Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(339)

Side by Side Diff: media/base/android/media_drm_bridge.cc

Issue 850183002: media: Support unprefixed EME API on Android. (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: rebase only Created 5 years, 11 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 // Copyright (c) 2013 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2013 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "media/base/android/media_drm_bridge.h" 5 #include "media/base/android/media_drm_bridge.h"
6 6
7 #include <algorithm> 7 #include <algorithm>
8 8
9 #include "base/android/build_info.h" 9 #include "base/android/build_info.h"
10 #include "base/android/jni_array.h" 10 #include "base/android/jni_array.h"
11 #include "base/android/jni_string.h" 11 #include "base/android/jni_string.h"
12 #include "base/callback_helpers.h" 12 #include "base/callback_helpers.h"
13 #include "base/containers/hash_tables.h" 13 #include "base/containers/hash_tables.h"
14 #include "base/lazy_instance.h" 14 #include "base/lazy_instance.h"
15 #include "base/location.h" 15 #include "base/location.h"
16 #include "base/logging.h" 16 #include "base/logging.h"
17 #include "base/message_loop/message_loop_proxy.h" 17 #include "base/message_loop/message_loop_proxy.h"
18 #include "base/strings/string_util.h" 18 #include "base/strings/string_util.h"
19 #include "base/sys_byteorder.h" 19 #include "base/sys_byteorder.h"
20 #include "base/sys_info.h" 20 #include "base/sys_info.h"
21 #include "jni/MediaDrmBridge_jni.h" 21 #include "jni/MediaDrmBridge_jni.h"
22 #include "media/base/cdm_key_information.h"
22 23
23 #include "widevine_cdm_version.h" // In SHARED_INTERMEDIATE_DIR. 24 #include "widevine_cdm_version.h" // In SHARED_INTERMEDIATE_DIR.
24 25
25 using base::android::AttachCurrentThread; 26 using base::android::AttachCurrentThread;
26 using base::android::ConvertUTF8ToJavaString; 27 using base::android::ConvertUTF8ToJavaString;
27 using base::android::ConvertJavaStringToUTF8; 28 using base::android::ConvertJavaStringToUTF8;
28 using base::android::JavaByteArrayToByteVector; 29 using base::android::JavaByteArrayToByteVector;
29 using base::android::ScopedJavaLocalRef; 30 using base::android::ScopedJavaLocalRef;
30 31
31 namespace media { 32 namespace media {
32 33
33 static uint32 ReadUint32(const uint8_t* data) { 34 namespace {
35
36 // DrmBridge supports session expiration event but doesn't provide detailed
37 // status for each key ID, which is required by the EME spec. Use a dummy key ID
38 // here to report session expiration info.
39 const char kDummyKeyId[] = "Dummy Key Id";
40
41 uint32 ReadUint32(const uint8_t* data) {
34 uint32 value = 0; 42 uint32 value = 0;
35 for (int i = 0; i < 4; ++i) 43 for (int i = 0; i < 4; ++i)
36 value = (value << 8) | data[i]; 44 value = (value << 8) | data[i];
37 return value; 45 return value;
38 } 46 }
39 47
40 static uint64 ReadUint64(const uint8_t* data) { 48 uint64 ReadUint64(const uint8_t* data) {
41 uint64 value = 0; 49 uint64 value = 0;
42 for (int i = 0; i < 8; ++i) 50 for (int i = 0; i < 8; ++i)
43 value = (value << 8) | data[i]; 51 value = (value << 8) | data[i];
44 return value; 52 return value;
45 } 53 }
46 54
55 // Returns string session ID from jbyteArray (byte[] in Java).
56 std::string GetSessionId(JNIEnv* env, jbyteArray j_session_id) {
57 std::vector<uint8> session_id_vector;
58 JavaByteArrayToByteVector(env, j_session_id, &session_id_vector);
59 return std::string(session_id_vector.begin(), session_id_vector.end());
60 }
61
47 // The structure of an ISO CENC Protection System Specific Header (PSSH) box is 62 // The structure of an ISO CENC Protection System Specific Header (PSSH) box is
48 // as follows. (See ISO/IEC FDIS 23001-7:2011(E).) 63 // as follows. (See ISO/IEC FDIS 23001-7:2011(E).)
49 // Note: ISO boxes use big-endian values. 64 // Note: ISO boxes use big-endian values.
50 // 65 //
51 // PSSH { 66 // PSSH {
52 // uint32 Size 67 // uint32 Size
53 // uint32 Type 68 // uint32 Type
54 // uint64 LargeSize # Field is only present if value(Size) == 1. 69 // uint64 LargeSize # Field is only present if value(Size) == 1.
55 // uint32 VersionAndFlags 70 // uint32 VersionAndFlags
56 // uint8[16] SystemId 71 // uint8[16] SystemId
57 // uint32 DataSize 72 // uint32 DataSize
58 // uint8[DataSize] Data 73 // uint8[DataSize] Data
59 // } 74 // }
60 const int kBoxHeaderSize = 8; // Box's header contains Size and Type. 75 const int kBoxHeaderSize = 8; // Box's header contains Size and Type.
61 const int kBoxLargeSizeSize = 8; 76 const int kBoxLargeSizeSize = 8;
62 const int kPsshVersionFlagSize = 4; 77 const int kPsshVersionFlagSize = 4;
63 const int kPsshSystemIdSize = 16; 78 const int kPsshSystemIdSize = 16;
64 const int kPsshDataSizeSize = 4; 79 const int kPsshDataSizeSize = 4;
65 const uint32 kTencType = 0x74656e63; 80 const uint32 kTencType = 0x74656e63;
66 const uint32 kPsshType = 0x70737368; 81 const uint32 kPsshType = 0x70737368;
67 const uint8 kWidevineUuid[16] = { 82 const uint8 kWidevineUuid[16] = {
68 0xED, 0xEF, 0x8B, 0xA9, 0x79, 0xD6, 0x4A, 0xCE, 83 0xED, 0xEF, 0x8B, 0xA9, 0x79, 0xD6, 0x4A, 0xCE,
69 0xA3, 0xC8, 0x27, 0xDC, 0xD5, 0x1D, 0x21, 0xED }; 84 0xA3, 0xC8, 0x27, 0xDC, 0xD5, 0x1D, 0x21, 0xED };
70 85
71 typedef std::vector<uint8> UUID; 86 typedef std::vector<uint8> UUID;
72 87
73 class KeySystemUuidManager {
74 public:
75 KeySystemUuidManager();
76 UUID GetUUID(const std::string& key_system);
77 void AddMapping(const std::string& key_system, const UUID& uuid);
78 std::vector<std::string> GetPlatformKeySystemNames();
79
80 private:
81 typedef base::hash_map<std::string, UUID> KeySystemUuidMap;
82
83 KeySystemUuidMap key_system_uuid_map_;
84
85 DISALLOW_COPY_AND_ASSIGN(KeySystemUuidManager);
86 };
87
88 KeySystemUuidManager::KeySystemUuidManager() {
89 // Widevine is always supported in Android.
90 key_system_uuid_map_[kWidevineKeySystem] =
91 UUID(kWidevineUuid, kWidevineUuid + arraysize(kWidevineUuid));
92 }
93
94 UUID KeySystemUuidManager::GetUUID(const std::string& key_system) {
95 KeySystemUuidMap::iterator it = key_system_uuid_map_.find(key_system);
96 if (it == key_system_uuid_map_.end())
97 return UUID();
98 return it->second;
99 }
100
101 void KeySystemUuidManager::AddMapping(const std::string& key_system,
102 const UUID& uuid) {
103 KeySystemUuidMap::iterator it = key_system_uuid_map_.find(key_system);
104 DCHECK(it == key_system_uuid_map_.end())
105 << "Shouldn't overwrite an existing key system.";
106 if (it != key_system_uuid_map_.end())
107 return;
108 key_system_uuid_map_[key_system] = uuid;
109 }
110
111 std::vector<std::string> KeySystemUuidManager::GetPlatformKeySystemNames() {
112 std::vector<std::string> key_systems;
113 for (KeySystemUuidMap::iterator it = key_system_uuid_map_.begin();
114 it != key_system_uuid_map_.end(); ++it) {
115 // Rule out the key system handled by Chrome explicitly.
116 if (it->first != kWidevineKeySystem)
117 key_systems.push_back(it->first);
118 }
119 return key_systems;
120 }
121
122 base::LazyInstance<KeySystemUuidManager>::Leaky g_key_system_uuid_manager =
123 LAZY_INSTANCE_INITIALIZER;
124
125 // Tries to find a PSSH box whose "SystemId" is |uuid| in |data|, parses the 88 // Tries to find a PSSH box whose "SystemId" is |uuid| in |data|, parses the
126 // "Data" of the box and put it in |pssh_data|. Returns true if such a box is 89 // "Data" of the box and put it in |pssh_data|. Returns true if such a box is
127 // found and successfully parsed. Returns false otherwise. 90 // found and successfully parsed. Returns false otherwise.
128 // Notes: 91 // Notes:
129 // 1, If multiple PSSH boxes are found,the "Data" of the first matching PSSH box 92 // 1, If multiple PSSH boxes are found,the "Data" of the first matching PSSH box
130 // will be set in |pssh_data|. 93 // will be set in |pssh_data|.
131 // 2, Only PSSH and TENC boxes are allowed in |data|. TENC boxes are skipped. 94 // 2, Only PSSH and TENC boxes are allowed in |data|. TENC boxes are skipped.
132 static bool GetPsshData(const uint8* data, int data_size, 95 bool GetPsshData(const uint8* data,
133 const UUID& uuid, 96 int data_size,
134 std::vector<uint8>* pssh_data) { 97 const UUID& uuid,
98 std::vector<uint8>* pssh_data) {
135 const uint8* cur = data; 99 const uint8* cur = data;
136 const uint8* data_end = data + data_size; 100 const uint8* data_end = data + data_size;
137 int bytes_left = data_size; 101 int bytes_left = data_size;
138 102
139 while (bytes_left > 0) { 103 while (bytes_left > 0) {
140 const uint8* box_head = cur; 104 const uint8* box_head = cur;
141 105
142 if (bytes_left < kBoxHeaderSize) 106 if (bytes_left < kBoxHeaderSize)
143 return false; 107 return false;
144 108
(...skipping 54 matching lines...) Expand 10 before | Expand all | Expand 10 after
199 if (box_end < cur + data_size) 163 if (box_end < cur + data_size)
200 return false; 164 return false;
201 165
202 pssh_data->assign(cur, cur + data_size); 166 pssh_data->assign(cur, cur + data_size);
203 return true; 167 return true;
204 } 168 }
205 169
206 return false; 170 return false;
207 } 171 }
208 172
209 static MediaDrmBridge::SecurityLevel GetSecurityLevelFromString( 173 class KeySystemUuidManager {
210 const std::string& security_level_str) { 174 public:
211 if (0 == security_level_str.compare("L1")) 175 KeySystemUuidManager();
212 return MediaDrmBridge::SECURITY_LEVEL_1; 176 UUID GetUUID(const std::string& key_system);
213 if (0 == security_level_str.compare("L3")) 177 void AddMapping(const std::string& key_system, const UUID& uuid);
214 return MediaDrmBridge::SECURITY_LEVEL_3; 178 std::vector<std::string> GetPlatformKeySystemNames();
215 DCHECK(security_level_str.empty()); 179
216 return MediaDrmBridge::SECURITY_LEVEL_NONE; 180 private:
181 typedef base::hash_map<std::string, UUID> KeySystemUuidMap;
182
183 KeySystemUuidMap key_system_uuid_map_;
184
185 DISALLOW_COPY_AND_ASSIGN(KeySystemUuidManager);
186 };
187
188 KeySystemUuidManager::KeySystemUuidManager() {
189 // Widevine is always supported in Android.
190 key_system_uuid_map_[kWidevineKeySystem] =
191 UUID(kWidevineUuid, kWidevineUuid + arraysize(kWidevineUuid));
217 } 192 }
218 193
219 static std::string GetSecurityLevelString( 194 UUID KeySystemUuidManager::GetUUID(const std::string& key_system) {
220 MediaDrmBridge::SecurityLevel security_level) { 195 KeySystemUuidMap::iterator it = key_system_uuid_map_.find(key_system);
221 switch (security_level) { 196 if (it == key_system_uuid_map_.end())
222 case MediaDrmBridge::SECURITY_LEVEL_NONE: 197 return UUID();
223 return ""; 198 return it->second;
224 case MediaDrmBridge::SECURITY_LEVEL_1: 199 }
225 return "L1"; 200
226 case MediaDrmBridge::SECURITY_LEVEL_3: 201 void KeySystemUuidManager::AddMapping(const std::string& key_system,
227 return "L3"; 202 const UUID& uuid) {
203 KeySystemUuidMap::iterator it = key_system_uuid_map_.find(key_system);
204 DCHECK(it == key_system_uuid_map_.end())
205 << "Shouldn't overwrite an existing key system.";
206 if (it != key_system_uuid_map_.end())
207 return;
208 key_system_uuid_map_[key_system] = uuid;
209 }
210
211 std::vector<std::string> KeySystemUuidManager::GetPlatformKeySystemNames() {
212 std::vector<std::string> key_systems;
213 for (KeySystemUuidMap::iterator it = key_system_uuid_map_.begin();
214 it != key_system_uuid_map_.end(); ++it) {
215 // Rule out the key system handled by Chrome explicitly.
216 if (it->first != kWidevineKeySystem)
217 key_systems.push_back(it->first);
228 } 218 }
229 return ""; 219 return key_systems;
230 } 220 }
231 221
222 base::LazyInstance<KeySystemUuidManager>::Leaky g_key_system_uuid_manager =
223 LAZY_INSTANCE_INITIALIZER;
224
232 // Checks whether |key_system| is supported with |container_mime_type|. Only 225 // Checks whether |key_system| is supported with |container_mime_type|. Only
233 // checks |key_system| support if |container_mime_type| is empty. 226 // checks |key_system| support if |container_mime_type| is empty.
234 // TODO(xhwang): The |container_mime_type| is not the same as contentType in 227 // TODO(xhwang): The |container_mime_type| is not the same as contentType in
235 // the EME spec. Revisit this once the spec issue with initData type is 228 // the EME spec. Revisit this once the spec issue with initData type is
236 // resolved. 229 // resolved.
237 static bool IsKeySystemSupportedWithTypeImpl( 230 bool IsKeySystemSupportedWithTypeImpl(const std::string& key_system,
238 const std::string& key_system, 231 const std::string& container_mime_type) {
239 const std::string& container_mime_type) {
240 if (!MediaDrmBridge::IsAvailable()) 232 if (!MediaDrmBridge::IsAvailable())
241 return false; 233 return false;
242 234
243 UUID scheme_uuid = g_key_system_uuid_manager.Get().GetUUID(key_system); 235 UUID scheme_uuid = g_key_system_uuid_manager.Get().GetUUID(key_system);
244 if (scheme_uuid.empty()) 236 if (scheme_uuid.empty())
245 return false; 237 return false;
246 238
247 JNIEnv* env = AttachCurrentThread(); 239 JNIEnv* env = AttachCurrentThread();
248 ScopedJavaLocalRef<jbyteArray> j_scheme_uuid = 240 ScopedJavaLocalRef<jbyteArray> j_scheme_uuid =
249 base::android::ToJavaByteArray(env, &scheme_uuid[0], scheme_uuid.size()); 241 base::android::ToJavaByteArray(env, &scheme_uuid[0], scheme_uuid.size());
250 ScopedJavaLocalRef<jstring> j_container_mime_type = 242 ScopedJavaLocalRef<jstring> j_container_mime_type =
251 ConvertUTF8ToJavaString(env, container_mime_type); 243 ConvertUTF8ToJavaString(env, container_mime_type);
252 return Java_MediaDrmBridge_isCryptoSchemeSupported( 244 return Java_MediaDrmBridge_isCryptoSchemeSupported(
253 env, j_scheme_uuid.obj(), j_container_mime_type.obj()); 245 env, j_scheme_uuid.obj(), j_container_mime_type.obj());
254 } 246 }
255 247
248 MediaDrmBridge::SecurityLevel GetSecurityLevelFromString(
249 const std::string& security_level_str) {
250 if (0 == security_level_str.compare("L1"))
251 return MediaDrmBridge::SECURITY_LEVEL_1;
252 if (0 == security_level_str.compare("L3"))
253 return MediaDrmBridge::SECURITY_LEVEL_3;
254 DCHECK(security_level_str.empty());
255 return MediaDrmBridge::SECURITY_LEVEL_NONE;
256 }
257
258 std::string GetSecurityLevelString(
259 MediaDrmBridge::SecurityLevel security_level) {
260 switch (security_level) {
261 case MediaDrmBridge::SECURITY_LEVEL_NONE:
262 return "";
263 case MediaDrmBridge::SECURITY_LEVEL_1:
264 return "L1";
265 case MediaDrmBridge::SECURITY_LEVEL_3:
266 return "L3";
267 }
268 return "";
269 }
270
271 } // namespace
272
273 // Called by Java.
274 static void AddKeySystemUuidMapping(JNIEnv* env,
275 jclass clazz,
276 jstring j_key_system,
277 jobject j_buffer) {
278 std::string key_system = ConvertJavaStringToUTF8(env, j_key_system);
279 uint8* buffer = static_cast<uint8*>(env->GetDirectBufferAddress(j_buffer));
280 UUID uuid(buffer, buffer + 16);
281 g_key_system_uuid_manager.Get().AddMapping(key_system, uuid);
282 }
283
256 // static 284 // static
257 bool MediaDrmBridge::IsAvailable() { 285 bool MediaDrmBridge::IsAvailable() {
258 if (base::android::BuildInfo::GetInstance()->sdk_int() < 19) 286 if (base::android::BuildInfo::GetInstance()->sdk_int() < 19)
259 return false; 287 return false;
260 288
261 int32 os_major_version = 0; 289 int32 os_major_version = 0;
262 int32 os_minor_version = 0; 290 int32 os_minor_version = 0;
263 int32 os_bugfix_version = 0; 291 int32 os_bugfix_version = 0;
264 base::SysInfo::OperatingSystemVersionNumbers(&os_major_version, 292 base::SysInfo::OperatingSystemVersionNumbers(&os_major_version,
265 &os_minor_version, 293 &os_minor_version,
(...skipping 10 matching lines...) Expand all
276 return SECURITY_LEVEL_1 == security_level; 304 return SECURITY_LEVEL_1 == security_level;
277 } 305 }
278 306
279 // static 307 // static
280 bool MediaDrmBridge::IsSecurityLevelSupported(const std::string& key_system, 308 bool MediaDrmBridge::IsSecurityLevelSupported(const std::string& key_system,
281 SecurityLevel security_level) { 309 SecurityLevel security_level) {
282 if (!IsAvailable()) 310 if (!IsAvailable())
283 return false; 311 return false;
284 312
285 scoped_ptr<MediaDrmBridge> media_drm_bridge = 313 scoped_ptr<MediaDrmBridge> media_drm_bridge =
286 MediaDrmBridge::CreateSessionless(key_system); 314 MediaDrmBridge::CreateWithoutSessionSupport(key_system);
287 if (!media_drm_bridge) 315 if (!media_drm_bridge)
288 return false; 316 return false;
289 317
290 return media_drm_bridge->SetSecurityLevel(security_level); 318 return media_drm_bridge->SetSecurityLevel(security_level);
291 } 319 }
292 320
293 static void AddKeySystemUuidMapping(JNIEnv* env, jclass clazz,
294 jstring j_key_system,
295 jobject j_buffer) {
296 std::string key_system = ConvertJavaStringToUTF8(env, j_key_system);
297 uint8* buffer = static_cast<uint8*>(env->GetDirectBufferAddress(j_buffer));
298 UUID uuid(buffer, buffer + 16);
299 g_key_system_uuid_manager.Get().AddMapping(key_system, uuid);
300 }
301
302 // static 321 // static
303 std::vector<std::string> MediaDrmBridge::GetPlatformKeySystemNames() { 322 std::vector<std::string> MediaDrmBridge::GetPlatformKeySystemNames() {
304 return g_key_system_uuid_manager.Get().GetPlatformKeySystemNames(); 323 return g_key_system_uuid_manager.Get().GetPlatformKeySystemNames();
305 } 324 }
306 325
307 // static 326 // static
308 bool MediaDrmBridge::IsKeySystemSupported(const std::string& key_system) { 327 bool MediaDrmBridge::IsKeySystemSupported(const std::string& key_system) {
309 DCHECK(!key_system.empty()); 328 DCHECK(!key_system.empty());
310 return IsKeySystemSupportedWithTypeImpl(key_system, ""); 329 return IsKeySystemSupportedWithTypeImpl(key_system, "");
311 } 330 }
312 331
313 // static 332 // static
314 bool MediaDrmBridge::IsKeySystemSupportedWithType( 333 bool MediaDrmBridge::IsKeySystemSupportedWithType(
315 const std::string& key_system, 334 const std::string& key_system,
316 const std::string& container_mime_type) { 335 const std::string& container_mime_type) {
317 DCHECK(!key_system.empty() && !container_mime_type.empty()); 336 DCHECK(!key_system.empty() && !container_mime_type.empty());
318 return IsKeySystemSupportedWithTypeImpl(key_system, container_mime_type); 337 return IsKeySystemSupportedWithTypeImpl(key_system, container_mime_type);
319 } 338 }
320 339
321 bool MediaDrmBridge::RegisterMediaDrmBridge(JNIEnv* env) { 340 bool MediaDrmBridge::RegisterMediaDrmBridge(JNIEnv* env) {
322 return RegisterNativesImpl(env); 341 return RegisterNativesImpl(env);
323 } 342 }
324 343
325 MediaDrmBridge::MediaDrmBridge(const std::vector<uint8>& scheme_uuid, 344 MediaDrmBridge::MediaDrmBridge(
326 const SessionCreatedCB& session_created_cb, 345 const std::vector<uint8>& scheme_uuid,
327 const SessionMessageCB& session_message_cb, 346 const SessionMessageCB& session_message_cb,
328 const SessionReadyCB& session_ready_cb, 347 const SessionClosedCB& session_closed_cb,
329 const SessionClosedCB& session_closed_cb, 348 const SessionErrorCB& session_error_cb,
330 const SessionErrorCB& session_error_cb) 349 const SessionKeysChangeCB& session_keys_change_cb)
331 : scheme_uuid_(scheme_uuid), 350 : scheme_uuid_(scheme_uuid),
332 session_created_cb_(session_created_cb),
333 session_message_cb_(session_message_cb), 351 session_message_cb_(session_message_cb),
334 session_ready_cb_(session_ready_cb),
335 session_closed_cb_(session_closed_cb), 352 session_closed_cb_(session_closed_cb),
336 session_error_cb_(session_error_cb) { 353 session_error_cb_(session_error_cb),
354 session_keys_change_cb_(session_keys_change_cb) {
337 JNIEnv* env = AttachCurrentThread(); 355 JNIEnv* env = AttachCurrentThread();
338 CHECK(env); 356 CHECK(env);
339 357
340 ScopedJavaLocalRef<jbyteArray> j_scheme_uuid = 358 ScopedJavaLocalRef<jbyteArray> j_scheme_uuid =
341 base::android::ToJavaByteArray(env, &scheme_uuid[0], scheme_uuid.size()); 359 base::android::ToJavaByteArray(env, &scheme_uuid[0], scheme_uuid.size());
342 j_media_drm_.Reset(Java_MediaDrmBridge_create( 360 j_media_drm_.Reset(Java_MediaDrmBridge_create(
343 env, j_scheme_uuid.obj(), reinterpret_cast<intptr_t>(this))); 361 env, j_scheme_uuid.obj(), reinterpret_cast<intptr_t>(this)));
344 } 362 }
345 363
346 MediaDrmBridge::~MediaDrmBridge() { 364 MediaDrmBridge::~MediaDrmBridge() {
347 JNIEnv* env = AttachCurrentThread(); 365 JNIEnv* env = AttachCurrentThread();
348 player_tracker_.NotifyCdmUnset(); 366 player_tracker_.NotifyCdmUnset();
349 if (!j_media_drm_.is_null()) 367 if (!j_media_drm_.is_null())
350 Java_MediaDrmBridge_release(env, j_media_drm_.obj()); 368 Java_MediaDrmBridge_release(env, j_media_drm_.obj());
351 } 369 }
352 370
353 // static 371 // static
372 // TODO(xhwang): Enable SessionExpirationUpdateCB when it is supported.
354 scoped_ptr<MediaDrmBridge> MediaDrmBridge::Create( 373 scoped_ptr<MediaDrmBridge> MediaDrmBridge::Create(
355 const std::string& key_system, 374 const std::string& key_system,
356 const SessionCreatedCB& session_created_cb,
357 const SessionMessageCB& session_message_cb, 375 const SessionMessageCB& session_message_cb,
358 const SessionReadyCB& session_ready_cb,
359 const SessionClosedCB& session_closed_cb, 376 const SessionClosedCB& session_closed_cb,
360 const SessionErrorCB& session_error_cb) { 377 const SessionErrorCB& session_error_cb,
378 const SessionKeysChangeCB& session_keys_change_cb,
379 const SessionExpirationUpdateCB& /* session_expiration_update_cb */) {
361 scoped_ptr<MediaDrmBridge> media_drm_bridge; 380 scoped_ptr<MediaDrmBridge> media_drm_bridge;
362 if (!IsAvailable()) 381 if (!IsAvailable())
363 return media_drm_bridge.Pass(); 382 return media_drm_bridge.Pass();
364 383
365 UUID scheme_uuid = g_key_system_uuid_manager.Get().GetUUID(key_system); 384 UUID scheme_uuid = g_key_system_uuid_manager.Get().GetUUID(key_system);
366 if (scheme_uuid.empty()) 385 if (scheme_uuid.empty())
367 return media_drm_bridge.Pass(); 386 return media_drm_bridge.Pass();
368 387
369 media_drm_bridge.reset(new MediaDrmBridge(scheme_uuid, 388 media_drm_bridge.reset(new MediaDrmBridge(scheme_uuid, session_message_cb,
370 session_created_cb, 389 session_closed_cb, session_error_cb,
371 session_message_cb, 390 session_keys_change_cb));
372 session_ready_cb,
373 session_closed_cb,
374 session_error_cb));
375 391
376 if (media_drm_bridge->j_media_drm_.is_null()) 392 if (media_drm_bridge->j_media_drm_.is_null())
377 media_drm_bridge.reset(); 393 media_drm_bridge.reset();
378 394
379 return media_drm_bridge.Pass(); 395 return media_drm_bridge.Pass();
380 } 396 }
381 397
382 // static 398 // static
383 scoped_ptr<MediaDrmBridge> MediaDrmBridge::CreateSessionless( 399 scoped_ptr<MediaDrmBridge> MediaDrmBridge::CreateWithoutSessionSupport(
384 const std::string& key_system) { 400 const std::string& key_system) {
385 return MediaDrmBridge::Create(key_system, 401 return MediaDrmBridge::Create(
386 SessionCreatedCB(), 402 key_system, SessionMessageCB(), SessionClosedCB(), SessionErrorCB(),
387 SessionMessageCB(), 403 SessionKeysChangeCB(), SessionExpirationUpdateCB());
388 SessionReadyCB(),
389 SessionClosedCB(),
390 SessionErrorCB());
391 } 404 }
392 405
393 bool MediaDrmBridge::SetSecurityLevel(SecurityLevel security_level) { 406 bool MediaDrmBridge::SetSecurityLevel(SecurityLevel security_level) {
394 JNIEnv* env = AttachCurrentThread(); 407 JNIEnv* env = AttachCurrentThread();
395 408
396 std::string security_level_str = GetSecurityLevelString(security_level); 409 std::string security_level_str = GetSecurityLevelString(security_level);
397 if (security_level_str.empty()) 410 if (security_level_str.empty())
398 return false; 411 return false;
399 412
400 ScopedJavaLocalRef<jstring> j_security_level = 413 ScopedJavaLocalRef<jstring> j_security_level =
401 ConvertUTF8ToJavaString(env, security_level_str); 414 ConvertUTF8ToJavaString(env, security_level_str);
402 return Java_MediaDrmBridge_setSecurityLevel( 415 return Java_MediaDrmBridge_setSecurityLevel(
403 env, j_media_drm_.obj(), j_security_level.obj()); 416 env, j_media_drm_.obj(), j_security_level.obj());
404 } 417 }
405 418
406 bool MediaDrmBridge::CreateSession(uint32 session_id, 419 void MediaDrmBridge::SetServerCertificate(
407 const std::string& content_type, 420 const uint8* certificate_data,
408 const uint8* init_data, 421 int certificate_data_length,
409 int init_data_length) { 422 scoped_ptr<media::SimpleCdmPromise> promise) {
423 promise->reject(NOT_SUPPORTED_ERROR, 0,
424 "SetServerCertificate() is not supported.");
425 }
426
427 void MediaDrmBridge::CreateSessionAndGenerateRequest(
428 SessionType session_type,
429 const std::string& init_data_type,
430 const uint8* init_data,
431 int init_data_length,
432 scoped_ptr<media::NewSessionCdmPromise> promise) {
410 DVLOG(1) << __FUNCTION__; 433 DVLOG(1) << __FUNCTION__;
411 434
412 DCHECK(!session_created_cb_.is_null()) 435 if (session_type != media::MediaKeys::TEMPORARY_SESSION) {
413 << "CreateSession called on a sessionless MediaDrmBridge object."; 436 promise->reject(NOT_SUPPORTED_ERROR, 0,
437 "Only the temporary session type is supported.");
438 return;
439 }
414 440
415 JNIEnv* env = AttachCurrentThread(); 441 JNIEnv* env = AttachCurrentThread();
416 ScopedJavaLocalRef<jbyteArray> j_init_data; 442 ScopedJavaLocalRef<jbyteArray> j_init_data;
417 // Caller should always use "video/*" content types. 443 // Caller should always use "video/*" content types.
418 DCHECK_EQ(0u, content_type.find("video/")); 444 DCHECK_EQ(0u, init_data_type.find("video/"));
419 445
420 // Widevine MediaDrm plugin only accepts the "data" part of the PSSH box as 446 // Widevine MediaDrm plugin only accepts the "data" part of the PSSH box as
421 // the init data when using MP4 container. 447 // the init data when using MP4 container.
422 if (std::equal(scheme_uuid_.begin(), scheme_uuid_.end(), kWidevineUuid) && 448 if (std::equal(scheme_uuid_.begin(), scheme_uuid_.end(), kWidevineUuid) &&
423 content_type == "video/mp4") { 449 init_data_type == "video/mp4") {
424 std::vector<uint8> pssh_data; 450 std::vector<uint8> pssh_data;
425 if (!GetPsshData(init_data, init_data_length, scheme_uuid_, &pssh_data)) 451 if (!GetPsshData(init_data, init_data_length, scheme_uuid_, &pssh_data)) {
426 return false; 452 promise->reject(INVALID_ACCESS_ERROR, 0, "Invalid PSSH data.");
453 return;
454 }
427 j_init_data = 455 j_init_data =
428 base::android::ToJavaByteArray(env, &pssh_data[0], pssh_data.size()); 456 base::android::ToJavaByteArray(env, &pssh_data[0], pssh_data.size());
429 } else { 457 } else {
430 j_init_data = 458 j_init_data =
431 base::android::ToJavaByteArray(env, init_data, init_data_length); 459 base::android::ToJavaByteArray(env, init_data, init_data_length);
432 } 460 }
433 461
434 ScopedJavaLocalRef<jstring> j_mime = 462 ScopedJavaLocalRef<jstring> j_mime =
435 ConvertUTF8ToJavaString(env, content_type); 463 ConvertUTF8ToJavaString(env, init_data_type);
436 Java_MediaDrmBridge_createSession( 464 uint32_t promise_id = cdm_promise_adapter_.SavePromise(promise.Pass());
437 env, j_media_drm_.obj(), session_id, j_init_data.obj(), j_mime.obj()); 465 Java_MediaDrmBridge_createSession(env, j_media_drm_.obj(), j_init_data.obj(),
438 return true; 466 j_mime.obj(), promise_id);
439 } 467 }
440 468
441 void MediaDrmBridge::LoadSession(uint32 session_id, 469 void MediaDrmBridge::LoadSession(
442 const std::string& web_session_id) { 470 SessionType session_type,
443 // MediaDrmBridge doesn't support loading sessions. 471 const std::string& session_id,
444 NOTREACHED(); 472 scoped_ptr<media::NewSessionCdmPromise> promise) {
473 promise->reject(NOT_SUPPORTED_ERROR, 0, "LoadSession() is not supported.");
445 } 474 }
446 475
447 void MediaDrmBridge::UpdateSession(uint32 session_id, 476 void MediaDrmBridge::UpdateSession(
448 const uint8* response, 477 const std::string& session_id,
449 int response_length) { 478 const uint8* response,
479 int response_length,
480 scoped_ptr<media::SimpleCdmPromise> promise) {
450 DVLOG(1) << __FUNCTION__; 481 DVLOG(1) << __FUNCTION__;
451 482
452 DCHECK(!session_ready_cb_.is_null())
453 << __FUNCTION__ << " called on a sessionless MediaDrmBridge object.";
454
455 JNIEnv* env = AttachCurrentThread(); 483 JNIEnv* env = AttachCurrentThread();
456 ScopedJavaLocalRef<jbyteArray> j_response = 484 ScopedJavaLocalRef<jbyteArray> j_response =
457 base::android::ToJavaByteArray(env, response, response_length); 485 base::android::ToJavaByteArray(env, response, response_length);
458 Java_MediaDrmBridge_updateSession( 486 ScopedJavaLocalRef<jbyteArray> j_session_id = base::android::ToJavaByteArray(
459 env, j_media_drm_.obj(), session_id, j_response.obj()); 487 env, reinterpret_cast<const uint8_t*>(session_id.data()),
488 session_id.size());
489 uint32_t promise_id = cdm_promise_adapter_.SavePromise(promise.Pass());
490 Java_MediaDrmBridge_updateSession(env, j_media_drm_.obj(), j_session_id.obj(),
491 j_response.obj(), promise_id);
460 } 492 }
461 493
462 void MediaDrmBridge::ReleaseSession(uint32 session_id) { 494 void MediaDrmBridge::CloseSession(const std::string& session_id,
495 scoped_ptr<media::SimpleCdmPromise> promise) {
463 DVLOG(1) << __FUNCTION__; 496 DVLOG(1) << __FUNCTION__;
497 JNIEnv* env = AttachCurrentThread();
498 ScopedJavaLocalRef<jbyteArray> j_session_id = base::android::ToJavaByteArray(
499 env, reinterpret_cast<const uint8_t*>(session_id.data()),
500 session_id.size());
501 uint32_t promise_id = cdm_promise_adapter_.SavePromise(promise.Pass());
502 Java_MediaDrmBridge_closeSession(env, j_media_drm_.obj(), j_session_id.obj(),
503 promise_id);
504 }
464 505
465 DCHECK(!session_closed_cb_.is_null()) 506 void MediaDrmBridge::RemoveSession(
466 << __FUNCTION__ << " called on a sessionless MediaDrmBridge object."; 507 const std::string& session_id,
508 scoped_ptr<media::SimpleCdmPromise> promise) {
509 promise->reject(NOT_SUPPORTED_ERROR, 0, "RemoveSession() is not supported.");
510 }
467 511
468 JNIEnv* env = AttachCurrentThread(); 512 CdmContext* MediaDrmBridge::GetCdmContext() {
469 Java_MediaDrmBridge_releaseSession(env, j_media_drm_.obj(), session_id); 513 NOTREACHED();
514 return nullptr;
470 } 515 }
471 516
472 int MediaDrmBridge::RegisterPlayer(const base::Closure& new_key_cb, 517 int MediaDrmBridge::RegisterPlayer(const base::Closure& new_key_cb,
473 const base::Closure& cdm_unset_cb) { 518 const base::Closure& cdm_unset_cb) {
474 return player_tracker_.RegisterPlayer(new_key_cb, cdm_unset_cb); 519 return player_tracker_.RegisterPlayer(new_key_cb, cdm_unset_cb);
475 } 520 }
476 521
477 void MediaDrmBridge::UnregisterPlayer(int registration_id) { 522 void MediaDrmBridge::UnregisterPlayer(int registration_id) {
478 player_tracker_.UnregisterPlayer(registration_id); 523 player_tracker_.UnregisterPlayer(registration_id);
479 } 524 }
(...skipping 13 matching lines...) Expand all
493 538
494 media_crypto_ready_cb_ = closure; 539 media_crypto_ready_cb_ = closure;
495 } 540 }
496 541
497 void MediaDrmBridge::OnMediaCryptoReady(JNIEnv* env, jobject) { 542 void MediaDrmBridge::OnMediaCryptoReady(JNIEnv* env, jobject) {
498 DCHECK(!GetMediaCrypto().is_null()); 543 DCHECK(!GetMediaCrypto().is_null());
499 if (!media_crypto_ready_cb_.is_null()) 544 if (!media_crypto_ready_cb_.is_null())
500 base::ResetAndReturn(&media_crypto_ready_cb_).Run(); 545 base::ResetAndReturn(&media_crypto_ready_cb_).Run();
501 } 546 }
502 547
503 void MediaDrmBridge::OnSessionCreated(JNIEnv* env, 548 void MediaDrmBridge::OnPromiseResolved(JNIEnv* env,
504 jobject j_media_drm, 549 jobject j_media_drm,
505 jint j_session_id, 550 jint j_promise_id) {
506 jstring j_web_session_id) { 551 cdm_promise_adapter_.ResolvePromise(j_promise_id);
507 uint32 session_id = j_session_id; 552 }
508 std::string web_session_id = ConvertJavaStringToUTF8(env, j_web_session_id); 553
509 session_created_cb_.Run(session_id, web_session_id); 554 void MediaDrmBridge::OnPromiseResolvedWithSession(JNIEnv* env,
555 jobject j_media_drm,
556 jint j_promise_id,
557 jbyteArray j_session_id) {
558 cdm_promise_adapter_.ResolvePromise(j_promise_id,
559 GetSessionId(env, j_session_id));
560 }
561
562 void MediaDrmBridge::OnPromiseRejected(JNIEnv* env,
563 jobject j_media_drm,
564 jint j_promise_id,
565 jstring j_error_message) {
566 std::string error_message = ConvertJavaStringToUTF8(env, j_error_message);
567 cdm_promise_adapter_.RejectPromise(j_promise_id, MediaKeys::UNKNOWN_ERROR, 0,
568 error_message);
510 } 569 }
511 570
512 void MediaDrmBridge::OnSessionMessage(JNIEnv* env, 571 void MediaDrmBridge::OnSessionMessage(JNIEnv* env,
513 jobject j_media_drm, 572 jobject j_media_drm,
514 jint j_session_id, 573 jbyteArray j_session_id,
515 jbyteArray j_message, 574 jbyteArray j_message,
516 jstring j_destination_url) { 575 jstring j_legacy_destination_url) {
517 uint32 session_id = j_session_id;
518 std::vector<uint8> message; 576 std::vector<uint8> message;
519 JavaByteArrayToByteVector(env, j_message, &message); 577 JavaByteArrayToByteVector(env, j_message, &message);
520 GURL destination_gurl = GURL(ConvertJavaStringToUTF8(env, j_destination_url)); 578 GURL legacy_destination_url =
521 if (!destination_gurl.is_valid() && !destination_gurl.is_empty()) { 579 GURL(ConvertJavaStringToUTF8(env, j_legacy_destination_url));
522 DLOG(WARNING) << "SessionMessage destination_url is invalid : " 580 // Note: Message type is not supported in MediaDrm. Do our best guess here.
523 << destination_gurl.possibly_invalid_spec(); 581 media::MediaKeys::MessageType message_type =
524 destination_gurl = GURL::EmptyGURL(); // Replace invalid destination_url. 582 legacy_destination_url.is_empty() ? media::MediaKeys::LICENSE_REQUEST
525 } 583 : media::MediaKeys::LICENSE_RENEWAL;
526 session_message_cb_.Run(session_id, message, destination_gurl);
527 }
528 584
529 void MediaDrmBridge::OnSessionReady(JNIEnv* env, 585 session_message_cb_.Run(GetSessionId(env, j_session_id), message_type,
530 jobject j_media_drm, 586 message, legacy_destination_url);
531 jint j_session_id) {
532 uint32 session_id = j_session_id;
533 session_ready_cb_.Run(session_id);
534 // TODO(xhwang/jrummell): Move this when usableKeyIds/keyschange are
535 // implemented.
536 player_tracker_.NotifyNewKey();
537 } 587 }
538 588
539 void MediaDrmBridge::OnSessionClosed(JNIEnv* env, 589 void MediaDrmBridge::OnSessionClosed(JNIEnv* env,
540 jobject j_media_drm, 590 jobject j_media_drm,
541 jint j_session_id) { 591 jbyteArray j_session_id) {
542 uint32 session_id = j_session_id; 592 session_closed_cb_.Run(GetSessionId(env, j_session_id));
543 session_closed_cb_.Run(session_id);
544 } 593 }
545 594
546 void MediaDrmBridge::OnSessionError(JNIEnv* env, 595 void MediaDrmBridge::OnSessionKeysChange(JNIEnv* env,
547 jobject j_media_drm, 596 jobject j_media_drm,
548 jint j_session_id) { 597 jbyteArray j_session_id,
549 uint32 session_id = j_session_id; 598 bool has_additional_usable_key,
550 session_error_cb_.Run(session_id, MediaKeys::kUnknownError, 0); 599 jint j_key_status) {
600 if (has_additional_usable_key)
601 player_tracker_.NotifyNewKey();
602
603 scoped_ptr<CdmKeyInformation> cdm_key_information(new CdmKeyInformation());
604 cdm_key_information->key_id.assign(kDummyKeyId,
605 kDummyKeyId + sizeof(kDummyKeyId));
606 cdm_key_information->status =
607 static_cast<CdmKeyInformation::KeyStatus>(j_key_status);
608 CdmKeysInfo cdm_keys_info;
609 cdm_keys_info.push_back(cdm_key_information.release());
610
611 session_keys_change_cb_.Run(GetSessionId(env, j_session_id),
612 has_additional_usable_key, cdm_keys_info.Pass());
613 }
614
615 void MediaDrmBridge::OnLegacySessionError(JNIEnv* env,
616 jobject j_media_drm,
617 jbyteArray j_session_id,
618 jstring j_error_message) {
619 std::string error_message = ConvertJavaStringToUTF8(env, j_error_message);
620 session_error_cb_.Run(GetSessionId(env, j_session_id),
621 MediaKeys::UNKNOWN_ERROR, 0, error_message);
551 } 622 }
552 623
553 ScopedJavaLocalRef<jobject> MediaDrmBridge::GetMediaCrypto() { 624 ScopedJavaLocalRef<jobject> MediaDrmBridge::GetMediaCrypto() {
554 JNIEnv* env = AttachCurrentThread(); 625 JNIEnv* env = AttachCurrentThread();
555 return Java_MediaDrmBridge_getMediaCrypto(env, j_media_drm_.obj()); 626 return Java_MediaDrmBridge_getMediaCrypto(env, j_media_drm_.obj());
556 } 627 }
557 628
558 MediaDrmBridge::SecurityLevel MediaDrmBridge::GetSecurityLevel() { 629 MediaDrmBridge::SecurityLevel MediaDrmBridge::GetSecurityLevel() {
559 JNIEnv* env = AttachCurrentThread(); 630 JNIEnv* env = AttachCurrentThread();
560 ScopedJavaLocalRef<jstring> j_security_level = 631 ScopedJavaLocalRef<jstring> j_security_level =
(...skipping 14 matching lines...) Expand all
575 JNIEnv* env = AttachCurrentThread(); 646 JNIEnv* env = AttachCurrentThread();
576 Java_MediaDrmBridge_resetDeviceCredentials(env, j_media_drm_.obj()); 647 Java_MediaDrmBridge_resetDeviceCredentials(env, j_media_drm_.obj());
577 } 648 }
578 649
579 void MediaDrmBridge::OnResetDeviceCredentialsCompleted( 650 void MediaDrmBridge::OnResetDeviceCredentialsCompleted(
580 JNIEnv* env, jobject, bool success) { 651 JNIEnv* env, jobject, bool success) {
581 base::ResetAndReturn(&reset_credentials_cb_).Run(success); 652 base::ResetAndReturn(&reset_credentials_cb_).Run(success);
582 } 653 }
583 654
584 } // namespace media 655 } // namespace media
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698