Correct a file path for media_cas_packager_sdk_files.
Currently getting Kokoro error ERROR: /var/lib/jenkins/workspace/Media_CAS_Packager_SDK/BUILD:13:1: no such package 'media_cas_packager_sdk/example': BUILD file not found on package path and referenced by '//:media_cas_packager_sdk_files'. Example: [] ------------- Created by MOE: https://github.com/google/moe MOE_MIGRATED_REVID=217577606
This commit is contained in:
BIN
example/simulcrypt_client
Normal file
BIN
example/simulcrypt_client
Normal file
Binary file not shown.
80
example/simulcrypt_client.cc
Normal file
80
example/simulcrypt_client.cc
Normal file
@@ -0,0 +1,80 @@
|
|||||||
|
////////////////////////////////////////////////////////////////////////////////
|
||||||
|
// Copyright 2018 Google LLC.
|
||||||
|
//
|
||||||
|
// This software is licensed under the terms defined in the Widevine Master
|
||||||
|
// License Agreement. For a copy of this agreement, please contact
|
||||||
|
// widevine-licensing@google.com.
|
||||||
|
////////////////////////////////////////////////////////////////////////////////
|
||||||
|
|
||||||
|
// Example client that talks to server_main.
|
||||||
|
|
||||||
|
#include <errno.h>
|
||||||
|
#include <netdb.h>
|
||||||
|
#include <netinet/in.h>
|
||||||
|
#include <stdio.h>
|
||||||
|
#include <stdlib.h>
|
||||||
|
#include <string.h>
|
||||||
|
#include <sys/socket.h>
|
||||||
|
#include <sys/types.h>
|
||||||
|
#include <unistd.h>
|
||||||
|
|
||||||
|
#include "gflags/gflags.h"
|
||||||
|
#include "glog/logging.h"
|
||||||
|
|
||||||
|
DEFINE_string(server, "", "Server host name");
|
||||||
|
DEFINE_int32(port, 0, "Server port number");
|
||||||
|
|
||||||
|
constexpr uint32_t kBufferSize = 256;
|
||||||
|
|
||||||
|
int main(int argc, char **argv) {
|
||||||
|
gflags::ParseCommandLineFlags(&argc, &argv, true);
|
||||||
|
CHECK(!FLAGS_server.empty()) << "need --server";
|
||||||
|
CHECK(FLAGS_port != 0) << "need --port";
|
||||||
|
|
||||||
|
struct hostent server;
|
||||||
|
{
|
||||||
|
int buflen = 1024;
|
||||||
|
char buf[1024];
|
||||||
|
struct hostent *result;
|
||||||
|
int h_errnop;
|
||||||
|
gethostbyname_r(/* __name= */ FLAGS_server.c_str(),
|
||||||
|
/* __result_buf= */ &server, /* __buf= */ buf,
|
||||||
|
/* __buflen= */ buflen,
|
||||||
|
/* __result= */ &result, /* __h_errnop= */ &h_errnop);
|
||||||
|
}
|
||||||
|
|
||||||
|
struct sockaddr_in server_addr;
|
||||||
|
bzero(reinterpret_cast<char *>(&server_addr), sizeof(server_addr));
|
||||||
|
server_addr.sin_family = AF_INET;
|
||||||
|
// TODO(user): Consider using inet_pton() to populate server_addr.sin_addr.
|
||||||
|
bcopy(server.h_addr, reinterpret_cast<char *>(&server_addr.sin_addr.s_addr),
|
||||||
|
server.h_length);
|
||||||
|
server_addr.sin_port = htons(FLAGS_port);
|
||||||
|
|
||||||
|
int socket_fd = socket(AF_INET, SOCK_STREAM, /* protocol= */ 0);
|
||||||
|
CHECK(socket_fd >= 0) << "failed to opening socket";
|
||||||
|
CHECK(connect(socket_fd, (struct sockaddr *)&server_addr,
|
||||||
|
sizeof(server_addr)) >= 0)
|
||||||
|
<< "failed to connect to socket";
|
||||||
|
|
||||||
|
printf("Please enter the message: ");
|
||||||
|
char buffer[kBufferSize];
|
||||||
|
bzero(buffer, kBufferSize);
|
||||||
|
fgets(buffer, kBufferSize - 1, stdin);
|
||||||
|
int total_bytes_written = 0;
|
||||||
|
while (total_bytes_written != strlen(buffer)) {
|
||||||
|
int num_bytes_written = write(socket_fd, buffer, strlen(buffer));
|
||||||
|
if (num_bytes_written < 0) {
|
||||||
|
LOG(FATAL) << "ERROR writing to socket: " << strerror(errno);
|
||||||
|
}
|
||||||
|
total_bytes_written += num_bytes_written;
|
||||||
|
}
|
||||||
|
bzero(buffer, kBufferSize);
|
||||||
|
if (read(socket_fd, buffer, kBufferSize - 1) < 0) {
|
||||||
|
LOG(FATAL) << "ERROR reading from socket: " << strerror(errno);
|
||||||
|
}
|
||||||
|
printf("Read from buffer: %s\n", buffer);
|
||||||
|
|
||||||
|
close(socket_fd);
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
166
example/test_simulcrypt_messages.h
Normal file
166
example/test_simulcrypt_messages.h
Normal file
@@ -0,0 +1,166 @@
|
|||||||
|
////////////////////////////////////////////////////////////////////////////////
|
||||||
|
// Copyright 2018 Google LLC.
|
||||||
|
//
|
||||||
|
// This software is licensed under the terms defined in the Widevine Master
|
||||||
|
// License Agreement. For a copy of this agreement, please contact
|
||||||
|
// widevine-licensing@google.com.
|
||||||
|
////////////////////////////////////////////////////////////////////////////////
|
||||||
|
|
||||||
|
// Example Simulcrypt messages used in unit tests and example client.
|
||||||
|
|
||||||
|
#ifndef MEDIA_CAS_PACKAGER_SDK_EXAMPLE_TEST_SIMULCRYPT_MESSAGES_H_
|
||||||
|
#define MEDIA_CAS_PACKAGER_SDK_EXAMPLE_TEST_SIMULCRYPT_MESSAGES_H_
|
||||||
|
|
||||||
|
namespace widevine {
|
||||||
|
namespace cas {
|
||||||
|
|
||||||
|
const char kTestEcmgStreamSetupMessage[] = { // protocol_version
|
||||||
|
'\x01',
|
||||||
|
// message_type - Stream_set-up
|
||||||
|
'\x01', '\x01',
|
||||||
|
// message_length
|
||||||
|
// 18 bytes below, 3 parameters 6 bytes each
|
||||||
|
'\x00', '\x12',
|
||||||
|
// parameter_type - ECM_channel_id
|
||||||
|
'\x00', '\x0e',
|
||||||
|
// parameter_length
|
||||||
|
'\x00', '\x02',
|
||||||
|
// parameter_value
|
||||||
|
'\x00', '\x01',
|
||||||
|
// parameter_type - ECM_stream_id
|
||||||
|
'\x00', '\x0f',
|
||||||
|
// parameter_length
|
||||||
|
'\x00', '\x02',
|
||||||
|
// parameter_value
|
||||||
|
'\x00', '\x02',
|
||||||
|
// parameter_type - nominal_CP_duration
|
||||||
|
'\x00', '\x10',
|
||||||
|
// parameter_length
|
||||||
|
'\x00', '\x02',
|
||||||
|
// parameter_value
|
||||||
|
'\x00', '\x03'};
|
||||||
|
|
||||||
|
const char kTestEcmgCwProvisionMessageWithOneCw[] = {
|
||||||
|
// protocol_version
|
||||||
|
'\x01',
|
||||||
|
// message_type - CW_provision
|
||||||
|
'\x02', '\x01',
|
||||||
|
// message_length
|
||||||
|
// 64 bytes below, 3 * 6 + 8 + 10 + 1 * 22 + 6
|
||||||
|
'\x00', '\x40',
|
||||||
|
// parameter_type - ECM_channel_id
|
||||||
|
'\x00', '\x0e',
|
||||||
|
// parameter_length
|
||||||
|
'\x00', '\x02',
|
||||||
|
// parameter_value
|
||||||
|
'\x00', '\x01',
|
||||||
|
// parameter_type - ECM_stream_id
|
||||||
|
'\x00', '\x0f',
|
||||||
|
// parameter_length
|
||||||
|
'\x00', '\x02',
|
||||||
|
// parameter_value
|
||||||
|
'\x00', '\x02',
|
||||||
|
// parameter_type - CP_number
|
||||||
|
'\x00', '\x12',
|
||||||
|
// parameter_length
|
||||||
|
'\x00', '\x02',
|
||||||
|
// parameter_value
|
||||||
|
'\x00', '\xa1',
|
||||||
|
// parameter_type - access_criteria
|
||||||
|
'\x00', '\x0d',
|
||||||
|
// parameter_length
|
||||||
|
'\x00', '\x04',
|
||||||
|
// parameter_value
|
||||||
|
'\x00', '\x00', '\x00', '\x00',
|
||||||
|
// parameter_type - CW_encryption
|
||||||
|
'\x00', '\x18',
|
||||||
|
// parameter_length
|
||||||
|
'\x00', '\x06',
|
||||||
|
// parameter_value
|
||||||
|
'\x00', '\x00', '\x00', '\x00', '\x00', '\x00',
|
||||||
|
// parameter_type - CP_CW_combination
|
||||||
|
'\x00', '\x14',
|
||||||
|
// parameter_length - 2 + 16
|
||||||
|
'\x00', '\x12',
|
||||||
|
// parameter_value - CP then CW
|
||||||
|
// CP
|
||||||
|
'\x00', '\xa1',
|
||||||
|
// CW (16 bytes)
|
||||||
|
'\x11', '\x11', '\x11', '\x11', '\x11', '\x11', '\x11', '\x11', '\x11',
|
||||||
|
'\x11', '\x11', '\x11', '\x11', '\x11', '\x11', '\x11',
|
||||||
|
// parameter_type - CP_duration
|
||||||
|
'\x00', '\x13',
|
||||||
|
// parameter_length
|
||||||
|
'\x00', '\x02',
|
||||||
|
// parameter_value
|
||||||
|
'\x00', '\x0a'};
|
||||||
|
|
||||||
|
const char kTestEcmgCwProvisionMessageWithTwoCw[] = {
|
||||||
|
// protocol_version
|
||||||
|
'\x01',
|
||||||
|
// message_type - CW_provision
|
||||||
|
'\x02', '\x01',
|
||||||
|
// message_length
|
||||||
|
// 86 bytes below, 3 * 6 + 8 + 10 + 2 * 22 + 6
|
||||||
|
'\x00', '\x56',
|
||||||
|
// parameter_type - ECM_channel_id
|
||||||
|
'\x00', '\x0e',
|
||||||
|
// parameter_length
|
||||||
|
'\x00', '\x02',
|
||||||
|
// parameter_value
|
||||||
|
'\x00', '\x01',
|
||||||
|
// parameter_type - ECM_stream_id
|
||||||
|
'\x00', '\x0f',
|
||||||
|
// parameter_length
|
||||||
|
'\x00', '\x02',
|
||||||
|
// parameter_value
|
||||||
|
'\x00', '\x02',
|
||||||
|
// parameter_type - CP_number
|
||||||
|
'\x00', '\x12',
|
||||||
|
// parameter_length
|
||||||
|
'\x00', '\x02',
|
||||||
|
// parameter_value
|
||||||
|
'\x00', '\xa1',
|
||||||
|
// parameter_type - access_criteria
|
||||||
|
'\x00', '\x0d',
|
||||||
|
// parameter_length
|
||||||
|
'\x00', '\x04',
|
||||||
|
// parameter_value
|
||||||
|
'\x00', '\x00', '\x00', '\x00',
|
||||||
|
// parameter_type - CW_encryption
|
||||||
|
'\x00', '\x18',
|
||||||
|
// parameter_length
|
||||||
|
'\x00', '\x06',
|
||||||
|
// parameter_value
|
||||||
|
'\x00', '\x00', '\x00', '\x00', '\x00', '\x00',
|
||||||
|
// parameter_type - CP_CW_combination
|
||||||
|
'\x00', '\x14',
|
||||||
|
// parameter_length - 2 + 16
|
||||||
|
'\x00', '\x12',
|
||||||
|
// parameter_value - CP then CW
|
||||||
|
// CP
|
||||||
|
'\x00', '\xa1',
|
||||||
|
// CW (16 bytes)
|
||||||
|
'\x11', '\x11', '\x11', '\x11', '\x11', '\x11', '\x11', '\x11', '\x11',
|
||||||
|
'\x11', '\x11', '\x11', '\x11', '\x11', '\x11', '\x11',
|
||||||
|
// parameter_type - CP_CW_combination
|
||||||
|
'\x00', '\x14',
|
||||||
|
// parameter_length - 2 + 16
|
||||||
|
'\x00', '\x12',
|
||||||
|
// parameter_value - CP then CW
|
||||||
|
// CP
|
||||||
|
'\x00', '\xa2',
|
||||||
|
// CW (16 bytes)
|
||||||
|
'\x22', '\x22', '\x22', '\x22', '\x22', '\x22', '\x22', '\x22', '\x22',
|
||||||
|
'\x22', '\x22', '\x22', '\x22', '\x22', '\x22', '\x22',
|
||||||
|
// parameter_type - CP_duration
|
||||||
|
'\x00', '\x13',
|
||||||
|
// parameter_length
|
||||||
|
'\x00', '\x02',
|
||||||
|
// parameter_value
|
||||||
|
'\x00', '\x0a'};
|
||||||
|
|
||||||
|
} // namespace cas
|
||||||
|
} // namespace widevine
|
||||||
|
|
||||||
|
#endif // MEDIA_CAS_PACKAGER_SDK_EXAMPLE_TEST_SIMULCRYPT_MESSAGES_H_
|
||||||
Binary file not shown.
@@ -1,95 +0,0 @@
|
|||||||
////////////////////////////////////////////////////////////////////////////////
|
|
||||||
// Copyright 2018 Google LLC.
|
|
||||||
//
|
|
||||||
// This software is licensed under the terms defined in the Widevine Master
|
|
||||||
// License Agreement. For a copy of this agreement, please contact
|
|
||||||
// widevine-licensing@google.com.
|
|
||||||
////////////////////////////////////////////////////////////////////////////////
|
|
||||||
|
|
||||||
#ifndef MEDIA_CAS_PACKAGER_SDK_PUBLIC_ECM_GENERATOR_H_
|
|
||||||
#define MEDIA_CAS_PACKAGER_SDK_PUBLIC_ECM_GENERATOR_H_
|
|
||||||
|
|
||||||
#include <stddef.h>
|
|
||||||
#include <memory>
|
|
||||||
#include <string>
|
|
||||||
#include <utility>
|
|
||||||
#include <vector>
|
|
||||||
|
|
||||||
#include <cstdint>
|
|
||||||
#include "util/status.h"
|
|
||||||
#include "media_cas_packager_sdk/internal/ecm.h"
|
|
||||||
|
|
||||||
namespace widevine {
|
|
||||||
namespace cas {
|
|
||||||
|
|
||||||
// KeyParameters carries key information for a single encryption key.
|
|
||||||
// Instances of this struct are owned by an EcmParameters struct.
|
|
||||||
struct KeyParameters {
|
|
||||||
std::string key_id;
|
|
||||||
std::string key_data;
|
|
||||||
std::string wrapped_key_data;
|
|
||||||
std::string wrapped_key_iv;
|
|
||||||
std::vector<std::string> content_ivs;
|
|
||||||
};
|
|
||||||
|
|
||||||
// EcmParameters holds information that is needed by the EcmGenerator. It is
|
|
||||||
// partially set up with data from a KeyGenerator (obtained via GenerateKey()).
|
|
||||||
// IVs are added later.
|
|
||||||
// TODO(user): may need a starting crypto period index.
|
|
||||||
struct EcmParameters {
|
|
||||||
static constexpr int kDefaultIVSize = 8;
|
|
||||||
int iv_size = kDefaultIVSize;
|
|
||||||
bool current_key_even = true;
|
|
||||||
uint32_t current_key_index = 0;
|
|
||||||
std::string entitlement_key_id;
|
|
||||||
bool rotation_enabled = true;
|
|
||||||
uint32_t rotation_periods;
|
|
||||||
std::vector<KeyParameters> key_params;
|
|
||||||
uint16_t program_id;
|
|
||||||
uint64_t rotation_period_microseconds;
|
|
||||||
// For video, this is zero. For audio, this is the size of the audio frame,
|
|
||||||
// which is a constant in the audio track.
|
|
||||||
uint16_t offset = 0;
|
|
||||||
};
|
|
||||||
|
|
||||||
// ECM Generator for Widevine/MediaCAS entitled keys.
|
|
||||||
class CasEcmGenerator {
|
|
||||||
public:
|
|
||||||
CasEcmGenerator() = default;
|
|
||||||
virtual ~CasEcmGenerator() = default;
|
|
||||||
|
|
||||||
virtual std::string GenerateEcm(const EcmParameters& params);
|
|
||||||
|
|
||||||
// Query the state of this ECM Generator
|
|
||||||
bool initialized() { return initialized_; }
|
|
||||||
bool rotation_enabled() { return rotation_enabled_; }
|
|
||||||
|
|
||||||
void set_ecm(std::unique_ptr<CasEcm> ecm) { ecm_ = std::move(ecm); }
|
|
||||||
|
|
||||||
private:
|
|
||||||
friend class CasEcmGeneratorTest;
|
|
||||||
|
|
||||||
util::Status ProcessEcmParameters(const EcmParameters& ecm_params,
|
|
||||||
std::vector<EntitledKeyInfo>* keys);
|
|
||||||
|
|
||||||
util::Status ProcessEcmParameters(const EcmParameters& ecm_params);
|
|
||||||
util::Status ValidateKeyId(const std::string& id);
|
|
||||||
util::Status ValidateKeyData(const std::string& key_data);
|
|
||||||
util::Status ValidateWrappedKeyIv(const std::string& iv);
|
|
||||||
util::Status ValidateIv(const std::string& iv, size_t required_size);
|
|
||||||
util::Status ValidateContentIv(const std::string& iv);
|
|
||||||
util::Status ValidateKeyParameters(const KeyParameters& key_params);
|
|
||||||
|
|
||||||
bool initialized_ = false;
|
|
||||||
uint32_t generation_ = 0;
|
|
||||||
bool rotation_enabled_ = false;
|
|
||||||
uint32_t current_key_index_ = 0;
|
|
||||||
bool current_key_even_ = true;
|
|
||||||
uint32_t content_iv_size_ = 0;
|
|
||||||
std::unique_ptr<CasEcm> ecm_;
|
|
||||||
};
|
|
||||||
|
|
||||||
} // namespace cas
|
|
||||||
} // namespace widevine
|
|
||||||
|
|
||||||
#endif // MEDIA_CAS_PACKAGER_SDK_PUBLIC_ECM_GENERATOR_H_
|
|
||||||
BIN
media_cas_packager_sdk/public/simulcrypt_server
Normal file
BIN
media_cas_packager_sdk/public/simulcrypt_server
Normal file
Binary file not shown.
84
media_cas_packager_sdk/public/simulcrypt_server.cc
Normal file
84
media_cas_packager_sdk/public/simulcrypt_server.cc
Normal file
@@ -0,0 +1,84 @@
|
|||||||
|
////////////////////////////////////////////////////////////////////////////////
|
||||||
|
// Copyright 2018 Google LLC.
|
||||||
|
//
|
||||||
|
// This software is licensed under the terms defined in the Widevine Master
|
||||||
|
// License Agreement. For a copy of this agreement, please contact
|
||||||
|
// widevine-licensing@google.com.
|
||||||
|
////////////////////////////////////////////////////////////////////////////////
|
||||||
|
|
||||||
|
// Example server that listens on a port for Simulcrypt API messages.
|
||||||
|
|
||||||
|
#include <errno.h>
|
||||||
|
#include <netinet/in.h>
|
||||||
|
#include <stdio.h>
|
||||||
|
#include <stdlib.h>
|
||||||
|
#include <string.h>
|
||||||
|
#include <sys/socket.h>
|
||||||
|
#include <sys/types.h>
|
||||||
|
#include <unistd.h>
|
||||||
|
#include <iostream>
|
||||||
|
|
||||||
|
#include "gflags/gflags.h"
|
||||||
|
#include "glog/logging.h"
|
||||||
|
|
||||||
|
DEFINE_int32(port, 0, "Server port number");
|
||||||
|
|
||||||
|
constexpr uint32_t kBufferSize = 256;
|
||||||
|
constexpr uint32_t kLicenseBacklog = 5;
|
||||||
|
constexpr uint32_t kWriteChunkSize = 18;
|
||||||
|
|
||||||
|
int main(int argc, char **argv) {
|
||||||
|
gflags::ParseCommandLineFlags(&argc, &argv, true);
|
||||||
|
CHECK(FLAGS_port != 0) << "need --port";
|
||||||
|
|
||||||
|
struct sockaddr_in server_address;
|
||||||
|
bzero(reinterpret_cast<char *>(&server_address), sizeof(server_address));
|
||||||
|
server_address.sin_family = AF_INET;
|
||||||
|
server_address.sin_addr.s_addr = htonl(INADDR_ANY);
|
||||||
|
server_address.sin_port = htons(FLAGS_port);
|
||||||
|
|
||||||
|
int listen_socket_fd = socket(AF_INET, SOCK_STREAM, /* protocol= */ 0);
|
||||||
|
CHECK(listen_socket_fd >= 0) << "failed to open socket";
|
||||||
|
CHECK(bind(listen_socket_fd, (struct sockaddr *)&server_address,
|
||||||
|
sizeof(server_address)) >= 0)
|
||||||
|
<< "error on binding";
|
||||||
|
std::cout << "Server listening ..." << std::endl << std::flush;
|
||||||
|
int return_val = listen(listen_socket_fd, kLicenseBacklog);
|
||||||
|
switch (return_val) {
|
||||||
|
case EADDRINUSE:
|
||||||
|
LOG(FATAL) << "Another socket is already listening on the same port.";
|
||||||
|
break;
|
||||||
|
case EBADF:
|
||||||
|
LOG(FATAL) << "The argument sockfd is not a valid descriptor.";
|
||||||
|
break;
|
||||||
|
case ENOTSOCK:
|
||||||
|
LOG(FATAL) << "The argument sockfd is not a socket.";
|
||||||
|
break;
|
||||||
|
case EOPNOTSUPP:
|
||||||
|
LOG(FATAL) << "The socket is not of a type that supports the listen() "
|
||||||
|
"operation.";
|
||||||
|
default:
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
|
||||||
|
struct sockaddr_in client_address;
|
||||||
|
socklen_t clilet_address_size = sizeof(client_address);
|
||||||
|
int client_socket_fd = accept(
|
||||||
|
listen_socket_fd, reinterpret_cast<struct sockaddr *>(&client_address),
|
||||||
|
&clilet_address_size);
|
||||||
|
CHECK(client_socket_fd >= 0) << "error on accept";
|
||||||
|
|
||||||
|
char buffer[kBufferSize];
|
||||||
|
bzero(buffer, kBufferSize);
|
||||||
|
if (read(client_socket_fd, buffer, kBufferSize - 1) < 0) {
|
||||||
|
LOG(FATAL) << "ERROR reading from socket";
|
||||||
|
}
|
||||||
|
printf("Here is the message: %s", buffer);
|
||||||
|
if (write(client_socket_fd, "I got your message", kWriteChunkSize) < 0) {
|
||||||
|
LOG(FATAL) << "ERROR writing to socket";
|
||||||
|
}
|
||||||
|
|
||||||
|
close(client_socket_fd);
|
||||||
|
close(listen_socket_fd);
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
Reference in New Issue
Block a user