| OLD | NEW |
| 1 // Copyright 2014 The Chromium Authors. All rights reserved. | 1 // Copyright 2014 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "chromecast/media/cma/ipc_streamer/decrypt_config_marshaller.h" | 5 #include "chromecast/media/cma/ipc_streamer/decrypt_config_marshaller.h" |
| 6 | 6 |
| 7 #include "base/logging.h" | 7 #include "base/logging.h" |
| 8 #include "chromecast/media/cma/ipc/media_message.h" | 8 #include "chromecast/media/cma/ipc/media_message.h" |
| 9 #include "media/base/decrypt_config.h" | 9 #include "media/base/decrypt_config.h" |
| 10 | 10 |
| 11 namespace chromecast { | 11 namespace chromecast { |
| 12 namespace media { | 12 namespace media { |
| 13 | 13 |
| 14 namespace { | 14 namespace { |
| 15 const size_t kMaxKeyIdSize = 256; | 15 const size_t kMaxKeyIdSize = 256; |
| 16 const size_t kMaxIvSize = 256; | 16 const size_t kMaxIvSize = 256; |
| 17 const size_t kMaxSubsampleCount = 1024; | 17 const size_t kMaxSubsampleCount = 1024; |
| 18 |
| 19 void WriteDecryptConfigHeader( |
| 20 const ::media::DecryptConfig& config, MediaMessage* msg) { |
| 21 CHECK_GT(config.key_id().size(), 0); |
| 22 CHECK_GT(config.iv().size(), 0); |
| 23 |
| 24 CHECK(msg->WritePod(config.key_id().size())); |
| 25 CHECK(msg->WriteBuffer(config.key_id().data(), config.key_id().size())); |
| 26 CHECK(msg->WritePod(config.iv().size())); |
| 27 CHECK(msg->WriteBuffer(config.iv().data(), config.iv().size())); |
| 28 } |
| 29 |
| 18 } | 30 } |
| 19 | 31 |
| 20 // static | 32 // static |
| 21 void DecryptConfigMarshaller::Write( | 33 void DecryptConfigMarshaller::Write( |
| 22 const ::media::DecryptConfig& config, MediaMessage* msg) { | 34 const ::media::DecryptConfig& config, MediaMessage* msg) { |
| 23 CHECK_GT(config.key_id().size(), 0); | |
| 24 CHECK_GT(config.iv().size(), 0); | |
| 25 CHECK_GT(config.subsamples().size(), 0); | 35 CHECK_GT(config.subsamples().size(), 0); |
| 36 WriteDecryptConfigHeader(config, msg); |
| 26 | 37 |
| 27 CHECK(msg->WritePod(config.key_id().size())); | |
| 28 CHECK(msg->WriteBuffer(config.key_id().data(), config.key_id().size())); | |
| 29 CHECK(msg->WritePod(config.iv().size())); | |
| 30 CHECK(msg->WriteBuffer(config.iv().data(), config.iv().size())); | |
| 31 CHECK(msg->WritePod(config.subsamples().size())); | 38 CHECK(msg->WritePod(config.subsamples().size())); |
| 32 for (size_t k = 0; k < config.subsamples().size(); k++) { | 39 for (size_t k = 0; k < config.subsamples().size(); k++) { |
| 33 CHECK(msg->WritePod(config.subsamples()[k].clear_bytes)); | 40 CHECK(msg->WritePod(config.subsamples()[k].clear_bytes)); |
| 34 CHECK(msg->WritePod(config.subsamples()[k].cypher_bytes)); | 41 CHECK(msg->WritePod(config.subsamples()[k].cypher_bytes)); |
| 35 } | 42 } |
| 36 } | 43 } |
| 37 | 44 |
| 38 // static | 45 // static |
| 46 void DecryptConfigMarshaller::WriteFullSampleEncryption( |
| 47 const ::media::DecryptConfig& config, int data_size, MediaMessage* msg) { |
| 48 WriteDecryptConfigHeader(config, msg); |
| 49 CHECK_EQ(config.subsamples().size(), 0); |
| 50 |
| 51 // Write exactly one subsample with zero clear bytes, |data_size| cypher bytes |
| 52 CHECK(msg->WritePod(1)); |
| 53 CHECK(msg->WritePod(0)); |
| 54 CHECK(msg->WritePod(data_size)); |
| 55 } |
| 56 |
| 57 // static |
| 39 scoped_ptr< ::media::DecryptConfig> DecryptConfigMarshaller::Read( | 58 scoped_ptr< ::media::DecryptConfig> DecryptConfigMarshaller::Read( |
| 40 MediaMessage* msg) { | 59 MediaMessage* msg) { |
| 41 size_t key_id_size = 0; | 60 size_t key_id_size = 0; |
| 42 CHECK(msg->ReadPod(&key_id_size)); | 61 CHECK(msg->ReadPod(&key_id_size)); |
| 43 CHECK_GT(key_id_size, 0); | 62 CHECK_GT(key_id_size, 0); |
| 44 CHECK_LT(key_id_size, kMaxKeyIdSize); | 63 CHECK_LT(key_id_size, kMaxKeyIdSize); |
| 45 scoped_ptr<char[]> key_id(new char[key_id_size]); | 64 scoped_ptr<char[]> key_id(new char[key_id_size]); |
| 46 CHECK(msg->ReadBuffer(key_id.get(), key_id_size)); | 65 CHECK(msg->ReadBuffer(key_id.get(), key_id_size)); |
| 47 | 66 |
| 48 size_t iv_size = 0; | 67 size_t iv_size = 0; |
| (...skipping 17 matching lines...) Expand all Loading... |
| 66 | 85 |
| 67 return scoped_ptr< ::media::DecryptConfig>( | 86 return scoped_ptr< ::media::DecryptConfig>( |
| 68 new ::media::DecryptConfig( | 87 new ::media::DecryptConfig( |
| 69 std::string(key_id.get(), key_id_size), | 88 std::string(key_id.get(), key_id_size), |
| 70 std::string(iv.get(), iv_size), | 89 std::string(iv.get(), iv_size), |
| 71 subsamples)); | 90 subsamples)); |
| 72 } | 91 } |
| 73 | 92 |
| 74 } // namespace media | 93 } // namespace media |
| 75 } // namespace chromecast | 94 } // namespace chromecast |
| OLD | NEW |