------------- Moves ecm_generator to media_cas_packager_sdk/internal. ------------- Add a simple TCP server listening on a port. My intention is to use this server to support the Simulcrypt APIs (TODO). Also add a simple TCP client binary for testing the server and also demo how to call the Simulcrypt APIs (TODO). ------------- If only a single key is in the ECM, it is the EVEN key. To make the code matches this understanding, change a parameter from 'false' to 'true'. But this change has NO impact on the produced ECM, regardless this parameter is 'false' or 'true' (i.e., whether using push_front or push_back), only a single key is in the ECM. ------------- Add classes that process Simulcrypt ECMG messages 1) Stream_set-up 2) CW_provision ------------- Renames server and client binaries. ------------- Make ecmg call ecm_generator to generate ecm. The return of the ecm to Simulcrypt caller will be implemented in the next CL. For now, using the 'key' (control word) in CW_provision message also as the 'key_id'. ------------- Move common folder ------------- Created by MOE: https://github.com/google/moe MOE_MIGRATED_REVID=217358698
56 lines
2.1 KiB
C++
56 lines
2.1 KiB
C++
////////////////////////////////////////////////////////////////////////////////
|
|
// Copyright 2018 Google LLC.
|
|
//
|
|
// This software is licensed under the terms defined in the Widevine Master
|
|
// License Agreement. For a copy of this agreement, please contact
|
|
// widevine-licensing@google.com.
|
|
////////////////////////////////////////////////////////////////////////////////
|
|
|
|
#include "common/certificate_util.h"
|
|
|
|
#include "common/certificate_type.h"
|
|
#include "common/drm_root_certificate.h"
|
|
#include "common/drm_service_certificate.h"
|
|
#include "common/verified_media_pipeline.h"
|
|
#include "common/vmp_checker.h"
|
|
#include "license_server_sdk/internal/client_cert.h"
|
|
#include "license_server_sdk/internal/device_status_list.h"
|
|
|
|
namespace widevine {
|
|
util::Status SetCertificateStatusList(
|
|
CertificateType cert_type, const std::string& signed_certificate_status_list,
|
|
uint32_t expiration_period_seconds, bool allow_unknown_devices) {
|
|
util::Status status =
|
|
VmpChecker::Instance()->SelectDrmCertificateType(cert_type);
|
|
if (!status.ok()) return status;
|
|
|
|
std::unique_ptr<DrmRootCertificate> root_cert;
|
|
status = DrmRootCertificate::CreateByType(cert_type, &root_cert);
|
|
if (!status.ok()) {
|
|
return status;
|
|
}
|
|
status = CertificateClientCert::SetDrmRootCertificatePublicKey(
|
|
root_cert->public_key());
|
|
if (!status.ok()) {
|
|
return status;
|
|
}
|
|
DeviceStatusList::Instance()->set_allow_unknown_devices(
|
|
allow_unknown_devices);
|
|
return DeviceStatusList::Instance()->UpdateStatusList(
|
|
root_cert->public_key(), signed_certificate_status_list,
|
|
expiration_period_seconds);
|
|
}
|
|
|
|
util::Status AddDrmServiceCertificate(
|
|
CertificateType cert_type, const std::string& service_certificate,
|
|
const std::string& service_private_key,
|
|
const std::string& service_private_key_passphrase) {
|
|
util::Status status =
|
|
VmpChecker::Instance()->SelectDrmCertificateType(cert_type);
|
|
if (!status.ok()) return status;
|
|
return DrmServiceCertificate::AddDrmServiceCertificate(
|
|
cert_type, service_certificate, service_private_key,
|
|
service_private_key_passphrase);
|
|
}
|
|
} // namespace widevine
|