); | |
| 416 return true; | |
| 417 } | |
| 418 | |
| 419 ::media::CdmPromise::Exception exception = ::media::CdmPromise::UNKNOWN_ERROR; | |
| 420 uint32_t system_code = 0; | |
| 421 std::string error_message; | |
| 422 | |
| 423 exception = ToCdmPromiseException(promise_message.exception()).value(); | |
| 424 system_code = promise_message.system_code(); | |
| 425 error_message = promise_message.error_message(); | |
| 426 *result = CdmPromiseResult(exception, system_code, error_message); | |
| 427 return true; | |
| 428 } | |
| 429 | |
| 430 bool ConvertProtoToCdmPromiseWithCdmIdSessionId(const pb::RpcMessage& message, | |
| 431 CdmPromiseResult* result, | |
| 432 int* cdm_id, | |
| 433 std::string* session_id) { | |
| 434 if (!message.has_cdm_promise_rpc()) | |
| 435 return false; | |
| 436 | |
| 437 const auto& promise_message = message.cdm_promise_rpc(); | |
| 438 if (!ConvertProtoToCdmPromise(promise_message, result)) | |
| 439 return false; | |
| 440 | |
| 441 if (cdm_id) | |
| 442 *cdm_id = promise_message.cdm_id(); | |
| 443 if (session_id) | |
| 444 *session_id = promise_message.session_id(); | |
| 445 | |
| 446 return true; | |
| 447 } | |
| 448 | |
| 449 //============================================================================== | |
| 450 CdmPromiseResult::CdmPromiseResult() | |
| 451 : CdmPromiseResult(::media::CdmPromise::UNKNOWN_ERROR, 0, "") {} | |
| 452 | |
| 453 CdmPromiseResult::CdmPromiseResult(::media::CdmPromise::Exception exception, | |
| 454 uint32_t system_code, | |
| 455 std::string error_message) | |
| 456 : success_(false), | |
| 457 exception_(exception), | |
| 458 system_code_(system_code), | |
| 459 error_message_(error_message) {} | |
| 460 | |
| 461 CdmPromiseResult::CdmPromiseResult(const CdmPromiseResult& other) = default; | |
| 462 | |
| 463 CdmPromiseResult::~CdmPromiseResult() = default; | |
| 464 | |
| 465 CdmPromiseResult CdmPromiseResult::SuccessResult() { | |
| 466 CdmPromiseResult result(static_cast<::media::CdmPromise::Exception>(0), 0, | |
| 467 ""); | |
| 468 result.success_ = true; | |
| 469 return result; | |
| 470 } | |
| 471 | |
| 472 } // namespace remoting | |
| 473 } // namespace media | |
| OLD | NEW |