Initial source release: v2.0.8-0-679
Change-Id: Idf6316a8faf4b4fdc54265aad12084e5aa60707a
This commit is contained in:
54
cdm/cdm_api_external.gyp
Normal file
54
cdm/cdm_api_external.gyp
Normal file
@@ -0,0 +1,54 @@
|
||||
# Copyright 2013 Google Inc. All Rights Reserved.
|
||||
#
|
||||
# Builds under the CDM ./build/build.py (target platform) build system
|
||||
# Refer to the distribution package's README for details.
|
||||
#
|
||||
{
|
||||
'targets': [
|
||||
{
|
||||
'target_name': 'wvcdm_shared_api_unittest',
|
||||
'type': 'executable',
|
||||
'sources': [
|
||||
'../cdm/test/cdm_api_test.cpp',
|
||||
'../core/test/config_test_env.cpp',
|
||||
'../core/test/license_request.cpp',
|
||||
'../core/test/http_socket.cpp',
|
||||
'../core/test/url_request.cpp',
|
||||
],
|
||||
'include_dirs': [
|
||||
'include',
|
||||
'../cdm/include',
|
||||
'../core/include',
|
||||
'../core/test',
|
||||
'../oemcrypto/include',
|
||||
],
|
||||
'ldflags': [
|
||||
'-L$(builddir_name)/$(BUILDTYPE)/lib.target',
|
||||
'-L$(builddir_name)/$(BUILDTYPE)',
|
||||
'-Wl,-rpath=$(builddir_name)/$(BUILDTYPE)/lib.target/',
|
||||
],
|
||||
'libraries': [
|
||||
'$(builddir_name)/$(BUILDTYPE)/lib.target/libwvcdm_shared.so',
|
||||
'-lssl',
|
||||
'-lcrypto',
|
||||
'-lpthread',
|
||||
'-lprotobuf',
|
||||
],
|
||||
'dependencies': [
|
||||
'test/gmock.gyp:gmock',
|
||||
'test/gmock.gyp:gmock_main',
|
||||
'test/gtest.gyp:gtest',
|
||||
],
|
||||
'conditions': [
|
||||
[ 'external_build==0',
|
||||
{
|
||||
'dependencies': [
|
||||
'../cdm/cdm_api_internal.gyp:wvcdm_shared',
|
||||
]
|
||||
}
|
||||
]
|
||||
],
|
||||
},
|
||||
],
|
||||
}
|
||||
|
||||
89
cdm/cdm_api_internal.gyp
Normal file
89
cdm/cdm_api_internal.gyp
Normal file
@@ -0,0 +1,89 @@
|
||||
# Copyright 2013 Google Inc. All Rights Reserved.
|
||||
#
|
||||
# Refer to the distribution package's README for information about
|
||||
# setting up your system, performing the build, and using/testing
|
||||
# the build targets.
|
||||
#
|
||||
# Set external_build=0 via GYP_DEFINES if debug information in
|
||||
# libwvcdm_shared.so is desirable.
|
||||
{
|
||||
'targets': [
|
||||
{
|
||||
'target_name': 'license_protocol',
|
||||
'type': 'static_library',
|
||||
'sources': ['../core/src/license_protocol.proto',],
|
||||
'variables': {
|
||||
'proto_in_dir': '../core/src',
|
||||
'proto_out_dir': 'license_protocol',
|
||||
},
|
||||
'includes': ['../build/protoc.gypi'],
|
||||
},
|
||||
{
|
||||
'target_name': 'device_files',
|
||||
'type': 'static_library',
|
||||
'sources': ['../core/src/device_files.proto',],
|
||||
'variables': {
|
||||
'proto_in_dir': '../core/src',
|
||||
'proto_out_dir': 'device_files',
|
||||
},
|
||||
'includes': ['../build/protoc.gypi'],
|
||||
},
|
||||
{
|
||||
'target_name': 'wvcdm_sysdep',
|
||||
'type': 'static_library',
|
||||
'defines': ['CDM_IMPLEMENTATION'],
|
||||
'include_dirs': [
|
||||
'../cdm/include',
|
||||
'../core/include',
|
||||
'../linux/include',
|
||||
'../third_party/stringencoders/src',
|
||||
],
|
||||
'sources': [
|
||||
'../cdm/src/file_store.cpp',
|
||||
'../cdm/src/properties_common.cpp',
|
||||
'../core/src/string_conversions.cpp',
|
||||
'../linux/src/lock.cpp',
|
||||
'../linux/src/log.cpp',
|
||||
'../third_party/stringencoders/src/modp_b64w.cpp',
|
||||
],
|
||||
},
|
||||
{
|
||||
'target_name': 'wvcdm_shared',
|
||||
'type': 'shared_library',
|
||||
'defines': ['CDM_IMPLEMENTATION'],
|
||||
'dependencies': [
|
||||
'license_protocol',
|
||||
'wvcdm_sysdep',
|
||||
'device_files',
|
||||
'<(oemcrypto_target)',
|
||||
],
|
||||
'include_dirs': [
|
||||
'../cdm/include',
|
||||
'../core/include',
|
||||
'../third_party/gmock/include',
|
||||
'../linux/include',
|
||||
'../oemcrypto/include',
|
||||
],
|
||||
'sources': [
|
||||
# uses common published api
|
||||
'../cdm/src/clock.cpp',
|
||||
'../cdm/src/host_event_listener.cpp',
|
||||
'../cdm/src/wv_content_decryption_module.cpp',
|
||||
'../core/src/buffer_reader.cpp',
|
||||
'../core/src/cdm_engine.cpp',
|
||||
'../core/src/cdm_session.cpp',
|
||||
'../core/src/certificate_provisioning.cpp',
|
||||
'../core/src/crypto_session.cpp',
|
||||
'../core/src/device_files.cpp',
|
||||
'../core/src/license.cpp',
|
||||
'../core/src/oemcrypto_adapter_static.cpp',
|
||||
'../core/src/policy_engine.cpp',
|
||||
'../core/src/privacy_crypto.cpp',
|
||||
'../core/src/properties.cpp',
|
||||
],
|
||||
'direct_dependencies': [
|
||||
'license_protocol',
|
||||
],
|
||||
},
|
||||
],
|
||||
}
|
||||
30
cdm/include/LICENSE
Normal file
30
cdm/include/LICENSE
Normal file
@@ -0,0 +1,30 @@
|
||||
// Copyright for the following files derived from the Chromium project
|
||||
// content_decryption_module.h
|
||||
//
|
||||
// Copyright (c) 2013 The Chromium Authors. All rights reserved.
|
||||
//
|
||||
// Redistribution and use in source and binary forms, with or without
|
||||
// modification, are permitted provided that the following conditions are
|
||||
// met:
|
||||
//
|
||||
// * Redistributions of source code must retain the above copyright
|
||||
// notice, this list of conditions and the following disclaimer.
|
||||
// * Redistributions in binary form must reproduce the above
|
||||
// copyright notice, this list of conditions and the following disclaimer
|
||||
// in the documentation and/or other materials provided with the
|
||||
// distribution.
|
||||
// * Neither the name of Google Inc. nor the names of its
|
||||
// contributors may be used to endorse or promote products derived from
|
||||
// this software without specific prior written permission.
|
||||
//
|
||||
// THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
|
||||
// "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
|
||||
// LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
|
||||
// A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
|
||||
// OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
||||
// SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
|
||||
// LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
|
||||
// DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
|
||||
// THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
|
||||
// (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
|
||||
// OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||
26
cdm/include/cdm_host_clock.h
Normal file
26
cdm/include/cdm_host_clock.h
Normal file
@@ -0,0 +1,26 @@
|
||||
// Copyright 2013 Google Inc. All Rights Reserved.
|
||||
|
||||
#ifndef WVCDM_CDM_CDM_HOST_CLOCK_H_
|
||||
#define WVCDM_CDM_CDM_HOST_CLOCK_H_
|
||||
|
||||
namespace wvcdm {
|
||||
|
||||
class IClock {
|
||||
public:
|
||||
IClock(){}
|
||||
virtual ~IClock();
|
||||
virtual int64_t GetCurrentTimeInSeconds() = 0;
|
||||
};
|
||||
|
||||
class HostClock {
|
||||
friend class Clock;
|
||||
friend class IClock;
|
||||
public:
|
||||
static void SetClockInterface(IClock* iclock);
|
||||
int64_t GetCurrentTimeInSeconds();
|
||||
private:
|
||||
static IClock* impl_;
|
||||
};
|
||||
} // namspace wvcdm
|
||||
|
||||
#endif // WVCDM_CDM_CDM_HOST_CLOCK_H_
|
||||
43
cdm/include/cdm_host_file.h
Normal file
43
cdm/include/cdm_host_file.h
Normal file
@@ -0,0 +1,43 @@
|
||||
// Copyright 2013 Google Inc. All Rights Reserved.
|
||||
|
||||
#ifndef WVCDM_CDM_CDM_HOST_FILE_H_
|
||||
#define WVCDM_CDM_CDM_HOST_FILE_H_
|
||||
|
||||
#include "file_store.h"
|
||||
#include "content_decryption_module.h"
|
||||
|
||||
namespace wvcdm {
|
||||
|
||||
class IFileFactory {
|
||||
protected:
|
||||
IFileFactory(){}
|
||||
virtual ~IFileFactory(){}
|
||||
public:
|
||||
virtual File::Impl* NewFileImpl () = 0;
|
||||
};
|
||||
|
||||
class File::Impl {
|
||||
public:
|
||||
explicit Impl(cdm::Host* const host) : host_(host) {}
|
||||
FILE* file_;
|
||||
static void RegisterFileFactory(IFileFactory* factory) {
|
||||
factory_ = factory;
|
||||
}
|
||||
static IFileFactory* factory_;
|
||||
|
||||
virtual bool Exists(const std::string& name);
|
||||
virtual bool Open(const std::string& name);
|
||||
virtual bool Close();
|
||||
virtual bool Remove(const std::string& name);
|
||||
virtual size_t Read(char* buffer, size_t bytes);
|
||||
virtual size_t Write(const char* buffer, size_t bytes);
|
||||
virtual size_t FileSize(const std::string& name);
|
||||
|
||||
private:
|
||||
cdm::Host* const host_;
|
||||
std::string fname_;
|
||||
};
|
||||
|
||||
} // namespace wvcdm
|
||||
|
||||
#endif // WVCDM_CDM_CDM_HOST_FILE_H_
|
||||
45
cdm/include/cdm_host_timer.h
Normal file
45
cdm/include/cdm_host_timer.h
Normal file
@@ -0,0 +1,45 @@
|
||||
// Copyright 2013 Google Inc. All Rights Reserved.
|
||||
|
||||
#ifndef WVCDM_CDM_CDM_HOST_TIMER_H_
|
||||
#define WVCDM_CDM_CDM_HOST_TIMER_H_
|
||||
|
||||
#include <cstddef>
|
||||
#include <string>
|
||||
#include <vector>
|
||||
|
||||
#include "content_decryption_module.h"
|
||||
#include "timer.h"
|
||||
|
||||
namespace wvcdm {
|
||||
class ITimerFactory {
|
||||
public:
|
||||
virtual Timer::Impl* NewTimerImpl() = 0;
|
||||
};
|
||||
|
||||
class Timer::Impl {
|
||||
friend class wvcdm::Timer;
|
||||
typedef enum {kIdle, kRunning} TimerState;
|
||||
public:
|
||||
static void RegisterTimerFactory(ITimerFactory* factory);
|
||||
|
||||
explicit Impl(cdm::Host* const host);
|
||||
virtual ~Impl(){}
|
||||
|
||||
void Start(TimerHandler *handler, uint32_t time_in_secs);
|
||||
|
||||
void Stop();
|
||||
|
||||
bool IsRunning(){return state_ == kRunning;}
|
||||
|
||||
void OnTimerEvent();
|
||||
|
||||
private:
|
||||
static ITimerFactory* factory_;
|
||||
cdm::Host* const host_;
|
||||
TimerHandler* handler_;
|
||||
int64_t delay_ms_;
|
||||
TimerState state_;
|
||||
};
|
||||
} // namespace wvcdm
|
||||
|
||||
#endif // WVCDM_CDM_CDM_HOST_TIMER_H_
|
||||
573
cdm/include/content_decryption_module.h
Normal file
573
cdm/include/content_decryption_module.h
Normal file
@@ -0,0 +1,573 @@
|
||||
// Copyright (c) 2013 The Chromium Authors. All rights reserved.
|
||||
// Use of this source code is governed by a BSD-style license that can be
|
||||
// found in the LICENSE file.
|
||||
|
||||
#ifndef WVCDM_CDM_CONTENT_DECRYPTION_MODULE_H_
|
||||
#define WVCDM_CDM_CONTENT_DECRYPTION_MODULE_H_
|
||||
|
||||
#if defined(_MSC_VER)
|
||||
typedef unsigned char uint8_t;
|
||||
typedef unsigned int uint32_t;
|
||||
typedef int int32_t;
|
||||
typedef __int64 int64_t;
|
||||
#else
|
||||
#include <stdint.h>
|
||||
#endif
|
||||
|
||||
// Define CDM_EXPORT so that functionality implemented by the CDM module
|
||||
// can be exported to consumers.
|
||||
#if defined(WIN32)
|
||||
|
||||
#if defined(CDM_IMPLEMENTATION)
|
||||
#define CDM_EXPORT __declspec(dllexport)
|
||||
#else
|
||||
#define CDM_EXPORT __declspec(dllimport)
|
||||
#endif // defined(CDM_IMPLEMENTATION)
|
||||
|
||||
#else // defined(WIN32)
|
||||
|
||||
#if defined(CDM_IMPLEMENTATION)
|
||||
#define CDM_EXPORT __attribute__((visibility("default")))
|
||||
#else
|
||||
#define CDM_EXPORT
|
||||
#endif
|
||||
|
||||
#endif // defined(WIN32)
|
||||
|
||||
// The version number must be rolled when the exported functions are updated!
|
||||
// If the CDM and the adapter use different versions of these functions, the
|
||||
// adapter will fail to load or crash!
|
||||
#define INITIALIZE_CDM_MODULE InitializeCdmModule_1
|
||||
|
||||
extern "C" {
|
||||
CDM_EXPORT void INITIALIZE_CDM_MODULE();
|
||||
|
||||
CDM_EXPORT void DeinitializeCdmModule();
|
||||
|
||||
// Returns a pointer to the requested CDM Host interface upon success.
|
||||
// Returns NULL if the requested CDM Host interface is not supported.
|
||||
// The caller should cast the returned pointer to the type matching
|
||||
// |host_interface_version|.
|
||||
typedef void* (*GetCdmHostFunc)(int host_interface_version, void* user_data);
|
||||
|
||||
// Returns a pointer to the requested CDM upon success.
|
||||
// Returns NULL if an error occurs or the requested |cdm_interface_version| or
|
||||
// |key_system| is not supported or another error occurs.
|
||||
// The caller should cast the returned pointer to the type matching
|
||||
// |cdm_interface_version|.
|
||||
// Caller retains ownership of arguments and must call Destroy() on the returned
|
||||
// object.
|
||||
CDM_EXPORT void* CreateCdmInstance(
|
||||
int cdm_interface_version,
|
||||
const char* key_system, int key_system_size,
|
||||
GetCdmHostFunc get_cdm_host_func, void* user_data);
|
||||
|
||||
CDM_EXPORT int GetCdmVersion();
|
||||
}
|
||||
|
||||
namespace cdm {
|
||||
|
||||
class AudioFrames;
|
||||
class DecryptedBlock;
|
||||
class VideoFrame;
|
||||
|
||||
enum Status {
|
||||
kSuccess = 0,
|
||||
kNeedMoreData, // Decoder needs more data to produce a decoded frame/sample.
|
||||
kNoKey, // The required decryption key is not available.
|
||||
kSessionError, // Session management error.
|
||||
kDecryptError, // Decryption failed.
|
||||
kDecodeError, // Error decoding audio or video.
|
||||
kRetry, // Buffer temporarily cannot be accepted. Retry after a short delay.
|
||||
kNeedsDeviceCertificate // Requires Device Certificate for content licensing
|
||||
};
|
||||
|
||||
// This must be consistent with MediaKeyError defined in the
|
||||
// Encrypted media Extensions (EME) specification: http://goo.gl/3Df8h
|
||||
enum MediaKeyError {
|
||||
kUnknownError = 1,
|
||||
kClientError,
|
||||
kServiceError,
|
||||
kOutputError,
|
||||
kHardwareChangeError,
|
||||
kDomainError
|
||||
};
|
||||
|
||||
// An input buffer can be split into several continuous subsamples.
|
||||
// A SubsampleEntry specifies the number of clear and cipher bytes in each
|
||||
// subsample. For example, the following buffer has three subsamples:
|
||||
//
|
||||
// |<----- subsample1 ----->|<----- subsample2 ----->|<----- subsample3 ----->|
|
||||
// | clear1 | cipher1 | clear2 | cipher2 | clear3 | cipher3 |
|
||||
//
|
||||
// For decryption, all of the cipher bytes in a buffer should be concatenated
|
||||
// (in the subsample order) into a single logical stream. The clear bytes should
|
||||
// not be considered as part of decryption.
|
||||
//
|
||||
// Stream to decrypt: | cipher1 | cipher2 | cipher3 |
|
||||
// Decrypted stream: | decrypted1| decrypted2 | decrypted3 |
|
||||
//
|
||||
// After decryption, the decrypted bytes should be copied over the position
|
||||
// of the corresponding cipher bytes in the original buffer to form the output
|
||||
// buffer. Following the above example, the decrypted buffer should be:
|
||||
//
|
||||
// |<----- subsample1 ----->|<----- subsample2 ----->|<----- subsample3 ----->|
|
||||
// | clear1 | decrypted1| clear2 | decrypted2 | clear3 | decrypted3 |
|
||||
//
|
||||
struct SubsampleEntry {
|
||||
SubsampleEntry(int32_t clear_bytes, int32_t cipher_bytes)
|
||||
: clear_bytes(clear_bytes), cipher_bytes(cipher_bytes) {}
|
||||
|
||||
int32_t clear_bytes;
|
||||
int32_t cipher_bytes;
|
||||
};
|
||||
|
||||
// Represents an input buffer to be decrypted (and possibly decoded). It
|
||||
// does not own any pointers in this struct.
|
||||
struct InputBuffer {
|
||||
InputBuffer()
|
||||
: data(NULL),
|
||||
data_size(0),
|
||||
data_offset(0),
|
||||
key_id(NULL),
|
||||
key_id_size(0),
|
||||
iv(NULL),
|
||||
iv_size(0),
|
||||
subsamples(NULL),
|
||||
num_subsamples(0),
|
||||
timestamp(0) {}
|
||||
|
||||
const uint8_t* data; // Pointer to the beginning of the input data.
|
||||
int32_t data_size; // Size (in bytes) of |data|.
|
||||
|
||||
int32_t data_offset; // Number of bytes to be discarded before decryption.
|
||||
|
||||
const uint8_t* key_id; // Key ID to identify the decryption key.
|
||||
int32_t key_id_size; // Size (in bytes) of |key_id|.
|
||||
|
||||
const uint8_t* iv; // Initialization vector.
|
||||
int32_t iv_size; // Size (in bytes) of |iv|.
|
||||
|
||||
const struct SubsampleEntry* subsamples;
|
||||
int32_t num_subsamples; // Number of subsamples in |subsamples|.
|
||||
|
||||
int64_t timestamp; // Presentation timestamp in microseconds.
|
||||
};
|
||||
|
||||
struct AudioDecoderConfig {
|
||||
enum AudioCodec {
|
||||
kUnknownAudioCodec = 0,
|
||||
kCodecVorbis,
|
||||
kCodecAac
|
||||
};
|
||||
|
||||
AudioDecoderConfig()
|
||||
: codec(kUnknownAudioCodec),
|
||||
channel_count(0),
|
||||
bits_per_channel(0),
|
||||
samples_per_second(0),
|
||||
extra_data(NULL),
|
||||
extra_data_size(0) {}
|
||||
|
||||
AudioCodec codec;
|
||||
int32_t channel_count;
|
||||
int32_t bits_per_channel;
|
||||
int32_t samples_per_second;
|
||||
|
||||
// Optional byte data required to initialize audio decoders, such as the
|
||||
// vorbis setup header.
|
||||
uint8_t* extra_data;
|
||||
int32_t extra_data_size;
|
||||
};
|
||||
|
||||
// Surface formats based on FOURCC labels, see: http://www.fourcc.org/yuv.php
|
||||
enum VideoFormat {
|
||||
kUnknownVideoFormat = 0, // Unknown format value. Used for error reporting.
|
||||
kYv12, // 12bpp YVU planar 1x1 Y, 2x2 VU samples.
|
||||
kI420 // 12bpp YVU planar 1x1 Y, 2x2 UV samples.
|
||||
};
|
||||
|
||||
struct Size {
|
||||
Size() : width(0), height(0) {}
|
||||
Size(int32_t width, int32_t height) : width(width), height(height) {}
|
||||
|
||||
int32_t width;
|
||||
int32_t height;
|
||||
};
|
||||
|
||||
struct VideoDecoderConfig {
|
||||
enum VideoCodec {
|
||||
kUnknownVideoCodec = 0,
|
||||
kCodecVp8,
|
||||
kCodecH264
|
||||
};
|
||||
|
||||
enum VideoCodecProfile {
|
||||
kUnknownVideoCodecProfile = 0,
|
||||
kVp8ProfileMain,
|
||||
kH264ProfileBaseline,
|
||||
kH264ProfileMain,
|
||||
kH264ProfileExtended,
|
||||
kH264ProfileHigh,
|
||||
kH264ProfileHigh10,
|
||||
kH264ProfileHigh422,
|
||||
kH264ProfileHigh444Predictive
|
||||
};
|
||||
|
||||
VideoDecoderConfig()
|
||||
: codec(kUnknownVideoCodec),
|
||||
profile(kUnknownVideoCodecProfile),
|
||||
format(kUnknownVideoFormat),
|
||||
extra_data(NULL),
|
||||
extra_data_size(0) {}
|
||||
|
||||
VideoCodec codec;
|
||||
VideoCodecProfile profile;
|
||||
VideoFormat format;
|
||||
|
||||
// Width and height of video frame immediately post-decode. Not all pixels
|
||||
// in this region are valid.
|
||||
Size coded_size;
|
||||
|
||||
// Optional byte data required to initialize video decoders, such as H.264
|
||||
// AAVC data.
|
||||
uint8_t* extra_data;
|
||||
int32_t extra_data_size;
|
||||
};
|
||||
|
||||
enum StreamType {
|
||||
kStreamTypeAudio = 0,
|
||||
kStreamTypeVideo = 1
|
||||
};
|
||||
|
||||
// ContentDecryptionModule interface that all CDMs need to implement.
|
||||
// The interface is versioned for backward compatibility.
|
||||
// Note: ContentDecryptionModule implementations must use the allocator
|
||||
// provided in CreateCdmInstance() to allocate any Buffer that needs to
|
||||
// be passed back to the caller. Implementations must call Buffer::Destroy()
|
||||
// when a Buffer is created that will never be returned to the caller.
|
||||
class ContentDecryptionModule_1 {
|
||||
public:
|
||||
// Generates a |key_request| given |type| and |init_data|.
|
||||
//
|
||||
// Returns kSuccess if the key request was successfully generated, in which
|
||||
// case the CDM must send the key message by calling Host::SendKeyMessage().
|
||||
// Returns kSessionError if any error happened, in which case the CDM must
|
||||
// send a key error by calling Host::SendKeyError().
|
||||
virtual Status GenerateKeyRequest(
|
||||
const char* type, int type_size,
|
||||
const uint8_t* init_data, int init_data_size) = 0;
|
||||
|
||||
// Adds the |key| to the CDM to be associated with |key_id|.
|
||||
//
|
||||
// Returns kSuccess if the key was successfully added, kSessionError
|
||||
// otherwise.
|
||||
virtual Status AddKey(const char* session_id, int session_id_size,
|
||||
const uint8_t* key, int key_size,
|
||||
const uint8_t* key_id, int key_id_size) = 0;
|
||||
|
||||
// Cancels any pending key request made to the CDM for |session_id|.
|
||||
//
|
||||
// Returns kSuccess if all pending key requests for |session_id| were
|
||||
// successfully canceled or there was no key request to be canceled,
|
||||
// kSessionError otherwise.
|
||||
virtual Status CancelKeyRequest(
|
||||
const char* session_id, int session_id_size) = 0;
|
||||
|
||||
// Performs scheduled operation with |context| when the timer fires.
|
||||
virtual void TimerExpired(void* context) = 0;
|
||||
|
||||
// Decrypts the |encrypted_buffer|.
|
||||
//
|
||||
// Returns kSuccess if decryption succeeded, in which case the callee
|
||||
// should have filled the |decrypted_buffer| and passed the ownership of
|
||||
// |data| in |decrypted_buffer| to the caller.
|
||||
// Returns kNoKey if the CDM did not have the necessary decryption key
|
||||
// to decrypt.
|
||||
// Returns kDecryptError if any other error happened.
|
||||
// If the return value is not kSuccess, |decrypted_buffer| should be ignored
|
||||
// by the caller.
|
||||
virtual Status Decrypt(const InputBuffer& encrypted_buffer,
|
||||
DecryptedBlock* decrypted_buffer) = 0;
|
||||
|
||||
// Initializes the CDM audio decoder with |audio_decoder_config|.
|
||||
// This function is only needed if DecryptAndDecodeSamples() or
|
||||
// DecryptDecodeAndRenderSamples() is used. It must be called before either
|
||||
// of these routines is called.
|
||||
//
|
||||
// Returns kSuccess if the |audio_decoder_config| is supported and the CDM
|
||||
// audio decoder is successfully initialized.
|
||||
// Returns kSessionError if |audio_decoder_config| is not supported. The CDM
|
||||
// may still be able to do Decrypt().
|
||||
//
|
||||
virtual Status InitializeAudioDecoder(
|
||||
const AudioDecoderConfig& audio_decoder_config) = 0;
|
||||
|
||||
// Initializes the CDM video decoder with |video_decoder_config|.
|
||||
// This function is only needed if DecryptAndDecodeFrame() or
|
||||
// DecryptDecodeAndRenderFrame() is used. It must be called before either
|
||||
// of these routines is called.
|
||||
//
|
||||
// Returns kSuccess if the |video_decoder_config| is supported and the CDM
|
||||
// video decoder is successfully initialized.
|
||||
// Returns kSessionError if |video_decoder_config| is not supported. The CDM
|
||||
// may still be able to do Decrypt().
|
||||
//
|
||||
virtual Status InitializeVideoDecoder(
|
||||
const VideoDecoderConfig& video_decoder_config) = 0;
|
||||
|
||||
// De-initializes the CDM decoder and sets it to an uninitialized state. The
|
||||
// caller can initialize the decoder again after this call to re-initialize
|
||||
// it. This can be used to reconfigure the decoder if the configuration
|
||||
// changes.
|
||||
virtual void DeinitializeDecoder(StreamType decoder_type) = 0;
|
||||
|
||||
// Resets the CDM decoder to an initialized clean state. All internal buffers
|
||||
// MUST be flushed.
|
||||
virtual void ResetDecoder(StreamType decoder_type) = 0;
|
||||
|
||||
// Decrypts the |encrypted_buffer| and decodes the decrypted buffer into a
|
||||
// |video_frame|. Upon end-of-stream, the caller should call this function
|
||||
// repeatedly with empty |encrypted_buffer| (|data| == NULL) until only empty
|
||||
// |video_frame| (|format| == kEmptyVideoFrame) is produced.
|
||||
//
|
||||
// Returns kSuccess if decryption and decoding both succeeded, in which case
|
||||
// the callee will have filled the |video_frame| and passed the ownership of
|
||||
// |frame_buffer| in |video_frame| to the caller.
|
||||
// Returns kNoKey if the CDM did not have the necessary decryption key
|
||||
// to decrypt.
|
||||
// Returns kNeedMoreData if more data was needed by the decoder to generate
|
||||
// a decoded frame (e.g. during initialization and end-of-stream).
|
||||
// Returns kDecryptError if any decryption error happened.
|
||||
// Returns kDecodeError if any decoding error happened.
|
||||
// If the return value is not kSuccess, |video_frame| should be ignored by
|
||||
// the caller.
|
||||
virtual Status DecryptAndDecodeFrame(const InputBuffer& encrypted_buffer,
|
||||
VideoFrame* video_frame) = 0;
|
||||
|
||||
// Decrypts the |encrypted_buffer| and decodes the decrypted buffer into
|
||||
// |audio_frames|. Upon end-of-stream, the caller should call this function
|
||||
// repeatedly with empty |encrypted_buffer| (|data| == NULL) until only empty
|
||||
// |audio_frames| is produced.
|
||||
//
|
||||
// Returns kSuccess if decryption and decoding both succeeded, in which case
|
||||
// the callee will have filled |audio_frames| and passed the ownership of
|
||||
// |data| in |audio_frames| to the caller.
|
||||
// Returns kNoKey if the CDM did not have the necessary decryption key
|
||||
// to decrypt.
|
||||
// Returns kNeedMoreData if more data was needed by the decoder to generate
|
||||
// audio samples (e.g. during initialization and end-of-stream).
|
||||
// Returns kDecryptError if any decryption error happened.
|
||||
// Returns kDecodeError if any decoding error happened.
|
||||
// If the return value is not kSuccess, |audio_frames| should be ignored by
|
||||
// the caller.
|
||||
virtual Status DecryptAndDecodeSamples(const InputBuffer& encrypted_buffer,
|
||||
AudioFrames* audio_frames) = 0;
|
||||
|
||||
// Decrypts the |encrypted_buffer|, decodes the decrypted buffer into a
|
||||
// video frame, and passes the frame to the rendering FW/HW. No data
|
||||
// is returned.
|
||||
//
|
||||
// Returns kSuccess if decryption, decoding, and rendering all succeeded.
|
||||
// Returns kNoKey if the CDM did not have the necessary decryption key
|
||||
// to decrypt.
|
||||
// Returns kRetry if |encrypted_buffer| cannot be accepted (e.g, video
|
||||
// pipeline is full). Caller should retry after a short delay.
|
||||
// Returns kDecryptError if any decryption error happened.
|
||||
// Returns kDecodeError if any decoding error happened.
|
||||
// If the return value is not kSuccess, |video_frame| should be ignored by
|
||||
// the caller.
|
||||
virtual Status DecryptDecodeAndRenderFrame(
|
||||
const InputBuffer& encrypted_buffer) = 0;
|
||||
|
||||
// Decrypts the |encrypted_buffer|, decodes the decrypted buffer into
|
||||
// audio frames, and passes the samples to the rendering FW/HW. No
|
||||
// data is returned.
|
||||
//
|
||||
// Returns kSuccess if decryption, decoding, and rendering all succeeded.
|
||||
// Returns kNoKey if the CDM did not have the necessary decryption key
|
||||
// to decrypt.
|
||||
// Returns kRetry if |encrypted_buffer| cannot be accepted (e.g., audio
|
||||
// pipeline is full). Caller should retry after a short delay.
|
||||
// Returns kDecryptError if any decryption error happened.
|
||||
// Returns kDecodeError if any decoding error happened.
|
||||
// If the return value is not kSuccess or kRetry, the audiostream has failed
|
||||
// and should be reset.
|
||||
virtual Status DecryptDecodeAndRenderSamples(
|
||||
const InputBuffer& encrypted_buffer) = 0;
|
||||
|
||||
// Destroys the object in the same context as it was created.
|
||||
virtual void Destroy() = 0;
|
||||
|
||||
// Provisioning related methods
|
||||
virtual Status GetProvisioningRequest(
|
||||
std::string* request, std::string* default_url) = 0;
|
||||
|
||||
virtual cdm::Status HandleProvisioningResponse(
|
||||
std::string& response) = 0;
|
||||
|
||||
protected:
|
||||
ContentDecryptionModule_1() {}
|
||||
virtual ~ContentDecryptionModule_1() {}
|
||||
};
|
||||
|
||||
const int kWidevineCdmInterfaceVersion_1 = 1002;
|
||||
|
||||
typedef ContentDecryptionModule_1 ContentDecryptionModule;
|
||||
const int kCdmInterfaceVersion = kWidevineCdmInterfaceVersion_1;
|
||||
|
||||
// Represents a buffer created by Allocator implementations.
|
||||
class Buffer {
|
||||
public:
|
||||
// Destroys the buffer in the same context as it was created.
|
||||
virtual void Destroy() = 0;
|
||||
|
||||
virtual int32_t Capacity() const = 0;
|
||||
virtual uint8_t* Data() = 0;
|
||||
virtual void SetSize(int32_t size) = 0;
|
||||
virtual int32_t Size() const = 0;
|
||||
|
||||
protected:
|
||||
Buffer() {}
|
||||
virtual ~Buffer() {}
|
||||
|
||||
private:
|
||||
Buffer(const Buffer&);
|
||||
void operator=(const Buffer&);
|
||||
};
|
||||
|
||||
// Host interface that the CDM can call into to access browser side services.
|
||||
// Host interfaces are versioned for backward compatibility. CDM should use
|
||||
// HostFactory object to request a Host interface of a particular version.
|
||||
class Host_1 {
|
||||
public:
|
||||
// Returns a Buffer* containing non-zero members upon success, or NULL on
|
||||
// failure. The caller owns the Buffer* after this call. The buffer is not
|
||||
// guaranteed to be zero initialized. The capacity of the allocated Buffer
|
||||
// is guaranteed to be not less than |capacity|.
|
||||
virtual Buffer* Allocate(int32_t capacity) = 0;
|
||||
|
||||
// Requests the host to call ContentDecryptionModule::TimerExpired() in
|
||||
// |delay_ms| from now with |context|.
|
||||
virtual void SetTimer(int64_t delay_ms, void* context) = 0;
|
||||
|
||||
// Returns the current epoch wall time in seconds.
|
||||
virtual double GetCurrentWallTimeInSeconds() = 0;
|
||||
|
||||
// Sends a keymessage event to the application.
|
||||
// Length parameters should not include null termination.
|
||||
virtual void SendKeyMessage(
|
||||
const char* session_id, int32_t session_id_length,
|
||||
const char* message, int32_t message_length,
|
||||
const char* default_url, int32_t default_url_length) = 0;
|
||||
|
||||
// Sends a keyerror event to the application.
|
||||
// |session_id_length| should not include null termination.
|
||||
virtual void SendKeyError(const char* session_id,
|
||||
int32_t session_id_length,
|
||||
MediaKeyError error_code,
|
||||
uint32_t system_code) = 0;
|
||||
|
||||
// Get private data from the host. This function is limited to internal use.
|
||||
typedef const void* (*GetPrivateInterface)(const char* interface_name);
|
||||
virtual void GetPrivateData(int32_t* instance,
|
||||
GetPrivateInterface* get_interface) = 0;
|
||||
|
||||
//Version 1.3
|
||||
// These Virtual member functions extend the cdm::Host interface to allow
|
||||
// the sharing for platform specific information, between the cdm::Host and
|
||||
// the CDM.
|
||||
|
||||
virtual int GetPlatformString(const std::string& name,
|
||||
std::string* value) = 0;
|
||||
virtual int SetPlatformString(const std::string& name,
|
||||
const std::string& value) = 0;
|
||||
virtual int PersistPlatformString(const std::string& name,
|
||||
const std::string& value) = 0;
|
||||
virtual int GetPlatformByteArray(const std::string& name,
|
||||
std::vector<uint8_t>* value) = 0;
|
||||
virtual int SetPlatformByteArray(const std::string& name,
|
||||
const std::vector<uint8_t>& value) = 0;
|
||||
virtual int PersistPlatformByteArray(const std::string& name,
|
||||
const std::vector<uint8_t>& value) = 0;
|
||||
|
||||
protected:
|
||||
Host_1() {}
|
||||
virtual ~Host_1() {}
|
||||
};
|
||||
|
||||
const int kWidevineHostInterfaceVersion_1 = 1002;
|
||||
|
||||
typedef Host_1 Host;
|
||||
const int kHostInterfaceVersion = kWidevineHostInterfaceVersion_1;
|
||||
|
||||
// Represents a decrypted block that has not been decoded.
|
||||
class DecryptedBlock {
|
||||
public:
|
||||
virtual void SetDecryptedBuffer(Buffer* buffer) = 0;
|
||||
virtual Buffer* DecryptedBuffer() = 0;
|
||||
|
||||
virtual void SetTimestamp(int64_t timestamp) = 0;
|
||||
virtual int64_t Timestamp() const = 0;
|
||||
|
||||
protected:
|
||||
DecryptedBlock() {}
|
||||
virtual ~DecryptedBlock() {}
|
||||
};
|
||||
|
||||
class VideoFrame {
|
||||
public:
|
||||
enum VideoPlane {
|
||||
kYPlane = 0,
|
||||
kUPlane = 1,
|
||||
kVPlane = 2,
|
||||
kMaxPlanes = 3,
|
||||
};
|
||||
|
||||
virtual void SetFormat(VideoFormat format) = 0;
|
||||
virtual VideoFormat Format() const = 0;
|
||||
|
||||
virtual void SetSize(cdm::Size size) = 0;
|
||||
virtual cdm::Size Size() const = 0;
|
||||
|
||||
virtual void SetFrameBuffer(Buffer* frame_buffer) = 0;
|
||||
virtual Buffer* FrameBuffer() = 0;
|
||||
|
||||
virtual void SetPlaneOffset(VideoPlane plane, int32_t offset) = 0;
|
||||
virtual int32_t PlaneOffset(VideoPlane plane) = 0;
|
||||
|
||||
virtual void SetStride(VideoPlane plane, int32_t stride) = 0;
|
||||
virtual int32_t Stride(VideoPlane plane) = 0;
|
||||
|
||||
virtual void SetTimestamp(int64_t timestamp) = 0;
|
||||
virtual int64_t Timestamp() const = 0;
|
||||
|
||||
protected:
|
||||
VideoFrame() {}
|
||||
virtual ~VideoFrame() {}
|
||||
};
|
||||
|
||||
// Represents decrypted and decoded audio frames. AudioFrames can contain
|
||||
// multiple audio output buffers, which are serialized into this format:
|
||||
//
|
||||
// |<------------------- serialized audio buffer ------------------->|
|
||||
// | int64_t timestamp | int64_t length | length bytes of audio data |
|
||||
//
|
||||
// For example, with three audio output buffers, the AudioFrames will look
|
||||
// like this:
|
||||
//
|
||||
// |<----------------- AudioFrames ------------------>|
|
||||
// | audio buffer 0 | audio buffer 1 | audio buffer 2 |
|
||||
class AudioFrames {
|
||||
public:
|
||||
virtual void SetFrameBuffer(Buffer* buffer) = 0;
|
||||
virtual Buffer* FrameBuffer() = 0;
|
||||
|
||||
protected:
|
||||
AudioFrames() {}
|
||||
virtual ~AudioFrames() {}
|
||||
};
|
||||
|
||||
} // namespace cdm
|
||||
|
||||
#endif // WVCDM_CDM_CONTENT_DECRYPTION_MODULE_H_
|
||||
33
cdm/include/host_event_listener.h
Normal file
33
cdm/include/host_event_listener.h
Normal file
@@ -0,0 +1,33 @@
|
||||
// Copyright 2013 Google Inc. All Rights Reserved.
|
||||
|
||||
#ifndef WVCDM_CDM_HOST_EVENT_LISTENER_H_
|
||||
#define WVCDM_CDM_HOST_EVENT_LISTENER_H_
|
||||
|
||||
#include "cdm_engine.h"
|
||||
#include "content_decryption_module.h"
|
||||
#include "wv_cdm_common.h"
|
||||
#include "wv_cdm_event_listener.h"
|
||||
#include "wv_cdm_types.h"
|
||||
|
||||
namespace wvcdm {
|
||||
|
||||
class HostEventListener : public WvCdmEventListener {
|
||||
public:
|
||||
HostEventListener(cdm::Host* host, CdmEngine* cdm_engine)
|
||||
: host_(host), cdm_engine_(cdm_engine) {}
|
||||
virtual ~HostEventListener() {}
|
||||
|
||||
// wvcdm::WvCdmEventListener implementation.
|
||||
virtual void OnEvent(const CdmSessionId& session_id,
|
||||
CdmEventType cdm_event) OVERRIDE;
|
||||
|
||||
private:
|
||||
cdm::Host* const host_;
|
||||
CdmEngine* const cdm_engine_;
|
||||
|
||||
CORE_DISALLOW_COPY_AND_ASSIGN(HostEventListener);
|
||||
};
|
||||
|
||||
} // namespace wvcdm
|
||||
|
||||
#endif // WVCDM_CDM_HOST_EVENT_LISTENER_H_
|
||||
47
cdm/include/properties_configuration.h
Normal file
47
cdm/include/properties_configuration.h
Normal file
@@ -0,0 +1,47 @@
|
||||
// Copyright 2013 Google Inc. All Rights Reserved.
|
||||
|
||||
#ifndef WVCDM_CDM_PROPERTIES_CONFIGURATION_H_
|
||||
#define WVCDM_CDM_PROPERTIES_CONFIGURATION_H_
|
||||
|
||||
#include "wv_cdm_constants.h"
|
||||
#include "properties.h"
|
||||
|
||||
namespace wvcdm {
|
||||
|
||||
// If false begin license usage on first playback
|
||||
const bool kPropertyBeginLicenseUsageWhenReceived = false;
|
||||
|
||||
// If false, calls to Generate Key request, after the first one,
|
||||
// will result in a renewal request being generated
|
||||
const bool kPropertyRequireExplicitRenewRequest = false;
|
||||
|
||||
// Set only one of the three below to true. If secure buffer
|
||||
// is selected, fallback to userspace buffers may occur
|
||||
// if L1/L2 OEMCrypto APIs fail
|
||||
const bool kPropertyOemCryptoUseSecureBuffers = false;
|
||||
const bool kPropertyOemCryptoUseFifo = true;
|
||||
const bool kPropertyOemCryptoUseUserSpaceBuffers = true;
|
||||
|
||||
// If false, keyboxes will be used as client identification
|
||||
// and passed as the token in the license request.
|
||||
// The default value of false for PLATFORM_CERTIFICATE_PROV is set in
|
||||
// global_config.gypi. It can be overridden to true in the platform specific
|
||||
// .gypi files if you want your device to use certificates for provisioning.
|
||||
const bool kPropertyUseCertificatesAsIdentification = PLATFORM_CERTIFICATE_PROV;
|
||||
|
||||
// If false, extraction of widevine PSSH information from the PSSH box
|
||||
// takes place external to the CDM. This will become the default behaviour
|
||||
// once all platforms support it.
|
||||
const bool kExtractPsshData = true;
|
||||
|
||||
// If true, session_id parameter to CdmEngine::Decrypt can be empty; the
|
||||
// function will try to find out the session_id from the key_id.
|
||||
const bool kDecryptWithEmptySessionSupport = true;
|
||||
|
||||
// If true, device files will be moved to the directory specified by
|
||||
// Properties::GetDeviceFilesBasePath
|
||||
const bool kSecurityLevelPathBackwardCompatibilitySupport = false;
|
||||
|
||||
} // namespace wvcdm
|
||||
|
||||
#endif // WVCDM_CDM_PROPERTIES_CONFIGURATION_H_
|
||||
12
cdm/include/wv_cdm_common.h
Normal file
12
cdm/include/wv_cdm_common.h
Normal file
@@ -0,0 +1,12 @@
|
||||
// Copyright 2013 Google Inc. All Rights Reserved.
|
||||
|
||||
#ifndef WVCDM_CDM_WV_CDM_COMMON_H_
|
||||
#define WVCDM_CDM_WV_CDM_COMMON_H_
|
||||
|
||||
#if defined(COMPILER_MSVC) || defined(__clang__)
|
||||
#define OVERRIDE override
|
||||
#else
|
||||
#define OVERRIDE
|
||||
#endif
|
||||
|
||||
#endif // WVCDM_CDM_WV_CDM_COMMON_H_
|
||||
3
cdm/include/wv_cdm_version.h
Normal file
3
cdm/include/wv_cdm_version.h
Normal file
@@ -0,0 +1,3 @@
|
||||
// Widevine CDM Kit Version
|
||||
#define WV_CDM_VERSION "v2.0.8-0-679"
|
||||
|
||||
162
cdm/include/wv_content_decryption_module.h
Normal file
162
cdm/include/wv_content_decryption_module.h
Normal file
@@ -0,0 +1,162 @@
|
||||
// Copyright 2013 Google Inc. All Rights Reserved.
|
||||
|
||||
#ifndef WVCDM_CDM_WV_CONTENT_DECRYPTION_MODULE_H_
|
||||
#define WVCDM_CDM_WV_CONTENT_DECRYPTION_MODULE_H_
|
||||
|
||||
#include "cdm_client_property_set.h"
|
||||
#include "cdm_engine.h"
|
||||
#include "cdm_host_clock.h"
|
||||
#include "cdm_host_file.h"
|
||||
|
||||
#include "clock.h"
|
||||
#include "content_decryption_module.h"
|
||||
#include "host_event_listener.h"
|
||||
|
||||
#include "wv_cdm_common.h"
|
||||
#include "wv_cdm_types.h"
|
||||
|
||||
namespace wvcdm {
|
||||
|
||||
class WVClientPropertySet : public wvcdm::CdmClientPropertySet {
|
||||
public:
|
||||
WVClientPropertySet()
|
||||
: use_privacy_mode_(false) {}
|
||||
|
||||
virtual ~WVClientPropertySet() {}
|
||||
|
||||
void set_security_level(const std::string& securityLevel) {
|
||||
security_level_ = securityLevel;
|
||||
}
|
||||
|
||||
virtual std::string security_level() const {
|
||||
return security_level_;
|
||||
}
|
||||
|
||||
void set_use_privacy_mode(bool usePrivacyMode) {
|
||||
use_privacy_mode_ = usePrivacyMode;
|
||||
}
|
||||
|
||||
virtual bool use_privacy_mode() const {
|
||||
return use_privacy_mode_;
|
||||
}
|
||||
|
||||
void set_service_certificate(const std::vector<uint8_t>& serviceCertificate) {
|
||||
service_certificate_ = serviceCertificate;
|
||||
}
|
||||
|
||||
virtual std::vector<uint8_t> service_certificate() const {
|
||||
return service_certificate_;
|
||||
}
|
||||
|
||||
virtual bool is_session_sharing_enabled() const {
|
||||
return true; // This is unused by common cdm but we need a definition
|
||||
// for the pure virtual methods.
|
||||
}
|
||||
|
||||
void set_is_session_sharing_enabled(bool shareKeys) {
|
||||
return; // This is unused by common cdm but we need a definition
|
||||
// for the pure virtual methods.
|
||||
}
|
||||
|
||||
virtual uint32_t session_sharing_id() const {
|
||||
return 1; // This is unused by common cdm but we need a
|
||||
// definition for the pure virtual methods.
|
||||
}
|
||||
|
||||
virtual void set_session_sharing_id(uint32_t id) {
|
||||
return; // This is unused by common cdm but we need a
|
||||
// definition for the pure virtual methods.
|
||||
}
|
||||
private:
|
||||
CORE_DISALLOW_COPY_AND_ASSIGN(WVClientPropertySet);
|
||||
|
||||
std::string security_level_;
|
||||
bool use_privacy_mode_;
|
||||
std::vector<uint8_t> service_certificate_;
|
||||
};
|
||||
|
||||
class WvContentDecryptionModule : public cdm::ContentDecryptionModule,
|
||||
public IFileFactory,
|
||||
public IClock {
|
||||
File::Impl* NewFileImpl() { return new File::Impl(host_); }
|
||||
public:
|
||||
explicit WvContentDecryptionModule(cdm::Host* host)
|
||||
: host_(host), host_event_listener_(host, &cdm_engine_) {
|
||||
File::Impl::RegisterFileFactory(this);
|
||||
HostClock::SetClockInterface(this);
|
||||
}
|
||||
virtual ~WvContentDecryptionModule();
|
||||
// cdm::ContentDecryptionModule implementation.
|
||||
virtual cdm::Status GenerateKeyRequest(const char* type, int type_size,
|
||||
const uint8_t* init_data,
|
||||
int init_data_size) OVERRIDE;
|
||||
|
||||
virtual cdm::Status AddKey(const char* session_id, int session_id_size,
|
||||
const uint8_t* key, int key_size,
|
||||
const uint8_t* key_id, int key_id_size) OVERRIDE;
|
||||
|
||||
virtual cdm::Status CancelKeyRequest(const char* session_id,
|
||||
int session_id_size) OVERRIDE;
|
||||
|
||||
virtual void TimerExpired(void* context) OVERRIDE;
|
||||
|
||||
virtual cdm::Status Decrypt(const cdm::InputBuffer& encrypted_buffer,
|
||||
cdm::DecryptedBlock* decrypted_buffer) OVERRIDE;
|
||||
|
||||
virtual cdm::Status InitializeAudioDecoder(
|
||||
const cdm::AudioDecoderConfig& audio_decoder_config) OVERRIDE;
|
||||
|
||||
virtual cdm::Status InitializeVideoDecoder(
|
||||
const cdm::VideoDecoderConfig& video_decoder_config) OVERRIDE;
|
||||
|
||||
virtual void DeinitializeDecoder(cdm::StreamType decoder_type) OVERRIDE;
|
||||
|
||||
virtual void ResetDecoder(cdm::StreamType decoder_type) OVERRIDE;
|
||||
|
||||
virtual cdm::Status DecryptAndDecodeFrame(
|
||||
const cdm::InputBuffer& encrypted_buffer,
|
||||
cdm::VideoFrame* video_frame) OVERRIDE;
|
||||
|
||||
virtual cdm::Status DecryptAndDecodeSamples(
|
||||
const cdm::InputBuffer& encrypted_buffer,
|
||||
cdm::AudioFrames* audio_frames) OVERRIDE;
|
||||
|
||||
virtual cdm::Status DecryptDecodeAndRenderFrame(
|
||||
const cdm::InputBuffer& encrypted_buffer) OVERRIDE;
|
||||
|
||||
virtual cdm::Status DecryptDecodeAndRenderSamples(
|
||||
const cdm::InputBuffer& encrypted_buffer) OVERRIDE;
|
||||
|
||||
virtual void Destroy() OVERRIDE;
|
||||
|
||||
// Provisioning related methods
|
||||
virtual cdm::Status GetProvisioningRequest(
|
||||
std::string* request, std::string* default_url);
|
||||
|
||||
virtual cdm::Status HandleProvisioningResponse(
|
||||
std::string& response);
|
||||
|
||||
void EnablePolicyTimer();
|
||||
void DisablePolicyTimer();
|
||||
void OnTimerEvent();
|
||||
|
||||
private:
|
||||
virtual int64_t GetCurrentTimeInSeconds() {
|
||||
return host_->GetCurrentWallTimeInSeconds();
|
||||
}
|
||||
cdm::Status DoSubsampleDecrypt(CdmSessionId& session_id,
|
||||
CdmDecryptionParameters& parameters,
|
||||
std::vector<uint8_t>& iv,
|
||||
const cdm::InputBuffer& encrypted_buffer,
|
||||
cdm::DecryptedBlock* decrypted_block);
|
||||
CdmEngine cdm_engine_;
|
||||
cdm::Host* const host_;
|
||||
HostEventListener host_event_listener_;
|
||||
WVClientPropertySet property_set_;
|
||||
|
||||
CORE_DISALLOW_COPY_AND_ASSIGN(WvContentDecryptionModule);
|
||||
};
|
||||
|
||||
} // namespace wvcdm
|
||||
|
||||
#endif // WVCDM_CDM_WV_CONTENT_DECRYPTION_MODULE_H_
|
||||
24
cdm/src/clock.cpp
Normal file
24
cdm/src/clock.cpp
Normal file
@@ -0,0 +1,24 @@
|
||||
#include "clock.h"
|
||||
|
||||
#include <cstddef>
|
||||
|
||||
#include "cdm_host_clock.h"
|
||||
|
||||
namespace wvcdm {
|
||||
|
||||
IClock* HostClock::impl_ = NULL;
|
||||
|
||||
IClock::~IClock() {
|
||||
HostClock::impl_ = NULL;
|
||||
}
|
||||
|
||||
int64_t Clock::GetCurrentTime() {
|
||||
return HostClock::impl_ ?
|
||||
HostClock::impl_->GetCurrentTimeInSeconds() : -1;
|
||||
}
|
||||
|
||||
void HostClock::SetClockInterface(IClock* iclock) {
|
||||
HostClock::impl_ = iclock;
|
||||
}
|
||||
|
||||
} // namespace wvcdm
|
||||
146
cdm/src/file_store.cpp
Normal file
146
cdm/src/file_store.cpp
Normal file
@@ -0,0 +1,146 @@
|
||||
// Copyright 2013 Google Inc. All Rights Reserved.
|
||||
|
||||
#include <string.h>
|
||||
#include <string>
|
||||
#include "cdm_host_file.h"
|
||||
|
||||
namespace wvcdm {
|
||||
|
||||
IFileFactory* File::Impl::factory_ = NULL;
|
||||
|
||||
// File::Impl() Section
|
||||
// The file handler for cert.bin, aka DeviceCertificate is all we're
|
||||
// setting up for now.
|
||||
|
||||
bool File::Impl::Exists(const std::string& name) {
|
||||
if (name == "cert.bin") {
|
||||
std::vector<uint8_t> value;
|
||||
if (host_->GetPlatformByteArray("DeviceCertificate", &value)) {
|
||||
return true;
|
||||
}
|
||||
}
|
||||
return false;
|
||||
}
|
||||
|
||||
bool File::Impl::Open(const std::string& name) {
|
||||
if (name == "cert.bin") {
|
||||
fname_= name;
|
||||
return true;
|
||||
}
|
||||
return false;
|
||||
}
|
||||
|
||||
bool File::Impl::Close() {
|
||||
fname_ = "";
|
||||
return true;
|
||||
}
|
||||
|
||||
bool File::Impl::Remove(const std::string& name) {
|
||||
if (Exists(name)) {
|
||||
std::vector<uint8_t> value(0);
|
||||
if (host_->SetPlatformByteArray("DeviceCertificate", value)) {
|
||||
return true;
|
||||
}
|
||||
}
|
||||
return false;
|
||||
}
|
||||
|
||||
size_t File::Impl::Read(char* buffer, size_t bytes) {
|
||||
if (fname_ == "cert.bin") {
|
||||
std::vector<uint8_t> value;
|
||||
if (host_->GetPlatformByteArray("DeviceCertificate", &value)) {
|
||||
memcpy(buffer, &value[0], bytes);
|
||||
return bytes;
|
||||
}
|
||||
}
|
||||
return 0;
|
||||
}
|
||||
|
||||
size_t File::Impl::Write(const char* buffer, size_t bytes) {
|
||||
if (fname_ == "cert.bin") {
|
||||
std::vector<uint8_t> value;
|
||||
value.resize(bytes);
|
||||
memcpy(&value[0], buffer, bytes);
|
||||
if (host_->PersistPlatformByteArray("DeviceCertificate", value)) {
|
||||
return bytes;
|
||||
}
|
||||
}
|
||||
return 0;
|
||||
}
|
||||
|
||||
size_t File::Impl::FileSize(const std::string& name) {
|
||||
if (name == "cert.bin") {
|
||||
std::vector<uint8_t> value;
|
||||
if (host_->GetPlatformByteArray("DeviceCertificate", &value)) {
|
||||
return value.size();
|
||||
}
|
||||
}
|
||||
return 0;
|
||||
}
|
||||
|
||||
File::File() : impl_(File::Impl::factory_->NewFileImpl()) {}
|
||||
|
||||
File::~File() {
|
||||
Close();
|
||||
delete impl_;
|
||||
}
|
||||
|
||||
bool File::Open(const std::string& name, int flags) {
|
||||
return impl_->Open(name);
|
||||
}
|
||||
|
||||
void File::Close() {
|
||||
impl_->Close();
|
||||
return;
|
||||
}
|
||||
|
||||
ssize_t File::Read(char* buffer, size_t bytes) {
|
||||
return impl_->Read(buffer, bytes);
|
||||
}
|
||||
|
||||
ssize_t File::Write(const char* buffer, size_t bytes) {
|
||||
return impl_->Write(buffer, bytes);
|
||||
}
|
||||
|
||||
bool File::Exists(const std::string& path) {
|
||||
return impl_->Exists(path);
|
||||
}
|
||||
|
||||
bool File::Remove(const std::string& path) {
|
||||
return impl_->Remove(path);
|
||||
}
|
||||
|
||||
bool File::Copy(const std::string& from, const std::string& to) {
|
||||
// Required for linkage only - no current API implementation in the partner CDM is required.
|
||||
return false;
|
||||
}
|
||||
|
||||
bool File::List(const std::string& path, std::vector<std::string>* files) {
|
||||
// Required for linkage only - no current API implementation in the partner CDM is required.
|
||||
return false;
|
||||
}
|
||||
|
||||
bool File::CreateDirectory(std::string path) {
|
||||
// Required for linkage only - no current API implementation in the partner CDM is required.
|
||||
return true;
|
||||
}
|
||||
|
||||
bool File::IsDirectory(const std::string& path) {
|
||||
// Required for linkage only - no current API implementation in the partner CDM is required.
|
||||
return false;
|
||||
}
|
||||
|
||||
bool File::IsRegularFile(const std::string& path) {
|
||||
// Required for linkage only - no current API implementation in the partner CDM is required.
|
||||
return false;
|
||||
}
|
||||
|
||||
ssize_t File::FileSize(const std::string& path) {
|
||||
size_t size = impl_->FileSize(path);
|
||||
if (size > 0) {
|
||||
return size;
|
||||
}
|
||||
return -1;
|
||||
}
|
||||
|
||||
} // namespace wvcdm
|
||||
38
cdm/src/host_event_listener.cpp
Normal file
38
cdm/src/host_event_listener.cpp
Normal file
@@ -0,0 +1,38 @@
|
||||
// Copyright 2013 Google Inc. All Rights Reserved.
|
||||
|
||||
#include "host_event_listener.h"
|
||||
|
||||
#include "log.h"
|
||||
#include "wv_cdm_constants.h"
|
||||
#include "wv_cdm_types.h"
|
||||
|
||||
namespace wvcdm {
|
||||
|
||||
void HostEventListener::OnEvent(const CdmSessionId& session_id,
|
||||
CdmEventType cdm_event) {
|
||||
switch (cdm_event) {
|
||||
case LICENSE_RENEWAL_NEEDED_EVENT: {
|
||||
wvcdm::CdmKeyMessage cdm_message;
|
||||
std::string server_url;
|
||||
CdmResponseType result = cdm_engine_->GenerateRenewalRequest(
|
||||
session_id, &cdm_message, &server_url);
|
||||
if (result == wvcdm::KEY_MESSAGE) {
|
||||
host_->SendKeyMessage(session_id.data(), session_id.length(),
|
||||
cdm_message.data(), cdm_message.length(),
|
||||
server_url.data(), server_url.length());
|
||||
} else {
|
||||
LOGD("Error on Generating a Renewal Request!");
|
||||
host_->SendKeyError(session_id.data(), session_id.size(),
|
||||
cdm::kUnknownError, 0);
|
||||
}
|
||||
break;
|
||||
}
|
||||
case LICENSE_EXPIRED_EVENT: {
|
||||
host_->SendKeyError(session_id.data(), session_id.size(),
|
||||
cdm::kUnknownError, 0);
|
||||
break;
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
} // namespace wvcdm
|
||||
95
cdm/src/properties_common.cpp
Normal file
95
cdm/src/properties_common.cpp
Normal file
@@ -0,0 +1,95 @@
|
||||
// Copyright 2013 Google Inc. All Rights Reserved.
|
||||
|
||||
#include "properties.h"
|
||||
|
||||
#include <string>
|
||||
#include <sys/utsname.h>
|
||||
|
||||
#include "log.h"
|
||||
|
||||
namespace wvcdm {
|
||||
|
||||
bool Properties::GetCompanyName(std::string* company_name) {
|
||||
if (!company_name) {
|
||||
LOGW("Properties::GetCompanyName: Invalid parameter");
|
||||
return false;
|
||||
}
|
||||
*company_name = PLATFORM_COMPANY_NAME_WV;
|
||||
|
||||
return true;
|
||||
}
|
||||
|
||||
bool Properties::GetModelName(std::string* model_name) {
|
||||
if (!model_name) {
|
||||
LOGW("Properties::GetModelName: Invalid parameter");
|
||||
return false;
|
||||
}
|
||||
*model_name = PLATFORM_MODEL_NAME_WV;
|
||||
return true;
|
||||
|
||||
}
|
||||
|
||||
bool Properties::GetArchitectureName(std::string* arch_name) {
|
||||
if (!arch_name) {
|
||||
LOGW("Properties::GetArchitectureName: Invalid parameter");
|
||||
return false;
|
||||
}
|
||||
*arch_name = PLATFORM_ARCHITECTURE_NAME_WV;
|
||||
return true;
|
||||
|
||||
}
|
||||
|
||||
bool Properties::GetDeviceName(std::string* device_name) {
|
||||
if (!device_name) {
|
||||
LOGW("Properties::GetDeviceName: Invalid parameter");
|
||||
return false;
|
||||
}
|
||||
*device_name = PLATFORM_DEVICE_NAME_WV;
|
||||
return true;
|
||||
|
||||
}
|
||||
|
||||
bool Properties::GetProductName(std::string* product_name) {
|
||||
if (!product_name) {
|
||||
LOGW("Properties::GetProductName: Invalid parameter");
|
||||
return false;
|
||||
}
|
||||
*product_name = PLATFORM_PRODUCT_NAME_WV;
|
||||
return true;
|
||||
|
||||
}
|
||||
|
||||
bool Properties::GetBuildInfo(std::string* build_info) {
|
||||
if (!build_info) {
|
||||
LOGW("Properties::GetBuildInfo: Invalid parameter");
|
||||
return false;
|
||||
}
|
||||
*build_info = PLATFORM_BUILDINFO_WV;
|
||||
return true;
|
||||
|
||||
}
|
||||
|
||||
bool Properties::GetDeviceFilesBasePath(CdmSecurityLevel security_level,
|
||||
std::string* base_path) {
|
||||
// no-op
|
||||
return true;
|
||||
}
|
||||
|
||||
bool Properties::GetFactoryKeyboxPath(std::string* keybox) {
|
||||
if (!keybox) {
|
||||
LOGW("Properties::GetFactoryKeyboxPath: Invalid parameter");
|
||||
return false;
|
||||
}
|
||||
return true;
|
||||
}
|
||||
|
||||
bool Properties::GetOEMCryptoPath(std::string* library_name) {
|
||||
if (!library_name) {
|
||||
LOGW("Properties::GetOEMCryptoPath: Invalid parameter");
|
||||
return false;
|
||||
}
|
||||
*library_name = "out/Default/lib.target/liboemcrypto.so";
|
||||
return true;
|
||||
}
|
||||
|
||||
} // namespace wvcdm
|
||||
76
cdm/src/timer.cpp
Normal file
76
cdm/src/timer.cpp
Normal file
@@ -0,0 +1,76 @@
|
||||
// Copyright 2013 Google Inc. All Rights Reserved.
|
||||
//
|
||||
// Timer class - provides a simple timer implementation
|
||||
//
|
||||
#include "cdm_host_timer.h"
|
||||
#include "scoped_ptr.h"
|
||||
#include "timer.h"
|
||||
|
||||
#include <errno.h>
|
||||
#include <pthread.h>
|
||||
#include <stdio.h>
|
||||
#include <time.h>
|
||||
#include <unistd.h>
|
||||
|
||||
namespace wvcdm {
|
||||
|
||||
ITimerFactory* Timer::Impl::factory_ = NULL;
|
||||
|
||||
Timer::Impl::Impl(cdm::Host* const host)
|
||||
: host_(host), handler_(NULL), delay_ms_(0),
|
||||
state_(kIdle) {
|
||||
}
|
||||
|
||||
void Timer::Impl::RegisterTimerFactory(ITimerFactory* factory) {
|
||||
factory_ = factory;
|
||||
}
|
||||
|
||||
void Timer::Impl::Start(TimerHandler* handler, uint32_t time_in_secs) {
|
||||
handler_ = handler;
|
||||
delay_ms_ = time_in_secs * 1000;
|
||||
state_ = kRunning;
|
||||
host_->SetTimer(delay_ms_, this);
|
||||
}
|
||||
|
||||
void Timer::Impl::OnTimerEvent() {
|
||||
if (kRunning == state_) {
|
||||
handler_->OnTimerEvent();
|
||||
host_->SetTimer(delay_ms_, this);
|
||||
}
|
||||
}
|
||||
|
||||
void Timer::Impl::Stop() {
|
||||
state_ = kIdle;
|
||||
}
|
||||
|
||||
Timer::Timer() : impl_(NULL) {}
|
||||
|
||||
Timer::~Timer() {
|
||||
if (impl_)
|
||||
delete impl_;
|
||||
}
|
||||
|
||||
bool Timer::Start(TimerHandler* handler, uint32_t time_in_secs) {
|
||||
if (!handler || 0 == time_in_secs)
|
||||
return false;
|
||||
if (!impl_ && Impl::factory_)
|
||||
impl_ = Impl::factory_->NewTimerImpl();
|
||||
if(!impl_)
|
||||
return false;
|
||||
|
||||
impl_->Start(handler, time_in_secs);
|
||||
return IsRunning();
|
||||
}
|
||||
|
||||
void Timer::Stop() {
|
||||
if (impl_)
|
||||
impl_->Stop();
|
||||
}
|
||||
|
||||
bool Timer::IsRunning() {
|
||||
if (!impl_)
|
||||
return false;
|
||||
return impl_->IsRunning();
|
||||
}
|
||||
|
||||
} // namespace wvcdm
|
||||
410
cdm/src/wv_content_decryption_module.cpp
Normal file
410
cdm/src/wv_content_decryption_module.cpp
Normal file
@@ -0,0 +1,410 @@
|
||||
// Copyright 2013 Google Inc. All Rights Reserved.
|
||||
|
||||
#include "wv_content_decryption_module.h"
|
||||
|
||||
#include <iostream>
|
||||
#include <string.h>
|
||||
|
||||
#include "cdm_client_property_set.h"
|
||||
#include "content_decryption_module.h"
|
||||
|
||||
#include "log.h"
|
||||
#include "OEMCryptoCENC.h"
|
||||
#include "properties.h"
|
||||
|
||||
#include "wv_cdm_constants.h"
|
||||
#include "wv_cdm_types.h"
|
||||
#include "wv_cdm_version.h"
|
||||
|
||||
void INITIALIZE_CDM_MODULE() {}
|
||||
|
||||
void DeinitializeCdmModule() {}
|
||||
|
||||
void* CreateCdmInstance(int cdm_interface_version, const char* key_system,
|
||||
int key_system_size, GetCdmHostFunc get_cdm_host_func,
|
||||
void* user_data) {
|
||||
if (cdm_interface_version != cdm::kCdmInterfaceVersion) return NULL;
|
||||
|
||||
cdm::Host* host = static_cast<cdm::Host*>(
|
||||
get_cdm_host_func(cdm::kHostInterfaceVersion, user_data));
|
||||
|
||||
if (!host) return NULL;
|
||||
|
||||
return static_cast<cdm::ContentDecryptionModule*>(
|
||||
new wvcdm::WvContentDecryptionModule(host));
|
||||
}
|
||||
|
||||
int GetCdmVersion() { return cdm::kCdmInterfaceVersion; }
|
||||
|
||||
namespace {
|
||||
static const std::string kWvCdmVersionString(WV_CDM_VERSION);
|
||||
|
||||
const int kCdmPolicyTimerDurationSeconds = 1;
|
||||
const int kCdmPolicyTimerCancel = 0;
|
||||
|
||||
// The iso spec only uses the lower 8 bytes of the iv as
|
||||
// the counter.
|
||||
const uint32_t kCencIvSize = 8;
|
||||
const uint32_t kIvSize = 16;
|
||||
|
||||
bool Ctr128Add(size_t block_count, uint8_t* counter) {
|
||||
if (NULL == counter)
|
||||
return false;
|
||||
if (0 == block_count)
|
||||
return true;
|
||||
uint8_t carry = 0;
|
||||
uint8_t n = kIvSize - 1;
|
||||
while (n >= kCencIvSize) {
|
||||
uint32_t temp = block_count & 0xff;
|
||||
temp += counter[n];
|
||||
temp += carry;
|
||||
counter[n] = temp & 0xff;
|
||||
carry = (temp & 0x100) ? 1 : 0;
|
||||
block_count = block_count >> 8;
|
||||
n--;
|
||||
if (!block_count && !carry) {
|
||||
break;
|
||||
}
|
||||
}
|
||||
return true;
|
||||
}
|
||||
} // namespace
|
||||
|
||||
namespace wvcdm {
|
||||
|
||||
// An empty iv string signals that the frame is unencrypted.
|
||||
bool IsBufferEncrypted(const cdm::InputBuffer& input_buffer) {
|
||||
return input_buffer.iv_size != 0;
|
||||
}
|
||||
|
||||
// cdm::ContentDecryptionModule implementation.
|
||||
|
||||
WvContentDecryptionModule::~WvContentDecryptionModule() {
|
||||
DisablePolicyTimer();
|
||||
}
|
||||
|
||||
cdm::Status WvContentDecryptionModule::GenerateKeyRequest(
|
||||
const char* type, int type_size, const uint8_t* init_data,
|
||||
int init_data_size) {
|
||||
LOGI("Enter WvContentDecryptionModule::GenerateKeyRequest()");
|
||||
CdmInitData init_data_internal(reinterpret_cast<const char*>(init_data),
|
||||
init_data_size);
|
||||
CdmKeyMessage key_request;
|
||||
CdmSessionId session_id;
|
||||
|
||||
std::string security_level;
|
||||
std::string privacy_mode;
|
||||
kVectorBytes service_certificate;
|
||||
|
||||
host_->GetPlatformString("SecurityLevel", &security_level);
|
||||
host_->GetPlatformString("PrivacyOn", &privacy_mode);
|
||||
host_->GetPlatformByteArray("ServiceCertificate", &service_certificate);
|
||||
|
||||
property_set_.set_security_level(security_level);
|
||||
property_set_.set_use_privacy_mode(privacy_mode == "True" ? 1 : 0 );
|
||||
property_set_.set_service_certificate(service_certificate);
|
||||
|
||||
CdmResponseType result =
|
||||
cdm_engine_.OpenSession("com.widevine.alpha", &property_set_, &session_id);
|
||||
|
||||
if (NEED_PROVISIONING == result) {
|
||||
LOGI("Need to aquire a Device Certificate from the Provisioning Server");
|
||||
return cdm::kNeedsDeviceCertificate;
|
||||
}
|
||||
|
||||
if (NO_ERROR != result) return cdm::kSessionError;
|
||||
|
||||
if (!cdm_engine_.AttachEventListener(session_id, &host_event_listener_)) {
|
||||
cdm_engine_.CloseSession(session_id);
|
||||
return cdm::kSessionError;
|
||||
}
|
||||
|
||||
CdmAppParameterMap app_parameters; // empty
|
||||
CdmKeySetId key_set_id; // empty
|
||||
std::string server_url;
|
||||
|
||||
result = cdm_engine_.GenerateKeyRequest(
|
||||
session_id, key_set_id, init_data_internal, kLicenseTypeStreaming,
|
||||
app_parameters, &key_request, &server_url);
|
||||
if (KEY_MESSAGE != result) {
|
||||
cdm_engine_.CloseSession(session_id);
|
||||
return cdm::kSessionError;
|
||||
}
|
||||
|
||||
host_->SendKeyMessage(session_id.data(), session_id.length(),
|
||||
key_request.data(), key_request.length(),
|
||||
server_url.data(), server_url.length());
|
||||
|
||||
return cdm::kSuccess;
|
||||
}
|
||||
|
||||
cdm::Status WvContentDecryptionModule::AddKey(const char* session_id,
|
||||
int session_id_size,
|
||||
const uint8_t* key, int key_size,
|
||||
const uint8_t* key_id,
|
||||
int key_id_size) {
|
||||
LOGI("Enter WvContentDecryptionModule::AddKey()\n");
|
||||
CdmSessionId session_id_internal(session_id, session_id_size);
|
||||
CdmKeyResponse key_data((const char*)key, key_size);
|
||||
CdmKeySetId key_set_id;
|
||||
|
||||
CdmResponseType response = cdm_engine_.AddKey(session_id_internal,
|
||||
key_data, &key_set_id);
|
||||
|
||||
if (response == KEY_ADDED) {
|
||||
EnablePolicyTimer();
|
||||
return cdm::kSuccess;
|
||||
} else {
|
||||
return cdm::kSessionError;
|
||||
}
|
||||
|
||||
}
|
||||
|
||||
cdm::Status WvContentDecryptionModule::CancelKeyRequest(const char* session_id,
|
||||
int session_id_size) {
|
||||
LOGI("Enter WvContentDecryptionModule::CancelKeyRequest()\n");
|
||||
CdmSessionId session_id_internal(session_id, session_id_size);
|
||||
return cdm_engine_.CancelKeyRequest(session_id_internal) == NO_ERROR
|
||||
? cdm::kSuccess
|
||||
: cdm::kSessionError;
|
||||
}
|
||||
|
||||
void WvContentDecryptionModule::TimerExpired(void* context) {
|
||||
LOGI("Timer expired, send cdm_engine OnTimerEvent");
|
||||
if (this != context) {
|
||||
LOGD("Context should have been set, Timer Expired Error\n");
|
||||
return;
|
||||
}
|
||||
OnTimerEvent();
|
||||
}
|
||||
|
||||
cdm::Status WvContentDecryptionModule::Decrypt(
|
||||
const cdm::InputBuffer& encrypted_buffer,
|
||||
cdm::DecryptedBlock* decrypted_block) {
|
||||
LOGI("=>Enter WvContentDecryptionModule::Decrypt()\n");
|
||||
if (encrypted_buffer.iv_size != KEY_IV_SIZE)
|
||||
return cdm::kDecryptError;
|
||||
std::vector < uint8_t > iv(KEY_IV_SIZE);
|
||||
memcpy(&iv[0], encrypted_buffer.iv, encrypted_buffer.iv_size);
|
||||
|
||||
KeyId key_id(reinterpret_cast<const char*>(encrypted_buffer.key_id),
|
||||
encrypted_buffer.key_id_size);
|
||||
|
||||
CdmSessionId session_id; // it's empty but cdm_engine will locate via key_id?
|
||||
|
||||
if (NULL == encrypted_buffer.subsamples
|
||||
|| encrypted_buffer.num_subsamples <= 0)
|
||||
return cdm::kDecryptError;
|
||||
|
||||
CdmDecryptionParameters parameters(&key_id,
|
||||
encrypted_buffer.data, 0, &iv, 0,
|
||||
NULL);
|
||||
parameters.is_secure = false;
|
||||
return DoSubsampleDecrypt(session_id,
|
||||
parameters,
|
||||
iv,
|
||||
encrypted_buffer,
|
||||
decrypted_block);
|
||||
}
|
||||
|
||||
cdm::Status WvContentDecryptionModule::InitializeAudioDecoder(
|
||||
const cdm::AudioDecoderConfig& audio_decoder_config) {
|
||||
LOGI("WvContentDecryptionModule::InitializeAudioDecoder() Not implemented\n");
|
||||
return cdm::kDecodeError;
|
||||
}
|
||||
|
||||
cdm::Status WvContentDecryptionModule::InitializeVideoDecoder(
|
||||
const cdm::VideoDecoderConfig& video_decoder_config) {
|
||||
LOGI("WvContentDecryptionModule::InitializeVideoDecoder() Not implemented\n");
|
||||
return cdm::kDecodeError;
|
||||
}
|
||||
|
||||
void WvContentDecryptionModule::DeinitializeDecoder(
|
||||
cdm::StreamType decoder_type) {
|
||||
LOGI("WvContentDecryptionModule::DeInitializeDecoder() Not implemented\n");
|
||||
}
|
||||
|
||||
void WvContentDecryptionModule::ResetDecoder(cdm::StreamType decoder_type) {
|
||||
LOGI("WvContentDecryptionModule::ResetDecoder() Not implemented\n");
|
||||
}
|
||||
|
||||
cdm::Status WvContentDecryptionModule::DecryptAndDecodeFrame(
|
||||
const cdm::InputBuffer& encrypted_buffer, cdm::VideoFrame* video_frame) {
|
||||
LOGI("WvContentDecryptionModule::DecryptAndDecodeFrame() Not implemented\n");
|
||||
return cdm::kDecodeError;
|
||||
}
|
||||
|
||||
cdm::Status WvContentDecryptionModule::DecryptAndDecodeSamples(
|
||||
const cdm::InputBuffer& encrypted_buffer, cdm::AudioFrames* audio_frames) {
|
||||
LOGI(
|
||||
"WvContentDecryptionModule::DecryptAndDecodeSamples() Not implemented\n");
|
||||
return cdm::kDecodeError;
|
||||
}
|
||||
|
||||
// This is the Level 1 API. When the host application calls the CDM's
|
||||
// DecryptDecodeAndRenderFrame(), rather than the CDM's Decrypt(),
|
||||
// OEMCrypto_DecryptCTR() will be told to use direct rendering with no
|
||||
// cleartext in the return.
|
||||
cdm::Status WvContentDecryptionModule::DecryptDecodeAndRenderFrame(
|
||||
const cdm::InputBuffer& encrypted_buffer) {
|
||||
LOGI("WvContentDecryptionModule::DecryptDecodeAndRenderFrame()\n");
|
||||
|
||||
if (encrypted_buffer.iv_size != KEY_IV_SIZE) return cdm::kDecryptError;
|
||||
|
||||
std::vector<uint8_t> iv(KEY_IV_SIZE);
|
||||
memcpy(&iv[0], encrypted_buffer.iv, encrypted_buffer.iv_size);
|
||||
KeyId key_id(reinterpret_cast<const char*>(encrypted_buffer.key_id),
|
||||
encrypted_buffer.key_id_size);
|
||||
CdmSessionId session_id; // it's empty but cdm_engine will locate via key_id.
|
||||
|
||||
if (NULL == encrypted_buffer.subsamples
|
||||
|| encrypted_buffer.num_subsamples <= 0)
|
||||
return cdm::kDecryptError;
|
||||
|
||||
CdmDecryptionParameters parameters(&key_id, encrypted_buffer.data, 0, &iv, 0,
|
||||
NULL);
|
||||
return DoSubsampleDecrypt(session_id, parameters, iv, encrypted_buffer,
|
||||
NULL);
|
||||
}
|
||||
|
||||
// This is the Level 1 API. When the host application calls the CDM's
|
||||
// DecryptDecodeAndRenderSamples(), rather than the CDM's Decrypt(),
|
||||
// OEMCrypto_DecryptCTR() will be told to use direct rendering with no cleartext
|
||||
// in the return.
|
||||
cdm::Status WvContentDecryptionModule::DecryptDecodeAndRenderSamples(
|
||||
const cdm::InputBuffer& encrypted_buffer) {
|
||||
LOGI("WvContentDecryptionModule::DecryptDecodeAndRenderSamples()\n");
|
||||
|
||||
if (encrypted_buffer.iv_size != KEY_IV_SIZE) return cdm::kDecryptError;
|
||||
|
||||
std::vector<uint8_t> iv(KEY_IV_SIZE);
|
||||
memcpy(&iv[0], encrypted_buffer.iv, encrypted_buffer.iv_size);
|
||||
KeyId key_id(reinterpret_cast<const char*>(encrypted_buffer.key_id),
|
||||
encrypted_buffer.key_id_size);
|
||||
CdmSessionId session_id; // it's empty but cdm_engine will locate via key_id.
|
||||
|
||||
if (NULL == encrypted_buffer.subsamples ||
|
||||
encrypted_buffer.num_subsamples <= 0)
|
||||
return cdm::kDecryptError;
|
||||
|
||||
CdmDecryptionParameters parameters(&key_id, encrypted_buffer.data, 0, &iv, 0,
|
||||
NULL);
|
||||
parameters.is_video = false; // override the default true value for audio.
|
||||
return DoSubsampleDecrypt(session_id, parameters, iv, encrypted_buffer,
|
||||
NULL);
|
||||
}
|
||||
|
||||
void WvContentDecryptionModule::Destroy() { delete this; }
|
||||
|
||||
// Provisioning related methods
|
||||
cdm::Status WvContentDecryptionModule::GetProvisioningRequest(
|
||||
std::string* request, std::string* provisioning_server_url) {
|
||||
if (cdm_engine_.GetProvisioningRequest(
|
||||
static_cast<CdmProvisioningRequest*>(request),
|
||||
provisioning_server_url) == NO_ERROR) {
|
||||
return cdm::kSuccess;
|
||||
}
|
||||
return cdm::kSessionError;
|
||||
}
|
||||
|
||||
cdm::Status WvContentDecryptionModule::HandleProvisioningResponse(
|
||||
std::string& response) {
|
||||
if (cdm_engine_.HandleProvisioningResponse(
|
||||
static_cast<CdmProvisioningRequest&>(response)) == NO_ERROR) {
|
||||
return cdm::kSuccess;
|
||||
}
|
||||
return cdm::kSessionError;
|
||||
}
|
||||
|
||||
void WvContentDecryptionModule::EnablePolicyTimer() {
|
||||
LOGI("WvContentDecryptionModule::EnablePolicyTimer()\n");
|
||||
host_->SetTimer(kCdmPolicyTimerDurationSeconds * 1000, this);
|
||||
}
|
||||
|
||||
void WvContentDecryptionModule::DisablePolicyTimer() {
|
||||
LOGI("WvContentDecryptionModule::DisablePolicyTimer()\n");
|
||||
host_->SetTimer(kCdmPolicyTimerCancel, NULL);
|
||||
}
|
||||
|
||||
void WvContentDecryptionModule::OnTimerEvent() {
|
||||
|
||||
LOGI("WvContentDecryptionModule::OnTimerEvent()\n");
|
||||
cdm_engine_.OnTimerEvent();
|
||||
}
|
||||
|
||||
cdm::Status WvContentDecryptionModule::DoSubsampleDecrypt(
|
||||
CdmSessionId& session_id,
|
||||
CdmDecryptionParameters& parameters,
|
||||
std::vector < uint8_t >& iv,
|
||||
const cdm::InputBuffer& encrypted_buffer,
|
||||
cdm::DecryptedBlock* decrypted_block) {
|
||||
|
||||
/* This routine assumes session_id and iv have already
|
||||
been initialized by the caller and encrypted_buffer contains subsample
|
||||
information. Also, parameters is expected to be pre-initialized with any
|
||||
needed parameters not related to subsample parsing.
|
||||
decrypted_block may be NULL. */
|
||||
CdmResponseType status = NO_ERROR;
|
||||
uint8_t* output_buffer = decrypted_block
|
||||
? reinterpret_cast<uint8_t*>(
|
||||
decrypted_block->DecryptedBuffer()->Data())
|
||||
: NULL;
|
||||
size_t offset = 0;
|
||||
size_t encrypted_offset = 0;
|
||||
uint32_t block_ctr = 0;
|
||||
const cdm::SubsampleEntry *subsamples = encrypted_buffer.subsamples;
|
||||
bool first = true;
|
||||
|
||||
for (int i = 0; i < encrypted_buffer.num_subsamples; ++i) {
|
||||
const cdm::SubsampleEntry& subsample = subsamples[i];
|
||||
|
||||
for (int is_encrypted = 0; is_encrypted < 2; ++is_encrypted) {
|
||||
size_t bytes =
|
||||
is_encrypted ? subsample.cipher_bytes : subsample.clear_bytes;
|
||||
if (0 == bytes)
|
||||
continue;
|
||||
if (is_encrypted) {
|
||||
uint32_t counter = encrypted_offset / kIvSize;
|
||||
::Ctr128Add(counter - block_ctr, &iv[0]);
|
||||
block_ctr = counter;
|
||||
}
|
||||
|
||||
parameters.encrypt_buffer = &encrypted_buffer.data[encrypted_buffer
|
||||
.data_offset + offset];
|
||||
if (output_buffer)
|
||||
parameters.decrypt_buffer = &output_buffer[offset];
|
||||
|
||||
parameters.encrypt_length = bytes;
|
||||
parameters.decrypt_buffer_length = encrypted_buffer.data_size - offset;
|
||||
parameters.block_offset = encrypted_offset % kIvSize;
|
||||
|
||||
offset += bytes;
|
||||
if (is_encrypted)
|
||||
encrypted_offset += bytes;
|
||||
|
||||
parameters.is_encrypted = is_encrypted;
|
||||
parameters.subsample_flags =
|
||||
(true == first) ? OEMCrypto_FirstSubsample : 0;
|
||||
parameters.subsample_flags |= (
|
||||
offset == encrypted_buffer.data_size ? OEMCrypto_LastSubsample : 0);
|
||||
|
||||
first = false;
|
||||
|
||||
status = cdm_engine_.Decrypt(session_id, parameters);
|
||||
|
||||
switch (status) {
|
||||
case wvcdm::NEED_KEY:
|
||||
return cdm::kNoKey;
|
||||
break;
|
||||
case wvcdm::NO_ERROR:
|
||||
break;
|
||||
default:
|
||||
return cdm::kDecryptError;
|
||||
break;
|
||||
}
|
||||
}
|
||||
}
|
||||
return cdm::kSuccess;
|
||||
}
|
||||
|
||||
} // namespace wvcdm
|
||||
1595
cdm/test/cdm_api_test.cpp
Normal file
1595
cdm/test/cdm_api_test.cpp
Normal file
File diff suppressed because it is too large
Load Diff
31
cdm/test/gmock.gyp
Normal file
31
cdm/test/gmock.gyp
Normal file
@@ -0,0 +1,31 @@
|
||||
# Copyright 2013 Google Inc. All Rights Reserved.
|
||||
{
|
||||
'target_defaults': {
|
||||
'type': 'static_library',
|
||||
'include_dirs': [
|
||||
'../../third_party/gmock',
|
||||
'../../third_party/gmock/include',
|
||||
'../../third_party/gmock/gtest/include',
|
||||
],
|
||||
'direct_dependent_settings': {
|
||||
'include_dirs': [
|
||||
'../../third_party/gmock/include',
|
||||
'../../third_party/gmock/gtest/include',
|
||||
],
|
||||
},
|
||||
},
|
||||
'targets': [
|
||||
{
|
||||
'target_name': 'gmock',
|
||||
'sources': [
|
||||
'../../third_party/gmock/src/gmock-all.cc',
|
||||
],
|
||||
},
|
||||
{
|
||||
'target_name': 'gmock_main',
|
||||
'sources': [
|
||||
'../../third_party/gmock/src/gmock_main.cc',
|
||||
],
|
||||
},
|
||||
],
|
||||
}
|
||||
16
cdm/test/gtest.gyp
Normal file
16
cdm/test/gtest.gyp
Normal file
@@ -0,0 +1,16 @@
|
||||
# Copyright 2013 Google Inc. All Rights Reserved.
|
||||
{
|
||||
'targets': [
|
||||
{
|
||||
'target_name': 'gtest',
|
||||
'type': 'static_library',
|
||||
'include_dirs': [
|
||||
'../../third_party/gmock/gtest',
|
||||
'../../third_party/gmock/gtest/include',
|
||||
],
|
||||
'sources': [
|
||||
'../../third_party/gmock/gtest/src/gtest-all.cc',
|
||||
],
|
||||
},
|
||||
],
|
||||
}
|
||||
Reference in New Issue
Block a user