| Index: content_decryption_module.h
|
| diff --git a/content_decryption_module.h b/content_decryption_module.h
|
| index 5af9595e525e0c6b7b76f1e7567c6aaacf51c326..32031e6f25b712c26f5d2208233ad3c21e87e677 100644
|
| --- a/content_decryption_module.h
|
| +++ b/content_decryption_module.h
|
| @@ -59,7 +59,7 @@ typedef void* (*GetCdmHostFunc)(int host_interface_version, void* user_data);
|
| // object.
|
| CDM_EXPORT void* CreateCdmInstance(
|
| int cdm_interface_version,
|
| - const char* key_system, int key_system_size,
|
| + const char* key_system, uint32_t key_system_size,
|
| GetCdmHostFunc get_cdm_host_func, void* user_data);
|
|
|
| CDM_EXPORT const char* GetCdmVersion();
|
| @@ -121,11 +121,11 @@ enum MediaKeyError {
|
| //
|
| // TODO(xhwang): Add checks to make sure these structs have fixed layout.
|
| struct SubsampleEntry {
|
| - SubsampleEntry(int32_t clear_bytes, int32_t cipher_bytes)
|
| + SubsampleEntry(uint32_t clear_bytes, uint32_t cipher_bytes)
|
| : clear_bytes(clear_bytes), cipher_bytes(cipher_bytes) {}
|
|
|
| - int32_t clear_bytes;
|
| - int32_t cipher_bytes;
|
| + uint32_t clear_bytes;
|
| + uint32_t cipher_bytes;
|
| };
|
|
|
| // Represents an input buffer to be decrypted (and possibly decoded). It does
|
| @@ -144,18 +144,18 @@ struct InputBuffer {
|
| timestamp(0) {}
|
|
|
| const uint8_t* data; // Pointer to the beginning of the input data.
|
| - int32_t data_size; // Size (in bytes) of |data|.
|
| + uint32_t data_size; // Size (in bytes) of |data|.
|
|
|
| - int32_t data_offset; // Number of bytes to be discarded before decryption.
|
| + uint32_t data_offset; // Number of bytes to be discarded before decryption.
|
|
|
| const uint8_t* key_id; // Key ID to identify the decryption key.
|
| - int32_t key_id_size; // Size (in bytes) of |key_id|.
|
| + uint32_t key_id_size; // Size (in bytes) of |key_id|.
|
|
|
| const uint8_t* iv; // Initialization vector.
|
| - int32_t iv_size; // Size (in bytes) of |iv|.
|
| + uint32_t iv_size; // Size (in bytes) of |iv|.
|
|
|
| const struct SubsampleEntry* subsamples;
|
| - int32_t num_subsamples; // Number of subsamples in |subsamples|.
|
| + uint32_t num_subsamples; // Number of subsamples in |subsamples|.
|
|
|
| int64_t timestamp; // Presentation timestamp in microseconds.
|
| };
|
| @@ -183,7 +183,7 @@ struct AudioDecoderConfig {
|
| // Optional byte data required to initialize audio decoders, such as the
|
| // vorbis setup header.
|
| uint8_t* extra_data;
|
| - int32_t extra_data_size;
|
| + uint32_t extra_data_size;
|
| };
|
|
|
| // Supported sample formats for AudioFrames.
|
| @@ -249,7 +249,7 @@ struct VideoDecoderConfig {
|
| // Optional byte data required to initialize video decoders, such as H.264
|
| // AAVC data.
|
| uint8_t* extra_data;
|
| - int32_t extra_data_size;
|
| + uint32_t extra_data_size;
|
| };
|
|
|
| enum StreamType {
|
| @@ -264,15 +264,15 @@ struct PlatformChallengeResponse {
|
| // |challenge| provided during Host::SendPlatformChallenge() combined with
|
| // nonce data and signed with the platform's private key.
|
| const uint8_t* signed_data;
|
| - int32_t signed_data_length;
|
| + uint32_t signed_data_length;
|
|
|
| // RSASSA-PKCS1-v1_5-SHA256 signature of the |signed_data| block.
|
| const uint8_t* signed_data_signature;
|
| - int32_t signed_data_signature_length;
|
| + uint32_t signed_data_signature_length;
|
|
|
| // X.509 device specific certificate for the |service_id| requested.
|
| const uint8_t* platform_key_certificate;
|
| - int32_t platform_key_certificate_length;
|
| + uint32_t platform_key_certificate_length;
|
| };
|
|
|
| // Supported output protection methods for use with EnableOutputProtection() and
|
| @@ -319,16 +319,16 @@ class ContentDecryptionModule_1 {
|
| // Returns kSessionError if any error happened, in which case the CDM must
|
| // send a key error by calling Host::SendKeyError().
|
| virtual Status GenerateKeyRequest(
|
| - const char* type, int type_size,
|
| - const uint8_t* init_data, int init_data_size) = 0;
|
| + const char* type, uint32_t type_size,
|
| + const uint8_t* init_data, uint32_t init_data_size) = 0;
|
|
|
| // Adds the |key| to the CDM to be associated with |key_id|.
|
| //
|
| // Returns kSuccess if the key was successfully added, kSessionError
|
| // otherwise.
|
| - virtual Status AddKey(const char* session_id, int session_id_size,
|
| - const uint8_t* key, int key_size,
|
| - const uint8_t* key_id, int key_id_size) = 0;
|
| + virtual Status AddKey(const char* session_id, uint32_t session_id_size,
|
| + const uint8_t* key, uint32_t key_size,
|
| + const uint8_t* key_id, uint32_t key_id_size) = 0;
|
|
|
| // Cancels any pending key request made to the CDM for |session_id|.
|
| //
|
| @@ -336,7 +336,7 @@ class ContentDecryptionModule_1 {
|
| // successfully canceled or there was no key request to be canceled,
|
| // kSessionError otherwise.
|
| virtual Status CancelKeyRequest(
|
| - const char* session_id, int session_id_size) = 0;
|
| + const char* session_id, uint32_t session_id_size) = 0;
|
|
|
| // Performs scheduled operation with |context| when the timer fires.
|
| virtual void TimerExpired(void* context) = 0;
|
| @@ -451,16 +451,16 @@ class ContentDecryptionModule_2 {
|
| // Returns kSessionError if any error happened, in which case the CDM must
|
| // send a key error by calling Host::SendKeyError().
|
| virtual Status GenerateKeyRequest(
|
| - const char* type, int type_size,
|
| - const uint8_t* init_data, int init_data_size) = 0;
|
| + const char* type, uint32_t type_size,
|
| + const uint8_t* init_data, uint32_t init_data_size) = 0;
|
|
|
| // Adds the |key| to the CDM to be associated with |key_id|.
|
| //
|
| // Returns kSuccess if the key was successfully added, kSessionError
|
| // otherwise.
|
| - virtual Status AddKey(const char* session_id, int session_id_size,
|
| - const uint8_t* key, int key_size,
|
| - const uint8_t* key_id, int key_id_size) = 0;
|
| + virtual Status AddKey(const char* session_id, uint32_t session_id_size,
|
| + const uint8_t* key, uint32_t key_size,
|
| + const uint8_t* key_id, uint32_t key_id_size) = 0;
|
|
|
| // Cancels any pending key request made to the CDM for |session_id|.
|
| //
|
| @@ -468,7 +468,7 @@ class ContentDecryptionModule_2 {
|
| // successfully canceled or there was no key request to be canceled,
|
| // kSessionError otherwise.
|
| virtual Status CancelKeyRequest(
|
| - const char* session_id, int session_id_size) = 0;
|
| + const char* session_id, uint32_t session_id_size) = 0;
|
|
|
| // Performs scheduled operation with |context| when the timer fires.
|
| virtual void TimerExpired(void* context) = 0;
|
| @@ -594,10 +594,10 @@ class Buffer {
|
| // Destroys the buffer in the same context as it was created.
|
| virtual void Destroy() = 0;
|
|
|
| - virtual int32_t Capacity() const = 0;
|
| + virtual uint32_t Capacity() const = 0;
|
| virtual uint8_t* Data() = 0;
|
| - virtual void SetSize(int32_t size) = 0;
|
| - virtual int32_t Size() const = 0;
|
| + virtual void SetSize(uint32_t size) = 0;
|
| + virtual uint32_t Size() const = 0;
|
|
|
| protected:
|
| Buffer() {}
|
| @@ -624,7 +624,7 @@ class Host_1 {
|
| // failure. The caller owns the Buffer* after this call. The buffer is not
|
| // guaranteed to be zero initialized. The capacity of the allocated Buffer
|
| // is guaranteed to be not less than |capacity|.
|
| - virtual Buffer* Allocate(int32_t capacity) = 0;
|
| + virtual Buffer* Allocate(uint32_t capacity) = 0;
|
|
|
| // Requests the host to call ContentDecryptionModule::TimerFired() |delay_ms|
|
| // from now with |context|.
|
| @@ -636,14 +636,14 @@ class Host_1 {
|
| // Sends a keymessage event to the application.
|
| // Length parameters should not include null termination.
|
| virtual void SendKeyMessage(
|
| - const char* session_id, int32_t session_id_length,
|
| - const char* message, int32_t message_length,
|
| - const char* default_url, int32_t default_url_length) = 0;
|
| + const char* session_id, uint32_t session_id_length,
|
| + const char* message, uint32_t message_length,
|
| + const char* default_url, uint32_t default_url_length) = 0;
|
|
|
| // Sends a keyerror event to the application.
|
| // |session_id_length| should not include null termination.
|
| virtual void SendKeyError(const char* session_id,
|
| - int32_t session_id_length,
|
| + uint32_t session_id_length,
|
| MediaKeyError error_code,
|
| uint32_t system_code) = 0;
|
|
|
| @@ -665,7 +665,7 @@ class Host_2 {
|
| // failure. The caller owns the Buffer* after this call. The buffer is not
|
| // guaranteed to be zero initialized. The capacity of the allocated Buffer
|
| // is guaranteed to be not less than |capacity|.
|
| - virtual Buffer* Allocate(int32_t capacity) = 0;
|
| + virtual Buffer* Allocate(uint32_t capacity) = 0;
|
|
|
| // Requests the host to call ContentDecryptionModule::TimerFired() |delay_ms|
|
| // from now with |context|.
|
| @@ -677,14 +677,14 @@ class Host_2 {
|
| // Sends a keymessage event to the application.
|
| // Length parameters should not include null termination.
|
| virtual void SendKeyMessage(
|
| - const char* session_id, int32_t session_id_length,
|
| - const char* message, int32_t message_length,
|
| - const char* default_url, int32_t default_url_length) = 0;
|
| + const char* session_id, uint32_t session_id_length,
|
| + const char* message, uint32_t message_length,
|
| + const char* default_url, uint32_t default_url_length) = 0;
|
|
|
| // Sends a keyerror event to the application.
|
| // |session_id_length| should not include null termination.
|
| virtual void SendKeyError(const char* session_id,
|
| - int32_t session_id_length,
|
| + uint32_t session_id_length,
|
| MediaKeyError error_code,
|
| uint32_t system_code) = 0;
|
|
|
| @@ -698,8 +698,8 @@ class Host_2 {
|
| // with the signed challenge response and platform certificate. Length
|
| // parameters should not include null termination.
|
| virtual void SendPlatformChallenge(
|
| - const char* service_id, int32_t service_id_length,
|
| - const char* challenge, int32_t challenge_length) = 0;
|
| + const char* service_id, uint32_t service_id_length,
|
| + const char* challenge, uint32_t challenge_length) = 0;
|
|
|
| // Attempts to enable output protection (e.g. HDCP) on the display link. The
|
| // |desired_protection_mask| is a bit mask of OutputProtectionMethods. No
|
| @@ -760,11 +760,11 @@ class VideoFrame {
|
| virtual void SetFrameBuffer(Buffer* frame_buffer) = 0;
|
| virtual Buffer* FrameBuffer() = 0;
|
|
|
| - virtual void SetPlaneOffset(VideoPlane plane, int32_t offset) = 0;
|
| - virtual int32_t PlaneOffset(VideoPlane plane) = 0;
|
| + virtual void SetPlaneOffset(VideoPlane plane, uint32_t offset) = 0;
|
| + virtual uint32_t PlaneOffset(VideoPlane plane) = 0;
|
|
|
| - virtual void SetStride(VideoPlane plane, int32_t stride) = 0;
|
| - virtual int32_t Stride(VideoPlane plane) = 0;
|
| + virtual void SetStride(VideoPlane plane, uint32_t stride) = 0;
|
| + virtual uint32_t Stride(VideoPlane plane) = 0;
|
|
|
| virtual void SetTimestamp(int64_t timestamp) = 0;
|
| virtual int64_t Timestamp() const = 0;
|
|
|