| OLD | NEW |
| 1 // Copyright 2013 The Chromium Authors. All rights reserved. | 1 // Copyright 2013 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "content/renderer/media/crypto/ppapi_decryptor.h" | 5 #include "content/renderer/media/crypto/ppapi_decryptor.h" |
| 6 | 6 |
| 7 #include <string> | 7 #include <string> |
| 8 | 8 |
| 9 #include "base/bind.h" | 9 #include "base/bind.h" |
| 10 #include "base/callback.h" |
| 10 #include "base/callback_helpers.h" | 11 #include "base/callback_helpers.h" |
| 11 #include "base/location.h" | 12 #include "base/location.h" |
| 12 #include "base/logging.h" | 13 #include "base/logging.h" |
| 13 #include "base/message_loop/message_loop.h" | 14 #include "base/message_loop/message_loop.h" |
| 14 #include "base/message_loop/message_loop_proxy.h" | 15 #include "base/message_loop/message_loop_proxy.h" |
| 15 #include "content/renderer/media/crypto/key_systems.h" | 16 #include "content/renderer/media/crypto/key_systems.h" |
| 16 #include "content/renderer/pepper/content_decryptor_delegate.h" | 17 #include "content/renderer/pepper/content_decryptor_delegate.h" |
| 17 #include "content/renderer/pepper/pepper_plugin_instance_impl.h" | 18 #include "content/renderer/pepper/pepper_plugin_instance_impl.h" |
| 18 #include "media/base/audio_decoder_config.h" | 19 #include "media/base/audio_decoder_config.h" |
| 20 #include "media/base/cdm_promise.h" |
| 19 #include "media/base/data_buffer.h" | 21 #include "media/base/data_buffer.h" |
| 20 #include "media/base/decoder_buffer.h" | 22 #include "media/base/decoder_buffer.h" |
| 21 #include "media/base/video_decoder_config.h" | 23 #include "media/base/video_decoder_config.h" |
| 22 #include "media/base/video_frame.h" | 24 #include "media/base/video_frame.h" |
| 23 | 25 |
| 24 namespace content { | 26 namespace content { |
| 25 | 27 |
| 28 // This class is needed so that resolving an Update() promise triggers playback |
| 29 // of the stream. It intercepts the resolve() call to invoke an additional |
| 30 // callback. |
| 31 class SessionUpdatedPromise : public media::SimpleCdmPromise { |
| 32 public: |
| 33 SessionUpdatedPromise(scoped_ptr<media::SimpleCdmPromise> caller_promise, |
| 34 base::Closure additional_resolve_cb) |
| 35 : caller_promise_(caller_promise.Pass()), |
| 36 additional_resolve_cb_(additional_resolve_cb) {} |
| 37 |
| 38 virtual void resolve() OVERRIDE { |
| 39 DCHECK(is_pending_); |
| 40 is_pending_ = false; |
| 41 additional_resolve_cb_.Run(); |
| 42 caller_promise_->resolve(); |
| 43 } |
| 44 |
| 45 virtual void reject(media::MediaKeys::Exception exception_code, |
| 46 uint32 system_code, |
| 47 const std::string& error_message) OVERRIDE { |
| 48 DCHECK(is_pending_); |
| 49 is_pending_ = false; |
| 50 caller_promise_->reject(exception_code, system_code, error_message); |
| 51 } |
| 52 |
| 53 protected: |
| 54 scoped_ptr<media::SimpleCdmPromise> caller_promise_; |
| 55 base::Closure additional_resolve_cb_; |
| 56 }; |
| 57 |
| 26 scoped_ptr<PpapiDecryptor> PpapiDecryptor::Create( | 58 scoped_ptr<PpapiDecryptor> PpapiDecryptor::Create( |
| 27 const std::string& key_system, | 59 const std::string& key_system, |
| 28 const GURL& security_origin, | 60 const GURL& security_origin, |
| 29 const CreatePepperCdmCB& create_pepper_cdm_cb, | 61 const CreatePepperCdmCB& create_pepper_cdm_cb, |
| 30 const media::SessionCreatedCB& session_created_cb, | |
| 31 const media::SessionMessageCB& session_message_cb, | 62 const media::SessionMessageCB& session_message_cb, |
| 32 const media::SessionReadyCB& session_ready_cb, | 63 const media::SessionReadyCB& session_ready_cb, |
| 33 const media::SessionClosedCB& session_closed_cb, | 64 const media::SessionClosedCB& session_closed_cb, |
| 34 const media::SessionErrorCB& session_error_cb) { | 65 const media::SessionErrorCB& session_error_cb) { |
| 35 std::string plugin_type = GetPepperType(key_system); | 66 std::string plugin_type = GetPepperType(key_system); |
| 36 DCHECK(!plugin_type.empty()); | 67 DCHECK(!plugin_type.empty()); |
| 37 scoped_ptr<PepperCdmWrapper> pepper_cdm_wrapper = | 68 scoped_ptr<PepperCdmWrapper> pepper_cdm_wrapper = |
| 38 create_pepper_cdm_cb.Run(plugin_type, security_origin); | 69 create_pepper_cdm_cb.Run(plugin_type, security_origin); |
| 39 if (!pepper_cdm_wrapper) { | 70 if (!pepper_cdm_wrapper) { |
| 40 DLOG(ERROR) << "Plugin instance creation failed."; | 71 DLOG(ERROR) << "Plugin instance creation failed."; |
| 41 return scoped_ptr<PpapiDecryptor>(); | 72 return scoped_ptr<PpapiDecryptor>(); |
| 42 } | 73 } |
| 43 | 74 |
| 44 return scoped_ptr<PpapiDecryptor>( | 75 return scoped_ptr<PpapiDecryptor>( |
| 45 new PpapiDecryptor(key_system, | 76 new PpapiDecryptor(key_system, |
| 46 pepper_cdm_wrapper.Pass(), | 77 pepper_cdm_wrapper.Pass(), |
| 47 session_created_cb, | |
| 48 session_message_cb, | 78 session_message_cb, |
| 49 session_ready_cb, | 79 session_ready_cb, |
| 50 session_closed_cb, | 80 session_closed_cb, |
| 51 session_error_cb)); | 81 session_error_cb)); |
| 52 } | 82 } |
| 53 | 83 |
| 54 PpapiDecryptor::PpapiDecryptor( | 84 PpapiDecryptor::PpapiDecryptor( |
| 55 const std::string& key_system, | 85 const std::string& key_system, |
| 56 scoped_ptr<PepperCdmWrapper> pepper_cdm_wrapper, | 86 scoped_ptr<PepperCdmWrapper> pepper_cdm_wrapper, |
| 57 const media::SessionCreatedCB& session_created_cb, | |
| 58 const media::SessionMessageCB& session_message_cb, | 87 const media::SessionMessageCB& session_message_cb, |
| 59 const media::SessionReadyCB& session_ready_cb, | 88 const media::SessionReadyCB& session_ready_cb, |
| 60 const media::SessionClosedCB& session_closed_cb, | 89 const media::SessionClosedCB& session_closed_cb, |
| 61 const media::SessionErrorCB& session_error_cb) | 90 const media::SessionErrorCB& session_error_cb) |
| 62 : pepper_cdm_wrapper_(pepper_cdm_wrapper.Pass()), | 91 : pepper_cdm_wrapper_(pepper_cdm_wrapper.Pass()), |
| 63 session_created_cb_(session_created_cb), | |
| 64 session_message_cb_(session_message_cb), | 92 session_message_cb_(session_message_cb), |
| 65 session_ready_cb_(session_ready_cb), | 93 session_ready_cb_(session_ready_cb), |
| 66 session_closed_cb_(session_closed_cb), | 94 session_closed_cb_(session_closed_cb), |
| 67 session_error_cb_(session_error_cb), | 95 session_error_cb_(session_error_cb), |
| 68 render_loop_proxy_(base::MessageLoopProxy::current()), | 96 render_loop_proxy_(base::MessageLoopProxy::current()), |
| 69 weak_ptr_factory_(this) { | 97 weak_ptr_factory_(this) { |
| 70 DCHECK(pepper_cdm_wrapper_.get()); | 98 DCHECK(pepper_cdm_wrapper_.get()); |
| 71 DCHECK(!session_created_cb_.is_null()); | |
| 72 DCHECK(!session_message_cb_.is_null()); | 99 DCHECK(!session_message_cb_.is_null()); |
| 73 DCHECK(!session_ready_cb_.is_null()); | 100 DCHECK(!session_ready_cb_.is_null()); |
| 74 DCHECK(!session_closed_cb_.is_null()); | 101 DCHECK(!session_closed_cb_.is_null()); |
| 75 DCHECK(!session_error_cb_.is_null()); | 102 DCHECK(!session_error_cb_.is_null()); |
| 76 | 103 |
| 77 base::WeakPtr<PpapiDecryptor> weak_this = weak_ptr_factory_.GetWeakPtr(); | 104 base::WeakPtr<PpapiDecryptor> weak_this = weak_ptr_factory_.GetWeakPtr(); |
| 78 CdmDelegate()->Initialize( | 105 CdmDelegate()->Initialize( |
| 79 key_system, | 106 key_system, |
| 80 base::Bind(&PpapiDecryptor::OnSessionCreated, weak_this), | |
| 81 base::Bind(&PpapiDecryptor::OnSessionMessage, weak_this), | 107 base::Bind(&PpapiDecryptor::OnSessionMessage, weak_this), |
| 82 base::Bind(&PpapiDecryptor::OnSessionReady, weak_this), | 108 base::Bind(&PpapiDecryptor::OnSessionReady, weak_this), |
| 83 base::Bind(&PpapiDecryptor::OnSessionClosed, weak_this), | 109 base::Bind(&PpapiDecryptor::OnSessionClosed, weak_this), |
| 84 base::Bind(&PpapiDecryptor::OnSessionError, weak_this), | 110 base::Bind(&PpapiDecryptor::OnSessionError, weak_this), |
| 85 base::Bind(&PpapiDecryptor::OnFatalPluginError, weak_this)); | 111 base::Bind(&PpapiDecryptor::OnFatalPluginError, weak_this)); |
| 86 } | 112 } |
| 87 | 113 |
| 88 PpapiDecryptor::~PpapiDecryptor() { | 114 PpapiDecryptor::~PpapiDecryptor() { |
| 89 pepper_cdm_wrapper_.reset(); | 115 pepper_cdm_wrapper_.reset(); |
| 90 } | 116 } |
| 91 | 117 |
| 92 bool PpapiDecryptor::CreateSession(uint32 session_id, | 118 void PpapiDecryptor::CreateSession( |
| 93 const std::string& content_type, | 119 const std::string& init_data_type, |
| 94 const uint8* init_data, | 120 const uint8* init_data, |
| 95 int init_data_length) { | 121 int init_data_length, |
| 96 DVLOG(2) << __FUNCTION__; | 122 SessionType session_type, |
| 97 DCHECK(render_loop_proxy_->BelongsToCurrentThread()); | 123 scoped_ptr<media::NewSessionCdmPromise> promise) { |
| 98 | |
| 99 if (!CdmDelegate() || | |
| 100 !CdmDelegate()->CreateSession( | |
| 101 session_id, content_type, init_data, init_data_length)) { | |
| 102 ReportFailureToCallPlugin(session_id); | |
| 103 return false; | |
| 104 } | |
| 105 | |
| 106 return true; | |
| 107 } | |
| 108 | |
| 109 void PpapiDecryptor::LoadSession(uint32 session_id, | |
| 110 const std::string& web_session_id) { | |
| 111 DVLOG(2) << __FUNCTION__; | 124 DVLOG(2) << __FUNCTION__; |
| 112 DCHECK(render_loop_proxy_->BelongsToCurrentThread()); | 125 DCHECK(render_loop_proxy_->BelongsToCurrentThread()); |
| 113 | 126 |
| 114 if (!CdmDelegate()) { | 127 if (!CdmDelegate()) { |
| 115 ReportFailureToCallPlugin(session_id); | 128 promise->reject(INVALID_STATE_ERROR, 0, "CdmDelegate() does not exist."); |
| 116 return; | 129 return; |
| 117 } | 130 } |
| 118 | 131 |
| 119 CdmDelegate()->LoadSession(session_id, web_session_id); | 132 CdmDelegate()->CreateSession(init_data_type, |
| 133 init_data, |
| 134 init_data_length, |
| 135 session_type, |
| 136 promise.Pass()); |
| 120 } | 137 } |
| 121 | 138 |
| 122 void PpapiDecryptor::UpdateSession(uint32 session_id, | 139 void PpapiDecryptor::LoadSession( |
| 123 const uint8* response, | 140 const std::string& web_session_id, |
| 124 int response_length) { | 141 scoped_ptr<media::NewSessionCdmPromise> promise) { |
| 125 DVLOG(2) << __FUNCTION__; | 142 DVLOG(2) << __FUNCTION__; |
| 126 DCHECK(render_loop_proxy_->BelongsToCurrentThread()); | 143 DCHECK(render_loop_proxy_->BelongsToCurrentThread()); |
| 127 | 144 |
| 128 if (!CdmDelegate() || | 145 if (!CdmDelegate()) { |
| 129 !CdmDelegate()->UpdateSession(session_id, response, response_length)) { | 146 promise->reject(INVALID_STATE_ERROR, 0, "CdmDelegate() does not exist."); |
| 130 ReportFailureToCallPlugin(session_id); | |
| 131 return; | 147 return; |
| 132 } | 148 } |
| 149 |
| 150 CdmDelegate()->LoadSession(web_session_id, promise.Pass()); |
| 133 } | 151 } |
| 134 | 152 |
| 135 void PpapiDecryptor::ReleaseSession(uint32 session_id) { | 153 void PpapiDecryptor::UpdateSession( |
| 136 DVLOG(2) << __FUNCTION__; | 154 const std::string& web_session_id, |
| 155 const uint8* response, |
| 156 int response_length, |
| 157 scoped_ptr<media::SimpleCdmPromise> promise) { |
| 137 DCHECK(render_loop_proxy_->BelongsToCurrentThread()); | 158 DCHECK(render_loop_proxy_->BelongsToCurrentThread()); |
| 138 | 159 |
| 139 if (!CdmDelegate() || !CdmDelegate()->ReleaseSession(session_id)) { | 160 if (!CdmDelegate()) { |
| 140 ReportFailureToCallPlugin(session_id); | 161 promise->reject(INVALID_STATE_ERROR, 0, "CdmDelegate() does not exist."); |
| 141 return; | 162 return; |
| 142 } | 163 } |
| 164 |
| 165 scoped_ptr<SessionUpdatedPromise> session_updated_promise( |
| 166 new SessionUpdatedPromise(promise.Pass(), |
| 167 base::Bind(&PpapiDecryptor::ResumePlayback, |
| 168 weak_ptr_factory_.GetWeakPtr()))); |
| 169 CdmDelegate()->UpdateSession( |
| 170 web_session_id, |
| 171 response, |
| 172 response_length, |
| 173 session_updated_promise.PassAs<media::SimpleCdmPromise>()); |
| 174 } |
| 175 |
| 176 void PpapiDecryptor::ReleaseSession( |
| 177 const std::string& web_session_id, |
| 178 scoped_ptr<media::SimpleCdmPromise> promise) { |
| 179 DCHECK(render_loop_proxy_->BelongsToCurrentThread()); |
| 180 |
| 181 if (!CdmDelegate()) { |
| 182 promise->reject(INVALID_STATE_ERROR, 0, "CdmDelegate() does not exist."); |
| 183 return; |
| 184 } |
| 185 |
| 186 CdmDelegate()->ReleaseSession(web_session_id, promise.Pass()); |
| 143 } | 187 } |
| 144 | 188 |
| 145 media::Decryptor* PpapiDecryptor::GetDecryptor() { | 189 media::Decryptor* PpapiDecryptor::GetDecryptor() { |
| 146 return this; | 190 return this; |
| 147 } | 191 } |
| 148 | 192 |
| 149 void PpapiDecryptor::RegisterNewKeyCB(StreamType stream_type, | 193 void PpapiDecryptor::RegisterNewKeyCB(StreamType stream_type, |
| 150 const NewKeyCB& new_key_cb) { | 194 const NewKeyCB& new_key_cb) { |
| 151 if (!render_loop_proxy_->BelongsToCurrentThread()) { | 195 if (!render_loop_proxy_->BelongsToCurrentThread()) { |
| 152 render_loop_proxy_->PostTask(FROM_HERE, | 196 render_loop_proxy_->PostTask(FROM_HERE, |
| (...skipping 170 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 323 weak_ptr_factory_.GetWeakPtr(), | 367 weak_ptr_factory_.GetWeakPtr(), |
| 324 stream_type)); | 368 stream_type)); |
| 325 return; | 369 return; |
| 326 } | 370 } |
| 327 | 371 |
| 328 DVLOG(2) << __FUNCTION__ << " - stream_type: " << stream_type; | 372 DVLOG(2) << __FUNCTION__ << " - stream_type: " << stream_type; |
| 329 if (CdmDelegate()) | 373 if (CdmDelegate()) |
| 330 CdmDelegate()->DeinitializeDecoder(stream_type); | 374 CdmDelegate()->DeinitializeDecoder(stream_type); |
| 331 } | 375 } |
| 332 | 376 |
| 333 void PpapiDecryptor::ReportFailureToCallPlugin(uint32 session_id) { | |
| 334 DCHECK(render_loop_proxy_->BelongsToCurrentThread()); | |
| 335 DVLOG(1) << "Failed to call plugin."; | |
| 336 session_error_cb_.Run(session_id, kUnknownError, 0); | |
| 337 } | |
| 338 | |
| 339 void PpapiDecryptor::OnDecoderInitialized(StreamType stream_type, | 377 void PpapiDecryptor::OnDecoderInitialized(StreamType stream_type, |
| 340 bool success) { | 378 bool success) { |
| 341 DCHECK(render_loop_proxy_->BelongsToCurrentThread()); | 379 DCHECK(render_loop_proxy_->BelongsToCurrentThread()); |
| 342 switch (stream_type) { | 380 switch (stream_type) { |
| 343 case kAudio: | 381 case kAudio: |
| 344 DCHECK(!audio_decoder_init_cb_.is_null()); | 382 DCHECK(!audio_decoder_init_cb_.is_null()); |
| 345 base::ResetAndReturn(&audio_decoder_init_cb_).Run(success); | 383 base::ResetAndReturn(&audio_decoder_init_cb_).Run(success); |
| 346 break; | 384 break; |
| 347 case kVideo: | 385 case kVideo: |
| 348 DCHECK(!video_decoder_init_cb_.is_null()); | 386 DCHECK(!video_decoder_init_cb_.is_null()); |
| 349 base::ResetAndReturn(&video_decoder_init_cb_).Run(success); | 387 base::ResetAndReturn(&video_decoder_init_cb_).Run(success); |
| 350 break; | 388 break; |
| 351 default: | 389 default: |
| 352 NOTREACHED(); | 390 NOTREACHED(); |
| 353 } | 391 } |
| 354 } | 392 } |
| 355 | 393 |
| 356 void PpapiDecryptor::OnSessionCreated(uint32 session_id, | 394 void PpapiDecryptor::OnSessionMessage(const std::string& web_session_id, |
| 357 const std::string& web_session_id) { | |
| 358 DCHECK(render_loop_proxy_->BelongsToCurrentThread()); | |
| 359 session_created_cb_.Run(session_id, web_session_id); | |
| 360 } | |
| 361 | |
| 362 void PpapiDecryptor::OnSessionMessage(uint32 session_id, | |
| 363 const std::vector<uint8>& message, | 395 const std::vector<uint8>& message, |
| 364 const GURL& destination_url) { | 396 const GURL& destination_url) { |
| 365 DCHECK(render_loop_proxy_->BelongsToCurrentThread()); | 397 DCHECK(render_loop_proxy_->BelongsToCurrentThread()); |
| 366 session_message_cb_.Run(session_id, message, destination_url); | 398 session_message_cb_.Run(web_session_id, message, destination_url); |
| 367 } | 399 } |
| 368 | 400 |
| 369 void PpapiDecryptor::OnSessionReady(uint32 session_id) { | 401 void PpapiDecryptor::OnSessionReady(const std::string& web_session_id) { |
| 370 DCHECK(render_loop_proxy_->BelongsToCurrentThread()); | 402 DCHECK(render_loop_proxy_->BelongsToCurrentThread()); |
| 371 | 403 |
| 404 ResumePlayback(); |
| 405 session_ready_cb_.Run(web_session_id); |
| 406 } |
| 407 |
| 408 void PpapiDecryptor::OnSessionClosed(const std::string& web_session_id) { |
| 409 DCHECK(render_loop_proxy_->BelongsToCurrentThread()); |
| 410 session_closed_cb_.Run(web_session_id); |
| 411 } |
| 412 |
| 413 void PpapiDecryptor::OnSessionError(const std::string& web_session_id, |
| 414 MediaKeys::Exception exception_code, |
| 415 uint32 system_code, |
| 416 const std::string& error_description) { |
| 417 DCHECK(render_loop_proxy_->BelongsToCurrentThread()); |
| 418 session_error_cb_.Run( |
| 419 web_session_id, exception_code, system_code, error_description); |
| 420 } |
| 421 |
| 422 void PpapiDecryptor::ResumePlayback() { |
| 372 // Based on the spec, we need to resume playback when update() completes | 423 // Based on the spec, we need to resume playback when update() completes |
| 373 // successfully, or when a session is successfully loaded. In both cases, | 424 // successfully, or when a session is successfully loaded (triggered by |
| 374 // the CDM fires OnSessionReady() event. So we choose to call the NewKeyCBs | 425 // OnSessionReady()). So we choose to call the NewKeyCBs here. |
| 375 // here. | |
| 376 // TODO(xhwang): Rename OnSessionReady to indicate that the playback may | |
| 377 // resume successfully (e.g. a new key is available or available again). | |
| 378 if (!new_audio_key_cb_.is_null()) | 426 if (!new_audio_key_cb_.is_null()) |
| 379 new_audio_key_cb_.Run(); | 427 new_audio_key_cb_.Run(); |
| 380 | 428 |
| 381 if (!new_video_key_cb_.is_null()) | 429 if (!new_video_key_cb_.is_null()) |
| 382 new_video_key_cb_.Run(); | 430 new_video_key_cb_.Run(); |
| 383 | |
| 384 session_ready_cb_.Run(session_id); | |
| 385 } | |
| 386 | |
| 387 void PpapiDecryptor::OnSessionClosed(uint32 session_id) { | |
| 388 DCHECK(render_loop_proxy_->BelongsToCurrentThread()); | |
| 389 session_closed_cb_.Run(session_id); | |
| 390 } | |
| 391 | |
| 392 void PpapiDecryptor::OnSessionError(uint32 session_id, | |
| 393 media::MediaKeys::KeyError error_code, | |
| 394 uint32 system_code) { | |
| 395 DCHECK(render_loop_proxy_->BelongsToCurrentThread()); | |
| 396 session_error_cb_.Run(session_id, error_code, system_code); | |
| 397 } | 431 } |
| 398 | 432 |
| 399 void PpapiDecryptor::OnFatalPluginError() { | 433 void PpapiDecryptor::OnFatalPluginError() { |
| 400 DCHECK(render_loop_proxy_->BelongsToCurrentThread()); | 434 DCHECK(render_loop_proxy_->BelongsToCurrentThread()); |
| 401 pepper_cdm_wrapper_.reset(); | 435 pepper_cdm_wrapper_.reset(); |
| 402 } | 436 } |
| 403 | 437 |
| 404 ContentDecryptorDelegate* PpapiDecryptor::CdmDelegate() { | 438 ContentDecryptorDelegate* PpapiDecryptor::CdmDelegate() { |
| 405 DCHECK(render_loop_proxy_->BelongsToCurrentThread()); | 439 DCHECK(render_loop_proxy_->BelongsToCurrentThread()); |
| 406 return (pepper_cdm_wrapper_) ? pepper_cdm_wrapper_->GetCdmDelegate() : NULL; | 440 return (pepper_cdm_wrapper_) ? pepper_cdm_wrapper_->GetCdmDelegate() : NULL; |
| 407 } | 441 } |
| 408 | 442 |
| 409 } // namespace content | 443 } // namespace content |
| OLD | NEW |