// Copyright 2013 Google Inc. All Rights Reserved. #ifndef WVCDM_CDM_PROPERTIES_CONFIGURATION_H_ #define WVCDM_CDM_PROPERTIES_CONFIGURATION_H_ #include "wv_cdm_constants.h" #include "properties.h" namespace wvcdm { // If false begin license usage on first playback const bool kPropertyBeginLicenseUsageWhenReceived = false; // If false, calls to Generate Key request, after the first one, // will result in a renewal request being generated const bool kPropertyRequireExplicitRenewRequest = false; // Set only one of the three below to true. If secure buffer // is selected, fallback to userspace buffers may occur // if L1/L2 OEMCrypto APIs fail const bool kPropertyOemCryptoUseSecureBuffers = false; const bool kPropertyOemCryptoUseFifo = true; const bool kPropertyOemCryptoUseUserSpaceBuffers = true; // If false, keyboxes will be used as client identification // and passed as the token in the license request. // The default value of false for PLATFORM_CERTIFICATE_PROV is set in // global_config.gypi. It can be overridden to true in the platform specific // .gypi files if you want your device to use certificates for provisioning. const bool kPropertyUseCertificatesAsIdentification = PLATFORM_CERTIFICATE_PROV; // If false, extraction of widevine PSSH information from the PSSH box // takes place external to the CDM. This will become the default behaviour // once all platforms support it. const bool kExtractPsshData = true; // If true, session_id parameter to CdmEngine::Decrypt can be empty; the // function will try to find out the session_id from the key_id. const bool kDecryptWithEmptySessionSupport = true; // If true, device files will be moved to the directory specified by // Properties::GetDeviceFilesBasePath const bool kSecurityLevelPathBackwardCompatibilitySupport = false; } // namespace wvcdm #endif // WVCDM_CDM_PROPERTIES_CONFIGURATION_H_